首页 > 最新文献

5th International Conference on Computer Sciences and Convergence Information Technology最新文献

英文 中文
Determinants of e-book readers adoption and continuation: A comparison of pre-adoption and post-adoption beliefs 电子书阅读器采用和继续使用的决定因素:采用前和采用后信念的比较
Shih-Chun Chou, J. Stu, Yuting Lin
E-book reader, as an evolutionary artifact for digital reading, has caught attention all over the world. In this customer-centered era, understanding why users adopt and continue using e-book readers (e.g. eReaders and digital devices equipped with reader software) become essential design issues for related scholars and practitioners. However, critical design factors are still obscure due to the rapid pace of development and innovation in information technology. In this paper, we employ two methods including customer observation and individual depth interview to disclosure user behavioral intention toward the latest e-book readers. This research found that potential adopter intention to adopt is solely determined by normative pressures, whereas user intention is solely determined by attitude, which refers to the perception of content enrichment, reading servicisation, and device personalization. Grounded on our result and discoveries, not only researchers could have guidance in developing e-book theories in the future, but also service providers could have driving forces in advancing e-book readers.
电子书阅读器作为数字阅读的进化产物,已经引起了全世界的关注。在这个以客户为中心的时代,理解用户为什么会采用并继续使用电子书阅读器(如电子阅读器和装有阅读软件的数字设备),成为相关学者和实践者的重要设计问题。然而,由于信息技术的快速发展和创新,关键的设计因素仍然模糊不清。本文采用消费者观察和个人深度访谈两种方法来揭示用户对最新电子书阅读器的行为意向。本研究发现,潜在采用者的采纳意愿仅由规范压力决定,而用户意愿仅由态度决定,态度指的是对内容丰富化、阅读服务化和设备个性化的感知。基于我们的研究结果和发现,不仅研究人员可以在未来发展电子书理论方面得到指导,而且服务提供商也可以在推进电子书阅读器方面发挥推动作用。
{"title":"Determinants of e-book readers adoption and continuation: A comparison of pre-adoption and post-adoption beliefs","authors":"Shih-Chun Chou, J. Stu, Yuting Lin","doi":"10.1109/ICCIT.2010.5711176","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711176","url":null,"abstract":"E-book reader, as an evolutionary artifact for digital reading, has caught attention all over the world. In this customer-centered era, understanding why users adopt and continue using e-book readers (e.g. eReaders and digital devices equipped with reader software) become essential design issues for related scholars and practitioners. However, critical design factors are still obscure due to the rapid pace of development and innovation in information technology. In this paper, we employ two methods including customer observation and individual depth interview to disclosure user behavioral intention toward the latest e-book readers. This research found that potential adopter intention to adopt is solely determined by normative pressures, whereas user intention is solely determined by attitude, which refers to the perception of content enrichment, reading servicisation, and device personalization. Grounded on our result and discoveries, not only researchers could have guidance in developing e-book theories in the future, but also service providers could have driving forces in advancing e-book readers.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125174583","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
A data hiding algorithm based on histogram re-quantization 一种基于直方图重量化的数据隐藏算法
C. Teng, Y. Shiau, C. Chen
Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.
隐写术作为一种数据隐藏技术,随着互联网通信的不断扩大,其作用越来越重要。因此,近年来提出了各种隐写算法,如Ni等人提出了一种基于直方图修改的无损数据隐藏算法。为了增强安全性和更大的数据嵌入容量,本文对Ni算法进行了扩展,采用随机排列和直方图重量化。首先,应用随机排列,安全性不容易被暴力攻击破坏。此外,通过采用直方图再量化,可以将嵌入容量增强约3倍。我们的方法在视觉上无法区分掩蔽图像和隐写图像,并且具有很大的嵌入容量。
{"title":"A data hiding algorithm based on histogram re-quantization","authors":"C. Teng, Y. Shiau, C. Chen","doi":"10.1109/ICCIT.2010.5711225","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711225","url":null,"abstract":"Steganography, a technique of data hiding, is becoming more and more significant with expansion of the Internet communication. As a result, various steganographic algorithms have been proposed in recent years, for example, Ni et al. have carried out a lossless data-hiding algorithm based on the histogram modification. In order to reinforce more security and more data embedding capacity, this paper extends the Ni's algorithm with a random permutation and a histogram re-quantization. To begin with, applying a random permutation, the security is not easy to be broken by a brute-force attack. In addition, the embedding capacity is able to be strengthened approximately 3 times by adopting a histogram re-quantization. As to our approach, it is visually indistinguishable between a cover image and a stegoimage with a large embedding capacity.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125428902","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Human arm-like robot control using the viscoelasticity of human multi-joint arm 仿人手臂机器人利用人体多关节手臂的粘弹性控制
Aihui Wang, M. Deng
The human arm performs a variety of skillful movements by adjusting dynamic characteristics of musculoskeletal system. Such characteristics of musculoskeletal system can be mainly described as viscoelasticity of human multi-joint arm. Many biomedical applications of robotics require knowledge of the viscoelasticity of human multi-joint arm in order to make motion appear more natural and accurately. Till now, the real time viscoelasticity of human multi-joint arm has not finally been used absolutely in robot control. This paper reviews a robust estimation method of the human multi-joint arm viscoelasticity during natural movement. A human arm-like robot control scheme using the real time measuring viscoelasticity of human multi-joint arm is proposed. An improved forward gaze model is used in order to study how to adjust the human multi-joint arm viscoelasticity by central nervous system according to external environment. The effectiveness of the proposed method is confirmed by the simulation and experimental results.
人的手臂通过调节肌肉骨骼系统的动态特性来完成各种熟练的动作。肌肉骨骼系统的这种特性主要可以描述为人体多关节臂的粘弹性。机器人的许多生物医学应用都需要了解人体多关节臂的粘弹性,以使运动显得更加自然和准确。到目前为止,人体多关节臂的实时粘弹性还没有完全应用于机器人控制。本文综述了一种人体多关节臂在自然运动过程中粘弹性的鲁棒估计方法。提出了一种实时测量人体多关节臂粘弹性的仿人手臂机器人控制方案。为了研究中枢神经系统如何根据外界环境调节人体多关节臂的粘弹性,提出了一种改进的前视模型。仿真和实验结果验证了该方法的有效性。
{"title":"Human arm-like robot control using the viscoelasticity of human multi-joint arm","authors":"Aihui Wang, M. Deng","doi":"10.1109/ICCIT.2010.5711151","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711151","url":null,"abstract":"The human arm performs a variety of skillful movements by adjusting dynamic characteristics of musculoskeletal system. Such characteristics of musculoskeletal system can be mainly described as viscoelasticity of human multi-joint arm. Many biomedical applications of robotics require knowledge of the viscoelasticity of human multi-joint arm in order to make motion appear more natural and accurately. Till now, the real time viscoelasticity of human multi-joint arm has not finally been used absolutely in robot control. This paper reviews a robust estimation method of the human multi-joint arm viscoelasticity during natural movement. A human arm-like robot control scheme using the real time measuring viscoelasticity of human multi-joint arm is proposed. An improved forward gaze model is used in order to study how to adjust the human multi-joint arm viscoelasticity by central nervous system according to external environment. The effectiveness of the proposed method is confirmed by the simulation and experimental results.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"56 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125560941","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Five sense media playback technology using multile devices synchronization 五感媒体播放技术采用多设备同步
Jae-Kwan Yun, Jonghyun Jang, Kyeong-Deok Moon
Recently, the requirements for the five sense media representation are arising rapidly. Until now, most people mainly used the method SMSD on one device, but we need more than one device to play multiple A/V and multiple sensory effects for effective five sense media representation. Therefore, multiple A/V device synchronization and multiple sensory effect device synchronization are very important part of five sense media representation. In this paper, we suggest concept of the five sense media playback, five sense media playback system architecture, and synchronization algorithm between multiple A/V devices and multiple sensory effect devices.
最近,对五感媒体表现的要求迅速增加。到目前为止,大多数人主要是在一台设备上使用SMSD的方法,但我们需要不止一台设备来播放多个A/V和多种感官效果,才能有效地呈现五感媒体。因此,多A/V设备同步和多感官效果设备同步是五感媒体表现的重要组成部分。本文提出了五感媒体播放的概念、五感媒体播放系统架构以及多A/V设备与多感效设备之间的同步算法。
{"title":"Five sense media playback technology using multile devices synchronization","authors":"Jae-Kwan Yun, Jonghyun Jang, Kyeong-Deok Moon","doi":"10.1109/ICCIT.2010.5711032","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711032","url":null,"abstract":"Recently, the requirements for the five sense media representation are arising rapidly. Until now, most people mainly used the method SMSD on one device, but we need more than one device to play multiple A/V and multiple sensory effects for effective five sense media representation. Therefore, multiple A/V device synchronization and multiple sensory effect device synchronization are very important part of five sense media representation. In this paper, we suggest concept of the five sense media playback, five sense media playback system architecture, and synchronization algorithm between multiple A/V devices and multiple sensory effect devices.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126442601","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Performance evaluation of ad hoc network under location-based attacks 基于位置攻击的ad hoc网络性能评估
Chen Tianye, Liu Ning, Yi Ping, Wu Yue, Zhai Qiang
In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of attackers. In this paper, we pay specific attention to two common attacks in ad hoc network - flooding and active black-hole attack. We established several network scenery to illustrate possible unbalanced network in realistic occasions. And through extensive simulation work on those scenes, we study the connection between the locations of the malicious attackers and influence on network performance. We evaluate both long-term influence and transient impact of flooding attack. We also study active black hole's victim range in both random scene and internet-connected gateway node scene. By comparing attack severity of differently located attackers, we propose theories for attackers to achieve maximized performance influence by strategically placing the malicious nodes. We also provide guidelines for defenders to figure out key zones of defensive importance as well as possible locations of attackers.
在部署路由攻击的实际ad hoc网络场景中,攻击者可能位于特定的地理区域,这可能会对网络性能造成不同的影响。尽管许多模拟工作已经完成,以区分不同类型的攻击,但很少有工作集中在攻击严重程度和攻击者部署之间的潜在联系上。本文重点研究了自组网中常见的两种攻击——泛洪攻击和主动黑洞攻击。我们建立了几个网络场景来说明现实场合中可能出现的不平衡网络。并通过对这些场景的大量仿真工作,研究了恶意攻击者的位置之间的联系以及对网络性能的影响。我们评估了洪水袭击的长期影响和短暂影响。我们还研究了随机场景和联网网关节点场景下活动黑洞的受害范围。通过比较不同位置攻击者的攻击严重程度,我们提出了攻击者通过策略性地放置恶意节点来实现最大性能影响的理论。我们还为防御者提供了指导方针,以确定防御重要性的关键区域以及攻击者的可能位置。
{"title":"Performance evaluation of ad hoc network under location-based attacks","authors":"Chen Tianye, Liu Ning, Yi Ping, Wu Yue, Zhai Qiang","doi":"10.1109/ICCIT.2010.5711210","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711210","url":null,"abstract":"In a practical ad hoc network scene where routing attacks are deployed, attackers are likely to be located in specific geographical region, which is likely to cause different influence on network performance. Though many simulations works has been done on sorting out different kinds of attacks, little work has been focused on the potential link between the severity of attack and the deployment of attackers. In this paper, we pay specific attention to two common attacks in ad hoc network - flooding and active black-hole attack. We established several network scenery to illustrate possible unbalanced network in realistic occasions. And through extensive simulation work on those scenes, we study the connection between the locations of the malicious attackers and influence on network performance. We evaluate both long-term influence and transient impact of flooding attack. We also study active black hole's victim range in both random scene and internet-connected gateway node scene. By comparing attack severity of differently located attackers, we propose theories for attackers to achieve maximized performance influence by strategically placing the malicious nodes. We also provide guidelines for defenders to figure out key zones of defensive importance as well as possible locations of attackers.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129395038","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
SCAREX: A framework for scalable, reliable, and extendable cluster computing SCAREX:用于可伸缩、可靠和可扩展的集群计算的框架
Mino Ku, D. Min, Eunmi Choi
Cluster computing has been widely used in various fields from academics to industry because of its technical advantages. Recently, cloud computing become more attractive, as cluster computing is one of the core basements of cloud computing. However, the development of cluster-based system is hard without relative knowledge such as networking, workload distribution, fault tolerant, etc. Thus, various implementations for cluster computing have been introduced to help the development of cluster-based system. However, these implementations also have the limitation for developing cluster-based system because of high performance in specified application fields. In this paper, we present the SCAREX framework which supports scalability, reliability, extendibility, and easy for implementing cluster-based system. This framework employs a fault-tolerant mechanism for the failure of workload processing, and facilitates dynamic module distribution and loading for the work module which works on the worker node. The SCAREX also provides a simple programming interface for easy development. Since the SCAREX has flexible architecture, the developer can implement various cluster architecture and extend cluster architecture by combining the SCAREX-based cluster with other packages of the SCAREX or other frameworks.
集群计算以其独特的技术优势被广泛应用于从学术到工业的各个领域。近年来,云计算变得越来越有吸引力,因为集群计算是云计算的核心基础之一。然而,如果没有相关的知识,如组网、工作负载分配、容错等,基于集群的系统开发是困难的。因此,已经引入了各种用于集群计算的实现来帮助基于集群的系统的开发。然而,由于在特定的应用领域性能不高,这些实现在开发基于集群的系统时也存在一定的局限性。在本文中,我们提出了SCAREX框架,它支持可扩展性、可靠性、可扩展性,并且易于实现基于集群的系统。该框架对工作负载处理的故障采用了容错机制,有利于工作节点上工作模块的动态分发和加载。SCAREX还提供了一个简单的编程接口,便于开发。由于SCAREX具有灵活的体系结构,开发人员可以通过将基于SCAREX的集群与SCAREX的其他包或其他框架相结合来实现各种集群体系结构和扩展集群体系结构。
{"title":"SCAREX: A framework for scalable, reliable, and extendable cluster computing","authors":"Mino Ku, D. Min, Eunmi Choi","doi":"10.1109/ICCIT.2010.5711200","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711200","url":null,"abstract":"Cluster computing has been widely used in various fields from academics to industry because of its technical advantages. Recently, cloud computing become more attractive, as cluster computing is one of the core basements of cloud computing. However, the development of cluster-based system is hard without relative knowledge such as networking, workload distribution, fault tolerant, etc. Thus, various implementations for cluster computing have been introduced to help the development of cluster-based system. However, these implementations also have the limitation for developing cluster-based system because of high performance in specified application fields. In this paper, we present the SCAREX framework which supports scalability, reliability, extendibility, and easy for implementing cluster-based system. This framework employs a fault-tolerant mechanism for the failure of workload processing, and facilitates dynamic module distribution and loading for the work module which works on the worker node. The SCAREX also provides a simple programming interface for easy development. Since the SCAREX has flexible architecture, the developer can implement various cluster architecture and extend cluster architecture by combining the SCAREX-based cluster with other packages of the SCAREX or other frameworks.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121301400","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The application of 3G technology in water resources monitoring system 3G技术在水资源监测系统中的应用
Feng Xu, Qi Zhou
Water conservancy is extremely important to the national economy and the people's livelihood. Video monitoring system based on 3G technology has played an important role in promoting the informatization of water resources. After introducing 3G technology and the actuality of IT application in water conservancy, we show how to use 3G as a forceful technical support for the further development of the informatization. Finally, the structure and functions also advantages of the water resources monitoring system based on 3G technology is discussed.
水利建设对国计民生至关重要。基于3G技术的视频监控系统在促进水资源信息化方面发挥了重要作用。在介绍了3G技术和水利信息化应用现状的基础上,阐述了如何利用3G技术作为信息化进一步发展的有力技术支撑。最后讨论了基于3G技术的水资源监测系统的结构、功能和优点。
{"title":"The application of 3G technology in water resources monitoring system","authors":"Feng Xu, Qi Zhou","doi":"10.1109/ICCIT.2010.5711202","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711202","url":null,"abstract":"Water conservancy is extremely important to the national economy and the people's livelihood. Video monitoring system based on 3G technology has played an important role in promoting the informatization of water resources. After introducing 3G technology and the actuality of IT application in water conservancy, we show how to use 3G as a forceful technical support for the further development of the informatization. Finally, the structure and functions also advantages of the water resources monitoring system based on 3G technology is discussed.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126813251","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Constructing new functions for E-learning system based on Clause-Rule model 基于子句-规则模型的电子学习系统新功能构建
K. Nakamura, K. Akama
E-Learning systems are used by many learners and teachers. However, all system functions are not provided for the users. We discuss a method of constructing e-Learning systems where learners and teachers can design, try to use, and share new system functions that they want to use; which may be nally added to the system by system managers.
许多学习者和教师都在使用电子学习系统。但是,并不是所有的系统功能都提供给用户。我们讨论了一种构建电子学习系统的方法,学习者和教师可以设计、尝试使用和共享他们想要使用的新系统功能;它可能最终由系统管理员添加到系统中。
{"title":"Constructing new functions for E-learning system based on Clause-Rule model","authors":"K. Nakamura, K. Akama","doi":"10.1109/ICCIT.2010.5711143","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711143","url":null,"abstract":"E-Learning systems are used by many learners and teachers. However, all system functions are not provided for the users. We discuss a method of constructing e-Learning systems where learners and teachers can design, try to use, and share new system functions that they want to use; which may be nally added to the system by system managers.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121387669","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An enhanced SVD based watermarking using U matrix 基于U矩阵的增强SVD水印
Iman Omidvar Tehrani, S. Ibrahim
Protecting images against illegal duplications is an important fact and recently many watermarking algorithms have been published. In this paper an enhanced SVD-based watermarking algorithm is proposed. In the proposed method U component is explored for embedding the watermark. Experimental results show that imperceptibility and robustness of the algorithm is good.
保护图像免受非法复制是一个重要的事实,近年来已经发表了许多水印算法。本文提出了一种增强的基于奇异值分解的水印算法。在该方法中,利用U分量来嵌入水印。实验结果表明,该算法具有良好的不可感知性和鲁棒性。
{"title":"An enhanced SVD based watermarking using U matrix","authors":"Iman Omidvar Tehrani, S. Ibrahim","doi":"10.1109/ICCIT.2010.5711130","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711130","url":null,"abstract":"Protecting images against illegal duplications is an important fact and recently many watermarking algorithms have been published. In this paper an enhanced SVD-based watermarking algorithm is proposed. In the proposed method U component is explored for embedding the watermark. Experimental results show that imperceptibility and robustness of the algorithm is good.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410073","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A review on the PKC-based security architecture for wireless sensor networks 基于pkc的无线传感器网络安全体系结构综述
Md. Iftekhar Salam, Hoonjae Lee
A wireless sensor network (WSN) is formed of low powered, battery driven electromechanical devices called sensor nodes which communicate with each other through the wireless medium. Secure data communication is a major concern for many sensor network applications. To ensure the confidentiality, it is necessary to establish a secure communication link among sensor nodes by means of cryptographic keys. However, due to the sensor network deployment scenario and several other constraints it is not an easy task to establish a security mechanism for WSN. Recently Haque et. al. proposed a PKC based security architecture to achieve secure data communication in WSN. In this paper, we point out some weaknesses in the PKC based scheme and propose an enhanced scheme to withstand these weaknesses. It is shown that the PKC based security scheme is susceptible to selective node capture attack. Moreover, this scheme requires contacting with the base station for each and every single communication which will add extra communication overhead. In our enhanced scheme, a sensor node establishes unique link key with its neighboring nodes once they are deployed which in turn increases the resiliency against nodes capture attack. Compared to the original scheme our modified scheme reduces the complexity and communication cost of the system while achieving a sufficient level of security.
无线传感器网络(WSN)由低功耗、电池驱动的机电设备组成,这些设备被称为传感器节点,它们通过无线媒介相互通信。安全的数据通信是许多传感器网络应用的主要关注点。为了保证数据的保密性,需要在传感器节点之间通过密钥建立安全的通信链路。然而,由于传感器网络的部署场景和其他一些限制,建立WSN的安全机制并不是一件容易的事情。最近Haque等人提出了一种基于PKC的安全架构来实现WSN中的安全数据通信。在本文中,我们指出了基于PKC的方案的一些弱点,并提出了一个增强的方案来抵御这些弱点。结果表明,基于PKC的安全方案容易受到选择性节点捕获攻击。此外,该方案每次通信都需要与基站联系,这将增加额外的通信开销。在我们的增强方案中,传感器节点与其相邻节点一旦部署就建立唯一的链路密钥,从而增加了对节点捕获攻击的弹性。与原方案相比,改进后的方案在保证足够安全性的同时降低了系统的复杂度和通信成本。
{"title":"A review on the PKC-based security architecture for wireless sensor networks","authors":"Md. Iftekhar Salam, Hoonjae Lee","doi":"10.1109/ICCIT.2010.5711135","DOIUrl":"https://doi.org/10.1109/ICCIT.2010.5711135","url":null,"abstract":"A wireless sensor network (WSN) is formed of low powered, battery driven electromechanical devices called sensor nodes which communicate with each other through the wireless medium. Secure data communication is a major concern for many sensor network applications. To ensure the confidentiality, it is necessary to establish a secure communication link among sensor nodes by means of cryptographic keys. However, due to the sensor network deployment scenario and several other constraints it is not an easy task to establish a security mechanism for WSN. Recently Haque et. al. proposed a PKC based security architecture to achieve secure data communication in WSN. In this paper, we point out some weaknesses in the PKC based scheme and propose an enhanced scheme to withstand these weaknesses. It is shown that the PKC based security scheme is susceptible to selective node capture attack. Moreover, this scheme requires contacting with the base station for each and every single communication which will add extra communication overhead. In our enhanced scheme, a sensor node establishes unique link key with its neighboring nodes once they are deployed which in turn increases the resiliency against nodes capture attack. Compared to the original scheme our modified scheme reduces the complexity and communication cost of the system while achieving a sufficient level of security.","PeriodicalId":131337,"journal":{"name":"5th International Conference on Computer Sciences and Convergence Information Technology","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128002720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
5th International Conference on Computer Sciences and Convergence Information Technology
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1