The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Keyboard is the main input device for computer systems. Electromagnetic waves will be emitted while the keyboards' working since they contain electronic components. These waves may generate electromagnetic interference, do harm to the operator's health and even reveal keystroke information thus bring information security problems. Focusing on the emanations concerned with information security, two...
The Chen system and Lorenz system are related by unified chaotic system, and the discoveration of unified chaotic system offers a new kind of studying chaos control. This paper studied chaos control of unified chaotic system by SIMULINK simulation. The result of simulation proved validity of this kind.
For quick realization of controller design and optimization of parameters in a project, avoiding the long-time and danger during debugging the project, a new co-simulation control method based on dSPACE and Siemens PID module FM355C was introduced. In this method the close-loop control system was set-up with the rapid control prototype method based on the dSPACE and its hardware environment, using...
By reversing secret images, a novel multi-secret visual cryptography scheme is presented in this paper. During the secret sharing process, the correlative matrices are designed to encode multiple images into two ring shares. Compared with the previous ones, the proposed scheme makes the number of secret images not restricted and has obviously improved the pixel expansion and the relative difference.
The feature points of skull location and mark is an important research aspect in computer-aided facial reconstruction and computer-aided photographic superimposition. Based on technique in the topology between feature points analyzing, an automatic localization and marking method for key points of skull is proposed. First, get the contour of skull based on image preprocess technique and calculate...
To solve the problem of cheating in the reconstructing process of visual cryptography, a verifiable visual cryptography was proposed by adding a verifier to common visual cryptography scheme (VCS). This scheme can be used in any access structure and can check every share to prevent attackers from spoiling and grabbing the secret information.
A new method of realizing fingerprint authentication on Smartcard has been presented. Based on SOC, this method puts the pre-processing algorithm, which is the most time-wasting process, out of card. It not only decreases the complexity of realizing fingerprint authentication on Smartcard, but also ensures the security of fingerprint information due to the original fingerprint image has been transformed...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.