The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper presents a new carving method for automatically and effectively carving PDF files from an unstructured digital forensic image. The carving method has five validation algorithms based on the content characters and the internal structure of PDF files. These validation algorithms include header/file length/maximal offset of objects/footer validation, internal structure validation, entropy...
We propose a novel approach to automatically quantify accuracy within context (QAC). Accuracy can be gauged by discrepancy between data view and its entity's perfect representation. Since it is difficult to obtain the perfect representation of entity, we propose to approximate perfect representation within its available context and accuracy can be quantified in the context. By naturally borrowing...
This paper presents a method based on information entropy to analyze the capacity of covert channels. Built upon noninterference, the method is firstly used to calculate the covert channel capacity, then to analyze the factors that have an impact on this quantity. Finally an example is given of the capacity calculation for covert channels in a multilevel secure database.
The medical image registration has been all confined in registering two images and rarely involved multiple images (three and more than three). Using the expanded mutual information measure (E-MIM) to register multiple images, which is inefficiency, can't meet the clinical requirement, and mutual information (MI) values are not necessarily nonnegative. In this paper, we introduce an N-dimensional...
The most efficient attack on symmetric-key systems is an exhaustive key search. A novel encryption method with infinite key space is presented by modify traditional book cipher. Infinite key space means the unbounded entropy of the key space, which can frustrate any exhaustive key search. Moreover, this book cipher is immune from frequency analysis. Experimental results show that both encryption and...
In a complex system, schemes are affected by lots of factors. The evaluation must take all the factors into account. The nature of the factors are fuzzy and grey, this paper apply grey relational analysis and entropy weights into fuzzy design theory, and solve the problem of three levels structure fuzzy comprehensive evaluation. A practical example of torpedo is showed to prove the validity of the...
Based on study of variation of information entropy and mean contrast with transformation parameters in image gay transformation, a no reference image quality assessment function constructed by the product of information entropy and mean contrast, InEnCF, is established. A criterion for the optimal image is determined by the maximum of no reference image quality assessment function. An optimal quality...
A method of a no reference image quality assessment (NR-IQA) is reported based on the product of information entropy and averaging contrast in this paper. Based on the study of the variation of information entropy and averaging contrast with transformation parameters in an image gray transformation called Zadeh-X transformation, a no reference image quality assessment function constructed by the product...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.