http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
( Jingwen Liu ),( Junshan Tan ),( Jiaohua Qin ),( Xuyu Xiang ) 한국인터넷정보학회 2020 KSII Transactions on Internet and Information Syst Vol.14 No.8
The traditional method of smoke image recognition has low accuracy. For this reason, we proposed an algorithm based on the good group of IMFOA which is GMFOA to optimize the parameters of SVM. Firstly, we divide the motion region by combining the three-frame difference algorithm and the ViBe algorithm. Then, we divide it into several parts and extract the histogram of oriented gradient and volume local binary patterns of each part. Finally, we use the GMFOA to optimize the parameters of SVM and multiple kernel learning algorithms to Classify smoke images. The experimental results show that the classification ability of our method is better than other methods, and it can better adapt to the complex environmental conditions.
( Qiang Liu ),( Xuyu Xiang ),( Jiaohua Qin ),( Yun Tan ),( Qin Zhang ) 한국인터넷정보학회 2021 KSII Transactions on Internet and Information Syst Vol.15 No.3
Traditional image steganography hides secret information by embedding, which inevitably leaves modification traces and is easy to be detected by steganography analysis tools. Since coverless steganography can effectively resist steganalysis, it has become a hotspot in information hiding research recently. Most coverless image steganography (CIS) methods are based on mapping rules, which not only exposes the vulnerability to geometric attacks, but also are less secure due to the revelation of mapping rules. To address the above issues, we introduced camouflage images for steganography instead of directly sending stego-image, which further improves the security performance and information hiding ability of steganography scheme. In particular, based on the different sub-features of stego-image and potential camouflage images, we try to find a larger similarity between them so as to achieve the reversible steganography. Specifically, based on the existing CIS mapping algorithm, we first can establish the correlation between stego-image and secret information and then transmit the camouflage images, which are obtained by reversible sub-feature retrieval algorithm. The received camouflage image can be used to reverse retrieve the stego-image in a public image database. Finally, we can use the same mapping rules to restore secret information. Extensive experimental results demonstrate the better robustness and security of the proposed approach in comparison to state-of-art CIS methods, especially in the robustness of geometric attacks.