Image steganography is the art and science of secure communication by concealing information within digital images. In recent years, the techniques of steganographic cost learning have developed rapidly. Although the ...
详细信息
Image steganography is the art and science of secure communication by concealing information within digital images. In recent years, the techniques of steganographic cost learning have developed rapidly. Although the existing methods can learn satisfactory additive costs, the interplay of different pixels' embedding impacts has not been considered, so the potential of learning may not be fully exploited. To overcome this limitation, in this paper, a reinforcement learning paradigm called Jo Po L(joint policy learning) is proposed to extend the idea of additive cost learning to a non-additive situation. Jo Po L aims to capture the interactions within pixel blocks by defining embedding policies and evaluating contributions of embedding impacts on a block level rather than a pixel level. Then, a policy network is utilized to learn optimal joint embedding policies for pixel blocks through interactions with the environment. Afterwards,these policies can be converted into joint embedding costs for practical message embedding. The structure of the policy network is designed with an effective attention mechanism and incorporated with the domain knowledge derived from traditional non-additive steganographic methods. The environment is responsible for assigning rewards according to the impacts of the sampled joint embedding actions, which are evaluated by the gradient information of a neural network-based steganalyzer. Experimental results show that the proposed non-additive method Jo Po L significantly outperforms the existing additive methods against both feature-based and CNN-based steganalzyers over different payloads.
In today s age, many daily tasks are performed through the Internet using various web applications. While using the web application, the information and data are stored in the database of the network which can easily ...
详细信息
Due to the high flexibility of quadruped robots compared with some traditional robots, it has become an important branch in the field of mobile robot research. Target detection and tracking technology is important for...
详细信息
Retrieving superior legal articles involves identifying relevant legal articles that hold higher legal effectiveness. This process is crucial in legislative work because superior legal articles form the legal basis fo...
In the era of artificial intelligence generated content (AIGC), conditional multimodal synthesis technologies (e.g., text-to-image) are dynamically reshaping the natural content. Brain signals, serving as potential re...
详细信息
The increasing complexity and memory demands of Deep Neural Networks (DNNs) for real-Time systems pose new significant challenges, one of which is the GPU memory capacity bottleneck, where the limited physical memory ...
详细信息
In recent years,feature engineering-based machine learning models have made significant progress in auto insurance fraud ***,most models or systems focused only on structural data and did not utilize multi-modal data ...
详细信息
In recent years,feature engineering-based machine learning models have made significant progress in auto insurance fraud ***,most models or systems focused only on structural data and did not utilize multi-modal data to improve fraud detection *** solve this problem,we adapt both natural language processing and computer vision techniques to our knowledge-based algorithm and construct an Auto Insurance Multi-modal Learning(AIML)*** then apply AIML to detect fraud behavior in auto insurance cases with data from real scenarios and conduct experiments to examine the improvement in model performance with multi-modal data compared to baseline model with structural data only.A selfdesigned Semi-Auto Feature Engineer(SAFE)algorithm to process auto insurance data and a visual data processing framework are embedded within *** show that AIML substantially improves the model performance in detecting fraud behavior compared to models that only use structural data.
A market study showed that an average of 70% of smartphone users use an android-based smartphone. The Android operating system draws numerous malware threats as a result of its popularity. The statistic reveals that 9...
详细信息
This work addresses maximally robust control synthesis under unknown disturbances. We consider a nonlinear system, subject to a Signal Temporal Logic (STL) specification and jointly synthesize the maximal possible dis...
详细信息
Background: Trajectory planning is important to research in robotics. As the application environment changes rapidly, robot trajectory planning in a static environment can no longer meet actual needs. Therefore, a lot...
详细信息
暂无评论