In the field of image copy-move forgery detection, it is very challenging to locate the boundaries of tampered small objects accurately. Current deep learning-based methods locate forged regions by detecting similar content in images. However, these methods usually just transmit the final features extracted by the encoder to the decoder to generate the mask, and ignore more spatial information of forged regions contained in the high-resolution encoding features, resulting in inaccurate model output prediction results for the boundary identification of small objects. To address this problem, a detection network based on multi-scale feature extraction and fusion called SimiNet was proposed. Firstly, abundant features were extracted by the multi-scale feature extraction module. Secondly, a skip connection was added between the feature extraction module and the decoding module to bridge the gap between the encoding and decoding features, so as to identify the boundaries of small objects accurately. Finally, Log-Cosh Dice Loss function was used to take the place of cross entropy loss to reduce the impact of class-imbalance problem on detection results. Experimental results show that the F1 score of SimiNet on USCISI dataset reaches 72.54%, which is 3.39 percentage points higher than that of the suboptimal method CMSDNet (Copy-Move Similarity Detection Network). It can be seen that SimiNet is more accurate for boundary identification of small objects and has better visualization.
For retrieving the encrypted data in cloud environment quickly, an efficient searchable encryption scheme for batch data processing scenarios was proposed. Firstly, two inverted indexes were built by the client, one file index was used to store the file-keyword mapping, another empty search index was used to store keyword-file mapping. Then, these two indexes were submitted to the cloud server. The search indexwas gradually updated and constructed according to the search tokens and file indexesduring the user’s search by the cloud, and the search results of the searched keywords were recorded by this search index. In this way, the search index construction time was shared to each retrieval process effectively and the storage space of search index was reduced. A set storage method based on key-value structure was adopted by the indexes, which supported the at-the-same-time merging and splitting of index, which means when adding and deleting files, the corresponding file index and search index were generated by the client according to the file set to be added or deleted, then the server merged or split the indexes, so that the files were able to be added and deleted in batch quickly. Testing results show that the proposed scheme greatly improves the updating efficiency of files and is suitable for batch data processing. Through leakage function, it is proved that the proposed scheme can meet the indistinguishability security standard against adaptive dynamic keyword selection attack.
A new soft subspace clustering algorithm was proposed to address the optimization problem for the projected subspaces, which was generally not considered in most of the existing soft subspace clustering algorithms. Maximizing the deviation of feature weights was proposed as the sub-space optimization goal, and a quantitative formula was presented. Based on the above, a new optimization objective function was designed which aimed at minimizing the within-cluster compactness while optimizing the soft subspace associated with each cluster. A new expression for feature-weight computation was mathematically derived, with which the new clustering algorithm was defined based on the framework of the classical k-means. The experimental results show that the proposed method significantly reduces the probability of trapping in local optimum prematurely and improves the stability of clustering results. And it has good performance and clustering efficiency, which is suitable for high-dimensional data cluster analysis.
In the field of social influence propagation, social network as the media plays a fundamental role in interaction between social individuals and disseminating information or views. First, the definition of social influence and the essential attribute of social influences as the social relevance were discussed. Then, the independent cascade model and the linear threshold model were expounded, as well as greedy algorithm and heuristic algorithms which can confirm the influential people. Finally, the new trend of research on social influence, such as community-based influence maximization algorithm and research on the influence of multiple subjects and multiple behaviors were deeply analyzed.