scholarly journals Coverless Steganography Based on Motion Analysis of Video

2021 ◽  
Vol 2021 ◽  
pp. 1-16
Author(s):  
Yun Tan ◽  
Jiaohua Qin ◽  
Xuyu Xiang ◽  
Chunhu Zhang ◽  
Zhangdong Wang

With the rapid development of interactive multimedia services and camera sensor networks, the number of network videos is exploding, which has formed a natural carrier library for steganography. In this study, a coverless steganography scheme based on motion analysis of video is proposed. For every video in the database, the robust histograms of oriented optical flow (RHOOF) are obtained, and the index database is constructed. The hidden information bits are mapped to the hash sequences of RHOOF, and the corresponding indexes are sent by the sender. At the receiver, through calculating hash sequences of RHOOF from the cover video, the secret information can be extracted successfully. During the whole process, the cover video remains original without any modification and has a strong ability to resist steganalysis. The capacity is investigated and shows good improvement. The robustness performance is prominent against most attacks such as pepper and salt noise, speckle noise, MPEG-4 compression, and motion JPEG 2000 compression. Compared with the existing coverless information hiding schemes based on images, the proposed method not only obtains a good trade-off between hiding information capacity and robustness but also can achieve higher hiding success rate and lower transmission data load, which shows good practicability and feasibility.

2016 ◽  
Vol 11 (7) ◽  
pp. 163
Author(s):  
Xinyi Dong ◽  
Hongmei Ju ◽  
Sifan Yin

<p>E-commerce has a rapid development with the advent of the Internet era, the era of “Internet +” also let many industries to find new opportunities. Now online shopping has become a mainstream to meet the needs of people’s life, especially in the developed cities, more and more people are willing to buy all sorts of goods in e - Bay, Amazon, Sunning, JD and other large e-commerce enterprises. Business enterprise needs to deliver intact goods quickly to customers to improve customers’ intention of purchasing. So the development of e-commerce and express industry is closely linked. The end of the city logistics needs to contact with consumers directly as the last part of the whole process in normal logistics distribution, which may occur some problems about the damage of goods, slow information feedback, service quality and other issues will reduce the satisfaction of consumers and affect reputation of companies. This article use ISM technology to analyze the influencing factors of the logistics of the ecommerce enterprise from the perspective of consumers, and divide all of the factors into three levels, each level contains different meanings which make a reference for the trend of development of the end of city logistics distribution. </p>


2018 ◽  
Vol 246 ◽  
pp. 03016
Author(s):  
Aidong Xu ◽  
Kai Fan ◽  
Hang Yang

With the rapid development of information technology construction in the power industry, research on network security has become a problem that cannot be ignored. This paper introduces the use of information communication network equipment at home and abroad in power system; analyzes the security risks of foreign network equipment in power system, shows the risk of power system network and the urgent need for localization of network equipment and analyzes the security of internal network of power system Risks; specific measures for the safety control of network equipment in the whole process are proposed to provide reference for power system network security protection.


Author(s):  
Shutian Zhou ◽  
Guofang Zhai ◽  
Yuwen Lu ◽  
Yijun Shi

Since there has been a huge amount of transport infrastructure projects being proposed, planned and constructed over the past decades in China, this article aims to reveal the substantial dynamics of China’s rapid development of urban mega-projects. It analyzes Nantong’s metro project to use it as a case study – how it was being justified, approved and implemented, and what were the key driving forces within the whole process through official justifications and key informant interview materials. The urban metro system is supposedly an approach to achieve urban development objectives, a tool for growth and a way to a better urban life. We find inter-city competition as an underlying driving force that initiates such urban mega-projects with certain weight given to economic indicators in project appraisals within a largely local government-led and public-invested process. Furthermore, domestic economic performance and changing policy interventions also exert significant influence on project approval and long-term project development. Our findings echo some Western literature on mega-projects development and urban competition, while revealing other features and emerging issues relating to project initiation, proposal examination and implementation specific to the Chinese context.


2013 ◽  
Vol 722 ◽  
pp. 86-92
Author(s):  
Yun Na Wu ◽  
Wen Jun Chen ◽  
Yang Li

Chinese wind power has undergone a rapid development under the support from government and technology progress, which caused a discordant situation with the backward of its post-evaluation work. Currently, a comprehensive post-evaluation index system and evaluation methods has not been established, the result of current evaluation cannot help the decision-making for the follow-up projects and the further improvement of the operational status of wind farm. However, since the end of 2010, there are more and more problems exposed in wind powers development. It is necessary to develop a comprehensive and scientific post-evaluation on Chinese wind power project. This research contains two parts, the first part constructed a whole-process post-evaluation model on wind power project, the second part developed a target completion degree post-evaluation model from terms of cost, quality, schedule, safety and environment. What is more, the literature about wind power project evaluation was analyzed in this paper.


Author(s):  
Lijuan Chang ◽  
Yaning Wang ◽  
Guanhai Feng ◽  
Liqiang Wang

With the rapid development of economic development in China, the urban construction is gradually deepening. The scale and scope of the construction project are getting larger and larger, and the engineering management is faced with many challenges. At present, many construction enterprises have some problems in the management of construction projects. In order to improve the quality management level, the whole process of supervision and management must be done. Take effective measures to solve the problems existing in the construction and ensure the smooth completion of the whole project construction. This paper analyzes the existing problems of construction quality supervision and management, and puts forward some concrete measures. It is hoped that the level of industry supervision and management can be improved to ensure the realization of the quality objectives of the project[1].


2018 ◽  
Vol 159 (46) ◽  
pp. 1940-1947
Author(s):  
András Bibok ◽  
Pál Ákos Deák ◽  
Attila Doros

Abstract: The transplantation of the abdominal organs has a major role in the treatment of several diseases. All subspecialities affected with the transplantation showed a rapid development in the last decades. The cooperation of the specialists of different segments of medicine provides the success of organ transplantation. Teamwork is necessary throughout the whole process starting from securing the technical background and proper human workforce, followed by the lifelong management of organs and recipients as well. One of the key players of organ transplantation is radiology and interventional radiology – the role of the latter one is discussed in this review, including the minimally invasive treatment of pre- and post-transplantation situations and diseases. Besides vascular and non-vascular interventions, the options of interventional oncology will be mentioned based on international literature and Hungarian experience. Orv Hetil. 2018; 159(46): 1940–1947.


2014 ◽  
Vol 1044-1045 ◽  
pp. 1040-1044
Author(s):  
Qing Ping Wang ◽  
Hong Zhu ◽  
Wei Wei Wu ◽  
Chang Zhu ◽  
Nai Chang Yuan

An improved algorithm for ship detection from the high-resolution synthetic aperture radar (SAR) images is proposed in this paper. In this algorithm, we firstly utilize the image pre-processing step to suppress the speckle noise. Then, the ship ROIs (Region of Interest) are obtained based on MSER (Maximally Stable Extremal Region) method, which enables preliminary extraction of ship candidates. Finally, an improved CFAR (Constant False Alarm Rate) detector is designed for accurate detection with the purpose of accelerating the whole process and decreasing false alarms. The experimental results show that this method can achieve effective ship detection in high-resolution SAR images. The process of ship detection is also accelerated which is in favour of the project realization.


2014 ◽  
Vol 18 (01) ◽  
pp. 199-221
Author(s):  
Wei Feng ◽  
Yong Ma ◽  
Shengliang Deng

This case describes how Fujian CTS Group, a state-owned company in Fujian Province, China, transformed from a company suffering from three consecutive years of losses to a profitable conglomerate through strategic restructuring. This case focuses on the whole process of strategic restructuring, including the background of the restructuring, the formulation and implementation of the strategic restructuring plan, as well as the results of the restructuring. FJ CTS group was founded in December 1949 as “Xiamen Overseas Chinese Service”, known as the first travel agency of PR China. After 60 years of development, Fujian CTS Group has developed into a conglomerate with core businesses of travel service, hotel, and tour bus. With the rapid development of China's tourism industry and quick change of business environment, Fujian CTS Group faced fierce competition from many domestic and foreign tourism enterprises, and the company had suffered from three consecutive years of losses since 2003. At the end of 2005, in order to get the company out of financial difficulties and achieve profitability, the board of directors of the group started to work on strategic restructuring program. At the end of 2006, the restructuring plan was completed. In early 2007, the group began the implementation of restructuring plan. Since then, with two years' great efforts, the restructuring of the group had been completed successfully. The company's overall revenue rose steadily, operating performance greatly improved. Until the end of 2009, the total assets of the group reached 13.52 billion Chinese yuan and the three core businesses (travel service segment, hotel segment, and tour bus segment) of the group all achieved good financial performance. The group has achieved turnaround through effective restructuring.


Symmetry ◽  
2021 ◽  
Vol 13 (6) ◽  
pp. 1043
Author(s):  
Junqi Guo ◽  
Minghui Yang ◽  
Boxin Wan

With the rapid development of the Internet of Things (IoT), wearable devices have become ubiquitous and interconnected in daily lives. Because wearable devices collect, transmit, and monitor humans’ physiological signals, data privacy should be a concern, as well as fully protected, throughout the whole process. However, the existing privacy protection methods are insufficient. In this paper, we propose a practical privacy-preserving mechanism for physiological signals collected by intelligent wearable devices. In the data acquisition and transmission stage, we employed existing asymmetry encryption-based methods. In the data publishing stage, we proposed a new model based on the combination and optimization of k-anonymity and differential privacy. An entropy-based personalized k-anonymity algorithm is proposed to improve the performance on processing the static and long-term data. Moreover, we use the symmetry of differential privacy and propose the temporal differential privacy mechanism for real-time data to suppress the privacy leakage while updating data. It is proved theoretically that the combination of the two algorithms is reasonable. Finally, we use smart bracelets as an example to verify the performance of our mechanism. The experiment results show that personalized k-anonymity improves up to 6.25% in terms of security index compared with traditional k-anonymity, and the grouping results are more centralized. Moreover, temporal differential privacy effectively reduces the amount of information exposed, which protects the privacy of IoT-based users.


Author(s):  
Weihao Qiu ◽  
Zhirun Hu ◽  
Liquan Xiao

As the rapid development of communication industry, especially the 5G communication and IOT, there will be plenty of electromagnetic (EM) waves in the free space, which carry lots of energies. However, some of these energies are wasted in free space. To reuse these wasted energies, significantly growing interests are towards to the energy harvesting antennas. This paper is aimed to investigate a wearable antenna which can transfer RF energy from ambient sources to direct current by a soft and portable textile antenna. Among the numerous signals in mobile network, the GSM 1800, 3G, WiFi and 4G/5G will be chosen due to the city signal intensity distribution. Hence, a corresponding triple bands antenna has been designed to cover those frequency bands. The CST STUDIO SUITE is used in whole process of antenna design and simulation. The proposed antenna is a hooked dipole antenna with tuning bar (HATB) whose ends have small folded part in each side for better bandwidth performance. The presented antenna provides a wide operating band from 1.8 GHz to 2.5 GHz below -10 dB in return loss. And methods to overcome interference between antennas is found. Furthermore, using the corresponding rectifier to achieve the RF/DC conversion. The overall efficiency of whole rectifier is about 56.8 %, and output power level of the antenna system is 45.92nW. The experimental results could indicate that my textile hooked antenna harvester is a good choice for the charging system of personal wearable attachment, which could achieve low power absorbing for long distance anytime and anywhere.


Sign in / Sign up

Export Citation Format

Share Document