jihppOpen Access

Journal of Information Hiding and Privacy Protection

Publication Frequency:Quarterly

  • Online

  • on board

About Journal

Journal of Information Hiding and Privacy Protectionfocuses on original papers addressing novel ideas, issues, theoretical analysis, implementation, experimental results, systems and applications in the field of Watermarking, Data Hiding, Multimedia Security, and Privacy Protection.Read More


    Realization of Mobile Augmented Reality System Based on Image Recognition

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 55-59, 2021, DOI:10.32604/jihpp.2021.017254
    Abstract With the development of computation technology, the augmented reality (AR) is widely applied in many fields as well as the image recognition. However, the AR application on mobile platform is not developed enough in the past decades due to the capability of the mobile processors. In recent years, the performance of mobile processors has changed rapidly, which makes it comparable to the desktop processors. This paper proposed and realized an AR system to be used on the Android mobile platform based on the image recognition through EasyAR engine and Unity 3D development tools. In this system, the image recognition could… More >


    The Design of Intelligent Wastebin Based on AT89S52

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 61-68, 2021, DOI:10.32604/jihpp.2021.017451
    Abstract Mainly introduces intelligent classification trash can be dedicated to solving indoor household garbage classification. The trash can is based on AT89S52 single-chip microcomputer as the main control chip. The single-chip microcomputer realizes the intelligent classification of garbage by controlling the voice module, mechanical drive module, and infrared detection module. The use of voice control technology and infrared detection technology makes the trash can have voice control and overflow alarm functions. The design has the advantages of simple and intelligent operation, simple structure, stable performance, low investment, etc., which can further effectively isolate people and garbage, reduce human infection with bacteria,… More >


    A Reversible Data Hiding Algorithm Based on Secret Sharing

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 69-82, 2021, DOI:10.32604/jihpp.2021.014108
    Abstract In traditional secret sharing schemes, all shared images containing secret segments are needed to recover secret information. In this paper, a reversible data hiding scheme based on Shamir secret sharing is used. Secret information can be recovered even if only part of the encrypted sharing is owned. This method can reduce the vulnerability of traditional encryption sharing schemes to attack. Before uploading the secret information to the cloud server, embed the encrypted n segments of secret information into n different pictures. The receiver downloads t images from the cloud server (t < n), extracts the encrypted information using the watermark… More >


    Adaptive Multi-Scale HyperNet with Bi-Direction Residual Attention Module for Scene Text Detection

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 83-89, 2021, DOI:10.32604/jihpp.2021.017181
    Abstract Scene text detection is an important step in the scene text reading system. There are still two problems during the existing text detection methods: (1) The small receptive of the convolutional layer in text detection is not sufficiently sensitive to the target area in the image; (2) The deep receptive of the convolutional layer in text detection lose a lot of spatial feature information. Therefore, detecting scene text remains a challenging issue. In this work, we design an effective text detector named Adaptive Multi-Scale HyperNet (AMSHN) to improve texts detection performance. Specifically, AMSHN enhances the sensitivity of target semantics in… More >


    Provenance Method of Electronic Archives Based on Knowledge Graph in Big Data Environment

    Journal of Information Hiding and Privacy Protection, Vol.3, No.2, pp. 91-99, 2021, DOI:10.32604/jihpp.2021.019883
    Abstract With the advent of the era of big data, the Provenance Method of electronic archives based on knowledge graph under the environment of big data has produced a large number of electronic archives due to the development of science and technology. How to guarantee the credential characteristics of electronic archives in the big data environment has attracted wide attention of the academic community. Provenance is an important technical means to guarantee the certification of electronic archives. In this paper, knowledge graph technology is used to provide the concept provenance of electronic archives in large data environment. It not only enriches… More >


    Research on Denoising of Cryo-em Images Based on Deep Learning

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 1-9, 2020, DOI:10.32604/jihpp.2020.010657
    Abstract Cryo-em (Cryogenic electron microscopy) is a technology this can build bio-macromolecule of three-dimensional structure. Under the condition of now, the projection image of the biological macromolecule which is collected by the Cryo-em technology that the contrast is low, the signal to noise is low, image blurring, and not easy to distinguish single particle from background, the corresponding processing technology is lagging behind. Therefore, make Cryoem image denoising useful, and maintaining bio-macromolecule of contour or signal of function-construct improve Cryo-em image quality or resolution of Cryo-em three-dimensional structure have important effect. This paper researched a denoising function base on GANs (generative… More >


    Image Denoising with GAN Based Model

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 155-163, 2020, DOI:10.32604/jihpp.2020.010453
    Abstract Image denoising is often used as a preprocessing step in computer vision tasks, which can help improve the accuracy of image processing models. Due to the imperfection of imaging systems, transmission media and recording equipment, digital images are often contaminated with various noises during their formation, which troubles the visual effects and even hinders people’s normal recognition. The pollution of noise directly affects the processing of image edge detection, feature extraction, pattern recognition, etc., making it difficult for people to break through the bottleneck by modifying the model. Many traditional filtering methods have shown poor performance since they do not… More >


    A Survey of GAN-Generated Fake Faces Detection Method Based on Deep Learning

    Journal of Information Hiding and Privacy Protection, Vol.2, No.2, pp. 87-94, 2020, DOI:10.32604/jihpp.2020.09839
    Abstract In recent years, with the rapid growth of generative adversarial networks (GANs), a photo-realistic face can be easily generated from a random vector. Moreover, the faces generated by advanced GANs are very realistic. It is reasonable to acknowledge that even a well-trained viewer has difficulties to distinguish artificial from real faces. Therefore, detecting the face generated by GANs is a necessary work. This paper mainly introduces some methods to detect GAN-generated fake faces, and analyzes the advantages and disadvantages of these models based on the network structure and evaluation indexes, and the results obtained in the respective data sets. On… More >


    A Survey on Face Anti-Spoofing Algorithms

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 21-34, 2020, DOI:10.32604/jihpp.2020.010467
    Abstract The development of artificial intelligence makes the application of face recognition more and more extensive, which also leads to the security of face recognition technology increasingly prominent. How to design a face anti-spoofing method with high accuracy, strong generalization ability and meeting practical needs is the focus of current research. This paper introduces the research progress of face anti-spoofing algorithm, and divides the existing face anti-spoofing methods into two categories: methods based on manual feature expression and methods based on deep learning. Then, the typical algorithms included in them are classified twice, and the basic ideas, advantages and disadvantages of… More >


    A Survey on Adversarial Example

    Journal of Information Hiding and Privacy Protection, Vol.2, No.1, pp. 47-57, 2020, DOI:10.32604/jihpp.2020.010462
    Abstract In recent years, deep learning has become a hotspot and core method in the field of machine learning. In the field of machine vision, deep learning has excellent performance in feature extraction and feature representation, making it widely used in directions such as self-driving cars and face recognition. Although deep learning can solve large-scale complex problems very well, the latest research shows that the deep learning network model is very vulnerable to the adversarial attack. Add a weak perturbation to the original input will lead to the wrong output of the neural network, but for the human eye, the difference… More >


    A Survey on Machine Learning in Chemical Spectral Analysis

    Journal of Information Hiding and Privacy Protection, Vol.2, No.4, pp. 165-174, 2020, DOI:10.32604/jihpp.2020.010466
    Abstract Chemical spectral analysis is contemporarily undergoing a revolution and drawing much attention of scientists owing to machine learning algorithms, in particular convolutional networks. Hence, this paper outlines the major machine learning and especially deep learning methods contributed to interpret chemical images, and overviews the current application, development and breakthrough in different spectral characterization. Brief categorization of reviewed literatures is provided for studies per application apparatus: X-Ray spectra, UV-Vis-IR spectra, Micro-scope, Raman spectra, Photoluminescence spectrum. End with the overview of existing circumstances in this research area, we provide unique insight and promising directions for the chemical imaging field to fully couple… More >

Share Link

WeChat scan