51 results on '"Zichi Wang"'
Search Results
2. Exploring Abnormal Behavior in Swarm: Identify User Using Adversarial Examples
- Author
-
Zichi Wang, Sheng Li, Xinpeng Zhang, and Guorui Feng
- Subjects
Computational Mathematics ,Control and Optimization ,Artificial Intelligence ,Computer Science Applications - Published
- 2023
- Full Text
- View/download PDF
3. Multi-source Style Transfer via Style Disentanglement Network
- Author
-
Quan Wang, Sheng Li, Zichi Wang, Xinpeng Zhang, and Guorui Feng
- Subjects
Signal Processing ,Media Technology ,Electrical and Electronic Engineering ,Computer Science Applications - Published
- 2023
- Full Text
- View/download PDF
4. Robust Image Steganography Against General Downsampling Operations with Lossless Secret Recovery
- Author
-
Sheng Li, Zichi Wang, Xiudong Zhang, and Xinpeng Zhang
- Subjects
Electrical and Electronic Engineering - Published
- 2023
- Full Text
- View/download PDF
5. Repeatable Data Hiding: Towards the Reusability of Digital Images
- Author
-
Zichi Wang, Guorui Feng, and Xinpeng Zhang
- Subjects
Authentication ,Cover (telecommunications) ,Steganography ,Computer science ,computer.software_genre ,Image (mathematics) ,Digital image ,Distortion ,Information hiding ,Media Technology ,Embedding ,Data mining ,Electrical and Electronic Engineering ,computer - Abstract
This paper proposes a repeatable data hiding framework for digital images, in which the distortion caused by data hiding is invariable no matter how many times the embedding operation is executed. As a result, the usability of images can be always guaranteed. To achieve repeatable data hiding, we deduce the theoretical modification probabilities of the elements in cover image (an image used for data hiding). Then we design an embedding framework to make the practical modification probabilities of cover elements equal to the deduced ones. When additional data is embedded into cover image with the deduced probabilities, the modification-trace of current embedding is replaced by the latter embedding. That means multiple embeddings do not produce new modification-trace, so that the distortion caused by data hiding is invariable. Therefore, the repeatability of data hiding can be guaranteed. Finally, we describe some applications of repeatable data hiding, e.g., logistics management, authentication database management, and steganography, to show the practicability of our framework.
- Published
- 2022
- Full Text
- View/download PDF
6. Cover Selection for Steganography Using Image Similarity
- Author
-
Zichi Wang, Guorui Feng, Liquan Shen, and Xinpeng Zhang
- Subjects
Electrical and Electronic Engineering - Published
- 2022
- Full Text
- View/download PDF
7. Unified Performance Evaluation Method for Perceptual Image Hashing
- Author
-
Xinran Li, Chuan Qin, Zichi Wang, Zhenxing Qian, and Xinpeng Zhang
- Subjects
Computer Networks and Communications ,Safety, Risk, Reliability and Quality - Published
- 2022
- Full Text
- View/download PDF
8. Generating watermarked adversarial texts
- Author
-
Mingjie Li, Hanzhou Wu, Zichi Wang, and Xinpeng Zhang
- Subjects
Electrical and Electronic Engineering ,Atomic and Molecular Physics, and Optics ,Computer Science Applications - Published
- 2023
- Full Text
- View/download PDF
9. Defending against adversarial examples using perceptual image hashing
- Author
-
Ke Wu, Zichi Wang, Xinpeng Zhang, and Zhenjun Tang
- Subjects
Electrical and Electronic Engineering ,Atomic and Molecular Physics, and Optics ,Computer Science Applications - Published
- 2023
- Full Text
- View/download PDF
10. Deniable Steganography: Concepts, Definitions, And Methods
- Author
-
jianwei fei, yong xu, zhihua xia, zichi wang, and xinpeng zhang
- Published
- 2023
- Full Text
- View/download PDF
11. Data Hiding in Neural Networks for Multiple Receivers [Research Frontier]
- Author
-
Xinpeng Zhang, Hanzhou Wu, Guorui Feng, and Zichi Wang
- Subjects
Artificial neural network ,Computer science ,Process (computing) ,computer.software_genre ,Evolutionary computation ,Theoretical Computer Science ,Reduction (complexity) ,Artificial Intelligence ,Robustness (computer science) ,Information hiding ,Embedding ,Data mining ,computer ,Decoding methods - Abstract
Recently, neural networks have become a promising architecture for some intelligent tasks. In addition to conventional tasks such as classification, neural networks can be used for data hiding. This paper proposes a data hiding scheme to transmit different data to multiple receivers via the same neural network simultaneously. Additional data are embedded into the neural network during the process of training instead of modifying the network parameters after training. As a result, the reduction in detection accuracy of the neural network is trivial with additional data embedded. On the receiver side, additional data can be extracted using specific data decoding networks. Instead of training, the parameters of data decoding networks are generated using the embedding keys possessed by the receivers. Therefore, it is unnecessary to store and transmit the decoding networks secretly, and the practicability is satisfactory. A receiver can extract corresponding additional data with the correct embedding key. For other parts of additional data, the receiver cannot affirm their existence and therefore cannot extract them. Experimental results verify the effectiveness of the proposed data hiding scheme, including embedding capacity and robustness.
- Published
- 2021
- Full Text
- View/download PDF
12. Perceptual Model Hashing: Towards Neural Network Model Authentication
- Author
-
Xinran Li, Zichi Wang, Guorui Feng, Xinpeng Zhang, and Chuan Qin
- Published
- 2022
- Full Text
- View/download PDF
13. Multi-source Data Hiding in Neural Networks
- Author
-
Ziyun Yang, Zichi Wang, Xinpeng Zhang, and Zhenjun Tang
- Published
- 2022
- Full Text
- View/download PDF
14. Robust Watermarking for Neural Network Models Using Residual Network
- Author
-
Lecong Wang, Zichi Wang, Xinran Li, and Chuan Qin
- Published
- 2022
- Full Text
- View/download PDF
15. Batch Steganography via Generative Network
- Author
-
Zichi Wang, Zhenxing Qian, Xiaolong Li, Nan Zhong, and Xinpeng Zhang
- Subjects
Steganography ,Cover (telecommunications) ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Pattern recognition ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Distortion ,Information hiding ,Metric (mathematics) ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Embedding ,Entropy (information theory) ,020201 artificial intelligence & image processing ,Artificial intelligence ,Electrical and Electronic Engineering ,business - Abstract
Batch steganography is a technique that hides information into multiple covers. To achieve a better performance on the security of data hiding, we propose a novel strategy of batch steganography using a generative network. In this method, the approaches of cover selection, payload allocation, and distortion evaluation are considered in the round. We define a quality metric to evaluate the distortion between the cover image and the stego. When training the generation function, we define an objective function containing two parts: the entropy loss and the steganalytic loss. While the entropy loss is used to represent the gap between the payload inside stego images and the entire embedding capacity, the steganalytic loss is used to assess the data embedding impact using the proposed quality metric. With back-propagation, we minimize the objective function to obtain an optimal solution. Accordingly, different payloads can be allocated to different images, and the ± 1 modification probability for pixels in each cover can be calculated. Finally, we embed information into the selected images by STC. Experimental results show that the proposed method achieves a better undetectability against modern steganalytic tools.
- Published
- 2021
- Full Text
- View/download PDF
16. Multichannel Steganography in Digital Images for Multiple Receivers
- Author
-
Xinpeng Zhang, Guorui Feng, Yanli Ren, and Zichi Wang
- Subjects
Steganography ,Cover (telecommunications) ,business.industry ,Computer science ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020207 software engineering ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer Science Applications ,Digital image ,Hardware and Architecture ,Information hiding ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Key (cryptography) ,Communication source ,business ,Focus (optics) ,Software ,Computer hardware - Abstract
In this article, we focus on a new concept called multichannel steganography, in which a sender is able to transmit different secret data to multiple receivers via the same cover image. First, we propose a general framework to achieve multichannel steganography based on modern steganographic paradigm. Then, we design two schemes to, respectively, achieve separable and sequential multichannel steganography with the proposed framework. In the separable scheme, a receiver can extract secret data for him/her using the corresponding data hiding key. For other parts of secret data, the receiver cannot affirm the existence and, therefore, cannot extract them. In the sequential scheme, the multiple receivers are dependent. The receiver with the highest priority can extract data first. After that, the receiver with the second priority can extract data when authorized by the highest priority receiver, and so on. In addition, the two schemes achieve multichannel steganography without decreasing the undetectability of steganography.
- Published
- 2021
- Full Text
- View/download PDF
17. JPEG Steganography With Content Similarity Evaluation
- Author
-
Zichi Wang, Guorui Feng, Zhenxing Qian, and Xinpeng Zhang
- Subjects
Human-Computer Interaction ,Control and Systems Engineering ,Electrical and Electronic Engineering ,Software ,Computer Science Applications ,Information Systems - Abstract
Content similarity is a representative property of natural images, for example, similar regions, which is utilized by modern steganalysis. Existing JPEG steganographic methods mainly focus on the complexity of content but ignore content similarity. This article investigates content similarity to improve the undetectability of JPEG steganography. Specifically, the content similarity of DCT blocks and the 64 parallel channels is used to design the distortion function. Given a JPEG image, initial embedding costs are assigned for quantized DCT coefficients using an appropriate algorithm among the existing distortion functions. Then, the similarities of blocks and channels are used to update the initial embedding costs, respectively. After combination, the final distortion function can be obtained. Using syndrome trellis coding (STC), which achieves minimal embedding distortion with respect to a given distortion function, secret data are embedded into the cover image with a final distortion function. Experimental results show that our scheme achieves better undetectability than current state-of-the-art JPEG steganographic methods.
- Published
- 2022
18. A New Steganography Method for Dynamic GIF Images Based on Palette Sort
- Author
-
Xinpeng Zhang, Jingzhi Lin, Zhenxing Qian, Zichi Wang, and Guorui Feng
- Subjects
Distortion function ,Technology ,021110 strategic, defence & security studies ,Article Subject ,Pixel ,Steganography ,Computer Networks and Communications ,Computer science ,Frame (networking) ,Payload (computing) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Palette (computing) ,Inter frame ,TK5101-6720 ,02 engineering and technology ,Telecommunication ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Algorithm ,Information Systems - Abstract
This paper proposes a new steganography method for hiding data into dynamic GIF (Graphics Interchange Format) images. When using the STC framework, we propose a new algorithm of cost assignment according to the characteristics of dynamic GIF images, including the image palette and the correlation of interframes. We also propose a payload allocation algorithm for different frames. First, we reorder the palette of GIF images to reduce the modifications on pixel values when modifying the index values. As the different modifications on index values would result in different impacts on pixel values, we assign the elements with less impact on pixel values with small embedding costs. Meanwhile, small embedding costs are also assigned for the elements in the regions that the interframe changes are large enough. Finally, we calculate an appropriate payload for each frame using the embedding probability obtained from the proposed distortion function. Experimental results show that the proposed method has a better security performance than state-of-the-art works.
- Published
- 2020
- Full Text
- View/download PDF
19. A Novel Location Privacy Protection Algorithm for Social Discovery Application
- Author
-
Yuwei Yao, Xinpeng Zhang, Hanzhou Wu, Zichi Wang, and Jiangfeng Wang
- Subjects
Mobile wireless ,Computer science ,020208 electrical & electronic engineering ,Privacy protection ,Location-based service ,0202 electrical engineering, electronic engineering, information engineering ,Entropy (information theory) ,020206 networking & telecommunications ,02 engineering and technology ,Electrical and Electronic Engineering ,Computer security ,computer.software_genre ,computer - Abstract
With the development of smartphones and mobile wireless network, social discovery applications are becoming more and more popular now. These applications help users to chat with nearby people and m...
- Published
- 2020
- Full Text
- View/download PDF
20. Steganography in Social Networks Based on Behavioral Correlation
- Author
-
Zichi Wang, Yinghong Hu, and Xinpeng Zhang
- Subjects
Steganalysis ,Social network ,Steganography ,business.industry ,Computer science ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Computer security ,computer.software_genre ,Correlation ,0202 electrical engineering, electronic engineering, information engineering ,Communication source ,Electrical and Electronic Engineering ,business ,computer - Abstract
This paper proposes a secure steganographic method in social networks based on the behavioral correlation between the sender and his friends. A sender transmits secret data to one of his friends in...
- Published
- 2020
- Full Text
- View/download PDF
21. Practical Cover Selection for Steganography
- Author
-
Xinpeng Zhang, Zhenxing Qian, and Zichi Wang
- Subjects
Steganography ,business.industry ,Computer science ,Applied Mathematics ,Data_MISCELLANEOUS ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,Pattern recognition ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Visualization ,Distortion ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,Artificial intelligence ,Electrical and Electronic Engineering ,Image denoising ,business ,Classifier (UML) - Abstract
This letter focus on a practical scenario of cover selection for steganography, in which a part of the available images of the sender have been processed to improve visual quality, e.g., contrast enhancement, image denoising. In this case, not only the embedding distortion (caused by steganography), but also the processing distortion (caused by processing) should be considered when selecting cover image. We propose a cover selection method to combine the two kinds of distortion together to measure the suitability for steganography of the available images. To calculate the processing distortion, a classifier is trained to distinguish the processed images with the original ones. The classifier is then used to measure the possibility of the existence of processing. High possibility means high processing distortion. In addition, the current distortion minimization framework designed for steganography is employed to calculate the embedding distortion. Finally, both kinds of distortion are combined to form the total distortion, and the image with the minimal total distortion is selected as cover. Using the selected image for embedding, high undetectability can be achieved.
- Published
- 2020
- Full Text
- View/download PDF
22. On Improving Perceptual Image Hashing Using Reference Image Construction
- Author
-
Xinran Li and Zichi Wang
- Published
- 2022
- Full Text
- View/download PDF
23. Research on Fault Isolation Technology and Device Development of LVDC System
- Author
-
Yuebin Wu, Tao Ma, Lei Hou, Tianxing Qi, Zichi Wang, Jianhai Yan, and Huizhuo Ma
- Published
- 2021
- Full Text
- View/download PDF
24. Privacy protection based on binary fingerprint compression
- Author
-
Jiajun Su, Xin Chen, Sheng Li, and Zichi Wang
- Subjects
Computer science ,business.industry ,Binary number ,020207 software engineering ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,computer.software_genre ,Encryption ,Huffman coding ,Grayscale ,Computer graphics ,symbols.namesake ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,symbols ,020201 artificial intelligence & image processing ,Data mining ,Bitstream ,business ,computer ,Decoding methods ,Information Systems - Abstract
This paper proposes a novel system to protect the fingerprint database based on compressed binary fingerprint images. In this system, the user can store private data with high capacity. First, the grayscale fingerprint image is transformed into a binary bitstream. Then, the binary bitstream is compressed using run-length encoding and Huffman encoding technique to create a sparse space to accommodate private data. Finally, the new image constructed by the obtained binary bitstream is encrypted with an encryption key. For fingerprint matching, it is only need to decrypt and decompress the encrypted image in the database to obtain the binary fingerprint image. When the matching is passed, the private data can be extracted to a user with data-embedding key. If the matching is failed, the private data cannot extracted for the purpose of privacy security. Even if a leakage of the encryption key occurs, this system can still protect the privacy data of the user due to the existence of the data-embedding key. Meanwhile, the encoding and decoding phases are real time, which guarantee the practicability of the proposed system.
- Published
- 2019
- Full Text
- View/download PDF
25. Towards Robust Image Steganography
- Author
-
Zichi Wang, Xinpeng Zhang, Jinyuan Tao, and Sheng Li
- Subjects
Steganography ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,computer.file_format ,JPEG ,Image (mathematics) ,Transmission (telecommunications) ,Distortion ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Discrete cosine transform ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer ,Transform coding - Abstract
Posting images on social network platforms is happening everywhere and every single second. Thus, the communication channels offered by various social networks have a great potential for covert communication. However, images transmitted through such channels will usually be JPEG compressed, which fails most of the existing steganographic schemes. In this paper, we propose a novel image steganography framework that is robust for such channels. In particular, we first obtain the channel compressed version (i.e., the channel output) of the original image. Secret data is embedded into the channel compressed original image by using any of the existing JPEG steganographic schemes, which produces the stego-image after the channel transmission. To generate the corresponding image before the channel transmission (termed the intermediate image), we propose a coefficient adjustment scheme to slightly modify the original image based on the stego-image. The adjustment is done such that the channel compressed version of the intermediate image is exactly the same as the stego-image. Therefore, after the channel transmission, secret data can be extracted from the stego-image with 100% accuracy. Various experiments are conducted to show the effectiveness of the proposed framework for image steganography robust to JPEG compression.
- Published
- 2019
- Full Text
- View/download PDF
26. Breaking Steganography
- Author
-
Guorui Feng, Xinpeng Zhang, Zichi Wang, and Zhenxing Qian
- Subjects
Steganography ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Algorithm ,Software ,Distortion minimization - Abstract
This article describes how to overcome the shortage of steganalysis for small capacity-based embedding. A slight modification method is proposed to break steganography. For a given image, traditional steganalysis methods are first used to achieve a preliminary result. For the “clear” image judged by steganalysis, it is still suspicious because of the incompleteness of steganalysis for small capacity. Thus, slight modifications are made to break the possibility of covert communication. The modifications are made on the locations with minimal distortion to guarantee high quality of the modified image. To this end, a proposed distortion minimization based algorithm using slight modification. Experimental results show that the error rate of secret data extraction is around 50% after implementation, which indicates that the covert communication of steganography is destroyed completely.
- Published
- 2019
- Full Text
- View/download PDF
27. Asymmetric Distortion Function for JPEG Steganography Using Block Artifact Compensation
- Author
-
Zhaoxia Yin, Zichi Wang, and Xinpeng Zhang
- Subjects
Distortion function ,021110 strategic, defence & security studies ,Artifact (error) ,Steganography ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,computer.file_format ,JPEG ,Compensation (engineering) ,Distortion ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,computer ,Software ,Block (data storage) - Abstract
This article describes how the existing distortion functions for JPEG steganography allot same cost for ±1 embedding changes. Because of the correlation of natural image, however, changes with different polarities make different influences on image. Therefore, the embedding costs for ±1 embedding changes should not be equivalent. This article proposes a general method to distinguish the embedding costs for different polarities of embedding changes for JPEG images with the help of reference images constructed by block artifact compensation. The original JPEG image is decompressed into spatial domain firstly, and then the block artifact is compensated by smoothing filtering implemented on border pixels of each 8 × 8 block. After that, the compensated image which is more similar to the original uncompressed image is recompressed into DCT domain and adopted as side information to guide the adjusting of the given distortion function. Experiment results show that after the proposed method is employed, the security performance of current popular JPEG steganographic methods is observably increased.
- Published
- 2019
- Full Text
- View/download PDF
28. Secure Cover Selection for Steganography
- Author
-
Xinpeng Zhang and Zichi Wang
- Subjects
General Computer Science ,Cover (telecommunications) ,Computational complexity theory ,Computer science ,security ,02 engineering and technology ,Image (mathematics) ,Set (abstract data type) ,cover selection ,Distortion ,0202 electrical engineering, electronic engineering, information engineering ,General Materials Science ,Steganography ,Selection (genetic algorithm) ,Steganalysis ,business.industry ,General Engineering ,020206 networking & telecommunications ,020207 software engineering ,Pattern recognition ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Artificial intelligence ,distortion ,business ,lcsh:TK1-9971 - Abstract
Existing cover selection methods for steganography cannot resist pooled steganalysis. This paper proposes a secure cover selection method which is able to resist pooled steganalysis and single object steganalysis meanwhile. To resist pooled steganalysis, the maximum mean discrepancy (MMD) distance between the stego set and a clear arbitrary image set is kept not larger than a normal threshold during cover selection, where the threshold is the MMD distance between two clear arbitrary image sets. Under this constraint, a searching strategy is designed to select the minimal steganographic distortion images within the affordable computational complexity to resist single object steganalysis. With the selected covers, the security of steganography is guaranteed against both single object steganalysis and pooled steganalysis. The experimental results demonstrated the effectiveness of the proposed method.
- Published
- 2019
- Full Text
- View/download PDF
29. Steganography in beautified mages
- Author
-
Zichi Wang, Xin Peng Zhang, Zhenxing Qian, Guorui Feng, and Li Yun Liu
- Subjects
Informatics ,Esthetics ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Image (mathematics) ,Software ,Distortion ,Image Interpretation, Computer-Assisted ,0502 economics and business ,Image Processing, Computer-Assisted ,0202 electrical engineering, electronic engineering, information engineering ,Beautification ,Computer vision ,Computer Security ,Steganalysis ,Distortion function ,Steganography ,business.industry ,Applied Mathematics ,05 social sciences ,Reproducibility of Results ,General Medicine ,Computational Mathematics ,Modeling and Simulation ,Embedding ,020201 artificial intelligence & image processing ,Artificial intelligence ,General Agricultural and Biological Sciences ,business ,Algorithms ,050203 business & management - Abstract
Existing distortion functions in steganography which achieved high undetectability are designed for unprocessed natural image. Nowadays, a large number of images are filtered before transmitting for the sake of beautification. In this situation, existing distortion functions should be improved to fit the properties of these beautified images. This paper proposes a distortion function optimization method for steganography on beautified images. Given an unprocessed image, a popular image beautification software is employed to produce two similar beautified images. One of them is used for embedding and the other one is employed as reference. Guided by the reference, existing distortion functions are improved by distinguishing the embedding costs for ±1 embedding. After embedding, the stego image is closer to the reference, which results in a higher undetectability against steganalysis. Experimental results also proved the increasing of undetectability when examined by modern steganalytic tools.
- Published
- 2019
- Full Text
- View/download PDF
30. Research on remote visual operation and maintenance of substation GIS equipment based on digital modeling
- Author
-
Qibao Kang, Yaqian Wang, He Zhu, Zichi Wang, and Hongliang Chen
- Subjects
Tree (data structure) ,Computer science ,Real-time computing ,Frame (networking) ,Process (computing) ,Object model ,Frame rate ,Maintenance engineering ,Visualization - Abstract
At present, the loading speed of model scene is slow in the visual operation and maintenance process of substation GIS equipment, which leads to poor visual operation and maintenance effect. In order to solve this problem, a remote visual operation and maintenance method of substation GIS equipment based on digital modeling is proposed. According to IEC61850 standard, the digital modeling of substation AC charging pile, DC charger and other main equipment is completed. The multi tree hybrid structure is generated by using the model data organization and dynamic operation and maintenance method, and the ground object model of substation is constructed to improve the loading speed of the model. The remote visual operation and maintenance of substation GIS equipment is realized by using the map model mapping technology. The experimental results show that the method can effectively improve the loading speed of the model scene, the average loading frame rate is 42 frame/s, and has good visual operation and maintenance effect and strong practical application.
- Published
- 2021
- Full Text
- View/download PDF
31. Steganographic Distortion Function for Enhanced Images
- Author
-
Xinpeng Zhang, Zichi Wang, and Guorui Feng
- Subjects
Distortion function ,021110 strategic, defence & security studies ,Pixel ,Cover (telecommunications) ,Steganography ,business.industry ,Computer science ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Image (mathematics) ,Distortion ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,Trellis modulation ,Joint (audio engineering) ,business - Abstract
Contrast enhancement is widely used to improve the visual quality of images. This paper proposes a distortion function for steganography in enhanced images. The pixel prediction error and the cost of the pixel value itself are joint to fit the unique properties of enhanced image. Given a cover image, each pixel is predicted by its neighbors. The prediction error, which reflects the texture complexity, are combined with the cost of the pixel value itself to form the final distortion function. With the proposed distortion function, secret data can be embedded into the enhanced cover image with minimal image distortion using syndrome trellis coding (STC). As a result, less detectable artifacts left in the stego images, so that high undetectability is achieved.
- Published
- 2021
- Full Text
- View/download PDF
32. Multisource Data Hiding in Digital Images
- Author
-
Zichi Wang
- Subjects
Physics and Astronomy (miscellaneous) ,Chemistry (miscellaneous) ,General Mathematics ,Computer Science (miscellaneous) ,Data_CODINGANDINFORMATIONTHEORY ,data hiding ,multisource ,digital image - Abstract
In this paper, we propose a new data-hiding framework: multisource data hiding, in which multiple senders (multiple sources) are able to transmit different secret data to a receiver via the same cover image symmetrically. We propose two multisource data-hiding schemes, i.e., separable and anonymous, according to different applications. In the separable scheme, the receiver can extract the secret data transmitted by all senders using the symmetrical data-hiding key. A sender is unable to know the content of the secret data that is not transmitted by them (non-source sender). In the anonymous scheme, it is unnecessary to extract all secret data on the receiver side. The content extracted by the receiver is a co-determined result of the secret data transmitted by all senders. Details of the secret data are unknown to the receiver and the non-source senders. In addition, the two proposed schemes achieve multisource data hiding without decreasing the undetectability of data hiding.
- Published
- 2022
- Full Text
- View/download PDF
33. Data Computing in Covert Domain
- Author
-
Zhenxing Qian, Xinpeng Zhang, and Zichi Wang
- Subjects
Upload ,Source data ,Cover (telecommunications) ,Computer science ,Covert ,business.industry ,Information hiding ,Cloud computing ,Communication source ,business ,Domain (software engineering) ,Computer network - Abstract
This paper proposes an idea of data computing in the covert domain (DCCD). We show that with information hiding some data computing tasks can be executed beneath the covers like images, audios, random data, etc. In the proposed framework, a sender hides his source data into two covers and uploads them onto a server. The server executes computation within the stego and returns the covert computing result to a receiver. With the covert result, the receiver can extract the computing result of the source data. During the process, it is imperceptible for the server and the adversaries to obtain the source data as they are hidden in the cover. The transmission can be done over public channels. Meanwhile, since the computation is realized in the covert domain, the cloud cannot obtain the knowledge of the computing result. Therefore, the proposed idea is useful for secure computing.
- Published
- 2020
- Full Text
- View/download PDF
34. Joint Cover-Selection and Payload-Allocation by Steganographic Distortion Optimization
- Author
-
Zichi Wang, Zhaoxia Yin, and Xinpeng Zhang
- Subjects
Cover (telecommunications) ,Steganography ,Computer science ,Applied Mathematics ,Payload (computing) ,Value (computer science) ,020206 networking & telecommunications ,02 engineering and technology ,Set (abstract data type) ,Distortion ,Signal Processing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Joint (audio engineering) ,Algorithm - Abstract
This letter proposes a batch steganographic method, which combines cover-selection and payload-allocation by steganographic distortion optimization. We first proved that with the value of payload increasing, the first-order derivative of steganographic distortion of a single cover is monotonically increasing. Then, we deduced that the first-order derivative of steganographic distortion of covers that selected from a given set should be equal if the total steganographic distortion of the corresponding selected covers is minimal. Finally, an algorithm was designed to combine cover-selection and payload-allocation, so that the optimal stego-covers can be obtained. Experiment results show that the undetectability is obviously improved when using the proposed steganographic method.
- Published
- 2018
- Full Text
- View/download PDF
35. On Improving Distortion Functions for JPEG Steganography
- Author
-
Zhenxing Qian, Min Yang, Zichi Wang, Dengpan Ye, and Xinpeng Zhang
- Subjects
General Computer Science ,Computer science ,JPEG ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Distortion ,0202 electrical engineering, electronic engineering, information engineering ,Discrete cosine transform ,General Materials Science ,Steganography ,Transform coding ,Steganalysis ,021110 strategic, defence & security studies ,business.industry ,General Engineering ,Pattern recognition ,computer.file_format ,distortion function ,Feature (computer vision) ,020201 artificial intelligence & image processing ,lcsh:Electrical engineering. Electronics. Nuclear engineering ,Artificial intelligence ,business ,lcsh:TK1-9971 ,computer - Abstract
This paper proposes a framework to improve the existing distortion functions designed for JPEG steganography, which results in a better capability of countering steganalysis. Different from the existing steganography approach that minimizes image distortion, we minimize the feature distortion caused by data embedding. Given a JPEG image, we construct a reference image close to the image before JPEG compression. Guided by both the reference image and the feature distortion minimization, the state-of-the-art distortion functions designed for syndrome trellis coding embedding are improved by distinguishing the embedding costs for +1 versus -1 embedding. This paper has three contributions. First, the proposed framework outperforms the traditional, since we use the constructed reference image and the public steganalytic knowledge for data embedding. Second, the proposed framework is universal for improving distortion functions that were designed for JPEG steganography. Finally, experimental results also prove that the proposed approach has a better undetectability when examined by modern steganalytic tools.
- Published
- 2018
- Full Text
- View/download PDF
36. Distortion function based on residual blocks for JPEG steganography
- Author
-
Zichi Wang, Zhaoxia Yin, Xinpeng Zhang, and Qingde Wei
- Subjects
Computer Networks and Communications ,Computer science ,Jpeg steganography ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Distortion ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,Discrete cosine transform ,Computer vision ,Trellis modulation ,Quantization (image processing) ,Distortion function ,021110 strategic, defence & security studies ,Steganography ,business.industry ,Quantization (signal processing) ,Hardware and Architecture ,Embedding ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Algorithm ,Software - Abstract
Steganography aims to embed additional data into digital media secretly and minimize the distortion caused by data embedding. Up to now, the key point of minimal distortion embedding framework is to design proper distortion function. In this paper, a distortion function for JPEG steganography based on residual blocks is proposed. To obtain less statistical detectability, Residual Block Values (termed as RBVs for short) and quantization steps are both involved in the proposed distortion function. RBVs are exploited to determine the embedding risk caused by modifications in corresponding DCT block while quantization steps are exploited to determine the embedding risk of the selection channel in a block. By implementing the syndrome trellis coding (STC) to embed secret data, the modifications are constrained in hard-to-detect religions. Experiments show that the proposed method performs better than current state-of-the-art methods of JPEG steganography.
- Published
- 2017
- Full Text
- View/download PDF
37. Distortion Function for JPEG Steganography Based on Image Texture and Correlation in DCT Domain
- Author
-
Zichi Wang, Zhaoxia Yin, and Xinpeng Zhang
- Subjects
Distortion function ,021110 strategic, defence & security studies ,Steganography ,business.industry ,Computer science ,Trellis quantization ,0211 other engineering and technologies ,02 engineering and technology ,computer.file_format ,JPEG ,Domain (mathematical analysis) ,Correlation ,Image texture ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Discrete cosine transform ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,computer - Abstract
This paper proposes a novel distortion function for JPEG steganography, which depends on the magnitude of discrete cosine transformation (DCT) coefficients, the first- and second-order residuals, a...
- Published
- 2017
- Full Text
- View/download PDF
38. Novel Simulation Model for Coil-Coil Type Electromagnetic Repulsion Actuator in Low Voltage DC Circuit Breaker
- Author
-
Bingyin Lei, Zichi Wang, Lijun Xu, Botong Li, Weijie Wen, and Qingyuan Yu
- Subjects
Electromagnetic field ,Physics ,Equivalent series resistance ,DC distribution system ,Electromagnetic coil ,Equivalent series inductance ,Equivalent circuit ,Mechanics ,Low voltage ,Electronic circuit - Abstract
Cooperating with secondary protection system, DC circuit breakers are used to deal with direct current (DC) faults in low voltage DC distribution system. To realize ultra-fast operating of DC breakers, optimization based on simulation of coil-coil type electromagnetic repulsion actuator (EMRA) is discussed in this paper. Considering exiting simulation based on finite element method (FEM) is quite time-consuming, an equivalent circuit method (ECM) for the Coil-Coil type EMRA is established. In the equivalent circuit equation, lumped equivalent inductance which contributes to the induced electromotive force (EMF) is used to reflect the coupling effect of distribute electromagnetic field on electric circuit, the gradient of equivalent inductance which contributes to the motional EMF reflecting the coupling effect of mechanical motion on electric circuit and the equivalent resistance that varies with temperature reflecting the coupling effect of temperature field on electric circuit. The lumped equivalent inductance and its gradient are extracted by solving static magnetic field based on FEM. By solving the state equations, the transient electrical and operating characteristic of EMRA are obtained. In the end, the results of the model based on ECM are compared with FEM, and as expected, they are in good consistence.
- Published
- 2019
- Full Text
- View/download PDF
39. Research on Fault Characteristics of High-Voltage Side in Dual Active Bridge DC/DC Converter
- Author
-
Lijun Xu, Botong Li, Zichi Wang, Xinlu Yang, Weijie Wen, and Bingyin Lei
- Subjects
Engineering ,business.industry ,Electrical engineering ,Equivalent circuit ,High voltage ,Transient (oscillation) ,business ,Fault (power engineering) ,Dc dc converter ,Dc converter ,Bridge (nautical) ,Dual (category theory) - Abstract
The working principle of the dual active bridge DC/DC converter is analyzed, and the equivalent circuit models of DC/DC converter are studied when pole-to-pole fault and pole-to-ground fault occur in the high-voltage side. When the system has pole-to-pole fault on the high-voltage side of the DC/DC converter, the transient characteristics of electric quantities are studied. When the system has pole-to-ground fault on the high-voltage side of the DC/DC converter, the transient characteristics of the electrical quantities are studied in the case of converter blocks immediately and does not block, respectively. The simulation model is built using PSCAD/EMTDC to verify the theoretical analysis results.
- Published
- 2019
- Full Text
- View/download PDF
40. An Improved Steganalysis Method Using Feature Combinations
- Author
-
Sheng Li, Zhenxing Qian, Xinpeng Zhang, and Zichi Wang
- Subjects
Steganalysis ,021110 strategic, defence & security studies ,Steganography ,business.industry ,Computer science ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Improved method ,Pattern recognition ,02 engineering and technology ,Image (mathematics) ,Cover (topology) ,Feature (computer vision) ,Information hiding ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business - Abstract
This paper proposes a new feature extraction method for steganalysis. In the improved method, the feature set is equipped with two parts. The first part is obtained by employing an existing feature extraction method on a suspicious image. With a content-correlative operation, differences of the image features are enlarge between the cover and the stego. The second part is obtained by employing the same feature extraction method on the obtained image. The two parts are combined together to form the new feature set. With the new feature set, the modifications made by steganography can be recognized more efficiently. Experimental results show that the detection accuracy of existing feature extraction methods is increased using the proposed method.
- Published
- 2019
- Full Text
- View/download PDF
41. Single Actor Pooled Steganalysis
- Author
-
Zhenxing Qian, Zichi Wang, and Xinpeng Zhang
- Subjects
Steganalysis ,021110 strategic, defence & security studies ,Steganography ,Computer science ,business.industry ,0211 other engineering and technologies ,Pattern recognition ,02 engineering and technology ,Binary classification ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Classifier (UML) - Abstract
This paper considers a more practical situation for pooled steganalysis that only a single actor is observed, so that the steganalyst needed to analyze the actor independently without comparing with other actors. We propose a pooled steganalysis method for this situation. For a given actor that has emitted a number of images, feature sets are extracted from each image, respectively, and then feed to a binary classifier popularly used in single object steganalysis. Combining all the results output by the classifier, a final decision is made ensemble to label the given actor as “guilty” or “innocent” with the minimal detection error. Experimental results show that the proposed method is effective for single actor pooled steganalysis.
- Published
- 2019
- Full Text
- View/download PDF
42. Breaking CNN-Based Steganalysis
- Author
-
Zichi Wang, Cheng Huang, Xinpeng Zhang, and Zhenxing Qian
- Subjects
Steganalysis ,021110 strategic, defence & security studies ,Steganography ,Artificial neural network ,Basis (linear algebra) ,Computer science ,business.industry ,Deep learning ,0211 other engineering and technologies ,020206 networking & telecommunications ,02 engineering and technology ,DUAL (cognitive architecture) ,Machine learning ,computer.software_genre ,Information hiding ,0202 electrical engineering, electronic engineering, information engineering ,Artificial intelligence ,business ,computer ,Vulnerability (computing) - Abstract
With the rapid development of deep learning, a lot of CNN-based steganalyzers have emerged. This kind of steganalyzer uses statistical learning to investigate the properties caused by steganography, which is the most efficient approaches for breaking information hiding. However, we find a vulnerability of CNN-based steganalyzer that it can be defeated by dual operations. In this paper, we propose an easy yet effective algorithm to perturb the stego images against neural network, which can evade CNN-based steganalyzer with high probabilities. We elaborated on the theoretical basis of the method we proposed and proved the feasibility of this method through experiments.
- Published
- 2019
- Full Text
- View/download PDF
43. Lossless and Reversible Data Hiding in Encrypted Images With Public-Key Cryptography
- Author
-
Jing Long, Zichi Wang, Xinpeng Zhang, and Hang Cheng
- Subjects
Lossless compression ,Theoretical computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,Plaintext ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,Encryption ,Ciphertext indistinguishability ,Symmetric-key algorithm ,Ciphertext ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,Electrical and Electronic Engineering ,Key clustering ,business ,Algorithm ,Image histogram ,Mathematics - Abstract
This paper proposes lossless, reversible, and combined data hiding schemes for ciphertext images encrypted by public-key cryptosystems with probabilistic and homomorphic properties. In the lossless scheme, the ciphertext pixels are replaced with new values to embed the additional data into several least significant bit planes of ciphertext pixels by multilayer wet paper coding. Then, the embedded data can be directly extracted from the encrypted domain, and the data-embedding operation does not affect the decryption of original plaintext image. In the reversible scheme, a preprocessing is employed to shrink the image histogram before image encryption, so that the modification on encrypted images for data embedding will not cause any pixel oversaturation in plaintext domain. Although a slight distortion is introduced, the embedded data can be extracted and the original image can be recovered from the directly decrypted image. Due to the compatibility between the lossless and reversible schemes, the data-embedding operations in the two manners can be simultaneously performed in an encrypted image. With the combined technique, a receiver may extract a part of embedded data before decryption, and extract another part of embedded data and recover the original plaintext image after decryption.
- Published
- 2016
- Full Text
- View/download PDF
44. Reversible Contrast Mapping based Reversible Data Hiding in Encrypted Images
- Author
-
Zhenxing Qian, Zichi Wang, Gui Feng, Yingqiang Qiu, Xinpeng Zhang, and Hangxing Wang
- Subjects
Computer science ,business.industry ,020206 networking & telecommunications ,02 engineering and technology ,Encryption ,Image (mathematics) ,Reversible contrast mapping ,Information hiding ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business - Abstract
Precious reversible data hiding in encrypted image (RDH-EI) methods vacate room for data embedding in encrypted version. However, the requirement of reversible data embedding of the content owner is ignored. This paper proposes a new framework for RDH-EI using generalized reversible contrast mapping (GRCM), which vacates room for data embedding in the encrypted image. Meanwhile, some secret data is also embedded in the image before encryption by the content owner. After image encryption and update, it is easy for the remote server to reversibly embed data into the encrypted image. The proposed method guarantees the reversibility, i.e., the embedded data can be exactly extracted and the original image be perfectly recovered after decryption. Experimental results also indicate the effectiveness of the proposed method.
- Published
- 2018
- Full Text
- View/download PDF
45. Distortion Function for Steganography in Texture Synthesized Images
- Author
-
Zhenxing Qian, Lina Shi, Zichi Wang, and Xinpeng Zhang
- Subjects
Steganalysis ,Distortion function ,021110 strategic, defence & security studies ,Steganography ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0211 other engineering and technologies ,Pattern recognition ,02 engineering and technology ,Texture (geology) ,Image (mathematics) ,Image texture ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Artificial intelligence ,business ,Texture synthesis - Abstract
This paper proposes a distortion function for steganography in texture synthesized images. Given a small piece of texture, an image synthesis algorithm is employed to generate a texture image in arbitrary size with similar local appearance. The obtained texture image is used as cover for data embedding. A distortion function is designed for the cover image to measure the detection risk of modifications. The image texture, splicing of patches, and repetition of texture blocks are contained in the proposed distortion function to fit the properties of synthesized images, which results in high undetectability against steganalysis. Experimental results also prove that the proposed distortion function performs better than current state-of-the-art steganographic methods.
- Published
- 2018
- Full Text
- View/download PDF
46. Distortion Function for Spatial Image Steganography Based on the Polarity of Embedding Change
- Author
-
Xinpeng Zhang, Jinpeng Lv, Zichi Wang, and Qingde Wei
- Subjects
Distortion function ,021110 strategic, defence & security studies ,Similarity (geometry) ,Pixel ,Steganography ,business.industry ,0211 other engineering and technologies ,Pattern recognition ,02 engineering and technology ,Image (mathematics) ,Digital image ,Distortion ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Computer vision ,Artificial intelligence ,business ,Mathematics - Abstract
Most of the existing distortion functions for digital images steganography allot a same embedding cost for ±1 embedding change, which should be different intuitively. This paper proposes a general method to distinguish the embedding cost for different polarity of embedding change for spatial images. The fluctuation after pixels are +1 or −1 modified respectively, and the texture of cover image are employed to adjust a given distortion function. After steganography with the adjusted distortion function, the fluctuation around stego pixels become more similar to the fluctuation around their neighbourhoods. This similarity performs less detectable artifacts. Experiment results show that the statistical undetectability of current popular steganographic methods is increased after incorporated the proposed method.
- Published
- 2017
- Full Text
- View/download PDF
47. Steganography in stylized images
- Author
-
Zhenxing Qian, Zichi Wang, Xinpeng Zhang, and Nan Zhong
- Subjects
Steganalysis ,Stylized fact ,Steganography ,Contextual image classification ,Image quality ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Image processing ,Pattern recognition ,02 engineering and technology ,Atomic and Molecular Physics, and Optics ,Computer Science Applications ,0202 electrical engineering, electronic engineering, information engineering ,Embedding ,020201 artificial intelligence & image processing ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Coding (social sciences) - Abstract
We propose a steganographic scheme for stylized images. Given a natural image, an image style transfer algorithm is executed twice to produce two similar stylized images with different parameters. One of them is used for embedding and another one is employed as a reference. For the cover image, embedding costs are assigned to measure the detection risk of the modifications. Each embedding cost is then asymmetrically adjusted into two polarity costs to further measure the detection risk of different modification polarities with the guidance of the reference image. After embedding with syndrome-trellis coding, the difference of the stegoimage and the reference image is minimized, which results in a high undetectability against steganalysis. Experimental results also prove that the proposed scheme performs much better than the existing steganographic methods when examined by modern steganalytic tools.
- Published
- 2019
- Full Text
- View/download PDF
48. Reversible visible watermark embedded in encrypted domain
- Author
-
Xinpeng Zhang, Zichi Wang, Jiang Yu, and Zhenxing Qian
- Subjects
Theoretical computer science ,Pixel ,business.industry ,Data_MISCELLANEOUS ,Plaintext ,Watermark ,computer.software_genre ,Encryption ,Watermarking attack ,Filesystem-level encryption ,Computer vision ,Artificial intelligence ,On-the-fly encryption ,business ,computer ,Digital watermarking ,Mathematics - Abstract
This work proposes a novel reversible visible watermarking scheme for encrypted images. In the scheme, the original plaintext image is encrypted by bit-wise exclusive-or operation. Although a data-hider does not know the original content, he may modify a part of encrypted data corresponding to the black pixels of a binary watermark image to insert the visible watermark. Meanwhile, some additional data used for content recovery are also embedded by using wet paper coding. After receiving the marked encrypted image, a user with the encryption key may perform direct decryption to obtain a visibly marked image, while a user with the encryption and data-hiding keys can perform data-extraction, image-decryption, and content-recovery to retrieve the original plaintext image.
- Published
- 2015
- Full Text
- View/download PDF
49. A new type of 3D reconstruction software system design based on 3D calibration board
- Author
-
Da Shen, Zhipeng Lin, Zichi Wang, and Lei Xue
- Subjects
Computer science ,Calibration (statistics) ,3D reconstruction ,Software system design ,Type (model theory) ,Simulation - Published
- 2014
- Full Text
- View/download PDF
50. Pipeline inwall 3D measurement system based on the cross structured light
- Author
-
Zichi Wang, Zhipeng Lin, Lei Xue, Qiang Zheng, and Da Shen
- Subjects
Engineering ,Correctness ,business.industry ,System of measurement ,Pipeline (computing) ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Point cloud ,law.invention ,law ,Calibration ,Computer vision ,Artificial intelligence ,business ,Remote control ,Structured light ,Camera resectioning - Abstract
In order to accurately realize the defect detection of pipeline inwall, this paper proposes a measurement system made up of cross structured light, single CCD camera and a smart car, etc. Based on structured light measurement technology, this paper mainly introduces the structured light measurement system, the imaging mathematical model, and the parameters and method of camera calibration. Using these measuring principles and methods, the camera in remote control car platform achieves continuous shooting of objects and real-time rebound processing as well as utilizing established model to extract 3D point cloud coordinate to reconstruct pipeline defects, so it is possible to achieve 3D automatic measuring, and verifies the correctness and feasibility of this system. It has been found that this system has great measurement accuracy in practice.
- Published
- 2014
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.