The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The homologous software detection technology plays a very important role in the work of intellectual property protection by identifying code plagiarism. Plagiarism mainly happens as copy-and-paste of the code, replacing the name of functions or variables, reordering the sequence of the statement, type redefinition, and so on. At present, there are three homologous software detection technology methods...
In this paper, we introduce a preprocessing method based on interference figure (PBIF) for downlink channel of multi-users visual MIMO system. By using singular value decomposition (SVD), the method decomposes multiuser downlink channel into multiple parallel single-user downlink channels and each channel have specific multi-user interference based on predesigned interference figure. We propose a...
In order to improve the recognition rate of the early fire, this paper analyzed the relationship between the image resolution and fire recognition rate from the application point of view. On this basis, we have adopted the Dmpster-Shafer evidence theory and carried on the recognition experiment to the different resolution fire image under different environmental conditions. The simulation experimental...
Matrix embedding has been used to improve the embedding efficiency of steganography, which is an efficient method to enhance the concealment security. The privacy security of matrix embedding has also been studied under the condition of known-stego-object attack. However, with the development of steganalysis, the attacker could obtain the estimated cover by the cover restoration technique. Consequently,...
It is important to do research on the source trustworthiness of the massive data under network environment. A detection method of source trustworthiness in text is proposed and designed based on cognitive hash. Based on the HowNet semantic features, this paper designs a text cognitive hash, and proposes a method evaluating feasible hash distance. Experimental results show the effectiveness of the...
In this paper, we aim to improve the recently proposed Yang et al.'s proxy blind signature scheme in order to withstand the security flaw in their scheme. The security of the improved scheme is enhanced in the signing phase and based on difficulty of solving the discrete logarithm problem (DLP). The analysis shows that the proposed scheme resolves security problem in Yang et al.'s scheme and also...
The purpose of TPM authorization mechanism is to authenticate the owner of a TPM or to authorize the use of an instance of a TPM capability. The TPM treats knowledge of the AuthData as complete proof of ownership of the entity. The main specification defines an authorized user must provide the parent key AuthData before loading its child key and provide the child key AuthData before using it. All...
We describe the design and implementation of a secure and robust architectural data management model suitable for cultural environments. Usage and exploitation of the World Wide Web is a critical requirement for a series of administrative tasks such as collecting, managing and distributing valuable cultural and artistic information. This requirement introduces a great number of Internet threats for...
Currently, images could be created and tampered easily with low cost image devices and sophisticated editing software. One cannot trust any image to be integrated anymore. Thus there is a strong need to investigate image tampering identification. This paper focuses on blind scheme of tampering identification which is practical in most scenarios. Given an image, our idea is to find its reference image...
In the Korean Pine solid quantity's forecast technique, the characteristic of Korean Pine cone's shape is one of main parameters. This paper can provide the precise data for the Korean Pine solid quantity's forecast technique by segmenting the image of Korean Pine which is taken by the Filed Server. Considering of the complex background of Korean Pine image and the target of hollow contours, we proposed...
Noise interferences and the lack of observation data are two main problems when implementing blind source separation. This paper introduces a BASS method which eliminates noise interferences, and meanwhile, uses sparse component analysis to fit the undetermined situation. Firstly, based on the BASS mathematical model including linear noise affixed, we built a probability distributed model of the sparse...
Cloud computing, possibly the most significant new technique in the 21st century, is now bringing enormous impact to the society, especially the business world. It provides services that set clients free from worrying about data processing problems so that they can focus on their major businesses. In this article, characteristics of it will be discussed with several examples, in order to show that...
Wireless sensor networks (WSNs) have wide applications due to these sensor nodes ease of deployment.But the security of WSNs is still an important issue. Some existed approaches mainly rely on cryptography to ensure data authentication and integrity. These approaches only address part of the problem of security in WSNs. However, these approaches are not sufficient for the unique characteristics and...
The discrepancies among the spectral range of the component bands of MHSRRSI will result in remarkable differences of the response extent to detect edges of geographical features. Considering the unique property of each color space, an improved Canny operator has been proposed which is available to detect and extract vector or scalar edges from MHSRRSI in weighted color space ( such as RGB, linear...
We propose a passive image splicing detection method based on consistency check of color distribution in the neighborhood of edge pixels. For a given image, we classify edges into different categories and extract shadow-shading-specular invariant edges as the candidate of splicing boundaries. Hue histogram entropy is then computed to capture abnormality of color distribution at these boundaries. Inconsistency...
Multimedia communication networks, such as the Internet, are heterogeneous in their nature due to the usage of different methods for content distribution. The efficiency of multimedia distribution depends on the variety of communication protocols that are simultaneously running (composed) over different network hosts in order to resolve packet conflicts. A very natural question that arises in such...
In this paper, a new scalable clustering method named “APANC” (Affinity Propagation And Normalized Cut) is proposed. During the APANC process, we firstly use the “Affinity Propagation” (AP) to preliminarily group the original data in order to reduce the data-scale, and then we further group the result of AP using “Normalized Cut” (NC) to get the final result. Through such combination, the advantages...
Research on the modeling and simulation of Link-16 has been got much attention nowadays. The common wireless network models are not suitable for Link-16. This paper proposes a Link-16 communication protocol architecture model with 5 layers. An extension of NS-2 (Network Simulator version 2) framework by modifying the original data structure and adding new network module is presented. Validations of...
How to efficiently enhance fault-tolerance and data access availability are the major problems to solve in distributed storage system. Data fragment maintenance is an essential part of distributed storage systems. Byzantine quorum system is a typical system model in maintaining data availability. The paper presents a novel fragment verifying and repairing algorithm built in Byzantine quorum system...
The performance of P2P networks have decreased severely because of the large number of free-riders. How to incentive nodes to provide service is an important factor to improve the performance of P2P networks. A novel ultra-node selection mechanism with incentive called USMI is presented in this paper. The main contributions of USMI are following: 1) any node in USMI has a value called utility. The...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.