Current Issue : January - March Volume : 2021 Issue Number : 1 Articles : 5 Articles
With the rapid development of Internet and cloud storage, data security sharing and copyright protection are becoming more and\nmore important. In this paper, we introduce a robust image watermarking algorithm for copyright protection based on variational\nautoencoder networks. The proposed image watermarking embedding and extracting network consists of three parts: encoder\nsubnetwork, decoder subnetwork, and detector subnetwork. In the training process, the encoder and decoder subnetworks learn a\nrobust image representation model and further implement the embedding of 1-bit watermark image to the cover image.\nMeanwhile, the detector subnetwork learns to extract the 1-bit watermark image from the embedding image. Experimental results\ndemonstrate that the watermarked images generated by the proposed algorithm have better visual effects and are more robust\nagainst geometric and noise attacks than traditional approaches in the transform domain....
In this paper, through the improved decision tree algorithm, the handles in multimedia English assistance are parsed and\nsimulated. In order to better perceive the sense of language in English composition and improve the rationality of intelligent\nevaluation, an N element based on association analysis is proposed. Sense value quantification calculates its support in the corpus\nby obtaining N-tuples of the composition. If the degree of support is lower than the threshold, the part where the language sense\nproblem occurs is analyzed, and the type of language sense problem is judged for the students to provide assistance in modifying\nthe composition. In addition, this paper also extracts word features, sentence features, and text structure features in the\ncomposition to fit the English handles analytical score. By testing the test set, the experiment shows that, by extracting the language\nsense features of the candidateâ??s English composition, it can not only judge whether there is a problem with the language sense of\nthe candidate, but also provide a basis for the overall evaluation of the composition....
Digital image watermarking is an attractive research area since it protects the multimedia data from unauthorized access. For\ndesigning an efficient and robust digital image watermarking system, the trade-off among imperceptibility, robustness, capacity,\nand security must be maintained. Various studies regarding this concern have been performed to ensure these requirements by\nhybridizing different domains, such as spatial and transform domains. In this paper, we have presented an analytical study of the\nexisting hybrid digital image watermarking methods. At first, we have given a standard framework for designing a hybrid method\nthat ensures the basic design requirements of watermarking for various applications. After a brief literature review, we compared\nand analyzed the complexity of several existing hybrid methods in a tabular form. The limitations and applications of these\nmethods are also highlighted. Finally, we summarized the challenges of the existing methods and concluded the study by giving\nfuture research directions....
Since 3D models can intuitively display real-world information, there are potential scenarios in many application fields, such as\narchitectural models and medical organ models. However, a 3D model shared through the internet can be easily obtained by an\nunauthorized user. In order to solve the security problem of 3D model in the cloud, a reversible data hiding method for\nencrypted 3D model based on prediction error expansion is proposed. In this method, the original 3D model is preprocessed,\nand the vertex of 3D model is encrypted by using the Paillier cryptosystem. In the cloud, in order to improve accuracy of\ndata extraction, the dyeing method is designed to classify all vertices into the embedded set and the referenced set. After that,\nsecret data is embedded by expanding direction of prediction error with direction vector. The prediction error of the vertex\nin the embedded set is computed by using the referenced set, and the direction vector is obtained according to the mapping\ntable, which is designed to map several bits to a direction vector. Secret data can be extracted by comparing the angle\nbetween the direction of prediction error and direction vector, and the original model can be restored using the referenced\nset. Experiment results show that compared with the existing data hiding method for encrypted 3D model, the proposed\nmethod has higher data hiding capacity, and the accuracy of data extraction have improved. Moreover, the directly decrypted\nmodel has less distortion....
Image hashing has attracted much attention of the community of multimedia security in the past years. It has been successfully used\nin social event detection, image authentication, copy detection, image quality assessment, and so on. This paper presents a novel\nimage hashing with low-rank representation (LRR) and ring partition. The proposed hashing finds the saliency map by the\nspectral residual model and exploits it to construct the visual representation of the preprocessed image. Next, the proposed\nhashing calculates the low-rank recovery of the visual representation by LRR and extracts the rotation-invariant hash from the\nlow-rank recovery by ring partition. Hash similarity is finally determined by L2 norm. Extensive experiments are done to\nvalidate effectiveness of the proposed hashing. The results demonstrate that the proposed hashing can reach a good balance\nbetween robustness and discrimination and is superior to some state-of-the-art hashing algorithms in terms of the area under\nthe receiver operating characteristic curve....
Loading....