The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Error correction is a key step in quantum key distribution. Winnow is a popular error correction algorithm and has been widely used. In this paper, an adaptive improved Winnow algorithm is presented, the main improvements are the adaptive selection of block size and a new uniform random scrambling method. The experimental results show that the proposed algorithm performs better than the original Winnow...
This paper proposed an image steganography method based on integer DCT and affine transformation. Integer DCT is an appropriate domain for steganography because it is invertible and lossless, but the change of the DCT coefficients will damage its Laplacian-shape-like distribution. To ensure the security of the method, we use affine transformation to recover the Laplacian-shape-like distribution of...
When the tampered JPEG image is saved, it was re-compressed. After double compression, the amounts of some DCT coefficient values decrease greatly. The pattern can be easily detected by statistics methods. To defend this forensic method, we established a model to evaluate the security and image quality influenced by the re-compression. Base on the model, an optimized adjustment of the DCT coefficients...
Recently, a number of chaos-based image encryption algorithms have been proposed. However, the initial parameters used in masking operation are usually fixed in the whole encryption process. In this paper, we introduce an efficient image encryption scheme of pixel bit based on combination of chaotic systems with variable initial parameters. The algorithm takes advantage of the best features of chaotic...
Recently, biometric template protection has received ever increasing research interests. However, most of the proposed schemes are not yet sufficiently mature for large scale deployment, they do not meet the requirements of security, and high-recognition performance. For example, matching methods based on Euclidean measurement ignore the difference of different component easily. Mean quantization...
The advent of digital forensic techniques imposes great challenges to the security of image disguise where tampering is involved to conceal the existence of sensitive objects in the source image. As a consequence, image interpolation that is a prerequisite step in image disguise should be adapted to be forensic resistant. This paper proposes a novel and secure interpolation method to facilitate image...
Image searching and authentication have become important issues for the digital world. Image hashing technique has been proposed to meet them. In this paper, a self-synchronized image hashing algorithm resistant to rotation is presented. In the algorithm, the features of the image are extracted by Scale Invariant Feature Transform(SIFT) algorithm. Then a cyclic matrix are generated from the features...
Image searching and authentication have become strong requirements in the digital world. Image perceptual hashing has been proposed to meet them. In this paper, a rotation resilient image hashing algorithm is presented. In the algorithm, the position information of original image is extracted to adjust the rotation. Then the features of the image are extracted by contourlet transform. The key-dependence...
In order to meet the application requirements regarding universality, permanence and performance, many multimodal biometric approaches have been proposed in recent decades. In these approaches, fused templates are stored unprotected as biometric reference in a token or database. Once the database is compromised, the attacker can potentially learn details that are sensitive to the data subject and...
As one of biometric technologies for personal identification and verification, many algorithm for iris recognition are proposed in recent decades. In these algorithms, iris templates are stored uncovered in the database. Once the database is compromised, the attackers can potentially obtain sufficient information to impersonate the users. This paper proposes a novel template protection algorithm for...
Reversible watermarking for compressed speech is proposed. Two properties of parameter-based speech coding bitstream are pointed out. Based on the properties, unimportant parameters are further compressed by entropy coding and concatenated with the watermark payload. The proposed scheme is demonstrated with G.729 speech coding and can be applied to other speech coding standards. Experiment results...
Perceptual audio hashing has been applied in audio content identification, retrieval and indexing for its accuracy and perceptual robustness. Security issue becomes important when perceptual hashing is applied in audio content authentication. A key-dependent compressed domain perceptual audio hashing algorithm for audio content authentication is proposed. A randomization scheme controlled by a random...
Mobile agent technology is an attempt towards bringing the computation process nearer to the physical location of data in a distributed system. Although it has been extensively studied and applied in a variety of applications but still its usage is limited mainly because of the security issues associated with its usage. Mobile agent watermark encapsulation (MAWE) is a method that first embeds a watermark...
Under the increasing demand for more reliable security systems, there is a renewed interest in human identification based on biometric. Since the biometric templates stored in database directly have introduced a number of security and privacy threats, the study to biometric template protection is necessary. This paper provides a new face recognition scheme with renewable templates. In this scheme,...
Kernel-mode security enhancement technologies are widely used to improve the efficiency of data processing and the security of data and operating systems in recent years. However, the security modules have been implemented without consolidated standards, in kernel-mode which make them hard to be compared, selected and reused. In this paper, a kernel-mode security module evaluation framework (KSEF)...
The security of biometric template is important for a biometric system's privacy and security. In a traditional biometric system, the template is saved directly in a reference database. This results in a series of security and privacy risks, which limits the development of biometric recognition technique. This paper provides a template protection scheme that is suit for statistic feature-based algorithm,...
Reversible watermarking is suitable for hiding data in 2-D vector maps because the distortions induced by data embedding can be removed after extracting the hidden bits. In this paper, two reversible data-hiding schemes are explored based on the idea of difference expansion. The first scheme takes the coordinates of vertices as the cover data and hides data by modifying the differences between the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.