The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital watermarking is a technique of embedding special information into media data. It is often used in the copyright protection and integrity verification of digital images, audio, video, and other media data. Based on the Chinese remainder theorem, we propose an image watermarking algorithm that embedding secret information into an image. We have implemented the algorithm in Matlab. Our experiment...
Indoor positioning system is implemented using sensors that use Wi-Fi triangulation to compute the position of a mobile device in a given area. This group of sensors placed in an unattended environment form a Wireless Sensor Network (WSN). These nodes in WSN are more vulnerable to passive and active attacks than wired sensors due to limitations in resources, unrestrained environments and their broadcasting...
Because the frequency interval of the PCAL (Phase Calibration) signal is a finite number of discrete values, when measuring the delay of the terminal device using PCAL signal, it cannot solve the delay ambiguity by infinitely reduce the measurement aperture. Aiming at this problem, a kind of delay ambiguity solving method based on Chinese Remainder Theorem(CRT) is proposed. Using several measured...
In the recent days, the exponential growth in functionality of mobile devices leads the manufacturers to develop more and more sophisticated microprocessors and microcontrollers. The power requirements of the microprocessors are increasing day by day along with the processing speed and chip area. So, rather than traditional number systems, Residue Number System (RNS) is becoming attractive for their...
Digital watermarking technique is a common solution to image authentication and authorization. Numerous researches in this area use modification method to alter the pixel value or the coefficients of transform domain to succeed the watermarking purpose. In this paper, we propose a novel watermarking scheme using the concept of association rules to build a features classification tree and Chinese remainder...
Neighbor discovery is a fundamental task in wireless ad hoc networks. For a cognitive radio network (CRN), it becomes a challenging problem because nodes may reside in different channels. A necessary condition for nodes to discover each other is that they have a rendezvous. Most of the existing neighbor discovery schemes and rendezvous-guaranteed schemes that can be used for neighbor discovery have...
Polynomial evaluation is an important tool in constructing many cryptographic protocols, such as proof of retrievability and verifiable keyword search. However, for the high degree polynomials derived from very large datasets, polynomial evaluation becomes an intractable problem, especially for resource limited devices. In this paper, we firstly propose practically efficient verifiable evaluation...
Fault attacks are widely deployed against secure devices by hardware evaluation centers. While the least expensive fault injection techniques, like clock or voltage glitches, are well taken into account in secure devices by dedicated hardware counter-measures, more advanced techniques, such as light based attacks, require huge investments. This paper presents a new way to induce faults at a moderate...
The diminished-one encoding is often considered when representing the operands in the modulo 2k+1 channels of a Residue Number System (RNS) since it can offer increased arithmetic processing speed. However, limited research is available on the design of residue-to-binary (reverse) converters for RNSs that use the diminished-one encoding in one or more channels. In this paper we introduce a simple...
A P-adic Exact Scientific Computational Library (ESCL) for rational matrix operations has been developed over the past few years. The effort has been focusing on converting all rational number operations to integer calculation, and fully taking advantage of the fast integer multiplication of modern computer architectures. In this paper, we report our progress on parallel implementation of P-adic arithmetic...
In order to finish the phase unwrapping of multi-baseline InSAR (Interferometric Synthetic Aperture Radar) to combine data with longer and shorter baselines and derive accurate DEMs (Digital Elevation Models), a phase unwrapping model with linear congruent equations is designed and its solution with the Chinese Remainder Theorem (CRT) is presented in detail. In this algorithm, the un-fuzzy phase interval...
This paper conducted a preliminary study and exploration of dynamic watermarking scheme. Firstly, the paper introduces software watermarking technology and analyses the process of dynamic graph watermarking. Secondly, this paper proposes and realizes the IPPCT dynamic watermarking scheme based on Chinese remainder theorem, and details the stages of watermarking embedding, decomposition, encryption...
In this paper, a novel 3-moduli set {22n+1 − 1,22n+1,22n − 1}, which has larger dynamic range when compared to other existing 3-moduli sets is proposed. After providing a proof that this moduli set always results in legitimate RNS, we subsequently propose an associated reverse converter based on the New Chinese Remainder Theorem. The proposed reverse converter has a delay of (4n + 6)tfa with an area...
This paper deals with a novel forwarding scheme for wireless sensor networks aimed at combining low computational complexity and high performance in terms of energy efficiency and reliability. The proposed approach relies on a packet-splitting algorithm based on the Chinese Remainder Theorem (CRT) and is characterized by a simple modular division between integers and a Kalman filter is used to reduce...
This paper proposes a novel modified reverse converter for the unrestricted moduli set. This uses to investigate the Residue Number System (RNS) to decimal equivalent binary conversion for the utilization of RNS numbers in Digital Signal Processing (DSP) applications. First, we simplify the Chinese Remainder Theorem in order to obtain a reverse converter that uses mod-(2n−1) operations. Next, we further...
This paper proposes the software watermarking algorithm based on Chinese remainder theorem, and introduces the authentication center to certify the watermark, to solve the problem that equation re-sorting algorithm are easily attacked by the random re-sequencing technology. The algorithm further disposals the sequence obtained, the selected divisor sequence and the multiple to generate the key, which...
Sharing of secret values in MANET is inconsistent and computationally insecure due to its dynamic nature. Over the years, key generation, encryption and decryption have evolved as important techniques for providing secure routing in MANETs. Many researchers are involved in solving the secret sharing problem. Shamir's proposal is one of the eminent secret sharing schemes. However, this scheme does...
Delay Tolerant Network (DTN) has the character of long intermittent connectivity and communication delays, which makes the existing group key management mechanism can not be effectively applied. We proposed a new Chinese Remainder Theorem based group key management mechanism for DTN. Comparing with the early scheme, the existing joined node can derive a new group key from the old group key using hash...
Fragile watermarking is one of the effective techniques for authentication of digital documents and images. However, recovering the content of the tampered region in a watermarked image is a challenging task while considering conflicting criteria of imperceptibility and watermark embedding capacity. In this paper we propose a Chinese remainder theorem (CRT)-based watermarking scheme which can recover...
Based on the Chinese remainder theorem (CRT), this paper presents a digital audio watermark sharing scheme. In this scheme, the idea of the key sharing is introduced into the audio watermarking algorithm and the binary sequence of shared information for watermark is embedded into the statistics average value of approximate coefficients of wavelet decomposition for different segments of the original...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.