-
Article
A robust coverless video steganography based on maximum DC coefficients against video attacks
Coverless steganography has been of great interest in recent years, since it is a technology that can absolutely resist the detection of steganalysis by not modifying the carriers. Most existing coverless steg...
-
Chapter and Conference Paper
A Coverless Image Steganography Based on a Robust Object Detection Network
Compared with traditional image steganography algorithms, coverless image steganography has attracted a lot of researchers due to the ability to resist steganalysis algorithms completely. However, most existin...
-
Chapter and Conference Paper
Low-Quality Deepfake Video Detection Model Targeting Compression-Degraded Spatiotemporal Inconsistencies
With Deepfakes gradually becoming an increasing threat to individuals and society, multimedia forensics, especially Deepfake video detection methods are in dire needs. However, most current attempts still rely...
-
Article
Deformable graph convolutional transformer for skeleton-based action recognition
The critical problem in skeleton-based action recognition is to extract high-level semantics from dynamic changes between skeleton joints. Therefore, Graph Convolutional Networks (GCNs) are widely applied to c...
-
Article
Dual-domain graph convolutional networks for skeleton-based action recognition
Skeleton-based action recognition is attracting more and more attention owing to the general representation ability of skeleton data. The Graph Convolutional Networks (GCNs) methods extended from Convolutional...
-
Article
Open AccessFibroblast growth factor-21 as a novel metabolic factor for regulating thrombotic homeostasis
Fibroblast growth factor-21 (FGF-21) performs a wide range of biological functions in organisms. Here, we report for the first time that FGF-21 suppresses thrombus formation with no notable risk of bleeding. P...
-
Chapter and Conference Paper
A Transformer-Based Cloth-Irrelevant Patches Feature Extracting Method for Long-Term Cloth-Changing Person Re-identification
Long-term person re-identification is a more practical research task in person retrieval fields because the object retrieved may appear for a more extended period in the actual situation. To overcome the distu...
-
Chapter and Conference Paper
A CNN-Based HEVC Video Steganalysis Against DCT/DST-Based Steganography
The development of video steganography has sparked ever-increasing concerns over video steganalysis. In this paper, a novel steganalysis approach against Discrete Cosine/Sine Transform (DCT/DST) based steganog...
-
Article
FGF21 ameliorates hepatic fibrosis by multiple mechanisms
Previous study reports that fibroblast growth factor 21 (FGF21) could ameliorate hepatic fibrosis, but its mechanisms have not been fully investigated.
-
Article
Fibroblast growth factor 21: a novel long-acting hypoglycemic drug for canine diabetes
Currently, insulin is commonly used in the clinical management of canine diabetes. However, it must be injected preprandially causing much inconvenience to the owners. Therefore, the development of long-acting...
-
Chapter and Conference Paper
SE_EDNet: A Robust Manipulated Faces Detection Algorithm
Face manipulation techniques have raised concern over potential threats, which demand effective images forensic methods. Various approaches have been proposed, but when detecting higher-quality manipulated fac...
-
Article
Combined features for steganalysis against PU partition mode-based steganography in HEVC
Many innovation modules introduced by High Efficiency Video Coding (HEVC) are remaining unexplored in the steganography domain. In this paper, a novel steganalytic approach is proposed against the PU partition...
-
Chapter and Conference Paper
A Motion Vector-Based Steganographic Algorithm for HEVC with MTB Mapping Strategy
Video is considered an ideal hidden communication cover because of its ample signal space and widespread propagation. In this paper, a novel motion vector-based video steganography algorithm is proposed under...
-
Chapter and Conference Paper
A High Capacity HEVC Steganographic Algorithm Using Intra Prediction Modes in Multi-sized Prediction Blocks
The existing video steganographic schemes based on intra prediction modes for video coding standards H.264/AVC and HEVC all use single-sized blocks to embed the secret payload. Thus, the steganographic propert...
-
Chapter and Conference Paper
Natural Language Inference Based on the LIC Architecture with DCAE Feature
Natural Language Inference (NLI), which is also known as Recognizing Textual Entailment (RTE), aims to identify the logical relationship between a premise and a hypothesis. In this paper, a DCAE (Directly-Cond...
-
Chapter and Conference Paper
Gait Recognition with Clothing and Carrying Variations Based on GEI and CAPDS Features
Gait recognition is a promising technology in biometrics. The accuracy of gait recognition can be decreased by many interference variations, such as view angle, clothing and carrying. A novel method is propose...
-
Chapter and Conference Paper
Double H.264 Compression Detection Scheme Based on Prediction Residual of Background Regions
Detection of double video compression plays an important role in video forensics. However, existing methods rarely focused on H.264 videos and are unreliable to provide detection results for static-background...
-
Chapter and Conference Paper
Anomaly Detection by Analyzing the Pedestrian Behavior and the Dynamic Changes of Behavior
Since there is an increasing demand of security and safety assurance for public, anomaly detection has been a great focus in the field of intelligent video surveillance analysis. In this paper, a novel method...
-
Chapter and Conference Paper
Coding Efficiency Preserving Steganography Based on HEVC Steganographic Channel Model
Steganographic Channel Model (SCM) is hard to build for different steganography algorithms in different embedding domains. Thus, theoretical analysis for some important factors in steganography, such as capac...
-
Chapter and Conference Paper
HEVC Double Compression Detection Based on SN-PUPM Feature
During the process of video forgery detection, double compression is a significant evidence. A novel scheme based on the Sequence of Number of Prediction Unit of its Prediction Mode (SN-PUPM) is proposed to c...