GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
  • MDPI AG  (26)
  • Chang, Chin-Chen  (26)
  • 1
    Online Resource
    Online Resource
    MDPI AG ; 2019
    In:  Symmetry Vol. 11, No. 1 ( 2019-01-11), p. 79-
    In: Symmetry, MDPI AG, Vol. 11, No. 1 ( 2019-01-11), p. 79-
    Abstract: A subtopic of visual secret sharing (VSS) is information hiding-based VSS (IH-VSS), which embeds secret messages into images using an information hiding technique. In the IH-VSS scheme, stego-images are divided into shadows under the guidance and constraint of some predetermined approaches. In order to achieve the purpose of security and reliability, the hidden information cannot be recovered unless a certain amount or all of the credible shadows work together. In this paper, we propose a (2, 2) IH-VSS scheme with reversibility and friendliness. In the shadow generation phase, two meaningful shadow images are produced and then distributed. In the extraction and restoration phase, the hidden secret information and cover image, respectively, can be reconstructed credibly and correctly. No complex computation of shadow generation is involved, but high security is achieved. Moreover, a satisfying peak-signal-to-noise ratio (PSNR) is obtained with the high embedding capacity of 1.59 bpp in a very simple and effective way.
    Type of Medium: Online Resource
    ISSN: 2073-8994
    Language: English
    Publisher: MDPI AG
    Publication Date: 2019
    detail.hit.zdb_id: 2518382-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    MDPI AG ; 2021
    In:  Electronics Vol. 10, No. 3 ( 2021-01-25), p. 281-
    In: Electronics, MDPI AG, Vol. 10, No. 3 ( 2021-01-25), p. 281-
    Abstract: In this paper, we propose a two-layer data hiding method by using the Hamming code to enhance the hiding capacity without causing significantly increasing computation complexity for AMBTC-compressed images. To achieve our objective, for the first layer, four disjoint sets using different combinations of the mean value (AVG) and the standard deviation (VAR) are derived according to the combination of secret bits and the corresponding bitmap, following Lin et al.’s method. For the second layer, these four disjoint sets are extended to eight by adding or subtracting 1, according to a matrix embedding with (7, 4) Hamming code. To maintain reversibility, we must return the irreversible block to its previous state, which is the state after the first layer of data is embedded. Then, to losslessly recover the AMBTC-compressed images after extracting the secret bits, we use continuity feature, the parity of pixels value, and the unique number of changed pixels in the same row to restore AVG and VAR. Finally, in comparison with state-of-the-art AMBTC-based schemes, it is confirmed that our proposed method provided two times the hiding capacity comparing with other six representative AMBTC-based schemes while maintaining acceptable file size of steog-images.
    Type of Medium: Online Resource
    ISSN: 2079-9292
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2662127-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    In: Biomedicines, MDPI AG, Vol. 9, No. 10 ( 2021-09-22), p. 1285-
    Abstract: Primary aldosteronism (PA) is associated with higher arterial stiffness compared to essential hypertension (EH). However, few studies have compared different pulse wave velocity (PWV) parameters to detect aldosterone-induced arterial stiffness. In this study, we aimed to compare the sensitivity in detecting aldosterone-induced arterial stiffness between brachial-ankle PWV (baPWV) and heart-ankle PWV (haPWV). We prospectively enrolled 1006 PA patients and 983 EH patients. Detailed medical history, basic biochemistry data and two PWV measurements (baPWV and haPWV) were collected in both groups. We performed analysis on the original cohort and two propensity score matching (PSM) models (model 1 adjusted for age and sex; model 2 adjusted for age, sex, systolic and diastolic blood pressure). The DeLong test was used to compare areas under receiver operating characteristic curves (AUCs) between baPWV and haPWV to predict PA. In all models, the PA patients had significantly higher baPWV compared to the EH patients. The AUC of haPWV was greater than that of baPWV. In conclusion, haPWV seems to be a better PWV parameter than baPWV in detecting aldosterone-induced arterial stiffness.
    Type of Medium: Online Resource
    ISSN: 2227-9059
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2720867-9
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    MDPI AG ; 2021
    In:  Entropy Vol. 23, No. 7 ( 2021-06-22), p. 790-
    In: Entropy, MDPI AG, Vol. 23, No. 7 ( 2021-06-22), p. 790-
    Abstract: With the development of cloud storage and privacy protection, reversible data hiding in encrypted images (RDHEI) plays the dual role of privacy protection and secret information transmission. RDHEI has a good application prospect and practical value. The current RDHEI algorithms still have room for improvement in terms of hiding capacity, security and separability. Based on (7, 4) Hamming Code and our proposed prediction/ detection functions, this paper proposes a Hamming Code and UnitSmooth detection based RDHEI scheme, called HUD-RDHEI scheme for short. To prove our performance, two database sets—BOWS-2 and BOSSBase—have been used in the experiments, and peak signal to noise ratio (PSNR) and pure embedding rate (ER) are served as criteria to evaluate the performance on image quality and hiding capacity. Experimental results confirm that the average pure ER with our proposed scheme is up to 2.556 bpp and 2.530 bpp under BOSSBase and BOWS-2, respectively. At the same time, security and separability is guaranteed. Moreover, there are no incorrect extracted bits during data extraction phase and the visual quality of directly decrypted image is exactly the same as the cover image.
    Type of Medium: Online Resource
    ISSN: 1099-4300
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2014734-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    MDPI AG ; 2023
    In:  Symmetry Vol. 15, No. 1 ( 2023-01-09), p. 189-
    In: Symmetry, MDPI AG, Vol. 15, No. 1 ( 2023-01-09), p. 189-
    Abstract: Reversible data hiding in encrypted images (RDHEI) is commonly used for privacy protection in images stored on cloud storage. Currently, block permutation and co-modulation (BPCM) encryption is commonly utilized in most existing RDHEI schemes to generate encrypted images. In this paper, we analyze the vulnerabilities of RDHEI based on BPCM encryption and then propose a cryptanalysis method based on the vector quantization (VQ) attack. Unlike the existing cryptanalysis method, our method does not require the help of a plaintext image instead of adopting the symmetric property between the original cover image and the encrypted cover image. To obtain the pixel-changing pattern of a block before and after co-modulation, the concept of a pixel difference block (PDB) is first defined. Then, the VQ technique is used to estimate the content of the ciphertext block. Finally, we propose a sequence recovery method to help obtain the final recovered image based on the premise that the generator is compromised. The experimental results demonstrate that when the block size is 4 × 4, our proposed cryptanalysis method can decrypt the contents of the ciphertext image well. The average similarity can exceed 75% when comparing the edge information of the estimated image and the original image. It is concluded from our study that the BPCM encryption algorithm is not robust enough.
    Type of Medium: Online Resource
    ISSN: 2073-8994
    Language: English
    Publisher: MDPI AG
    Publication Date: 2023
    detail.hit.zdb_id: 2518382-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    MDPI AG ; 2021
    In:  Electronics Vol. 10, No. 6 ( 2021-03-15), p. 690-
    In: Electronics, MDPI AG, Vol. 10, No. 6 ( 2021-03-15), p. 690-
    Abstract: In this paper, we first designed Huffman code (HC)-based absolute moment block truncation coding (AMBTC). Then, we applied Huffman code (HC)-based absolute moment block truncation coding (AMBTC) to design a pixel pair-wise fragile image watermarking method. Pixel pair-wise tampering detection and content recovery mechanisms were collaboratively applied in the proposed scheme to enhance readability even when images have been tampered with. Representative features are derived from our proposed HC-based AMBTC compression codes of the original image, and then serve as authentication code and recovery information at the same time during tamper detection and recovery operations. Recovery information is embedded into two LSB of the original image with a turtle shell-based data hiding method and a pre-determined matrix. Therefore, each non-overlapping pixel-pair carries four bits of recovery information. When the recipient suspects that the received image may have been tampered with, the compressed image can be used to locate tampered pixels, and then the recovery information can be used to restore the tampered pixels.
    Type of Medium: Online Resource
    ISSN: 2079-9292
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2662127-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    MDPI AG ; 2023
    In:  Electronics Vol. 12, No. 13 ( 2023-07-07), p. 2989-
    In: Electronics, MDPI AG, Vol. 12, No. 13 ( 2023-07-07), p. 2989-
    Abstract: Driving behavior analysis has become crucial for traffic safety. In addition, more abundant driving data are needed to analyze driving behavior more comprehensively and thus improve traffic safety. This paper proposes an approach to image data extraction and driving behavior analysis that uses geographic information and driving data. Information derived from geographic and global positioning systems was used for image data extraction. In addition, we used an onboard diagnostic II and a controller area network bus logger to record driving data for driving behavior analysis. Driving behavior was analyzed using sparse automatic encoders and data exploration to detect abnormal and aggressive behavior. A regression analysis was performed to derive the relationship between aggressive driving behavior and road facilities. The results indicated that lane ratios, no lane markings, and straight lane markings are important features that affect aggressive driving behaviors. Several traffic improvements were proposed for specific intersections and roads to make drivers and pedestrians safer.
    Type of Medium: Online Resource
    ISSN: 2079-9292
    Language: English
    Publisher: MDPI AG
    Publication Date: 2023
    detail.hit.zdb_id: 2662127-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    MDPI AG ; 2021
    In:  Applied Sciences Vol. 11, No. 17 ( 2021-08-31), p. 8066-
    In: Applied Sciences, MDPI AG, Vol. 11, No. 17 ( 2021-08-31), p. 8066-
    Abstract: We present a traffic light detection and recognition approach for traffic lights that utilizes convolutional neural networks. We also introduce a technique for identifying arrow signal lights in multiple urban traffic environments. For detection, we use map data and two different focal length cameras for traffic light detection at various distances. For recognition, we propose a new algorithm that combines object detection and classification to recognize the light state classes of traffic lights. Furthermore, we use a unified network by sharing features to decrease computation time. The results reveal that the proposed approach enables high-performance traffic light detection and recognition.
    Type of Medium: Online Resource
    ISSN: 2076-3417
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2704225-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    MDPI AG ; 2022
    In:  Symmetry Vol. 14, No. 3 ( 2022-03-02), p. 509-
    In: Symmetry, MDPI AG, Vol. 14, No. 3 ( 2022-03-02), p. 509-
    Abstract: Reversible data hiding (RDH) in dual images is a technique that shares secret messages into two similar shadow images, while the secret messages and the cover image can be restored only when those two shadows are gathered simultaneously. In this paper, a novel turtle shell-based RDH hiding scheme based on the symmetric property is presented in order to increase the embedding capacity and maintain good visual quality in dual images under the guidance of position-aware. First, we classify each pixel pair into one of four types according to their locations and then determine a sunflower area centered around it in order to construct the combination of positions and the embedding table. Using the embedding table, the secret messages are concealed into a cover image by generating two shadow images. At the decoder’s side, the complete restoration of the secret messages and the cover image can be accomplished by identifying the position relationship between the two stego-pixel pairs. The experimental results confirmed that the proposed position-aware guided RDH scheme is superior to some of the relevant works on the aspects of embedding capacity or image quality. In addition, the proposed scheme provides a secure communication that can effectively resist attacks on the pixel value difference histogram, relative entropy, and regular singular analysis.
    Type of Medium: Online Resource
    ISSN: 2073-8994
    Language: English
    Publisher: MDPI AG
    Publication Date: 2022
    detail.hit.zdb_id: 2518382-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    MDPI AG ; 2021
    In:  Symmetry Vol. 13, No. 11 ( 2021-11-17), p. 2191-
    In: Symmetry, MDPI AG, Vol. 13, No. 11 ( 2021-11-17), p. 2191-
    Abstract: In 2002, Agrawal and Kiernan defined six basic requirements, including preventing illegal watermark embedding and authentication, reversibility, robustness, and others, which must be satisfied when a reversible watermark is designed for relational databases. To meet these requirements, in this paper, a lossless watermarking scheme for a categorical relational database called LRW-CRDB (lossless robust watermarking for categorical relational databases) is proposed. In our LRW-CRDB scheme, the database owner needs to generate two secret embedding keys, K1 and K2, in advance. Then, two reference sets are generated based on two different secret embedding keys and a symmetry-based data hiding strategy, and then these are used for the watermark embedding phases. Experimental results confirmed that our LRW-CRDB scheme successfully detects 100% of hidden watermarks, even when more than 95% of the watermarked relational database has been deleted. In other words, the robustness of our proposed LRW-CRDB scheme outperforms other existing schemes under a variety of possible attacks, such as alteration, sorting, deletion, and mix-match attacks.
    Type of Medium: Online Resource
    ISSN: 2073-8994
    Language: English
    Publisher: MDPI AG
    Publication Date: 2021
    detail.hit.zdb_id: 2518382-5
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...