scholarly journals Hiding multiple secret information using dynamic image bit manipulation

2020 ◽  
Vol 1444 ◽  
pp. 012039
Author(s):  
Ahmad Fashiha Hastawan ◽  
Risma Septiana
Author(s):  
Мадина Усенбай ◽  
Акмарал Иманбаева

Конфиденциальность является одним из важных параметров для повышения безопасности в сети, цель которого - сохранить секретную информацию. Рассмотрена модель доверия, состоящая из текущих и прошлых оценок на основе репутации объекта в сети. В модели используется параметр времени для защиты конфиденциальности пользователя для статических и динамических объектов, например, в IoT или облачной технологии. Confidentiality is one of the important parameters for increasing security on the network, the coal of which is to keep secret information. A trust model consisting of current and past assessments based on the object reputation in the network is considered. The model uses a time parameter to protect user privacy for static and dynamic objects, for example, in IoT or cloud technology.


2020 ◽  
Author(s):  
Yanping Chen ◽  
Dongjie Yu ◽  
Jane Cansoni

BACKGROUND Background: Nowadays, the application of computer technology in the medical field is more and more extensive, and many diseases can achieve better diagnosis and treatment effects through computer technology. OBJECTIVE Objective: The paper applies intelligent facial dynamic image information to the clinical treatment of peripheral acupuncture and moxibustion for the treatment of peripheral facial paralysis. An automatic acupoint positioning algorithm based on facial information dynamic image is proposed, which provides an objective and standard basis for the treatment of facial acupuncture and moxibustion. METHODS Methods: The paper selects the head threshold, that is, the facial dynamic image information as the research background, and divides the facial features according to the "three courts and five eyes" rule, and uses the Minimum Eigenvalue operator to detect the corner points of the facial features, locate the facial features, and use the face. The feature position is used as a reference coordinate for facial acupoint positioning. RESULTS Results: After verification, it was found that the positioning was accurate, and the peripheral facial paralysis of the patient was improved after warm acupuncture point positioning treatment, which improved the facial nerve function of the patient, improved the treatment efficiency and shortened the treatment time. Therefore, this technology is worthy of clinical promotion. CONCLUSIONS Conclusion: Through experimental analysis, the algorithm is proved to be effective and accurate. Based on facial dynamic image information to locate acupoints, warm acupuncture has a significant effect on peripheral facial paralysis, which can significantly improve facial nerve function and shorten treatment time, which is worthy of clinical promotion.


Author(s):  
Lungwen Kuo ◽  
Tsuiyueh Chang ◽  
Chih‐Chun Lai

Author(s):  
Effrosyni Doutsi ◽  
Lionel Fillatre ◽  
Marc Antonini ◽  
Panagiotis Tsakalides

Complexity ◽  
2020 ◽  
Vol 2020 ◽  
pp. 1-12
Author(s):  
Xi-Yan Li ◽  
Xia-Bing Zhou ◽  
Qing-Lei Zhou ◽  
Shi-Jing Han ◽  
Zheng Liu

With the development of cloud computing, high-capacity reversible data hiding in an encrypted image (RDHEI) has attracted increasing attention. The main idea of RDHEI is that an image owner encrypts a cover image, and then a data hider embeds secret information in the encrypted image. With the information hiding key, a receiver can extract the embedded data from the hidden image; with the encryption key, the receiver reconstructs the original image. In this paper, we can embed data in the form of random bits or scanned documents. The proposed method takes full advantage of the spatial correlation in the original images to vacate the room for embedding information before image encryption. By jointly using Sudoku and Arnold chaos encryption, the encrypted images retain the vacated room. Before the data hiding phase, the secret information is preprocessed by a halftone, quadtree, and S-BOX transformation. The experimental results prove that the proposed method not only realizes high-capacity reversible data hiding in encrypted images but also reconstructs the original image completely.


Author(s):  
Kiran S. Balagani ◽  
Mauro Conti ◽  
Paolo Gasti ◽  
Martin Georgiev ◽  
Tristan Gurtler ◽  
...  

Sign in / Sign up

Export Citation Format

Share Document