Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image ...
详细信息
Generative image steganography is a technique that directly generates stego images from secret *** traditional methods,it theoretically resists steganalysis because there is no cover ***,the existing generative image steganography methods generally have good steganography performance,but there is still potential room for enhancing both the quality of stego images and the accuracy of secret information ***,this paper proposes a generative image steganography algorithm based on attribute feature transformation and invertible mapping ***,the reference image is disentangled by a content and an attribute encoder to obtain content features and attribute features,***,a mean mapping rule is introduced to map the binary secret information into a noise vector,conforming to the distribution of attribute *** noise vector is input into the generator to produce the attribute transformed stego image with the content feature of the reference ***,we design an adversarial loss,a reconstruction loss,and an image diversity loss to train the proposed *** results demonstrate that the stego images generated by the proposed method are of high quality,with an average extraction accuracy of 99.4%for the hidden ***,since the stego image has a uniform distribution similar to the attribute-transformed image without secret information,it effectively resists both subjective and objective steganalysis.
The Salp swarm algorithm (SSA) simulates how salps forage and travel in the ocean. SSA suffers from low initial population diversity, improper balancing of exploration and exploitation, and slow convergence speed. Thu...
详细信息
The application of aramid fiber(AF)/polyetheretherketone(PEEK)composites is currently hindered by the inert surface and poor wettability of AF,resulting in weak interfacial adhesion and poor mechani-cal *** coating an...
详细信息
The application of aramid fiber(AF)/polyetheretherketone(PEEK)composites is currently hindered by the inert surface and poor wettability of AF,resulting in weak interfacial adhesion and poor mechani-cal *** coating and the introduction of nanostructures have been proven to be effective approaches to address this ***,a simple hybrid sizing agent has been developed to modify the AF surface,consisting of soluble polyimide(PI)as a compatibilizer,carboxyl-functionalized carbon nanotubes(CNT-COOH)as a rigid unit,and aramid nanofibers(ANF)as a flexible *** syner-getic effects of PI and the multiscale flexible-rigid structure(CNT-COOH/ANF)contribute to the formation of chemical and physical bonds between AF and PEEK matrix,further improving the interfacial adhesion and stress transfer *** to the enhanced wettability and roughness of AF,compared with unsized AF,the flexural strength(220.97 MPa),modulus(13.26 GPa),ILSS(13.36 MPa),and storage modu-lus(12.93 GPa)of the AF/PEEK composite increase by 132.60%,99.00%,18.97%,and 82.70%***,the flexible-rigid nanonetwork facilitates the penetration of the PEEK resin into pore *** simple and effective approach exhibits promising potential in enhancing the interfacial bonding of AF/PEEK composites.
In today's digital era, the use of data is becoming more day by day. Data is serving as a main source for all the applications we rely on. As the volume of data rapidly increases, the need for security also increa...
详细信息
We rethink the segment anything model(SAM) and propose a novel multiprompt network called COMPrompter for camouflaged object detection(COD). SAM has zero-shot generalization ability beyond other models and can provide...
详细信息
We rethink the segment anything model(SAM) and propose a novel multiprompt network called COMPrompter for camouflaged object detection(COD). SAM has zero-shot generalization ability beyond other models and can provide an ideal framework for COD. Our network aims to enhance the single prompt strategy in SAM to a multiprompt strategy. To achieve this, we propose an edge gradient extraction module, which generates a mask containing gradient information regarding the boundaries of camouflaged objects. This gradient mask is then used as a novel boundary prompt, enhancing the segmentation process. Thereafter, we design a box-boundary mutual guidance module, which fosters more precise and comprehensive feature extraction via mutual guidance between a boundary prompt and a box prompt. This collaboration enhances the model's ability to accurately detect camouflaged objects. Moreover, we employ the discrete wavelet transform to extract high-frequency features from image embeddings. The high-frequency features serve as a supplementary component to the multiprompt ***, our COMPrompter guides the network to achieve enhanced segmentation results, thereby advancing the development of SAM in terms of COD. Experimental results across COD benchmarks demonstrate that COMPrompter achieves a cutting-edge performance, surpassing the current leading model by an average positive metric of 2.2% in COD10K. In the specific application of COD, the experimental results in polyp segmentation show that our model is superior to top-tier methods as well. The code will be made available at https://***/guobaoxiao/COMPrompter.
A progressive neurodegenerative ailment called Parkinson's disease (PD) is marked by the death of dopamine-producing cells in the substantia nigra area of the brain. The exact etiology of PD remains elusive, but i...
详细信息
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and ...
详细信息
Pervasive Computing has become more personal with the widespread adoption of the Internet of Things(IoT)in our day-to-day *** emerging domain that encompasses devices,sensors,storage,and computing of personal use and surroundings leads to Personal IoT(PIoT).PIoT offers users high levels of personalization,automation,and *** proliferation of PIoT technology has extended into society,social engagement,and the interconnectivity of PIoT objects,resulting in the emergence of the Social Internet of Things(SIoT).The combination of PIoT and SIoT has spurred the need for autonomous learning,comprehension,and understanding of both the physical and social *** research on PIoT is dedicated to enabling seamless communication among devices,striking a balance between observation,sensing,and perceiving the extended physical and social environment,and facilitating information ***,the virtualization of independent learning from the social environment has given rise to Artificial Social Intelligence(ASI)in PIoT ***,autonomous data communication between different nodes within a social setup presents various resource management challenges that require careful *** paper provides a comprehensive review of the evolving domains of PIoT,SIoT,and ***,the paper offers insightful modeling and a case study exploring the role of PIoT in post-COVID *** study contributes to a deeper understanding of the intricacies of PIoT and its various dimensions,paving the way for further advancements in this transformative field.
Severe rainfall has seriously threatened human health and survival. Natural catastrophes such as floods, droughts, and many other natural disasters are caused by heavy rains, which people worldwide have to deal with t...
详细信息
Cloud computing (CC) is a cost-effective platform for users to store their data on the internet rather than investing in additional devices for storage. Data deduplication (DD) defines a process of eliminating redunda...
详细信息
Multilevel characterization of the recently developed Unknown Protein Sequence (UPS) is significant for the drug-designing, disease-diagnosis, and treatment plans. UPS can demonstrate harmful as well as useful charact...
详细信息
暂无评论