Kaimeng Chen

ORCID: 0000-0002-4050-3863
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Chaos-based Image/Signal Encryption
  • Advanced Steganography and Watermarking Techniques
  • Digital Media Forensic Detection
  • Advanced Data Storage Technologies
  • Parallel Computing and Optimization Techniques
  • Caching and Content Delivery
  • CCD and CMOS Imaging Sensors
  • advanced mathematical theories
  • Infrared Target Detection Methodologies
  • Internet Traffic Analysis and Secure E-voting
  • Impact of Light on Environment and Health
  • melanin and skin pigmentation
  • Cloud Computing and Resource Management
  • Cellular Automata and Applications
  • Interconnection Networks and Systems
  • Biochemical Analysis and Sensing Techniques
  • Coffee research and impacts

Jimei University
2018-2024

National United University
2021

University of Science and Technology of China
2014-2015

The phenomenal advances of cloud computing technology have given rise to the research area privacy-preserving signal processing, which aims preserve information privacy even when signals are processed in an insecure environment. Privacy-preserving hiding is a multidisciplinary study that has opened up great deal intriguing real-life applications, such as data exfiltration prevention, origin authentication, and electronic management. Information practice embedding intended messages into...

10.1109/access.2019.2908924 article EN cc-by-nc-nd IEEE Access 2019-01-01

10.1016/j.jvcir.2020.102932 article EN Journal of Visual Communication and Image Representation 2020-10-24

For vacating-room-after-encryption reversible data hiding in encrypted images (VRAE RDHEI), an essential problem is how to address potential errors extraction and image recovery. This significantly limits the capacities of existing VRAE RDHEI methods. To solve while losing as little capacity possible, this paper, a novel method proposed that uses ideas noisy channel model code. By designing mechanism appropriately, embedding can be equivalent input output virtual binary symmetric (BSC)...

10.1109/tdsc.2022.3228385 article EN IEEE Transactions on Dependable and Secure Computing 2022-12-12

Background. Following petroleum, coffee is the second most commonly traded commodity globally. It also a popular good with economic value, as well value in terms of leisure and culture. However, processing generates large amount waste, resulting environmental concerns. Therefore, this study, ethanol was used to extract waste (coffee pulp). High-performance liquid chromatography conducted examine caffeine content chlorogenic acid content, antioxidant capacity (i.e., total phenolic flavonoid...

10.1155/2021/8649618 article EN cc-by Journal of Chemistry 2021-12-17

In this paper, we proposed a novel reversible data hiding method in encrypted image (RDHEI), which is based on the compression of pixel differences. method, at content owner’ side divided into non-overlapping blocks, and block-level encryption scheme used to generate image, partially retains spatial correlation blocks. Due correlation, each block pixels are highly likely be similar. Therefore, differences all blocks concentrated small range can compressed. By differences, hider vacate room...

10.3390/math8091435 article EN cc-by Mathematics 2020-08-26

JPEG steganalysis aims to detect stego images. For some robust steganography methods, in order enhance images' robustness of resisting recompression from lossy channel such SNS or photo sharing websites, steganographer may intentionally recompress cover image several times with quantization matrix targeted channel, which thereby make it possible transmit data for better disguise. In addition, there are huge number images be recompressed various reasons, as processing by tools. Thus a method...

10.1109/tcsvt.2022.3155758 article EN IEEE Transactions on Circuits and Systems for Video Technology 2022-03-02

The data embedding of vacating room after encryption reversible hiding in encrypted images (VRAE RDHEI) is performed on an image without redundancy and spatial correlation. Data extraction recovery rely a range unique mechanisms that utilize correlation the decrypted domain. Of these mechanisms, pixel prediction among most frequently used, directly affecting capacity fidelity. In this paper, we propose novel method uses two-round interpolation mechanism to enhance precision while preserving...

10.3390/math12010032 article EN cc-by Mathematics 2023-12-22

In this paper, a novel, real-time, error-free, reversible data hiding method for encrypted images has been proposed. Based on the (7, 4) Hamming code, we designed an efficient encoding scheme to embed secret into least significant bits (LSBs) of image. For reversibility, most bit (MSB) prediction that can recover portion modified MSBs after image is decrypted. These be accommodate additional information used LSBs. After embedding data, original recovered with no error and extracted from both...

10.3390/sym11010051 article EN Symmetry 2019-01-04

With the rise of non-volatile memory used in cloud service, it becomes urgent to reduce write cost so as improve data manipulation capability. This paper proposed a high embedding efficiency reversible hiding scheme for encrypted images (RDH-EI). It embeds at locations most significant bit (MSB) using matrix encoding, resulting efficiency. In order restore image completely receiver side, highly accurate MSB prediction based on orthogonal projection technique is preprocessed original and...

10.1109/access.2020.2980302 article EN cc-by IEEE Access 2020-01-01

Reversible data hiding in encrypted images (RDHEI) is a technology that embeds directly the without decryption or knowledge of content images. However, it difficult to vacate room from image. This problem limits embedding capacity existing RDHEI methods. In this paper, we propose new method designed supply large pre-processing original Using block-level encryption scheme, proposed partially retains spatial correlation high bit-planes image, while image held securely. The hider can compress...

10.1080/09540091.2021.1926930 article EN Connection Science 2021-05-12

Reversible data hiding in encrypted images (RDHEI) is a technology which embeds secret into reversible way. In this paper, we proposed novel high-capacity RDHEI method based on the compression of prediction errors. Before image encryption, an adaptive linear regression predictor trained from original image. Then, used to obtain errors pixels image, and are compressed by Huffman coding. The vacate additional room with no loss. After vacated reserved for embedding. receiver can extract recover...

10.3390/math9172166 article EN cc-by Mathematics 2021-09-05

PCM (phase change memory) has been regarded as one of the most promising NVRAM. Due to its excellent features including high access speed, good scalability, byte addressability, and low idle power, is expected be an alternative DRAM or flash memory in future. So far, many different kinds architecture have proposed merge into hierarchy computer systems. For PCM-based systems, considering that various properties differing with conventional storage media, traditional cache management policies...

10.14257/ijmue.2016.11.1.28 article EN International Journal of Multimedia and Ubiquitous Engineering 2016-01-31

Small target detection and tracking has long been a difficult research hotspot in computer vision. To solve the problem of low probability high false alarm rate traditional DP-TBD algorithm with background complexity signal-to-noise ratio (SNR), small video based on subspace model is proposed. The firstly adopts PCA-SIFT to preprocess frame image, thereby obtaining new measurement model. Then, according motion characteristics noise, as well correlation between value functions adjacent...

10.1145/3650400.3650556 article EN Proceedings of the 2021 5th International Conference on Electronic Information Technology and Computer Engineering 2023-10-20
Coming Soon ...