-
Article
(k, n) threshold secret image sharing scheme based on Chinese remainder theorem with authenticability
In the traditional secret image sharing (SIS) scheme, the secret image is divided into several noise-like shares, which lack authentication and may attract the attention of malicious users. Therefore, the auth...
-
Chapter and Conference Paper
PTAC: Privacy-Preserving Time and Attribute Factors Combined Cloud Data Access Control with Computation Outsourcing
Cloud storage service has significant advantages on both cost reduction and convenient data sharing. It frees data owners from technical management. However, it poses new challenges on privacy and security pro...
-
Chapter and Conference Paper
Towards More Powerful Multi-column Convolutional Network for Crowd Counting
Scale variation has always been one of the most challenging problems for crowd counting. By using multi-column convolutions with different receptive fields to deal with different scales in the scene, the multi...
-
Chapter and Conference Paper
Reset Attack: An Attack Against Homomorphic Encryption-Based Privacy-Preserving Deep Learning System
In some existing privacy-preserving deep learning systems, additively homomorphic encryption enables ciphertext computation across the gradients. Therefore, many learning participants can perform neural networ...
-
Chapter and Conference Paper
A Novel Visual Cryptography Scheme Shared with Edge Information Embedded QR Code
QR code has been widely used in our daily life due to its convenience, and the security of QR code becomes a rising problem. In this paper, we introduce a new algorithm that adds the edge of the gray image to ...
-
Article
Object and patch based anomaly detection and localization in crowded scenes
Detecting and localizing anomalies in crowded scenes is an ongoing challenge for public security. Existing approaches are mainly based on patches and trajectories. However, they fall short in semantic understa...
-
Chapter and Conference Paper
Learning Cross Camera Invariant Features with CCSC Loss for Person Re-identification
Person re-identification (re-ID) is mainly deployed in the multi-camera surveillance scene, which means that learning cross camera invariant features is highly required. In this paper, we propose a novel loss ...
-
Article
Which gray level should be given the smallest cost for adaptive steganography?
Currently, the most successful approach to steganography in digital image is distortion-minimization framework, which reduces the steganographers’ work to the design of distortion function with the aid of prac...
-
Article
The mitochondrial genome of a stonefly species, Cerconychia sapa (Plecoptera: Styloperlidae)
The nearly complete sequence of the mitochondrial DNA (mtDNA) of the stonefly, Cerconychia sapa, has been completed and annotated in this study. The circular genome is 15,188 bp in length with an A+T content of 7...
-
Chapter and Conference Paper
Nest Detection Using Coarse-to-Fine Searching Strategy
Nest on pylon is a great threat to the safety and function of electric power system. Thus detection of nest has been considered as a vital task when checking transmission line through intelligent surveillance ...
-
Chapter and Conference Paper
Edge-Aware Saliency Detection via Novel Graph Model
Edge information takes an important role in distinguishing salient objects from background. In this paper, the screened edge information is utilized to roughly locate the salient object, which is combined with...
-
Article
The mitochondrial genome of Mesocapnia daxingana (Plecoptera: Capniidae)
The stonefly Mesocapnia daxingana (Plecoptera: Capniidae) is a new species and the capniid genus Mesocapnia are first reported from China. Their potential use as biomonitoring for water quality assessment is well...
-
Article
Cryptanalysis of a chaos-based image encryption scheme combining DNA coding and entropy
An image encryption scheme based on chaos system combining with DNA coding and information entropy has been proposed recently, in which chaos system and DNA operation are used to perform substitution, and entr...
-
Chapter and Conference Paper
Sub-channel and Power Allocation for Multiuser OFDM Systems with Proportional Rate Constraints Based on Genetic Algorithms
This paper considers sub-channel and power allocation based on genetic algorithms to maximize the overall system capacity using proportional rate constraints in multiuser orthogonal frequency division multiple...
-
Chapter and Conference Paper
Visual Information Encryption in Frequency Domain: Risk and Enhancement
Focusing on the encryption of digital image and video, this paper reports an intrinsic weakness of all existing discrete-cosine-transform (DCT) based algorithms. This serious weakness of DCT is analyzed theore...
-
Article
Analysis of Transmission Characteristics for NRD/Microstrip Line Hybrid Integrated LSE and LSM-Mode Baluns*
The NRD/microstrip line hybrid integration structure shows good behavior for millimeter wave applications. This paper applies the integral equations method to analyze the transmission characteristics of the NR...