Learn More
—Recently, more and more attention is paid to reversible data hiding (RDH) in encrypted images, since it maintains the excellent property that the original cover can be losslessly recovered after embedded data is extracted while protecting the image content's confidentiality. All previous methods embed data by reversibly vacating room from the encrypted(More)
—Due to the existence of security threats in the cloud, many mechanisms have been proposed to allow a user to audit data integrity with the public key of the data owner before utilizing cloud data. The correctness of choosing the right public key in previous mechanisms depends on the security of Public Key Infrastructure (PKI). Although traditional PKI has(More)
Throughput of Concurrent Multipath Transfer varies with different path selection schemes. As the number of path increases, the path selection solution space increases exponentially while receiving buffer efficiency decreases. To solve this problem, we model the throughput of Concurrent Multipath Transfer and find that it may be limited by the receiving(More)
The eye is an ideal target organ for gene therapy as it is easily accessible and immune‑privileged. With the increasing insight into the underlying molecular mechanisms of ocular diseases, gene therapy has been proposed as an effective approach. Successful gene therapy depends on efficient gene transfer to targeted cells to prove stable and prolonged gene(More)
Comparing to the client based locating, infrastructure based methods do not require install special software or hardware at client side. So it not only fits for real deployment, but also supports some specific requirement (ex target tracking). Former researchers mainly adopt k-NN method in infrastructure based locating. However, its computing complexity is(More)