The search functionality is under construction.

Author Search Result

[Author] Yanli REN(5hit)

1-5hit
  • JPEG Image Steganalysis from Imbalanced Data

    Jia FU  Guorui FENG  Yanli REN  

     
    LETTER-Information Theory

      Vol:
    E100-A No:11
      Page(s):
    2518-2521

    Image steganalysis can determine whether the image contains the secret messages. In practice, the number of the cover images is far greater than that of the secret images, so it is very important to solve the detection problem in imbalanced image sets. Currently, SMOTE, Borderline-SMOTE and ADASYN are three importantly synthesized algorithms used to solve the imbalanced problem. In these methods, the new sampling point is synthesized based on the minority class samples. But this research is seldom seen in image steganalysis. In this paper, we find that the features of the majority class sample are similar to those of the minority class sample based on the distribution of the image features in steganalysis. So the majority and minority class samples are both used to integrate the new sample points. In experiments, compared with SMOTE, Borderline-SMOTE and ADASYN, this approach improves detection accuracy using the FLD ensemble classifier.

  • JPEG Steganalysis Based on Multi-Projection Ensemble Discriminant Clustering

    Yan SUN  Guorui FENG  Yanli REN  

     
    LETTER-Information Network

      Pubricized:
    2018/10/15
      Vol:
    E102-D No:1
      Page(s):
    198-201

    In this paper, we propose a novel algorithm called multi-projection ensemble discriminant clustering (MPEDC) for JPEG steganalysis. The scheme makes use of the optimal projection of linear discriminant analysis (LDA) algorithm to get more projection vectors by using the micro-rotation method. These vectors are similar to the optimal vector. MPEDC combines unsupervised K-means algorithm to make a comprehensive decision classification adaptively. The power of the proposed method is demonstrated on three steganographic methods with three feature extraction methods. Experimental results show that the accuracy can be improved using iterative discriminant classification.

  • Analysis of the k-Error Linear Complexity and Error Sequence for 2pn-Periodic Binary Sequence

    Zhihua NIU  Deyu KONG  Yanli REN  Xiaoni DU  

     
    PAPER-Cryptography and Information Security

      Vol:
    E101-A No:8
      Page(s):
    1197-1203

    The k-error linear complexity of a sequence is a fundamental concept for assessing the stability of the linear complexity. After computing the k-error linear complexity of a sequence, those bits that cause the linear complexity reduced also need to be determined. For binary sequences with period 2pn, where p is an odd prime and 2 is a primitive root modulo p2, we present an algorithm which computes the minimum number k such that the k-error linear complexity is not greater than a given constant c. The corresponding error sequence is also obtained.

  • Iris Segmentation Based on Improved U-Net Network Model

    Chunhui GAO  Guorui FENG  Yanli REN  Lizhuang LIU  

     
    LETTER-Neural Networks and Bioengineering

      Vol:
    E102-A No:8
      Page(s):
    982-985

    Accurate segmentation of the region in the iris picture has a crucial influence on the reliability of the recognition system. In this letter, we present an end to end deep neural network based on U-Net. It uses dense connection blocks to replace the original convolutional layer, which can effectively improve the reuse rate of the feature layer. The proposed method takes U-net's skip connections to combine the same-scale feature maps from the upsampling phase and the downsampling phase in the upsampling process (merge layer). In the last layer of downsampling, it uses dilated convolution. The dilated convolution balances the iris region localization accuracy and the iris edge pixel prediction accuracy, further improving network performance. The experiments running on the Casia v4 Interval and IITD datasets, show that the proposed method improves segmentation performance.

  • Fully Verifiable Algorithm for Outsourcing Multiple Modular Exponentiations with Single Cloud Server

    Min DONG  Yanli REN  Guorui FENG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E101-A No:3
      Page(s):
    608-611

    With the popularity of cloud computing services, outsourcing computation has entered a period of rapid development. Modular exponentiation is one of the most expensive operations in public key cryptographic systems, but the current outsourcing algorithms for modular exponentiations (MExps) with single server are inefficient or have small checkability. In this paper, we propose an efficient and fully verifiable algorithm for outsourcing multiple MExps with single untrusted server where the errors can be detected by an outsourcer with a probability of 1. The theory analysis and experimental evaluations also show that the proposed algorithm is the most efficient one compared with the previous work. Finally, we present the outsourcing schemes of digital signature algorithm (DSA) and attribute based encryption (ABE) as two applications of the proposed algorithm.