期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
A HEVC Video Steganalysis Method Using the Optimality of Motion Vector Prediction
1
作者 Jun Li Minqing zhang +2 位作者 Ke Niu yingnan zhang Xiaoyuan Yang 《Computers, Materials & Continua》 SCIE EI 2024年第5期2085-2103,共19页
Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detectio... Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detection performance,this paper proposes a steganalysis method that can perfectly detectMV-based steganography in HEVC.Firstly,we define the local optimality of MVP(Motion Vector Prediction)based on the technology of AMVP(Advanced Motion Vector Prediction).Secondly,we analyze that in HEVC video,message embedding either usingMVP index orMVD(Motion Vector Difference)may destroy the above optimality of MVP.And then,we define the optimal rate of MVP as a steganalysis feature.Finally,we conduct steganalysis detection experiments on two general datasets for three popular steganographymethods and compare the performance with four state-ofthe-art steganalysis methods.The experimental results demonstrate the effectiveness of the proposed feature set.Furthermore,our method stands out for its practical applicability,requiring no model training and exhibiting low computational complexity,making it a viable solution for real-world scenarios. 展开更多
关键词 Video steganography video steganalysis motion vector prediction motion vector difference advanced motion vector prediction local optimality
下载PDF
Adaptive Video Dual Domain Watermarking Scheme Based on PHT Moment and Optimized Spread Transform Dither Modulation
2
作者 Yucheng Liang Ke Niu +2 位作者 yingnan zhang Yifei Meng Fangmeng Hu 《Computers, Materials & Continua》 SCIE EI 2024年第11期2457-2492,共36页
To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)t... To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)technology used in digital images.Our approach introduces a parameter optimization strategy that incre-mentally adjusts scheme parameters through attack simulation fitting,allowing for adaptive tuning of experimental parameters.In this scheme,the low-frequency Polar Harmonic Transform(PHT)moment is utilized as the embedding domain for robust watermarking,enhancing stability against simulation attacks while implementing the parameter optimization strategy.Through extensive attack simulations across various digital videos,we identify the optimal low-frequency PHT moment using adaptive normalization.Subsequently,the embedding parameters for robust watermarking are adaptively adjusted to maximize robustness.To address computational efficiency and practical requirements,the unnormalized high-frequency PHT moment is selected as the embedding domain for reversible watermarking.We optimize the traditional single-stage extended transform dithering modulation(STDM)to facilitate multi-stage embedding in the dual-domain watermarking process.In practice,the video embedded with a robust watermark serves as the candidate video.This candidate video undergoes simulation according to the parameter optimization strategy to balance robustness and embedding capacity,with adaptive determination of embedding strength.The reversible watermarking is formed by combining errors and other information,utilizing recursive coding technology to ensure reversibility without attacks.Comprehensive analyses of multiple performance indicators demonstrate that our scheme exhibits strong robustness against Common Signal Processing(CSP)and Geometric Deformation(GD)attacks,outperforming other advanced video watermarking algorithms under similar conditions of invisibility,reversibility,and embedding capacity.This underscores the effectiveness and feasibility of our attack simulation fitting strategy. 展开更多
关键词 Dual-domain H.264 group of pictures polar harmonic transform spread transform dither modulation
下载PDF
A Dual Domain Robust Reversible Watermarking Algorithm for Frame Grouping Videos Using Scene Smoothness
3
作者 Yucheng Liang Ke Niu +1 位作者 yingnan zhang Yifei Meng 《Computers, Materials & Continua》 SCIE EI 2024年第6期5143-5174,共32页
The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grou... The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grouping videos.Grounded in the H.264 video coding standard,the algorithm first employs traditional robust watermark stitching technology to embed watermark information in the low-frequency coefficient domain of the U channel.Subsequently,it utilizes histogram migration techniques in the high-frequency coefficient domain of the U channel to embed auxiliary information,enabling successful watermark extraction and lossless recovery of the original video content.Experimental results demonstrate the algorithm’s strong imperceptibility,with each embedded frame in the experimental videos achieving a mean peak signal-to-noise ratio of 49.3830 dB and a mean structural similarity of 0.9996.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 7.59%and 0.4%on average.At the same time,the proposed algorithm has strong robustness to both offline and online attacks:In the face of offline attacks,the average normalized correlation coefficient between the extracted watermark and the original watermark is 0.9989,and the average bit error rate is 0.0089.In the face of online attacks,the normalized correlation coefficient between the extracted watermark and the original watermark is 0.8840,and the mean bit error rate is 0.2269.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 1.27%and 18.16%on average,highlighting the algorithm’s robustness.Furthermore,the algorithm exhibits low computational complexity,with the mean encoding and the mean decoding time differentials during experimental video processing being 3.934 and 2.273 s,respectively,underscoring its practical utility. 展开更多
关键词 Robust reversible watermarking scene smoothness dual-domain U channel H.264 encoding standard
下载PDF
A MV-Based Steganographic Algorithm for H.264/AVC without Distortion 被引量:1
4
作者 Hongqiong Tang Xiaoyuan Yang +1 位作者 yingnan zhang Ke Niu 《Computers, Materials & Continua》 SCIE EI 2020年第6期1205-1219,共15页
H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC... H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC compressed video without distortion.Four modules are introduced to eliminate the distortion caused by the modifications of motion vectors and guarantee the security of the algorithm.In the embedding block,the motion vector space encoding is used to embed a(2n+1)-ary notational number into an n-dimension vector composed of motion vectors generated from the selection block.Scrambling is adopted to disturb the order of steganographic carriers to improve the randomness of the carrier before the operation of embedding.The re-motion compensation(re-MC)block will re-construct the macroblock(MB)whose motion vectors have been modified by embedding block.System block plays the role of the generator for chaotic sequences and encryptor for secret data.Experimental results demonstrate that our proposed algorithm can achieve high embedding capacity without stego video visual quality distortion,it also presents good undetectability for existing MV-based steganalysis feature.Performance comparisons with other existing algorithms are provided to demonstrate the superiority of the proposed algorithm. 展开更多
关键词 Video steganography motion vector without distortion H.264/AVC
下载PDF
Automatic Satisfaction Analysis in Call Centers Considering Global Features of Emotion and Duration 被引量:1
5
作者 Jing Liu Chaomin Wang +7 位作者 yingnan zhang Pengyu Cong Liqiang Xu Zhijie Ren Jin Hu Xiang Xie Junlan Feng Jingming Kuang 《Journal of Beijing Institute of Technology》 EI CAS 2018年第1期58-64,共7页
Analysis of customers' satisfaction provides a guarantee to improve the service quality in call centers.In this paper,a novel satisfaction recognition framework is introduced to analyze the customers' satisfaction.I... Analysis of customers' satisfaction provides a guarantee to improve the service quality in call centers.In this paper,a novel satisfaction recognition framework is introduced to analyze the customers' satisfaction.In natural conversations,the interaction between a customer and its agent take place more than once.One of the difficulties insatisfaction analysis at call centers is that not all conversation turns exhibit customer satisfaction or dissatisfaction. To solve this problem,an intelligent system is proposed that utilizes acoustic features to recognize customers' emotion and utilizes the global features of emotion and duration to analyze the satisfaction. Experiments on real-call data show that the proposed system offers a significantly higher accuracy in analyzing the satisfaction than the baseline system. The average F value is improved to 0. 701 from 0. 664. 展开更多
关键词 satisfaction analysis emotion recognition call centers global features of emotion and duration
下载PDF
Forecasting Alzheimer’s Disease Using Combination Model Based on Machine Learning
6
作者 He Li Yuhang Wu +2 位作者 yingnan zhang Tao Wei Yufeng Gui 《Applied Mathematics》 2018年第4期403-417,共15页
As the acceleration of aged population tendency, building models to forecast Alzheimer’s Disease (AD) is essential. In this article, we surveyed 1157 interviewees. By analyzing the results using three machine learnin... As the acceleration of aged population tendency, building models to forecast Alzheimer’s Disease (AD) is essential. In this article, we surveyed 1157 interviewees. By analyzing the results using three machine learning methods—BP neural network, SVM and random forest, we can derive the accuracy of them in forecasting AD, so that we can compare the methods in solving AD prediction. Among them, random forest is the most accurate method. Moreover, to combine the advantages of the methods, we build a new combination forecasting model based on the three machine learning models, which is proved more accurate than the models singly. At last, we give the conclusion of the connection between life style and AD, and provide several suggestions for elderly people to help them prevent AD. 展开更多
关键词 Alzheimer’s Disease BP NEURAL Network SVM RANDOM FOREST Combination Forecasting Model
下载PDF
Advanced nano drug delivery systems for neuroprotection against ischemic stroke 被引量:1
7
作者 Chenchen Xie Jun Liao +12 位作者 Ning zhang Yuhan Sun Yi Li Liyan Xiong yingnan zhang Xiaoyan Liu Wei Su Heming Chen Ping Zeng Xiaoqing zhang Ying Lu Tingfang Wang Chuan zhang 《Chinese Chemical Letters》 SCIE CAS CSCD 2024年第2期151-162,共12页
Ischemic stroke(IS)represents a significant threat to brain health due to its elevated mortality and disability rates.The efficacy of small-molecule neuroprotective agents has been impeded by challenges associated wit... Ischemic stroke(IS)represents a significant threat to brain health due to its elevated mortality and disability rates.The efficacy of small-molecule neuroprotective agents has been impeded by challenges associated with traversing the blood-brain barrier(BBB)and limited bioavailability.Conversely,advanced nano drug delivery systems hold promise for overcoming these obstacles by facilitating efficient transportation across the BBB and maintaining optimal drug concentrations.This review aims to explore advanced neuroprotective nano drug delivery systems as a means of effectively administering neuroprotective agents to the brain using pharmaceutical approaches in the treatment of IS.By examining these systems,researchers and clinicians can gain valuable insights and innovative concepts,illuminating the potential of advanced neuroprotective nano drug delivery systems.Leveraging these advancements can drive the progress of pioneering and efficacious therapeutic interventions for IS. 展开更多
关键词 TARGET Blood-brain barrier Ischemic stroke Nano drug delivery NEUROPROTECTION
原文传递
基于Y系列不对称小分子受体材料的研究进展
8
作者 张英楠 陈毅 +2 位作者 朱甜甜 李海阳 詹传郎 《中国科学:化学》 CAS CSCD 北大核心 2024年第6期837-855,共19页
近年来,高效的小分子受体材料(small-molecule acceptors, SMAs)的设计和性能研究方面所取得的进步,使得有机太阳能电池(organic solar cells, OSCs)领域取得了快速发展,有望替代传统硅基太阳能电池在一些细分领域得到应用.在众多的OSC... 近年来,高效的小分子受体材料(small-molecule acceptors, SMAs)的设计和性能研究方面所取得的进步,使得有机太阳能电池(organic solar cells, OSCs)领域取得了快速发展,有望替代传统硅基太阳能电池在一些细分领域得到应用.在众多的OSC小分子受体材料中,具有A-DA’D-A (D和A分别指电子给体和受体单元)型结构的不对称稠环小分子受体材料因其优异的光伏性能备受人们关注,其具有更大的偶极矩和更强的分子间相互作用,有利于分子堆积及增强电子迁移率,这类材料的光电转换效率最高已经突破19%.本综述聚焦于不对称稠环小分子的分子结构(包括端基、中心核以及侧链)的设计及晶体结构方面,总结了基于Y系列的不对称稠环型小分子受体的研究进展.通过分子结构-材料性能-光伏性能之间的构效关系总结,为开发高性能的不对称稠环小分子受体材料提供一种分子设计策略. 展开更多
关键词 有机太阳能电池 受体材料 分子结构 不对称 稠环受体
原文传递
s-弧传递可解Cayley图
9
作者 李才恒 潘江敏 张颖楠 《中国科学:数学》 CSCD 北大核心 2024年第7期1029-1044,共16页
本文刻画了度数大于等于3的连通s-弧传递可解Cayley图(s≥3).本文证明了这些图都是4类具体的图的正规覆盖,特别地,证明了s的上确界为4,并指出了一个4-弧传递可解Cayley图的无穷类.
关键词 上确界 s-弧传递图 CAYLEY图 可解群
原文传递
lncRNA NEAT1 is required for splenic erythroid differentiation
10
作者 Xiaoru zhang yingnan zhang +4 位作者 Guangfeng Geng Jie Gao Jingyuan Tong Lihong Shi Jinhua Liu 《Journal of Genetics and Genomics》 SCIE CAS CSCD 2023年第6期454-457,共4页
The erythropoiesis process consists of differentiation stages,starting with erythroid progenitors,including erythroid burstforming unit cells(BFU-Es),erythroid colony-forming unit cells(CFU-Es),followed by terminal er... The erythropoiesis process consists of differentiation stages,starting with erythroid progenitors,including erythroid burstforming unit cells(BFU-Es),erythroid colony-forming unit cells(CFU-Es),followed by terminal erythroid differentiation,which,in turn,gives rise to basophilic erythroblasts,polychromatic erythroblasts,orthochromatic erythroblasts,reticulocytes(RETs),and mature erythrocytes(Hu et al.,2013). 展开更多
关键词 STARTING NEAT1 ERYTHROID
原文传递
A Novel Video Reversible Data Hiding Algorithm Using Motion Vector for H.264/AVC 被引量:6
11
作者 Ke Niu Xiaoyuan Yang yingnan zhang 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第5期489-498,共10页
A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decod... A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decoded reference frame, the distortion accumulation effects due to modification of the motion vectors is overcome. All the extracted information can be recovered without loss of the original compressed video carrier. The experimental results show that the proposed algorithm is simple, has higher capacity and invisibility than other existing schemes, and can adjust the relationship between capacity and invisibility according to embedded load. 展开更多
关键词 reversible video data hiding H.264/AVC motion vector histogram modification modified referenceframe
原文传递
Novel Video Steganography Algorithm Based on Secret Sharing and Error-Correcting Code for H.264/AVC 被引量:4
12
作者 yingnan zhang Minqing zhang +2 位作者 Xiaoyuan Yang Duntao Guo Longfei Liu 《Tsinghua Science and Technology》 SCIE EI CAS CSCD 2017年第2期198-209,共12页
In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmi... In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmit secrets and conduct covert communication. As such, we present an algorithm based on a secret sharing scheme and an Error-Correcting Code(ECC), which combines Grey Relational Analysis(GRA) with a partition mode in video compression standard H.264/AVC. First, we process secret information by secret sharing, and then use an ECC to process the obtained information. Moreover, we choose the Discrete Cosine Transform(DCT) blocks using GRA, and then use rules to hide the pretreated information in DCT coefficients of the video frames. Experimental results indicate that our algorithm has good invisibility, better robustness, good anti-steganalysis ability, and little influence on the bit rate of the video carrier. In addition, the bit error rate is low after attacks such as noise, filtering,or frame loss in the simulation environment. 展开更多
关键词 steganography video secret sharing error-correcting code robustness grey relational analysis partition mode
原文传递
Coupled modified Kd V equations, skew orthogonal polynomials, convergence acceleration algorithms and Laurent property
13
作者 Xiangke Chang Yi He +3 位作者 Xingbiao Hu Shihao Li Hon-wah Tam yingnan zhang 《Science China Mathematics》 SCIE CSCD 2018年第6期1063-1078,共16页
In this paper, we show that the coupled modified Kd V equations possess rich mathematical structures and some remarkable properties. The connections between the system and skew orthogonal polynomials,convergence accel... In this paper, we show that the coupled modified Kd V equations possess rich mathematical structures and some remarkable properties. The connections between the system and skew orthogonal polynomials,convergence acceleration algorithms and Laurent property are discussed in detail. 展开更多
关键词 integrable system skew orthogonal polynomial convergence acceleration algorithm Laurent prop-erty
原文传递
One variant of a (2 + 1)-dimensional Volterra system and its (1 + 1)-dimensional reduction
14
作者 yingnan zhang Yi HE Hon-Wah TAM 《Frontiers of Mathematics in China》 SCIE CSCD 2013年第5期1085-1097,共13页
A new system is generated from a multi-linear form of a (2+1)- dimensional Volterra system. Though the system is only partially integrable and needs additional conditions to possess two-soliton solutions, its (1+... A new system is generated from a multi-linear form of a (2+1)- dimensional Volterra system. Though the system is only partially integrable and needs additional conditions to possess two-soliton solutions, its (1+1)- dimensional reduction gives an integrable equation which has been studied via reduction skills. Here, we give this (1+1)-dimensional reduction a simple bilinear form, from which a Backlund transformation is derived and the corresponding nonlinear superposition formula is built. 展开更多
关键词 INTEGRABILITY soliton solution Bgcklund transformation (BT) nonlinear superposition formula
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部