The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Pixel expansion is a common drawback of traditional (2,2) visual secret sharing (VSS), unexpanded shares can decrease the bandwidth and save storage. In the literature, we introduce a novel (2,2) VSS scheme, that solved the pixel expansion and visual quality is almost equal with traditional (2,2) VSS. Our scheme not only can apply to (2,2) VSS, but also to (k, k) VSS. At last, analyse and experiment...
Apart from traditional visual secret sharing (VSS), progressive visual secret sharing (PVSS) can gain clearer recovered secret image with more shares. In the literature, Hou and Quan [Hou, Y. C., Quan, Z. Y.: Progressive visual cryptography with unexpanded shares. IEEE Trans. on Circ. and Sys. for Video Tech. 21(11), Pages 1760-1764(2011)], and Chen et al. [Chen, T.-H., et al., Quality-adaptive visual...
A flexible (2k, 2k) quantum image secret sharing (QISS) is proposed for the first time based on 1-qubit measurement scheme and the idea of strip. Through simple quantum measurements, a quantum image can be generated into 2k shares. When recovering the original secret image, strip operations which are proposed in quantum movie are applied on the shares and the secret image can be recovered in one piece...
Image searching and authentication have become important issues for the digital world. Image hashing technique has been proposed to meet them. In this paper, a self-synchronized image hashing algorithm resistant to rotation is presented. In the algorithm, the features of the image are extracted by Scale Invariant Feature Transform(SIFT) algorithm. Then a cyclic matrix are generated from the features...
Covert channels are widely used for secret information transmission on networks. Although existing packet length based covert channels have great tamper resistance, they fail to deliver normal network traffic especially when the amounts of covert messages increase. As such, they are vulnerable to detections due to abnormal network traffic. Hence, in this paper, we are motivated to design a protocol-independent...
A novel image perceptual hashing method is proposed on the intermediate hashing stage. It first uses the iterative geometric techniques to get main geometric features. Then, by the observation that the distances of feature points are invariant in the polar coordinate under arbitrary rotation, a novel processing method is proposed to arrange the two-dimensional distribution to a one-dimensional feature...
Image searching and authentication have become strong requirements in the digital world. Image perceptual hashing has been proposed to meet them. In this paper, a rotation resilient image hashing algorithm is presented. In the algorithm, the position information of original image is extracted to adjust the rotation. Then the features of the image are extracted by contourlet transform. The key-dependence...
In order to meet the application requirements regarding universality, permanence and performance, many multimodal biometric approaches have been proposed in recent decades. In these approaches, fused templates are stored unprotected as biometric reference in a token or database. Once the database is compromised, the attacker can potentially learn details that are sensitive to the data subject and...
Immersive sound spaces which are synthesized using virtual reality techniques have recently been developed to realize highly realistic telecommunication interactions. In real world soundscapes the sounds we usually listen to include background or ??ambient?? sounds such as the sounds of the ventilation system in a room. However, current virtual auditory display systems generate point sound sources...
A novel image perceptual hashing algorithm is proposed on the intermediate hashing stage. It first uses an iterative geometric technique to extract significant geometry preserving feature points. Then, the fuzzy distance matching method is proposed based on the observation that the distances of feature points are invariant in the polar coordinate under arbitrary rotation. It is verified that the proposed...
Perceptual encryption is commonly used in encoded images and videos to intentionally introduce visual quality degradation to the media data to protect the added value out of the content in a reversible way. We propose in this paper a perceptual image encryption algorithm using iterative operation of local pixel shuffling and reversible histogram spreading to an extended gray-level range, via which...
Robust hashing for multimedia authentication is an emerging research area. A novel key-dependent robust speech hashing based on speech production model is proposed in this letter. Robust hash is calculated based on linear spectrum frequencies (LSFs) which model the vocal tract. The correlation between LSFs is decoupled by discrete cosine transformation (DCT). A randomization scheme controlled by a...
As one of biometric technologies for personal identification and verification, many algorithm for iris recognition are proposed in recent decades. In these algorithms, iris templates are stored uncovered in the database. Once the database is compromised, the attackers can potentially obtain sufficient information to impersonate the users. This paper proposes a novel template protection algorithm for...
Perceptual audio hashing has been applied in audio content identification, retrieval and indexing for its accuracy and perceptual robustness. Security issue becomes important when perceptual hashing is applied in audio content authentication. A key-dependent compressed domain perceptual audio hashing algorithm for audio content authentication is proposed. A randomization scheme controlled by a random...
With the wide use of anonymity tools, both blocking and anti-blocking of these tools have become hot topics. And the traffic identifications of the corresponding tools are key issues of both blocking and anti-blocking. In this paper, we address on identifying Tor and Web-Mix traffics, which are two of the most famous anonymity tools. Taking advantage of the typical methods for traffic identification,...
An arbitrarily rotated image should not be recognized as a different one, but the conventional image perceptual hashing algorithms can only deal with this partially. Different to watermarking, image perceptual hashing does not need to embed information into the image content, this make it possible that perceptual hashing can treat the synchronization problem in a new manner. In this paper, three cyclic...
HVS (human visual system) has been widely used to evaluate image quality over the past three decades, which provided a good simulation on the image cognitive processing of human vision system. As a newly developing technology, perceptual hashing need to take the perception information into account during the feature extraction stage, and then code them into a short digest. In this paper, we present...
Organizations and people have been looking for a secure data storage method for years, but with the rapidly progressed data recovering and analyzing technology, itpsilas seemed to be futureless. Noticed that conventional ways of disk encryption or hiding always expose many clues that could be utilized by adversaries to recover the data. This paper suggests a new method of disguising which would deduce...
Traditionally, the proposed perceptual hashing algorithms are mainly focused on the feature extraction and coding stages. But they only concerned parts of perception information, and take a certain type of features to obtain codes, which makes them to be biased on resisting some varieties of attacks. On the other hand, HVS (Human Visual System) as one of best methods simulating the image cognitive...
Kernel-mode security enhancement technologies are widely used to improve the efficiency of data processing and the security of data and operating systems in recent years. However, the security modules have been implemented without consolidated standards, in kernel-mode which make them hard to be compared, selected and reused. In this paper, a kernel-mode security module evaluation framework (KSEF)...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.