The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A watermarking energy estimating model in wavelet domain is proposed in this paper. The model novelly expresses the special relationship between the watermarking energy and the PSNR(or SNR) of the watermarked image in wavelet domain, and the PSNR(or SNR) can be computed by the watermarking energy rather than by the watermarked image, so that the quality of the watermarked image can be directly controlled...
The following topics are dealt with: anti-counterfeiting and identification; wireless communication and network security; cryptographical algorithm and realization; IC design and system integration; and RFID, antenna and application.
This paper presents an efficient fingerprint indexing algorithm that retrieves the top best matches from a huge database. It considers minutia features based on 9-dimensional index space comprised of transformation invariant information and a stable triangulation algorithm i.e 1-order Delaunay triangulation, both of which are insensitive to fingerprint distortion. It uses indexing technique based...
In this paper, we introduce a secure mobile payment model suitable for macro transactions that compromise cost, simplicity, security, and performance of transaction, with minimum number of cryptography key usages, and less encryption/decryption operations compared to other models. This model can use symmetric and asymmetric cryptography without the need of trusted 3rd parties or even PKI complexity...
Due to the funds problem, it is impossible to have acceleration sensors installed on bridgepsilas every cable. In order to get each cablepsilas tension, a three-layer BP neural network model is presented and the neural network with a number of measured data is trained. Using this neural network model, the cable tension can be predicted without any acceleration sensor installed. Then, the neural network...
A fragile content-based image authentication scheme with location based on integer wavelet transform is presented. In this scheme, the digest of each block is coded by a chaotic sequence to form its watermark, which is embedded in another block which selected by an ergodic matrix of a hyperchaotic sequence. The encryption further strengthens the security. That all security parameters are user dependent...
As a kind of powerful anti-counterfeiting device, diffractive optically variable image (DOVI) has been developed and widely used in information security field. However, the identification of DOVI today by bare eyes is not reliable. In this paper we investigate the recognition of DOVI with machine learning method, and five kinds of algorithms, namely quadratic discriminate analysis (QDA), linear discriminate...
Generally, the security requirements analysis is a key process of security requirements engineering which includes the elicitation, analysis, verification and management of security requirements. Based on the existing security requirements analysis theories and approaches, this paper introduces two proposals to analysis the security requirements of information systems. The first proposal based on...
A user authentication scheme based upon the properties of Euclidean geometry properties is proposed. The center authority (CA) constructs the shared information by using both its secret and the userpsilas password in the user registration phase. Then the request message is computed by using both the userpsilas password and the registered information based on properties of Euclidean geometry and one-way...
Trend prediction of time series is an important research. Pattern matching provides a useful way for trend prediction. We mainly focus on the subsequence matching of time series in the paper. Firstly, we present the simulated series as the imputed pattern for the pattern matching; especially build a simulated ascending triangle series. Secondly, we propose an evaluation method with the actual trend...
Recent advancements in nanomaterials have produced a new class of fluorescent labels based on the semiconductor quantum dots. The emission wavelength of quantum dots can be continuously tuned by changing the particle size or component, and a single light source can be used for simultaneous excitation of all dots with different band gaps. High-quality dots are also highly stable against photobleaching...
With the ever-increasing demand for the quality of steel plate and strip products, roll eccentricity has become an important factor affecting the product quality. In this paper, the roll eccentricity signal is modeled based on modern signal processing theory. As the data gained from the sensor contain interference, the wavelet threshold de-noising method is developed. By using wavelet analysis, the...
In this paper, a novel robust audio watermarking algorithm is presented. It takes full advantage of the multi-resolution and the energy compression properties of the discrete wavelet transform (DWT) and discrete cosine transform (DCT) respectively, and embeds a pseudorandom permuted binary image in the original audio signal by vector quantization (VQ). The original audio is first transformed using...
In this paper, a simple watermarking scheme for digital image authentication is proposed. The insertion of a binary watermark is accomplished by adding to the lower frequency subband of discrete wavelet transform (DWT) decomposition of host image with a random binary image obtained by random permutations. The proposed scheme is secure, fast, and is immune of the well-known quantization attack. Especially...
Anti-counterfeiting is a global problem. Brand owners suffer from huge losses due to counterfeits every year, and turn to advanced solutions to gain back control over their brands. An anti-counterfeiting system normally encodes a digital identifier in a physical identifier in essence. The physical identifier then is attached with the product. If the physical identifier is cloneable or reusable, the...
The clonal selection (CS) algorithm is an optimization algorithm based upon the clonal selection principle in the biological immune system. This paper presents a novel approach that uses CS algorithm for path-oriented test data generation. The approach takes a selected path as a target and executes sequences of operators iteratively for test case to generate. An affinity function which is made up...
The structural testing and functional testing are analyzed. The new software testing model is proposed that is the definition-use testing methods. The new software testing model defines coverage criterion between full path and full edge. Providing a system method to check software default, and improves the software testing efficiency.
A practical publicly verifiable secret sharing (PVSS) is constructed based on the bilinear pairing on elliptic curves, which has all advantages of B. Schoenmakerspsila PVSS and its secret is not the form of discrete logarithm, thus this PVSS is extremely practical. Moreover, in the schemepsilas distribution of shares phase, only using bilinearity of bilinear pairing, anybody can verify whether the...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.