2018 Vol.36

    Please wait a minute...
    For Selected: Toggle Thumbnails
    Journal of Applied Sciences    2018, 36 (1): 0-0.  
    Abstract395)      PDF(pc) (44KB)(316)       Save
    Related Articles | Metrics | Comments0
    Journal of Applied Sciences    2018, 36 (1): 0-0.  
    Abstract154)      PDF(pc) (298KB)(324)       Save
    Related Articles | Metrics | Comments0
    Application-Oriented Fiber Optic Hydrogen Sensing Technology
    YANG Ming-hong, WANG Gao-peng, DAI Ji-xiang, JIANG De-sheng
    Journal of Applied Sciences    2018, 36 (1): 1-19.   DOI: 10.3969/j.issn.0255-8297.2018.01.001
    Abstract1017)      PDF(pc) (25248KB)(554)       Save

    Fiber optic hydrogen sensing, due to its optical nature, is intrinsically safe and immune to electromagnetic interference, and therefore has become a focus in the research of hydrogen sensors. It is applicable to health monitoring of electric power equipment, hydrogen energy, earthquake monitoring and other fields. This paper reviews the basic principle of four different types of fiber optic hydrogen sensors, and the latest research accomplishments in several types including micro-mirror, interference, evanescent-field, and fiber Bragg grating (FBG). The recent work of the authors' group is introduced in detail. These include palladium alloy fiber optic hydrogen sensor applied to high concentration of hydrogen monitoring, platinum-doped tungsten trioxide fiber optic hydrogen sensor applied to low-medium hydrogen concentration alarm, and tungsten trioxide-palladium-platinum nanocomposite film fiber optic hydrogen sensor applied to ultra-low hydrogen concentration trace monitoring. The state of the above research areas is summarized, and existing problems and prospects of the applications are analyzed.

    Reference | Related Articles | Metrics | Comments0
    Stimulated Brillouin Scattering in Optical Fiber Sensing Systems
    MENG Zhou, CHEN Mo, CHEN Wei, HU Xiao-yang, WANG Jian-fei
    Journal of Applied Sciences    2018, 36 (1): 20-40.   DOI: 10.3969/j.issn.0255-8297.2018.01.002
    Abstract1212)      PDF(pc) (15570KB)(716)       Save

    As an important nonlinear effect in fibers, stimulated Brillouin scattering (SBS) has significant influence on fiber sensing systems. SBS increases phase noise and deteriorates detection sensitivity in a long-haul interferometric sensing system, therefore it is critical to study SBS suppression techniques. On the other hand, SBS can be used in distributed sensing of temperature and strain. Distributed sensing techniques based on SBS have attracted much research attention. Meanwhile, lasers with ultra-narrow linewidth based on SBS have wide applications in coherent sensing systems due to their unique characteristics. This paper explains the effects of SBS on interferometric sensing systems, and compares some SBS suppression techniques. Major performance criteria of a Brillouin time domain analyzer and several techniques for improvements are introduced. Finally, the development history and present situation of the ultra-narrow linewidth Brillouin/erbium fiber lasers are presented.

    Reference | Related Articles | Metrics | Comments0
    Progress in Research of Distributed Fiber Acoustic Sensing Techniques
    CAI Hai-wen, YE Qing, WANG Zhao-yong, LU Bin, CAO Yu-long
    Journal of Applied Sciences    2018, 36 (1): 41-58.   DOI: 10.3969/j.issn.0255-8297.2018.01.003
    Abstract1353)      PDF(pc) (28231KB)(965)       Save

    Distributed fiber acoustic sensing (DAS) has wide application prospects, including security monitoring for important places and critical infrastructure, large-scale structure health monitoring,oil and gas resource exploration, etc. This is due to its capability of quantitative measurement for distributed dynamic strain over a long distance in real time. Recently, this technology attracts much attention from scientists and industries all over the world. In this paper, the development progress of distributed fiber acoustic sensing is reviewed and commented. Moreover, the relevant research in the author's group, represented by phase-sensitive optical time domain reflectometry (Φ-OTDR), are highlighted. Three parts of the research are summarized:high-fidelity signal restoration,system performance improvement, and engineering applications.

    Reference | Related Articles | Metrics | Comments0
    Research Progress of Sapphire-Derived Fibers and Sensors
    PANG Fu-fei, MA Zhang-wei, LIU Huan-huan, CHEN Na, CHEN Zhen-yi, WANG Ting-yun
    Journal of Applied Sciences    2018, 36 (1): 59-74.   DOI: 10.3969/j.issn.0255-8297.2018.01.004
    Abstract963)      PDF(pc) (37789KB)(754)       Save

    Sapphire-derived fiber (SDF) has advantages such as good mechanical properties and high temperature resistance. It has a wide range of potential applications in high temperature and distributed strain sensors. This article briefly introduces basic characteristics of SDF.Based on the research accomplishments of the authors' group in recent years, typical components of SDF are presented, mainly including fiber Bragg grating (FBG), Fabry-Perot (F-P) cavity, long period grating (LPG) and Mach-Zehnder interferometer (M-Z). The principle and fabrication method of these SDF-based sensors are investigated and discussed.

    Reference | Related Articles | Metrics | Comments0
    Tilted Fiber Bragg Grating Sensors
    GUO Tuan, LIU Fu, SHAO Li-yang
    Journal of Applied Sciences    2018, 36 (1): 75-103.   DOI: 10.3969/j.issn.0255-8297.2018.01.005
    Abstract817)      PDF(pc) (66988KB)(482)       Save

    By inducing a tilted angle between the grating and the normal direction of optical fibers, tilted fiber Bragg grating (TFBG) provides an effective means to lead the forward-propagating input light to the backward-propagating cladding modes and the core mode. Taking advantage of novel configurations and functional material coating, TFBG can be used as a powerful lab-on-fiber component for various measurements of mechanical, electrical, magnetic, biological, medical, and chemical parameters. In this paper, we present a brief review of TFBG sensing technology, including TFBG fabrication, mode coupling theory, sensing principle properties (especially the surface plasmon sensing technology). Recent progresses in various applications are discussed. These applications include mechanical sensing (bending, vibration, micro-displacement), electromagnetic sensing (electric field, magnetic field), biological sensing (cell density, protein, glucose) and chemical sensing (gas, electroactive microbe). Thanks to the multidisciplinary cooperation, especially the great progress of functional materials and nanotechnologies, the future of TFBG is promising in advanced and practical sensing.

    Reference | Related Articles | Metrics | Comments0
    Cited: Baidu(39)
    Optical Fiber Sensors Based on In-Fiber Air Bubble Microcavirties
    LIU Shen, LIAO Chang-rui, WANG Yi-ping
    Journal of Applied Sciences    2018, 36 (1): 104-147.   DOI: 10.3969/j.issn.0255-8297.2018.01.006
    Abstract1060)      PDF(pc) (56034KB)(691)       Save

    Optical fiber sensors based on Fabry-Perot interferometer (FPI) with an infiber air bubble have attracted much attention for sensing applications in gas-pressure and tensile-strain measurement. Based on the recent research progress, a new technique is presented, which can create an air-bubble-based FPI by means of improved electrical arc discharge. Only a common fusion splicer is needed without any additional equipment. In this paper, the FPI sensor with air bubbles is described. The fabrication method, principle of operation and sensing applications are discussed. Furthermore, a novel optical microresonator based on an in-fiber rectangular air bubble is demonstrated. Whispering-gallery modes can be tuned by applying tensile strain to the rectangular air bubbles.

    Reference | Related Articles | Metrics | Comments0
    Tapered Optical Fiber Sensing Technology
    YU Ji-bo, WANG Xian-fan, YANG Wen-lei, WANG Peng-fei
    Journal of Applied Sciences    2018, 36 (1): 148-175.   DOI: 10.3969/j.issn.0255-8297.2018.01.007
    Abstract970)      PDF(pc) (25737KB)(655)       Save

    As a novel sensing technology, tapered optical fiber sensing technology has attracted much more attention due to its advantages in many sensing related applications, such as sensing in electricity, petrochemical industry, biochemistry, aerospace, environmental protection and national defense. Compared with the conventional optical fiber based sensors, tapered optical fiber sensing devices offer a number of outstanding optical properties, including fast response, scale in micro/nano meters, strong confinement, large evanescent field and high sensitivity. In this chapter the following parts are presented:1) the principles, fabrication process, refractive index and temperature sensing characteristics based on microfiber coupler sensors were reviewed; 2) the sensing principles of singlemode-multimode-singlemode (SMS) fiber structure and singlemode-tapered multimode-singlemode (STMS) fiber structure were discussed and their applications on refractive index and temperature sensing were presented; 3) a multimode interference halftapered optical fiber probe based sensors were demonstrated for temperature and refractive index sensing; 4) Finally tapered optical fiber based devices can also be used for optical telecommunications and micromanipulation applications.

    Reference | Related Articles | Metrics | Comments0
    Miniature Lab on/in Fiber
    WANG Dong-ning, CHEN Wei-ping, LIU Ye, YANG Yu-bang, LI Wei-wei, LIU Jing, YANG Fan, LI Liu-jiang
    Journal of Applied Sciences    2018, 36 (1): 176-208.   DOI: 10.3969/j.issn.0255-8297.2018.01.008
    Abstract663)      PDF(pc) (38407KB)(393)       Save

    Fiber optic devices and optical fiber sensors have been developed rapidly due to their light weight, small size, immunity to electromagnetic interference, and remote sensing capability. With the emergence of various types of fiber structures, the key is to develop optical fiber sensors with practical applications. This paper focuses on the experimental study of grating, microholes and micro-hole based long-period grating, fiber in-line MZI interferometers and FP interferometers, device based on selective liquid filling of photonic crystal fibers, micro/nano fiber device and microstructure integration. Their applications are discussed and potentials for the use in lab on/in fiber explored.

    Reference | Related Articles | Metrics | Comments0
    Journal of Applied Sciences    2018, 36 (2): 0-0.  
    Abstract318)      PDF(pc) (50KB)(198)       Save
    Related Articles | Metrics | Comments0
    Journal of Applied Sciences    2018, 36 (2): 0-0.  
    Abstract97)      PDF(pc) (409KB)(219)       Save
    Related Articles | Metrics | Comments0
    Reversible Data Hiding Based on Frequency Selection in JPEG Images
    HUANG Dan, CHENG Si-jin, HUANG Fang-jun
    Journal of Applied Sciences    2018, 36 (2): 209-219.   DOI: 10.3969/j.issn.0255-8297.2018.02.001
    Abstract650)      PDF(pc) (15216KB)(373)       Save

    In this paper, by studying the encoding method of the discrete cosine transform (DCT) coefcients of joint photographic experts group (JPEG) image, and analyzing the relationship between the statistical properties of the DCT coefcients and coding length, we fnd that hiding data into DCT coefcients belonging to the mid-and-high frequency bands will lead to less fle size increment. Therefore, we propose a novel reversible data hiding (RDH) method based on the frequency selection strategy, in which the DCT coefcients of cover image are classifed into different groups based on their frequency bands, and the DCT coefcients of adjacent blocks belonging to the same frequency band are classifed into the same group. Thereafter, those groups with more zero coefcients are chosen preferentially for reversible data hiding. Experimental results demonstrate that the proposed RDH method can not only lessen the fle size increase introduced by data hiding greatly, but also perverse the image visual quality well.

    Reference | Related Articles | Metrics | Comments0
    Reversible Information Hiding Method in Encrypted Image Based on Surface Interpolation
    CHEN Yan, YU Chun-qiang, HOU Xiao-jie, ZHANG Xian-quan, TANG Zhen-jun, HE Nan
    Journal of Applied Sciences    2018, 36 (2): 220-236.   DOI: 10.3969/j.issn.0255-8297.2018.02.002
    Abstract777)      PDF(pc) (4106KB)(344)       Save

    This paper proposes a reversible information hiding method for encrypted images by means of surface interpolation. An original image is encrypted frstly, then a random function is used for obtaining the cover pixels in the encrypted image. Different hiding methods are adopted in accordance with the different inverted bits in the cover pixels. The stego-image is decrypted and the cover pixels are obtained. In the 5×5 neighborhood of a cover pixel, six non-cover pixels which are closet to the cover pixel are selected. Then surface interpolation is applied to calculate the predicted value of the cover pixel. The predicted value is used for extracting secret data and recovering the original pixel. The experimental results indicate that this method performs with a lower error rate in secret data extraction and a higher visual quality in image recovery.

    Reference | Related Articles | Metrics | Comments0
    Improved Reversible Image Camouflage Method Based on Image Block Classifcation Threshold Optimization
    LIU Xiao-kai, YAO Heng, QIN Chuan
    Journal of Applied Sciences    2018, 36 (2): 237-246.   DOI: 10.3969/j.issn.0255-8297.2018.02.003
    Abstract870)      PDF(pc) (12684KB)(317)       Save

    In order to improve the visual quality of stego images in digital image camouflage, a method of reversible image camouflage based on the threshold optimization of image sub-block classifcation is proposed. First, the sub-blocks of the original image and the cover image are classifed, respectively, according to their statistical characteristics. The threshold for classifcation is optimized through minimizing the mean square error of the camouflage image and cover image. Then, after the processes of the image sub-block matching, image sub-block linear transformation, sub-block rotation and horizontal flipping, a stego image which is visually similar to the cover image is generated. The transformation parameter information used for restoring the original image is eventually embedded into the stego image in a reversible manner to generate the fnal camouflage image. Therefore, the receiver side can extract the auxiliary information to realize the lossless recovery of the original image. The experimental results show that the visual quality of the camouflage image generated by the proposed method is better than that of the image without classifcation threshold optimization.

    Reference | Related Articles | Metrics | Comments0
    Statistical Feature Hashing Based on Wavelet Decomposition
    SHEN Qi, ZHAO Yan
    Journal of Applied Sciences    2018, 36 (2): 247-254.   DOI: 10.3969/j.issn.0255-8297.2018.02.004
    Abstract864)      PDF(pc) (4605KB)(294)       Save

    A statistical feature hash based on wavelet decomposition is proposed for the improvement of the image copy detection efciency and the recognition performance. In the proposal, an approximate image is frstly extracted from a preprocessed image by the threeorder wavelet decomposition. Secondly, the statistical features of the row and column of the approximate image of the third wavelet decomposition are extracted, and the L2 distance of the row and column statistical features is used as the invariant feature. All the invariant features are combined and used as the fnal hash of the image. Experimental results show that the proposed hash algorithm has better performance and higher efciency in copy detection.

    Reference | Related Articles | Metrics | Comments0
    Synchronized Data Embedding and Scrambling Scheme in JPEG Images
    DAI Yu, YIN Zhao-xia
    Journal of Applied Sciences    2018, 36 (2): 255-266.   DOI: 10.3969/j.issn.0255-8297.2018.02.005
    Abstract677)      PDF(pc) (6733KB)(324)       Save

    A synchronized data embedding-scrambling scheme in JPEG images is proposed in this paper. First, Checkerboard prediction method is used to predict the DC coefcient. According to the prediction error, the DC coefcient values are classifed into three categories:not-predicted (NP), predicted but not embedded (PN), and predictedand-embedded (PE). Then, the PE is vacated to embed information while scrambling the DC coefcients. Finally, the eligible RLC (run length coding) pairs of AC coefcients are rotated to embed information. Experimental results confrmed that the method ensures the high payload and the low fle expansion. The SSIM value of the reconstructed image is more than 0.996. The PSNR value of the reconstructed image is more than 50. And the original image can be reconstructed completely under certain conditions.

    Reference | Related Articles | Metrics | Comments0
    Analysis and Improvement of a Reversible Hiding Algorithm in Encrypted Domain
    DENG Min, CHEN Fan, HE Hong-jie, YAN Shu
    Journal of Applied Sciences    2018, 36 (2): 267-277.   DOI: 10.3969/j.issn.0255-8297.2018.02.006
    Abstract855)      PDF(pc) (5386KB)(549)       Save

    It is analyzed that the four-adjacent-pixel prediction reversible information hiding algorithm cannot achieve a lossless recovery from encrypted images. In order to achieve the errorless recovery of the original image, a new the pixel-type is proposed by combining four neighborhoods with pixel to be predicted itself, and compressing type-mark matrix, which is used to record the smoothness of the pixels, and embedding it into the smooth pixels. Accordingly, in the recovery phase, the original image can be recovered perfectly with the help of the extracted type-mark matrix and its neighbor pixels. Experimental results demonstrate that the proposed method can achieve real reversibility, and further improve the embedding capacity and the quality of decryption image.

    Reference | Related Articles | Metrics | Comments0
    P Frame PU Partitioning Mode Based H.264 to HEVC Video Transcoding Detection
    YU Li-fang, ZHANG Zhen-zhen, YANG Xian, LI Zhao-hong
    Journal of Applied Sciences    2018, 36 (2): 278-286.   DOI: 10.3969/j.issn.0255-8297.2018.02.007
    Abstract902)      PDF(pc) (7683KB)(289)       Save

    In this paper, a new algortithm engaging in detecting transcoding from H.264 to HEVC is proposed. PU partitioning mode, which is one of the new characteristics of HEVC (high efciency video coding), is investigated. The histogram of the PU size in the frst P frames of all GOPs is utilized as the feature set, and SVM with the statistical results is used for video classifcation. Experimental results demonstrate the effectiveness of our proposed method in distinguishing transcoded videos from single compressed videos, with a improved classifation accuracy of higher than 90%.

    Reference | Related Articles | Metrics | Comments0
    Cited: Baidu(1)
    Blind Detection of Audio Forgery Based on ENF Neighborhood Correlation Coefcient
    LÜ Zhi-sheng, TAN Li, FENG Bin, HU Yong-jian
    Journal of Applied Sciences    2018, 36 (2): 287-298.   DOI: 10.3969/j.issn.0255-8297.2018.02.008
    Abstract924)      PDF(pc) (10633KB)(458)       Save

    In order to improve the accuracy of the existing blind tamper detection methods based on electric network frequency (ENF) in the case of low SNR, we propose a novel blind detection approach based on the ENF cross-correlation coefcients in neighborhood. First, the ENF signal extracted from the query audio is divided into blocks, and the cross-correlation coefcients of the adjacent blocks are calculated. Then the adaptive fast transversal flter (FTF) is performed to the coefcient sequence. According to the variation of the fltering error energy, we can detect audio forgery. In order to reduce the interference and improve the accuracy of forgery detection and localization, the audio is processed in both forward and backward directions. Then the two directions'error energies are combined to detect forgery. Compared with two existing representative methods, the proposed method performs excellent accuracy both in forgery location and forgery detection. Especially under the circumstances of larger ENF fluctuation and lower SNR, the method shows more advantages.

    Reference | Related Articles | Metrics | Comments0
    A Secure Image Retrieval Method Based on Combined Orthogonal Decomposition and BoVW
    ZHAO Xiao, XU Yan-yan, GONG Jia-ying, SONG Fang-zhen
    Journal of Applied Sciences    2018, 36 (2): 299-308.   DOI: 10.3969/j.issn.0255-8297.2018.02.009
    Abstract693)      PDF(pc) (5953KB)(443)       Save

    We propose an image security retrieval method combining orthogonal decomposition and bag of visual word model (BoVW) in this paper to solve the problems that existing encryption algorithms for the current encryption domain image retrieval cannot meet the needs of different applications, and the algorithms relying on underlying image generally suffer lower retrieval accuracy. By introducing orthogonal decomposition framework, the image data domain is divided into the encryption domain and the retrieval domain. The encryption operation and feature extraction operation are independent, without interaction between them. In the encryption domain, users can choose any encryption method as needed. In the retrieval domain, the visual word bag model framework is introduced, and the image is represented as the visual word histogram, which reduces the semantic gap between the underlying feature and the high-level semantics, accordingly, improving the retrieval precision. Experimental results show that the proposed method provides higher security and higher retrieval precision than the current encryption domain image retrieval techniques.

    Reference | Related Articles | Metrics | Comments0
    Preprocessing Layer in Spatial Steganalysis Based on Deep Learning
    SHI Xiao-yu, LI Bin, TAN Shun-quan
    Journal of Applied Sciences    2018, 36 (2): 309-320.   DOI: 10.3969/j.issn.0255-8297.2018.02.010
    Abstract933)      PDF(pc) (5200KB)(655)       Save

    In this paper, we propose some preprocessing methods to improve the performance of a well-designed convolution neural network based on the preprocessed layer. In the proposed methods, linear and nonlinear residuals are obtained by employing a set of derivative flters, and then quantized and truncated for the effective extraction. Experimental results show that the detection performances with the three proposed preprocessing methods are all improved. Although the improvements are not consistence under different spatial steganographic algorithms and different embedding rates. The detection performance is 6% better than the prior work for S-UNIWARD at 0.4bpp.

    Reference | Related Articles | Metrics | Comments0
    Local Blur Detection of Digital Images Based on Deep Learning
    YANG Bin, ZHANG Tao, CHEN Xian-yi
    Journal of Applied Sciences    2018, 36 (2): 321-330.   DOI: 10.3969/j.issn.0255-8297.2018.02.011
    Abstract1682)      PDF(pc) (9689KB)(691)       Save

    Blurring is generally a post-operation to conceal or remove the trace of tampering. In this paper, a new convolutional neural network model is proposed, and the corresponding network topology is presented to handle the problems in the detection of blur operations, such as Gaussian blur, average blur, or median blur. An information process layer is added into the conventional convolutional neural network to extract the residual features of fltering frequency domain, accordingly, improving the accuracy of blur detection between the frst-order and the second-order fltering operations. Experimental results demonstrate that the proposed method performs a higher accuracy in blur detection than traditional methods, and is able to discriminate between the common linear and nonlinear blur operations.

    Reference | Related Articles | Metrics | Comments0
    Coverless Test Paper Disguise Combined with Non-direct Transmission and Random Codebook
    LU Hai, SHAO Li-ping
    Journal of Applied Sciences    2018, 36 (2): 331-346.   DOI: 10.3969/j.issn.0255-8297.2018.02.012
    Abstract875)      PDF(pc) (6123KB)(268)       Save

    In traditional no-embedding, search-based coverless information hiding methods, there exist some shortages such as small capacity, requiring or maintaining a large database about texts or images with a high search cost. To address these problems, a coverless test paper disguise method combined with non-direct transmission and random codebook is proposed. Firstly, to avoid direct transmission of secret information, secret information is coded by random codebook which has been scrambled by pseudo-random sequence. Secondly, the coded secret information is converted into 32-decimal digit sequence and further expressed by 24-decimal and 9-decimal digit sequences. Finally, each 24-decimal and 9-decimal digits in these two sequences are disguised by the key based random offsets relative to option arrangement order in choice question and answer of blank-flling question respectively in a random generated test paper. Comparing with the existed methods, the proposed method avoids the direct transmission of secret information and does not require extra carrier modifcation by introducing direct stego test paper generation. The proposed method does not require a large database, not require any search cost. It depends on the correct key to obtain transmitted secret information with a high hiding capacity.

    Reference | Related Articles | Metrics | Comments0
    Expansion of Video Forgery Detection Database and Validation of Its Effectiveness
    LI Ji-cheng, HU Yong-jian, Al-Alas Mohammed, XIONG Yi-chun, WEN Dong-xia, REN Yuan-yuan, LIAO Guang-jun
    Journal of Applied Sciences    2018, 36 (2): 347-361.   DOI: 10.3969/j.issn.0255-8297.2018.02.013
    Abstract1118)      PDF(pc) (21970KB)(257)       Save

    Video forgery detection database VFDD1.0 effectively alleviates the current situation of lacking standard video forgery detection database, but still with drawback of insufcient capacity. To solve this problem, we expanded VFDD1.0 to VFDD2.0, which contains 1 550 videos, including 990 original videos captured with different imaging equipment and the corresponding 560 forged videos. In this paper, we describe the newly added videos and test the effectiveness of the expanded database with seven video forgery detection algorithms. Experimental results show that the proposed VFDD2.0 is capable of exhibiting performance of different algorithms more comprehensively, and is proved to be an effective database for video forgery detection.

    Reference | Related Articles | Metrics | Comments0
    Adaptive Image Reversible Data Hiding Error Prediction Algorithm Based on Multiple Linear Regression
    WANG Xiao-yu, MA Bin, LI Jian, SHI Yun-qing
    Journal of Applied Sciences    2018, 36 (2): 362-370.   DOI: 10.3969/j.issn.0255-8297.2018.02.014
    Abstract852)      PDF(pc) (6567KB)(317)       Save

    An adaptive error prediction method based on multiple linear regression algorithm to improve the reversible information hiding capacity is proposed. The inner relationship among pixels around the object pixel is learned adaptively based on the consistency feature of pixels distributing in local area of natural images, and a multiple linear regression function matrix is built to express the relationship. The object pixel is predicted accurately with the linear function learned from its neighboring pixels, rather than simply with the arithmetic combination of surrounding pixels. Experimental results show that the multiple linear regression based adaptive image error prediction algorithm can effectively enhance the reversible data embedding capability compared to other advanced error prediction methods.

    Reference | Related Articles | Metrics | Comments0
    Coverless Information Hiding Based on Generative Adversarial Networks
    LIU Ming-ming, ZHANG Min-qing, LIU Jia, GAO Pei-xian, ZHANG Ying-nan
    Journal of Applied Sciences    2018, 36 (2): 371-382.   DOI: 10.3969/j.issn.0255-8297.2018.02.015
    Abstract1534)      PDF(pc) (3720KB)(1282)       Save

    Traditional image steganography algorithms, which embed the secret information by modifying the content of the image more or less, are hard to resist the detection of image steganalysis tools. To address this problem, a novel coverless information hiding method based on generative adversarial networks is proposed in this paper. The main idea of the method is that the class label of generative adversarial networks is replaced with the secret information as a driver to generate hidden image directly. And the secret information is extracted from the hidden image through a discriminator. Experimental results show that this hidden algorithm ensures good performs in terms of steganography capacity, anti-steganalysis and safety.

    Reference | Related Articles | Metrics | Comments0
    Adaptive Network Flow Watermarking Detection Scheme Based on Joint Centroid Entropy
    SHI Jin, LI Qian-kun, LIU Wei-wei, LIU Guang-jie, DAI Yue-wei
    Journal of Applied Sciences    2018, 36 (2): 383-392.   DOI: 10.3969/j.issn.0255-8297.2018.02.016
    Abstract835)      PDF(pc) (3938KB)(305)       Save

    Considering the differences of watermarking in various types of complex network trafc, a new pre-grouping mechanism based on total packets number, average packets interval and bytes symmetry is designed. On this basis, an adaptive network flow watermarking detection scheme based on joint centroid entropy is proposed with the exploitation of the statistic variation of network trafc which is caused by interval-based flow watermarking. Experimental results on different types of trafc in anonymous communication system Tor show that the proposed method can achieve higher detection accuracy for random multi-key interval centroid based watermarking.

    Reference | Related Articles | Metrics | Comments0
    Robust Watermarking of RGB Image Against Geometric Attacks
    LI Jing-xuan, XIANG Shi-jun
    Journal of Applied Sciences    2018, 36 (2): 393-410.   DOI: 10.3969/j.issn.0255-8297.2018.02.017
    Abstract1032)      PDF(pc) (43762KB)(233)       Save

    In this paper, a robust watermarking algorithm based on RGB image is proposed for anti-geometric attacks by optimizing R, G and B channels. Firstly, the pixels in G and B channels of an image are expanded twice and three times, respectively. After that, the image is fltered by a Gaussian low-pass flter so that its mean and histogram can be used for watermark embedding. Comparing with the watermarking algorithm without pixel expanding in G and B channels, the proposed pixel-expanded algorithm shows stronger robustness. Furthermore, we embed the same number of bits into R,G and B channels for robustness testing, and the experimental results with 100 RGB images show that the strategy to expand the pixels in G and B channels is benefcial to improve the robustness of histogram-based watermarking for anti-geometric attacks.

    Reference | Related Articles | Metrics | Comments0
    Journal of Applied Sciences    2018, 36 (3): 0-0.  
    Abstract127)      PDF(pc) (51KB)(153)       Save
    Related Articles | Metrics | Comments0
    Journal of Applied Sciences    2018, 36 (3): 0-0.  
    Abstract375)      PDF(pc) (425KB)(177)       Save
    Related Articles | Metrics | Comments0
    An Autoencoder-Based Data Collection Scheme for Wireless Sensor Networks
    LI Guo-rui, TIAN Li, CUI Hao, CHEN Hao-bo
    Journal of Applied Sciences    2018, 36 (3): 411-419.   DOI: 10.3969/j.issn.0255-8297.2018.03.001
    Abstract843)      PDF(pc) (11124KB)(223)       Save

    Data collection is one of the key operations in wireless sensor networks. In this paper, we propose an energy efcient data collection scheme for wireless sensor networks by using an autoencoder. It includes the model training process and the data collection process. In the model training process, historical dataset is utilized to train the autoencoder with the goal of obtaining a measurement matrix and a reconstruction matrix. In the data collection process, the measurement matrix is utilized to compress the sensed data in a distributed manner and the reconstruction matrix is utilized to reconstruct the surveillant data of the whole sensor network. The experiment results show that the proposed scheme presents higher data compression ratio and higher data reconstruction accuracy as well as faster data reconstruction speed than existed data collection schemes.

    Reference | Related Articles | Metrics | Comments0
    Performance of Multi-pair Two-Way Massive MIMO AF Relaying over Rician Fading Channels
    SUN Xiao-li, XU Kui, XU You-yun, MA Wen-feng
    Journal of Applied Sciences    2018, 36 (3): 420-430.   DOI: 10.3969/j.issn.0255-8297.2018.03.002
    Abstract883)      PDF(pc) (7524KB)(237)       Save

    This paper investigates a multi-pair two-way massive MIMO amplify-andforward (AF) half-duplex relay system over Rician fading channels, where multiple pairs of users, each equipped with a single antenna, exchange information within pair through a relay with very large number of antennas. Firstly, the paper gives the zero-forcing reception/zero-forcing transmission (ZFR/ZFT) processing matrix under the conditions of perfect and imperfect channel state information (CSI) at the relay. Then, the asymptotic expressions of the end-to-end signal-to-interference-plus-noise ratio are derived. Finally, the asymptotic spectral efciency (SE) at the general power scaling schemes in the case with infnite number of relay antennas are derived and verifed by the Monte-Carlo simulations.

    Reference | Related Articles | Metrics | Comments0
    Reliability of D2D System Related to Distance in Rayleigh Fading Channel
    LIU Jin, ZHAO Jun-hui, LIU Yun-yi
    Journal of Applied Sciences    2018, 36 (3): 431-442.   DOI: 10.3969/j.issn.0255-8297.2018.03.003
    Abstract940)      PDF(pc) (7479KB)(225)       Save

    Under the control of the base station, both sides of the device-to-device (D2D) communication can communicate directly without going through the base station. In order to improve the system capacity, the system reliability and the diversity gain, this paper introduces a relay technology into D2D communication system, and adopts relay strategies including amplify-and-forward mode and decode-and-forward mode. Considering the influence of relay position on the reliability of D2D system, this paper establishes a distance model and derives the formula of the outage probability of the system under different conditions in Rayleigh fading channel. Simulation results show that relay technology can effectively reduce the outage probability in the case of low system channel target rate, that the closer to the midpoint of the D2D communication link the relay node, the lower the outage probability, and that the reliability of the communication relay system is better than that of the non-relayed D2D communication system.

    Reference | Related Articles | Metrics | Comments0
    Simulation of Temperature Field Distribution of CO2 Laser Annealing Ge Core Fiber
    ZHAO Zi-wen, MAO Yu-ji-zhe, CHENG Xue-li, CHEN Na, DONG Yan-hua, WANG Ting-yun
    Journal of Applied Sciences    2018, 36 (3): 443-450.   DOI: 10.3969/j.issn.0255-8297.2018.03.004
    Abstract683)      PDF(pc) (11611KB)(228)       Save

    The temperature feld distribution of Ge core fber in the process of CO2 laser annealing is simulated by using COMSOL Multiphysics. The influences of laser power and fber moving velocity in axial direction on the temperature feld distribution in the laser heating zone are simulated. Accordingly, the proper laser powers corresponding to different moving velocities of fber are preliminarily obtained. For the Ge core fber with the inner diameter of 80 μm and outer diameter of 300 μm, the proper laser powers corresponding to the axial movement velocities of 4 mm/s, 8 mm/s, 12 mm/s, 16 mm/s and 20 mm/s are 1.5 W, 2.0 W, 2.5 W, 3.5 W, and 4.0 W, respectively. The simulation of the paper provides a theoretical basis for optimizing the performance of the Ge core fber by CO2 laser annealing.

    Reference | Related Articles | Metrics | Comments0
    Anti-interference Method of LED Visible Light Communication and Its Engineering Implementation
    SU Yun-xia, WU Ya-ting, ZHANG Xue-fan
    Journal of Applied Sciences    2018, 36 (3): 451-460.   DOI: 10.3969/j.issn.0255-8297.2018.03.005
    Abstract914)      PDF(pc) (3195KB)(431)       Save

    Light-emitting diode (LED) visible light communication (VLC) is a promising technology due to its unique advantages. However, it suffers from the problem of light interference. This paper proposes anti-interference methods from several aspects aiming at LED VLC’s vulnerability to the interference of stray light and dust. In frequency domain, we propose an anti-interference flter which flters out the outside-band noise. In time domain, we propose phase-lock-demodulation related coherent demodulation method and theoretically deduce the process. In method of signal modulation, we propose a driving method of anti-interference transmission circuit for LED optical communication and illumination. To improve the effectiveness of photo-electric conversion, we propose a sensitive optical receiver circuit scheme. Experimental results indicate that the proposed scheme has good anti-interference ability to stray light. The communication distance exceeds 20 m, which shows the practical application value of our scheme.

    Reference | Related Articles | Metrics | Comments0
    Quality Evaluation Method for the Results of Digital Orthophoto Mosaic
    ZHANG Sha-sha, WANG Shu-gen
    Journal of Applied Sciences    2018, 36 (3): 461-470.   DOI: 10.3969/j.issn.0255-8297.2018.03.006
    Abstract915)      PDF(pc) (20176KB)(227)       Save

    For the quality evaluation of the Digital Orthophoto mosaic, a quantitative evaluation method, which is based on the buffer images and includes both the radiometric consistency and geometric consistency indexes, is presented in this paper. Firstly, the buffer zones are built around the seamline, and the buffer images are obtained from the left and right images corresponding to the seamline. Then based on this, the quality evaluation indexes can be calculated, among them, the radiometric consistency is mainly evaluated by the indexes of the gray contrast coefcient and the Uniform Intensity-Distribution, the geometric consistency is mainly evaluated by using the offset distance of the SURF (speeded-up robust features) feature matching points. Finally, the evaluation results of mosaic quality are obtained. Using 36 urban orthophotos of the Vaihingen area of Germany and 36 mountain orthophotos of the Enshi area of China as an experiment data set, the quality evaluation was carried out for the mosaic results respectively obtained by three business softwares of ArcGIS, OrthoVista and DPGrid, which verifes the effectiveness of the proposed method.

    Reference | Related Articles | Metrics | Comments0
    Target Detection from High Resolution Remote Sensing Images Based on Combination of Multi-scale Visual Features
    FENG Fa-jie, LI Jun-ping, DING Ya-zhou, ZHU Kun, CUI Wei-hong
    Journal of Applied Sciences    2018, 36 (3): 471-484.   DOI: 10.3969/j.issn.0255-8297.2018.03.007
    Abstract918)      PDF(pc) (42096KB)(203)       Save

    To utilize the spatial structure and color information of the target in the high resolution remote sensing images, this paper proposes a method of target detection based on multi-scale visual feature combination. Firstly, we use two types of feature descriptor to express the color and spatial structure information of targets, one is the dense spatial pyramid scale-invariant feature transform (SIFT) descriptor in spatial pyramid of the color transformed images, the other is the multi-scale histogram of oriented gradient (HOG) feature combined with the hue, saturability and value (HSV) features. Secondly, the two sets of features are used to train classifer through support vector machine (SVM). For the color transformed dense SIFT spatial pyramid feature descriptor, the input of SVM is constructed by spatial pyramid matching kernel (SPMK). For the combined HOG and HSV feature, the orderly-combined eigenvectors are taken as the input of the SVM classifer. Finally the intersection of the two classifcation results are regarded as the fnal results. For verifcation, we tested the buildings and fsh rafts in aerial images and the yachts in satellite images. Experimental results show that the proposed method can improve the precision of target detection, which can reach to by 90% or better.

    Reference | Related Articles | Metrics | Comments0
    Half-Art—A New QR Code Artistic Algorithm Based on Halftone and Qart
    YAN Bo-yu, SUN Cheng-jun, FENG Fan, ZHANG Jin, GONG Xiao-li
    Journal of Applied Sciences    2018, 36 (3): 485-494.   DOI: 10.3969/j.issn.0255-8297.2018.03.008
    Abstract932)      PDF(pc) (13940KB)(427)       Save

    In order to improve the recognition and diversity of quick response (QR) Code, this paper analyzes Halftone algorithm, illustrates its basic idea, advantages and disadvantages, and extends Halfton. In addition, based on some ideas from Halftone and QArt, a new artistic algorithm called Half-Art is put forward. The algorithm is divided into two stages: data modifcation and image processing. The mathematical features of the ReedSolomon codes (RS codes) and binarized layer masking algorithm are used to combine the target image with the QR Code. The algorithm combines the advantages, makes up shortcomings of Halftone and QArt. The optimized QR Code has good readability when spread through electronic channels.

    Reference | Related Articles | Metrics | Comments0
    Restricted Boltzmann Machine Algorithm for Image Classifcation and Its Parallel Implementation Based on (2D)2 PCA
    SONG Hai-feng, CHEN Guang-sheng, JING Wei-peng, YANG Wei-wei
    Journal of Applied Sciences    2018, 36 (3): 495-503.   DOI: 10.3969/j.issn.0255-8297.2018.03.009
    Abstract542)      PDF(pc) (2989KB)(353)       Save

    In this paper, in order to solve the problem of high time complexity when using restricted Boltzmann machine (RBM) to classify the high resolution image, a RBM algorithm for image classifcation based on two-way 2-dimension principal component analysis ((2D)2PCA) is put forward. The algorithm frstly reduces the dimension in X and Z direction on the image by using (2D)2PCA, secondly extracts the principle components as the input data of the visible layer of RBM network, fnally, builds the RBM network with contrastive divergence algorithm and realizes the image classifcation. The proposed algorithm can solve the drawbacks of the long training time of RBM network, which might lead to the convergence failure of the entire network training state as processing the high resolution image. The parallel experimental results show that the algorithm can achieve both high speed and good parallelism as processing high resolution images. The ratio of acceleration reaches 3.13 as employing a cluster of four parallel machines.

    Reference | Related Articles | Metrics | Comments0