Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detectio...Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detection performance,this paper proposes a steganalysis method that can perfectly detectMV-based steganography in HEVC.Firstly,we define the local optimality of MVP(Motion Vector Prediction)based on the technology of AMVP(Advanced Motion Vector Prediction).Secondly,we analyze that in HEVC video,message embedding either usingMVP index orMVD(Motion Vector Difference)may destroy the above optimality of MVP.And then,we define the optimal rate of MVP as a steganalysis feature.Finally,we conduct steganalysis detection experiments on two general datasets for three popular steganographymethods and compare the performance with four state-ofthe-art steganalysis methods.The experimental results demonstrate the effectiveness of the proposed feature set.Furthermore,our method stands out for its practical applicability,requiring no model training and exhibiting low computational complexity,making it a viable solution for real-world scenarios.展开更多
To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)t...To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)technology used in digital images.Our approach introduces a parameter optimization strategy that incre-mentally adjusts scheme parameters through attack simulation fitting,allowing for adaptive tuning of experimental parameters.In this scheme,the low-frequency Polar Harmonic Transform(PHT)moment is utilized as the embedding domain for robust watermarking,enhancing stability against simulation attacks while implementing the parameter optimization strategy.Through extensive attack simulations across various digital videos,we identify the optimal low-frequency PHT moment using adaptive normalization.Subsequently,the embedding parameters for robust watermarking are adaptively adjusted to maximize robustness.To address computational efficiency and practical requirements,the unnormalized high-frequency PHT moment is selected as the embedding domain for reversible watermarking.We optimize the traditional single-stage extended transform dithering modulation(STDM)to facilitate multi-stage embedding in the dual-domain watermarking process.In practice,the video embedded with a robust watermark serves as the candidate video.This candidate video undergoes simulation according to the parameter optimization strategy to balance robustness and embedding capacity,with adaptive determination of embedding strength.The reversible watermarking is formed by combining errors and other information,utilizing recursive coding technology to ensure reversibility without attacks.Comprehensive analyses of multiple performance indicators demonstrate that our scheme exhibits strong robustness against Common Signal Processing(CSP)and Geometric Deformation(GD)attacks,outperforming other advanced video watermarking algorithms under similar conditions of invisibility,reversibility,and embedding capacity.This underscores the effectiveness and feasibility of our attack simulation fitting strategy.展开更多
The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grou...The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grouping videos.Grounded in the H.264 video coding standard,the algorithm first employs traditional robust watermark stitching technology to embed watermark information in the low-frequency coefficient domain of the U channel.Subsequently,it utilizes histogram migration techniques in the high-frequency coefficient domain of the U channel to embed auxiliary information,enabling successful watermark extraction and lossless recovery of the original video content.Experimental results demonstrate the algorithm’s strong imperceptibility,with each embedded frame in the experimental videos achieving a mean peak signal-to-noise ratio of 49.3830 dB and a mean structural similarity of 0.9996.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 7.59%and 0.4%on average.At the same time,the proposed algorithm has strong robustness to both offline and online attacks:In the face of offline attacks,the average normalized correlation coefficient between the extracted watermark and the original watermark is 0.9989,and the average bit error rate is 0.0089.In the face of online attacks,the normalized correlation coefficient between the extracted watermark and the original watermark is 0.8840,and the mean bit error rate is 0.2269.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 1.27%and 18.16%on average,highlighting the algorithm’s robustness.Furthermore,the algorithm exhibits low computational complexity,with the mean encoding and the mean decoding time differentials during experimental video processing being 3.934 and 2.273 s,respectively,underscoring its practical utility.展开更多
H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC...H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC compressed video without distortion.Four modules are introduced to eliminate the distortion caused by the modifications of motion vectors and guarantee the security of the algorithm.In the embedding block,the motion vector space encoding is used to embed a(2n+1)-ary notational number into an n-dimension vector composed of motion vectors generated from the selection block.Scrambling is adopted to disturb the order of steganographic carriers to improve the randomness of the carrier before the operation of embedding.The re-motion compensation(re-MC)block will re-construct the macroblock(MB)whose motion vectors have been modified by embedding block.System block plays the role of the generator for chaotic sequences and encryptor for secret data.Experimental results demonstrate that our proposed algorithm can achieve high embedding capacity without stego video visual quality distortion,it also presents good undetectability for existing MV-based steganalysis feature.Performance comparisons with other existing algorithms are provided to demonstrate the superiority of the proposed algorithm.展开更多
Analysis of customers' satisfaction provides a guarantee to improve the service quality in call centers.In this paper,a novel satisfaction recognition framework is introduced to analyze the customers' satisfaction.I...Analysis of customers' satisfaction provides a guarantee to improve the service quality in call centers.In this paper,a novel satisfaction recognition framework is introduced to analyze the customers' satisfaction.In natural conversations,the interaction between a customer and its agent take place more than once.One of the difficulties insatisfaction analysis at call centers is that not all conversation turns exhibit customer satisfaction or dissatisfaction. To solve this problem,an intelligent system is proposed that utilizes acoustic features to recognize customers' emotion and utilizes the global features of emotion and duration to analyze the satisfaction. Experiments on real-call data show that the proposed system offers a significantly higher accuracy in analyzing the satisfaction than the baseline system. The average F value is improved to 0. 701 from 0. 664.展开更多
As the acceleration of aged population tendency, building models to forecast Alzheimer’s Disease (AD) is essential. In this article, we surveyed 1157 interviewees. By analyzing the results using three machine learnin...As the acceleration of aged population tendency, building models to forecast Alzheimer’s Disease (AD) is essential. In this article, we surveyed 1157 interviewees. By analyzing the results using three machine learning methods—BP neural network, SVM and random forest, we can derive the accuracy of them in forecasting AD, so that we can compare the methods in solving AD prediction. Among them, random forest is the most accurate method. Moreover, to combine the advantages of the methods, we build a new combination forecasting model based on the three machine learning models, which is proved more accurate than the models singly. At last, we give the conclusion of the connection between life style and AD, and provide several suggestions for elderly people to help them prevent AD.展开更多
Ischemic stroke(IS)represents a significant threat to brain health due to its elevated mortality and disability rates.The efficacy of small-molecule neuroprotective agents has been impeded by challenges associated wit...Ischemic stroke(IS)represents a significant threat to brain health due to its elevated mortality and disability rates.The efficacy of small-molecule neuroprotective agents has been impeded by challenges associated with traversing the blood-brain barrier(BBB)and limited bioavailability.Conversely,advanced nano drug delivery systems hold promise for overcoming these obstacles by facilitating efficient transportation across the BBB and maintaining optimal drug concentrations.This review aims to explore advanced neuroprotective nano drug delivery systems as a means of effectively administering neuroprotective agents to the brain using pharmaceutical approaches in the treatment of IS.By examining these systems,researchers and clinicians can gain valuable insights and innovative concepts,illuminating the potential of advanced neuroprotective nano drug delivery systems.Leveraging these advancements can drive the progress of pioneering and efficacious therapeutic interventions for IS.展开更多
The erythropoiesis process consists of differentiation stages,starting with erythroid progenitors,including erythroid burstforming unit cells(BFU-Es),erythroid colony-forming unit cells(CFU-Es),followed by terminal er...The erythropoiesis process consists of differentiation stages,starting with erythroid progenitors,including erythroid burstforming unit cells(BFU-Es),erythroid colony-forming unit cells(CFU-Es),followed by terminal erythroid differentiation,which,in turn,gives rise to basophilic erythroblasts,polychromatic erythroblasts,orthochromatic erythroblasts,reticulocytes(RETs),and mature erythrocytes(Hu et al.,2013).展开更多
A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decod...A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decoded reference frame, the distortion accumulation effects due to modification of the motion vectors is overcome. All the extracted information can be recovered without loss of the original compressed video carrier. The experimental results show that the proposed algorithm is simple, has higher capacity and invisibility than other existing schemes, and can adjust the relationship between capacity and invisibility according to embedded load.展开更多
In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmi...In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmit secrets and conduct covert communication. As such, we present an algorithm based on a secret sharing scheme and an Error-Correcting Code(ECC), which combines Grey Relational Analysis(GRA) with a partition mode in video compression standard H.264/AVC. First, we process secret information by secret sharing, and then use an ECC to process the obtained information. Moreover, we choose the Discrete Cosine Transform(DCT) blocks using GRA, and then use rules to hide the pretreated information in DCT coefficients of the video frames. Experimental results indicate that our algorithm has good invisibility, better robustness, good anti-steganalysis ability, and little influence on the bit rate of the video carrier. In addition, the bit error rate is low after attacks such as noise, filtering,or frame loss in the simulation environment.展开更多
In this paper, we show that the coupled modified Kd V equations possess rich mathematical structures and some remarkable properties. The connections between the system and skew orthogonal polynomials,convergence accel...In this paper, we show that the coupled modified Kd V equations possess rich mathematical structures and some remarkable properties. The connections between the system and skew orthogonal polynomials,convergence acceleration algorithms and Laurent property are discussed in detail.展开更多
A new system is generated from a multi-linear form of a (2+1)- dimensional Volterra system. Though the system is only partially integrable and needs additional conditions to possess two-soliton solutions, its (1+...A new system is generated from a multi-linear form of a (2+1)- dimensional Volterra system. Though the system is only partially integrable and needs additional conditions to possess two-soliton solutions, its (1+1)- dimensional reduction gives an integrable equation which has been studied via reduction skills. Here, we give this (1+1)-dimensional reduction a simple bilinear form, from which a Backlund transformation is derived and the corresponding nonlinear superposition formula is built.展开更多
基金the National Natural Science Foundation of China(Grant Nos.62272478,62202496,61872384).
文摘Among steganalysis techniques,detection against MV(motion vector)domain-based video steganography in the HEVC(High Efficiency Video Coding)standard remains a challenging issue.For the purpose of improving the detection performance,this paper proposes a steganalysis method that can perfectly detectMV-based steganography in HEVC.Firstly,we define the local optimality of MVP(Motion Vector Prediction)based on the technology of AMVP(Advanced Motion Vector Prediction).Secondly,we analyze that in HEVC video,message embedding either usingMVP index orMVD(Motion Vector Difference)may destroy the above optimality of MVP.And then,we define the optimal rate of MVP as a steganalysis feature.Finally,we conduct steganalysis detection experiments on two general datasets for three popular steganographymethods and compare the performance with four state-ofthe-art steganalysis methods.The experimental results demonstrate the effectiveness of the proposed feature set.Furthermore,our method stands out for its practical applicability,requiring no model training and exhibiting low computational complexity,making it a viable solution for real-world scenarios.
基金supported in part by the National Natural Science Foundation of China under Grant 62202496,62272478the Basic Frontier Innovation Project of Engineering University of People Armed Police under Grant WJY202314,WJY202221.
文摘To address the challenges of video copyright protection and ensure the perfect recovery of original video,we propose a dual-domain watermarking scheme for digital video,inspired by Robust Reversible Watermarking(RRW)technology used in digital images.Our approach introduces a parameter optimization strategy that incre-mentally adjusts scheme parameters through attack simulation fitting,allowing for adaptive tuning of experimental parameters.In this scheme,the low-frequency Polar Harmonic Transform(PHT)moment is utilized as the embedding domain for robust watermarking,enhancing stability against simulation attacks while implementing the parameter optimization strategy.Through extensive attack simulations across various digital videos,we identify the optimal low-frequency PHT moment using adaptive normalization.Subsequently,the embedding parameters for robust watermarking are adaptively adjusted to maximize robustness.To address computational efficiency and practical requirements,the unnormalized high-frequency PHT moment is selected as the embedding domain for reversible watermarking.We optimize the traditional single-stage extended transform dithering modulation(STDM)to facilitate multi-stage embedding in the dual-domain watermarking process.In practice,the video embedded with a robust watermark serves as the candidate video.This candidate video undergoes simulation according to the parameter optimization strategy to balance robustness and embedding capacity,with adaptive determination of embedding strength.The reversible watermarking is formed by combining errors and other information,utilizing recursive coding technology to ensure reversibility without attacks.Comprehensive analyses of multiple performance indicators demonstrate that our scheme exhibits strong robustness against Common Signal Processing(CSP)and Geometric Deformation(GD)attacks,outperforming other advanced video watermarking algorithms under similar conditions of invisibility,reversibility,and embedding capacity.This underscores the effectiveness and feasibility of our attack simulation fitting strategy.
基金supported in part by the National Natural Science Foundation of China under Grants 62202496,62272478the Basic Frontier Innovation Project of Engineering university of People Armed Police under Grants WJY202314,WJY202221.
文摘The proposed robust reversible watermarking algorithm addresses the compatibility challenges between robustness and reversibility in existing video watermarking techniques by leveraging scene smoothness for frame grouping videos.Grounded in the H.264 video coding standard,the algorithm first employs traditional robust watermark stitching technology to embed watermark information in the low-frequency coefficient domain of the U channel.Subsequently,it utilizes histogram migration techniques in the high-frequency coefficient domain of the U channel to embed auxiliary information,enabling successful watermark extraction and lossless recovery of the original video content.Experimental results demonstrate the algorithm’s strong imperceptibility,with each embedded frame in the experimental videos achieving a mean peak signal-to-noise ratio of 49.3830 dB and a mean structural similarity of 0.9996.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 7.59%and 0.4%on average.At the same time,the proposed algorithm has strong robustness to both offline and online attacks:In the face of offline attacks,the average normalized correlation coefficient between the extracted watermark and the original watermark is 0.9989,and the average bit error rate is 0.0089.In the face of online attacks,the normalized correlation coefficient between the extracted watermark and the original watermark is 0.8840,and the mean bit error rate is 0.2269.Compared with the three comparison algorithms,the performance of the two experimental indexes is improved by 1.27%and 18.16%on average,highlighting the algorithm’s robustness.Furthermore,the algorithm exhibits low computational complexity,with the mean encoding and the mean decoding time differentials during experimental video processing being 3.934 and 2.273 s,respectively,underscoring its practical utility.
基金This work was supported by the National Natural Science Foundation of China(Grant Nos.61872384 and U1636114)partly supported by the Natural Science Foundation of Engineering University of PAP(Grant No.WJY201915).
文摘H.264/AVC video is one of the most popular multimedia and has been widely used as the carriers of video steganography.In this paper,a novel motion vector(MV)based steganographic algorithm is proposed for the H.264/AVC compressed video without distortion.Four modules are introduced to eliminate the distortion caused by the modifications of motion vectors and guarantee the security of the algorithm.In the embedding block,the motion vector space encoding is used to embed a(2n+1)-ary notational number into an n-dimension vector composed of motion vectors generated from the selection block.Scrambling is adopted to disturb the order of steganographic carriers to improve the randomness of the carrier before the operation of embedding.The re-motion compensation(re-MC)block will re-construct the macroblock(MB)whose motion vectors have been modified by embedding block.System block plays the role of the generator for chaotic sequences and encryptor for secret data.Experimental results demonstrate that our proposed algorithm can achieve high embedding capacity without stego video visual quality distortion,it also presents good undetectability for existing MV-based steganalysis feature.Performance comparisons with other existing algorithms are provided to demonstrate the superiority of the proposed algorithm.
基金Supported by the National Natural Science Foundation of China(61473041,61571044,11590772)
文摘Analysis of customers' satisfaction provides a guarantee to improve the service quality in call centers.In this paper,a novel satisfaction recognition framework is introduced to analyze the customers' satisfaction.In natural conversations,the interaction between a customer and its agent take place more than once.One of the difficulties insatisfaction analysis at call centers is that not all conversation turns exhibit customer satisfaction or dissatisfaction. To solve this problem,an intelligent system is proposed that utilizes acoustic features to recognize customers' emotion and utilizes the global features of emotion and duration to analyze the satisfaction. Experiments on real-call data show that the proposed system offers a significantly higher accuracy in analyzing the satisfaction than the baseline system. The average F value is improved to 0. 701 from 0. 664.
文摘As the acceleration of aged population tendency, building models to forecast Alzheimer’s Disease (AD) is essential. In this article, we surveyed 1157 interviewees. By analyzing the results using three machine learning methods—BP neural network, SVM and random forest, we can derive the accuracy of them in forecasting AD, so that we can compare the methods in solving AD prediction. Among them, random forest is the most accurate method. Moreover, to combine the advantages of the methods, we build a new combination forecasting model based on the three machine learning models, which is proved more accurate than the models singly. At last, we give the conclusion of the connection between life style and AD, and provide several suggestions for elderly people to help them prevent AD.
基金financial support provided by the National Natural Science Foundation of Shanghai(No.20ZR1420000)Shanghai Shen Kang Center Research Physician Training Program on Innovation and Translation Capabilities(No.SHDC2022CRS051)Three-Year Action Plan for Improving Clinical Research Capacity of International Peace Maternal and Child Health Hospital,Shanghai Jiao Tong University School of Medicine(No.IPMCH2022CR1-05).
文摘Ischemic stroke(IS)represents a significant threat to brain health due to its elevated mortality and disability rates.The efficacy of small-molecule neuroprotective agents has been impeded by challenges associated with traversing the blood-brain barrier(BBB)and limited bioavailability.Conversely,advanced nano drug delivery systems hold promise for overcoming these obstacles by facilitating efficient transportation across the BBB and maintaining optimal drug concentrations.This review aims to explore advanced neuroprotective nano drug delivery systems as a means of effectively administering neuroprotective agents to the brain using pharmaceutical approaches in the treatment of IS.By examining these systems,researchers and clinicians can gain valuable insights and innovative concepts,illuminating the potential of advanced neuroprotective nano drug delivery systems.Leveraging these advancements can drive the progress of pioneering and efficacious therapeutic interventions for IS.
文摘The erythropoiesis process consists of differentiation stages,starting with erythroid progenitors,including erythroid burstforming unit cells(BFU-Es),erythroid colony-forming unit cells(CFU-Es),followed by terminal erythroid differentiation,which,in turn,gives rise to basophilic erythroblasts,polychromatic erythroblasts,orthochromatic erythroblasts,reticulocytes(RETs),and mature erythrocytes(Hu et al.,2013).
基金supported by the National Natural Science Foundation of China (Nos.61379152 and 61403417)
文摘A novel reversible data hiding algorithm for H.264/AVC videos is proposed. Histogram Shifting (HS) of motion vector values is used efficiently in reversible data hiding to embed data. By designating a specific decoded reference frame, the distortion accumulation effects due to modification of the motion vectors is overcome. All the extracted information can be recovered without loss of the original compressed video carrier. The experimental results show that the proposed algorithm is simple, has higher capacity and invisibility than other existing schemes, and can adjust the relationship between capacity and invisibility according to embedded load.
基金supported by the National Natural Science Foundation of China(Nos.61379152 and 61403417)
文摘In this paper, we analyze the video steganography technique, which is used to ensure national security and the confidentiality of the information of governmental agencies and enterprises. Videos may be used to transmit secrets and conduct covert communication. As such, we present an algorithm based on a secret sharing scheme and an Error-Correcting Code(ECC), which combines Grey Relational Analysis(GRA) with a partition mode in video compression standard H.264/AVC. First, we process secret information by secret sharing, and then use an ECC to process the obtained information. Moreover, we choose the Discrete Cosine Transform(DCT) blocks using GRA, and then use rules to hide the pretreated information in DCT coefficients of the video frames. Experimental results indicate that our algorithm has good invisibility, better robustness, good anti-steganalysis ability, and little influence on the bit rate of the video carrier. In addition, the bit error rate is low after attacks such as noise, filtering,or frame loss in the simulation environment.
基金supported by National Natural Science Foundation of China(Grant Nos.11331008,11201469,11571358 and 11601237)the China Postdoctoral Science Foundation Funded Project(Grant Nos.2012M510186 and 2013T60761)the Hong Kong Research Grant Council(Grant No.GRF HKBU202512)
文摘In this paper, we show that the coupled modified Kd V equations possess rich mathematical structures and some remarkable properties. The connections between the system and skew orthogonal polynomials,convergence acceleration algorithms and Laurent property are discussed in detail.
文摘A new system is generated from a multi-linear form of a (2+1)- dimensional Volterra system. Though the system is only partially integrable and needs additional conditions to possess two-soliton solutions, its (1+1)- dimensional reduction gives an integrable equation which has been studied via reduction skills. Here, we give this (1+1)-dimensional reduction a simple bilinear form, from which a Backlund transformation is derived and the corresponding nonlinear superposition formula is built.