Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unso...
详细信息
Prevailing linguistic steganalysis approaches focus on learning sensitive features to distinguish a particular category of steganographic texts from non-steganographic texts,by performing binary *** it remains an unsolved problem and poses a significant threat to the security of cyberspace when various categories of non-steganographic or steganographic texts *** this paper,we propose a general linguistic steganalysis framework named LS-MTL,which introduces the idea of multi-task learning to deal with the classification of various categories of steganographic and non-steganographic ***-MTL captures sensitive linguistic features from multiple related linguistic steganalysis tasks and can concurrently handle diverse tasks with a constructed *** the proposed framework,convolutional neural networks(CNNs)are utilized as private base models to extract sensitive features for each steganalysis ***,a shared CNN is built to capture potential interaction information and share linguistic features among all ***,LS-MTL incorporates the private and shared sensitive features to identify the detected text as steganographic or *** results demonstrate that the proposed framework LS-MTL outperforms the baseline in the multi-category linguistic steganalysis task,while average Acc,Pre,and Rec are increased by 0.5%,1.4%,and 0.4%,*** ablation experimental results show that LS-MTL with the shared module has robust generalization capability and achieves good detection performance even in the case of spare data.
computer-generated aesthetic patterns arewidely used as design materials in various fields. Themost common methods use fractals or dynamicalsystems as basic tools to create various patterns. Toenhance aesthetics and c...
详细信息
computer-generated aesthetic patterns arewidely used as design materials in various fields. Themost common methods use fractals or dynamicalsystems as basic tools to create various patterns. Toenhance aesthetics and controllability, some researchershave introduced symmetric layouts along with thesetools. One popular strategy employs dynamical systemscompatible with symmetries that construct functionswith the desired symmetries. However, these aretypically confined to simple planar symmetries. Theother generates symmetrical patterns under theconstraints of tilings. Although it is slightly moreflexible, it is restricted to small ranges of tilingsand lacks textural variations. Thus, we proposed anew approach for generating aesthetic patterns bysymmetrizing quasi-regular patterns using general kuniformtilings. We adopted a unified strategy toconstruct invariant mappings for k-uniform tilings thatcan eliminate texture seams across the tiling ***, we constructed three types of symmetriesassociated with the patterns: dihedral, rotational, andreflection symmetries. The proposed method can beeasily implemented using GPU shaders and is highlyefficient and suitable for complicated tiling with regularpolygons. Experiments demonstrated the advantages of our method over state-of-the-art methods in terms offlexibility in controlling the generation of patterns withvarious parameters as well as the diversity of texturesand styles.
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing ima...
详细信息
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore *** image sharing can also raise privacy *** encryption can protect social ***,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial *** this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and ***,the fingerprint code with a hierarchical community structure is designed based on social network ***,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is *** that,all codeword segments are embedded into the LL,LH,and HL subbands,*** selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our ***,the superiority of the technique is elaborated through comparison with some related image security *** solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social *** the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured.
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase t...
详细信息
The intact data transmission to the authentic user is becoming crucial at every moment in the current ***;is a technique for concealing the hidden message in any cover media such as image,video;and audio to increase the protection of *** resilience and imperceptibility are improved by choosing an appropriate embedding *** paper gives a novel system to immerse the secret information in different videos with different *** audio and video steganography with novel amalgamations are implemented to immerse the confidential auditory information and the authentic user’s face image.A hidden message is first included in the audio from the multimedia file;using LSB *** Stego-video is created in the second stage by merging the authorized user’s face into the frame of the video;by using PVD ***-audio is linked again with the stego-video in the third *** incorporated perspective techniques(LSB-SS and PVD-SS algorithms)with more significant data immersing capacity,good robustness and imperceptibility are proposed in this research *** spread spectrum approach is used to increase the complexity of secret data *** different video files are tested with different voice files with the results such as PSNR,SSIM,RMSE and MSE as 52.3,0.9963,0.0024 and 0.0000059,respectively.
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation *** MHNN is simulated and dynamicall...
详细信息
A memristive Hopfield neural network(MHNN)with a special activation gradient is proposed by adding a suitable memristor to the Hopfield neural network(HNN)with a special activation *** MHNN is simulated and dynamically analyzed,and implemented on ***,a new pseudo-random number generator(PRNG)based on MHNN is *** post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator,which effectively ensures the randomness of *** experiments in this paper comply with the IEEE 754-1985 high precision32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7 Z020 CLG400-2 FPGA chip and the Verilog-HDL hardware programming *** random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis,proving its randomness and high ***,an image encryption system based on PRNG is proposed and implemented on FPGA,which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things(Io T).
Fake news, Fake certification, and Plagiarism are the most common issues arising these days. During this COVID-19 situation, there are a lot of rumors and fake news spreading and some of us are using fake certificatio...
详细信息
Placement is one of the most critical design stages for very large-scale integrated (VLSI) circuits. Modern VLSI placers usually adopt the analytical placement framework, which formulates placement into a non-linear o...
详细信息
Data envelopment analysis (DEA) is widely used in various fields and for various models. Inverted data envelopment analysis (inverted DEA) is an extended model of DEA. Regression analysis (RA) is a statistical process...
详细信息
Medical data are subject to privacy regulations, which severely limit AI specialists who wish to construct decision support systems for medicine. Large amounts of this data are tabular, indicating that they are organi...
详细信息
This system provides a comprehensive overview of hospital environments by tracking air quality, dust, temperature, and humidity simultaneously, offering a more complete picture of indoor conditions than systems that f...
详细信息
暂无评论