The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new robust digital image watermarking technique based on discrete cosine transform (DCT) and neural network. The neural network is full counter propagation neural network (FCNN). FCNN has been used to simulate the perceptual and visual characteristics of the original image. The perceptual features of the original image have been used to determine the highest changeable threshold...
The study of gaits for a multi-legged system has been a popular and integral part for the development of an efficient walking machine. It has been proven that the wave gait possesses the optimum stability among regular and periodic gaits for legged systems with four and six legs. Choi and Song reported that, for legged systems with eight and more legs, the wave gait may not be the optimally stable...
Human gait is a spatio-temporal phenomenon and typifies the motion characteristics of an individual. The gait of a person is easily recognizable when extracted from a sideview of the person. Accordingly, gait-recognition algorithms work best when presented with images where the person walks parallel to the camera (i.e. the image plane).A set of stances or key frames that occur during the walk cycle...
Embedding maximum information in a stego-image with minimum change in its appearance has been a major concern in image-based steganography techniques. In this paper, we present a strategy of attaining maximum embedding capacity in an image in a way that maximum possible neighboring pixels are analyzed for their frequencies, to determine the amount of information to be added in each pixel. The technique...
Efficient finite field arithmetic is essential for fast implementation of Elliptic Curve Cryptography (ECC) in software environments. Finite field squaring is an important arithmetic operation in the binary finite field GF(2m). Squaring is required for many cryptographic techniques based on the Discrete Logarithm Problem (DLP) in the multiplicative group of a finite field or additive group of points...
In this paper, we will provide an overview of the mechanisms used in image protection, especially Chaos-based encryption techniques available today. We will see how previously proposed methods such as data encryption standard (DES), Triple Data Encryption Standard (Triple- DES), and International Data Encryption Algorithm (IDEA) have been applied in image protection domain and how new concepts of...
Many techniques are used to hide data in various formats in stegnography. The most widely used mechanism on account of its simplicity is the use of the least significant bit. Least significant bit or its variants are normally used to hide data in a digital image. The other bits may be used but it is highly likely that image would be distorted. This paper discusses the art and science of stegnography...
Upcoming technologies in the field of information security. The idea of elliptic curve cryptography (ECC), and how it's a better promise for a faster and more secure method of encryption in comparison to the current standards in the public key cryptographic algorithms of RSA. And the possibilities of making more efficient on chip implementation of the ECC and how the work is progressing in the area.
E-leaming systems represent a new form of learning and are becoming more and more popular everyday. Hence security in e-Learning has become a fundamental requirement. But the problem of e- learning systems is that only little money is invested for security. Also to authenticate an e-learner especially in case of e-exams is a major challenge in an e-learning environment. The role of authentication...
Image scrambling is an important technique in digital image encryption and digital image watermarking. This paper presents a novel image scrambling method using Poker shuffle, which is controlled dynamically by chaotic system. Compared with other scrambling techniques such as algebraic permutations and chaotic permutations, the proposed method has properties of nonlinearity, non-analytic formula and...
Mobile equipment (ME) playing an important role of bridge between wireless network and mobile user has been facing more and more security threats. Trusted mobile platform (TMP) was proposed by TCG (trusted computing group) as a new mechanism to enhance the security of the resource-constrained ME. In this paper, we embark a new study on constructing a TMP according to ME's feature, and performing mutual...
A search engine is computer software that is continually modified to avail of the latest technologies in order to provide improved search results. Each search engine does the same function of collecting, organizing, indexing and serving results in its own unique way, thus employing various algorithms and techniques, which are their trade secrets. In short, the functions of a search engine can be categorized...
-With developing of computer networks and digital techniques, the electronic image are easily created, edited, reproduced and distributed. Unfortunately, illegal copy and malicious tamper are also facilitated. At present, fragile watermark is researched greatly to authenticate the veracity and integrity of electronic contents. In this paper, a chaotic watermarking scheme for authentication of popular...
This paper presents local variance projection log energy entropy (LVP-LEE) features for illumination robust face recognition. In the proposed method, one face image is firstly divided into non-overlapping small blocks, and then the vertical and horizontal variance projection distributions of each small face block are computed, using to extract features in terms of log energy entropy concept. Finally,...
Recently, Han-Chang showed that Xiao-Liao-Deng's key agreement protocol based on chaotic maps is vulnerable to man-in-the-middle attack and proposed two improved schemes. One works in clock synchronization, and the other can work without synchronization. They claimed that their schemes are secure against replaying attacks and can establish a shared session key. However, we point out that all the aforementioned...
Malware detection has emerged been an active area of research over the last few years. Numerous malware detection techniques have been proposed to combat this rapidly evolving threat. Notable of these detection techniques are rate limiting [10], [11] , the sample entropy based malware detection [8], maximum entropy estimation [9] and the TRW algorithm that employs sequential hypothesis testing [4]...
Recently, Wu-Chieu proposed a user friendly remote user authentication scheme with smart cards. In this paper, we demonstrate that their scheme is vulnerable and susceptible to the attack and has some practical pitfalls. Their scheme performs unilateral authentication (only client authentication) and there is no mutual authentication between user and remote system, so their scheme suspects from the...
Service-oriented architecture (SOA) has opened up a new direction in the fields of software development and system integration. On the basis of analyzing the characters of SOA, according to over enterprise application requests, this paper expound a kind of model of the over enterprise application based on SOA, and the layers of the structure and how to realize the architecture is discussed. Both interior...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.