首页 > 最新文献

2018 14th International Conference on Computational Intelligence and Security (CIS)最新文献

英文 中文
Off-Topic Text Detection Based on Neural Networks Combined with Text Features 结合文本特征的神经网络脱题文本检测
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00042
Zhanyuan Yang, Hanfeng Liu, Minping Chen, xia li
Off-topic text detection refers to detecting whether the topic of a text deviates from the required topic. Our work addresses the problem of predicting whether a text is off-topic or not for a given prompt. Prior studies use classical content vector to represent the text and predict it with machine learning based methods. To our knowledge, there are few studies investigated this task using neural networks. In this paper, we propose to use a combination of neural features and surface text features as a representation of a text. Then we input the hidden representation of the text into a softmax layer to get the probability of the prediction. We do several experiments on four datasets. The experimental results show that our method achieves better performance compared with the baseline method.
偏离主题文本检测是指检测文本的主题是否偏离了需要的主题。我们的工作解决了在给定提示下预测文本是否偏离主题的问题。先前的研究使用经典内容向量来表示文本,并使用基于机器学习的方法进行预测。据我们所知,很少有研究使用神经网络来研究这一任务。在本文中,我们建议使用神经特征和表面文本特征的组合作为文本的表示。然后,我们将文本的隐藏表示输入到softmax层中,以获得预测的概率。我们在四个数据集上做了几个实验。实验结果表明,与基线方法相比,我们的方法取得了更好的性能。
{"title":"Off-Topic Text Detection Based on Neural Networks Combined with Text Features","authors":"Zhanyuan Yang, Hanfeng Liu, Minping Chen, xia li","doi":"10.1109/CIS2018.2018.00042","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00042","url":null,"abstract":"Off-topic text detection refers to detecting whether the topic of a text deviates from the required topic. Our work addresses the problem of predicting whether a text is off-topic or not for a given prompt. Prior studies use classical content vector to represent the text and predict it with machine learning based methods. To our knowledge, there are few studies investigated this task using neural networks. In this paper, we propose to use a combination of neural features and surface text features as a representation of a text. Then we input the hidden representation of the text into a softmax layer to get the probability of the prediction. We do several experiments on four datasets. The experimental results show that our method achieves better performance compared with the baseline method.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"39 5","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114102875","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Application of Virtualization Platform in Informationization of Higher Vocational Colleges 虚拟化平台在高职院校信息化中的应用
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00108
Jing Nie
This paper first introduces the number of servers faced by higher vocational colleges in the process of informatization construction, the low resource utilization rate, the incompatibility of management systems, and the low degree of management and maintenance automation. The virtualization based on Huawei FusionSphere architecture is proposed. The integrated implementation method performs unified logical division and management of virtual machine resources, shields the physical platform details, and improves the degree of automated management and maintenance of the server.
本文首先介绍了高职院校在信息化建设过程中所面临的服务器数量多、资源利用率低、管理系统不兼容、管理维护自动化程度低等问题。提出了基于华为FusionSphere架构的虚拟化方案。集成实现方式对虚拟机资源进行统一的逻辑划分和管理,屏蔽了物理平台细节,提高了服务器自动化管理和维护的程度。
{"title":"Application of Virtualization Platform in Informationization of Higher Vocational Colleges","authors":"Jing Nie","doi":"10.1109/CIS2018.2018.00108","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00108","url":null,"abstract":"This paper first introduces the number of servers faced by higher vocational colleges in the process of informatization construction, the low resource utilization rate, the incompatibility of management systems, and the low degree of management and maintenance automation. The virtualization based on Huawei FusionSphere architecture is proposed. The integrated implementation method performs unified logical division and management of virtual machine resources, shields the physical platform details, and improves the degree of automated management and maintenance of the server.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115161135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Real-Time Location Privacy Protection Method Based on Space Transformation 基于空间变换的实时位置隐私保护方法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00071
Yingle Li, Shuyu Li
In recent years, mobile internet technology and positioning technology have been rapidly developed and widely used, mobile users can enjoy location-based services through mobile smart devices anywhere and anytime. However, they may lead to the leakage of personal sensitive information such as user's spatial temporal location data and so on. Trying to solve this problem and overcoming the shortcoming of traditional randomized dummy generation algorithm, a real-time location privacy protection algorithm based on spatial transform is proposed in the paper, without influencing the quality of user real-time location service. The algorithm uses the number of interest points in the history log file and the road network topology as the key elements of the query context and the motion model, which makes the generated dummy more realistic and effective in both time and space dimension. And the dummy set is encrypted by using the algorithm based on Hilbert space transformation, to make the user query data more secure. The results of experiment show that the algorithm can improve the effectiveness of dummy and gain better obfuscation query result in condition of preserving user privacy information.
近年来,移动互联网技术和定位技术得到了迅速发展和广泛应用,移动用户可以随时随地通过移动智能设备享受基于位置的服务。但是,它们可能会导致用户的时空位置数据等个人敏感信息的泄露。为了解决这一问题,克服传统随机虚拟生成算法的不足,提出了一种不影响用户实时位置服务质量的基于空间变换的实时位置隐私保护算法。该算法以历史日志文件中的兴趣点数量和路网拓扑结构作为查询上下文和运动模型的关键要素,使生成的虚拟人在时间和空间维度上都更加真实有效。采用基于Hilbert空间变换的算法对虚拟集进行加密,使用户查询数据更加安全。实验结果表明,该算法在保留用户隐私信息的情况下,提高了虚拟机的有效性,获得了较好的混淆查询结果。
{"title":"A Real-Time Location Privacy Protection Method Based on Space Transformation","authors":"Yingle Li, Shuyu Li","doi":"10.1109/CIS2018.2018.00071","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00071","url":null,"abstract":"In recent years, mobile internet technology and positioning technology have been rapidly developed and widely used, mobile users can enjoy location-based services through mobile smart devices anywhere and anytime. However, they may lead to the leakage of personal sensitive information such as user's spatial temporal location data and so on. Trying to solve this problem and overcoming the shortcoming of traditional randomized dummy generation algorithm, a real-time location privacy protection algorithm based on spatial transform is proposed in the paper, without influencing the quality of user real-time location service. The algorithm uses the number of interest points in the history log file and the road network topology as the key elements of the query context and the motion model, which makes the generated dummy more realistic and effective in both time and space dimension. And the dummy set is encrypted by using the algorithm based on Hilbert space transformation, to make the user query data more secure. The results of experiment show that the algorithm can improve the effectiveness of dummy and gain better obfuscation query result in condition of preserving user privacy information.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"47 7","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113981587","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Computationally Efficient Low Power Neuron Model for Digital Brain 数字大脑计算效率低功耗神经元模型
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00009
A. Mehmood, M. Iqbal, H. Dawood, Ping Guo
Modern supercomputers are capable of performing elementary operations of the order of petaflops. This power is comparable with the computational power of a human brain. The power supply required by supercomputers is in megawatts while human brain requires few watts to perform the same elementary operations as the modern supercomputers can. Thus the power consumption of supercomputers can be reduced (about 10 times) by considering the neuromorphic structure of a brain and attempt to mimic it on hardware chip to construct the computer that can function in the same manner as the human brain. In this paper we have proposed to develop the model for single brain cell, that can be replicated to built the whole brain model having computational power of supercomputers but the energy supply comparable with human brain.
现代超级计算机能够执行每秒千万亿次的基本运算。这种能力与人类大脑的计算能力相当。超级计算机所需的电力供应以兆瓦为单位,而人类大脑只需几瓦就能完成与现代超级计算机相同的基本操作。因此,考虑到大脑的神经形态结构,并试图在硬件芯片上模拟它,以构建能够以与人脑相同的方式运作的计算机,可以将超级计算机的功耗降低(约10倍)。在本文中,我们提出了建立单个脑细胞的模型,这个模型可以被复制,以建立具有超级计算机计算能力但能量供应与人脑相当的整个大脑模型。
{"title":"Computationally Efficient Low Power Neuron Model for Digital Brain","authors":"A. Mehmood, M. Iqbal, H. Dawood, Ping Guo","doi":"10.1109/CIS2018.2018.00009","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00009","url":null,"abstract":"Modern supercomputers are capable of performing elementary operations of the order of petaflops. This power is comparable with the computational power of a human brain. The power supply required by supercomputers is in megawatts while human brain requires few watts to perform the same elementary operations as the modern supercomputers can. Thus the power consumption of supercomputers can be reduced (about 10 times) by considering the neuromorphic structure of a brain and attempt to mimic it on hardware chip to construct the computer that can function in the same manner as the human brain. In this paper we have proposed to develop the model for single brain cell, that can be replicated to built the whole brain model having computational power of supercomputers but the energy supply comparable with human brain.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128570931","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cloud Service Risk in the Smart Grid 智能电网中的云服务风险
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00060
Liping Chen, Jun Liu, Weitao Ha
Smart grid utilizes cloud service to realize reliable, efficient, secured, and cost-effective power management, but there are a number of security risks in the cloud service of smart grid. The security risks are particularly problematic to operators of power information infrastructure who want to leverage the benefits of cloud. In this paper, security risk of cloud service in the smart grid are categorized and analyzed characteristics, and multi-layered index system of general technical risks is established, which applies to different patterns of cloud service. Cloud service risk of smart grid can evaluate according indexes.
智能电网利用云服务实现可靠、高效、安全、经济的电力管理,但智能电网云服务存在诸多安全隐患。对于希望利用云计算优势的电力信息基础设施运营商来说,安全风险尤其成问题。本文对智能电网中云服务的安全风险进行了分类和特征分析,建立了适用于不同云服务模式的通用技术风险多层次指标体系。智能电网云服务风险可根据指标进行评估。
{"title":"Cloud Service Risk in the Smart Grid","authors":"Liping Chen, Jun Liu, Weitao Ha","doi":"10.1109/CIS2018.2018.00060","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00060","url":null,"abstract":"Smart grid utilizes cloud service to realize reliable, efficient, secured, and cost-effective power management, but there are a number of security risks in the cloud service of smart grid. The security risks are particularly problematic to operators of power information infrastructure who want to leverage the benefits of cloud. In this paper, security risk of cloud service in the smart grid are categorized and analyzed characteristics, and multi-layered index system of general technical risks is established, which applies to different patterns of cloud service. Cloud service risk of smart grid can evaluate according indexes.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130058876","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Study on Secret Sharing for SM2 Digital Signature and Its Application SM2数字签名的秘密共享及其应用研究
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00052
Fan Ding, Yihong Long, Peili Wu
Secret sharing is commonly used to protect the user's private key. SM2 is an elliptic curve public-key cryptography algorithm released by China's State Cryptography Administration. For its unique digital signature operation, ordinary secret sharing schemes are not suitable for the case of the digital signature using the SM2 private key. To solve this problem, the product-based secret sharing scheme and the summation-based secret sharing scheme for the SM2 digital signature are proposed in this paper. The summation-based secret sharing scheme, in particular, contains ordinary secret sharing and threshold secret sharing. In addition, this work applies the above two schemes to the Android mobile terminal to protect a user's SM2 private key.
秘密共享通常用于保护用户的私钥。SM2是中国国家密码管理局发布的椭圆曲线公钥加密算法。普通的秘密共享方案由于其独特的数字签名操作,不适合使用SM2私钥进行数字签名的情况。针对这一问题,本文提出了基于产品的SM2数字签名秘密共享方案和基于求和的SM2数字签名秘密共享方案。其中,基于求和的秘密共享方案包括普通秘密共享和阈值秘密共享。此外,本工作将上述两种方案应用于Android移动终端,以保护用户的SM2私钥。
{"title":"Study on Secret Sharing for SM2 Digital Signature and Its Application","authors":"Fan Ding, Yihong Long, Peili Wu","doi":"10.1109/CIS2018.2018.00052","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00052","url":null,"abstract":"Secret sharing is commonly used to protect the user's private key. SM2 is an elliptic curve public-key cryptography algorithm released by China's State Cryptography Administration. For its unique digital signature operation, ordinary secret sharing schemes are not suitable for the case of the digital signature using the SM2 private key. To solve this problem, the product-based secret sharing scheme and the summation-based secret sharing scheme for the SM2 digital signature are proposed in this paper. The summation-based secret sharing scheme, in particular, contains ordinary secret sharing and threshold secret sharing. In addition, this work applies the above two schemes to the Android mobile terminal to protect a user's SM2 private key.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121824147","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Modified RSA Encryption Algorithm Based on Chaos and Its Application in Voice Encryption System 基于混沌的改进RSA加密算法及其在语音加密系统中的应用
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00104
Yi Wang, Zhiping Tan
A modified RSA encryption algorithm based on meminductor chaos circuit is proposed in this paper. On the basis of the original RSA encryption algorithm, utilizing meminductor chaotic circuit generate chaos signal conceals the public key in the RSA algorithm, so it can improve information security effectively. Finally, the modified RSA encryption algorithm is used to complete the real-time voice encryption system design based on the chaotic synchronization system. The simulation results are verified by numerical simulations.
提出了一种改进的基于mem电感混沌电路的RSA加密算法。在原有RSA加密算法的基础上,利用meminductor混沌电路产生混沌信号,将公钥隐藏在RSA算法中,有效地提高了信息的安全性。最后,利用改进的RSA加密算法,完成了基于混沌同步系统的实时语音加密系统设计。数值模拟验证了仿真结果。
{"title":"Modified RSA Encryption Algorithm Based on Chaos and Its Application in Voice Encryption System","authors":"Yi Wang, Zhiping Tan","doi":"10.1109/CIS2018.2018.00104","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00104","url":null,"abstract":"A modified RSA encryption algorithm based on meminductor chaos circuit is proposed in this paper. On the basis of the original RSA encryption algorithm, utilizing meminductor chaotic circuit generate chaos signal conceals the public key in the RSA algorithm, so it can improve information security effectively. Finally, the modified RSA encryption algorithm is used to complete the real-time voice encryption system design based on the chaotic synchronization system. The simulation results are verified by numerical simulations.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126351115","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Novel Enhanced Nonnegative Feature Extraction Approach 一种新的增强非负特征提取方法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00096
Haitao Chen, Wensheng Chen, Binbin Pan, Bo Chen
Nonnegative matrix factorization (NMF) is a promising approach for image-data representation and classification under the nonnegativity constraint. However, the traditional NMF does not exploit the data-label information and its performance will be degraded in classification tasks. To overcome the flaw of NMF, this paper proposes a novel enhanced nonnegative matrix factorization (ENMF) method for learning powerful discriminative feature. The basic idea is that the training data from the same class are forced to embed into their own feature subspaces, where these subspaces are mutually orthogonal. The ENMF update rule is obtained by means of auxiliary function technique and Cardano's formula. We prove and analyze the convergence of the proposed ENMF algorithm theoretically and empirically. Experimental results on face recognition show that the proposed method outperforms the existing state-of-the-art NMF-based algorithms.
在非负性约束下,非负矩阵分解是一种很有前途的图像数据表示和分类方法。然而,传统的NMF不利用数据标签信息,在分类任务中会降低其性能。为了克服非负矩阵分解的缺陷,提出了一种新的增强非负矩阵分解(ENMF)方法来学习强判别特征。基本思想是,来自同一类的训练数据被强制嵌入到它们自己的特征子空间中,这些子空间是相互正交的。利用辅助函数技术和卡尔达诺公式,得到了ENMF的更新规则。从理论上和经验上证明并分析了所提出的ENMF算法的收敛性。人脸识别实验结果表明,该方法优于现有的基于神经网络的人脸识别算法。
{"title":"A Novel Enhanced Nonnegative Feature Extraction Approach","authors":"Haitao Chen, Wensheng Chen, Binbin Pan, Bo Chen","doi":"10.1109/CIS2018.2018.00096","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00096","url":null,"abstract":"Nonnegative matrix factorization (NMF) is a promising approach for image-data representation and classification under the nonnegativity constraint. However, the traditional NMF does not exploit the data-label information and its performance will be degraded in classification tasks. To overcome the flaw of NMF, this paper proposes a novel enhanced nonnegative matrix factorization (ENMF) method for learning powerful discriminative feature. The basic idea is that the training data from the same class are forced to embed into their own feature subspaces, where these subspaces are mutually orthogonal. The ENMF update rule is obtained by means of auxiliary function technique and Cardano's formula. We prove and analyze the convergence of the proposed ENMF algorithm theoretically and empirically. Experimental results on face recognition show that the proposed method outperforms the existing state-of-the-art NMF-based algorithms.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121495506","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Improved Extended Polynomial-Based Secret Image Sharing Scheme Using QR Code 改进的基于扩展多项式的QR码秘密图像共享方案
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00058
Zhengxin Fu, Sijia Liu, Kun Xia, Bin Yu
Secret image sharing technology is an effective approach to encode the secret image into several shares, and the original image can be recovered by the remaining shares even some shares are lost. As a typical two-dimensional machine reada-ble code, QR code is widely used in human life due to its fast reading speed, high data density and strong error correction capability. Combined with the characteristics of QR code and secret image sharing, an extended secret image sharing scheme was proposed based on QR code, where "extended" means that the generated shares were visually similar to the QR code. The main idea is to control the parameters' selec-tion of polynomial using the binary QR codes. Meanwhile, the average gray difference of the shares was defined as α to measure the similarity between QR-like shares and the origi-nal carrier QR codes. Based on α, a secret sharing algorithm was designed to generate QR-like shares. At last, upper and lower limits of α are introduced through experimental analy-sis, and the relationship between the error correction level of carrier QR code and the lower limit of α.
秘密图像共享技术是一种将秘密图像编码成多个共享的有效方法,即使部分共享丢失,剩余的共享也可以恢复原始图像。二维码作为一种典型的二维机器可读代码,以其读取速度快、数据密度高、纠错能力强等优点,在人类生活中得到了广泛的应用。结合QR码和秘密图像共享的特点,提出了一种基于QR码的扩展秘密图像共享方案,其中“扩展”是指生成的共享在视觉上与QR码相似。其主要思想是利用二进制QR码控制多项式参数的选择。同时,将类QR份额的平均灰度差定义为α,以衡量类QR份额与原始载体QR码之间的相似性。基于α,设计了一种秘密共享算法来生成类qr共享。最后通过实验分析,给出了α的上下限,以及载波QR码的纠错等级与α下限的关系。
{"title":"Improved Extended Polynomial-Based Secret Image Sharing Scheme Using QR Code","authors":"Zhengxin Fu, Sijia Liu, Kun Xia, Bin Yu","doi":"10.1109/CIS2018.2018.00058","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00058","url":null,"abstract":"Secret image sharing technology is an effective approach to encode the secret image into several shares, and the original image can be recovered by the remaining shares even some shares are lost. As a typical two-dimensional machine reada-ble code, QR code is widely used in human life due to its fast reading speed, high data density and strong error correction capability. Combined with the characteristics of QR code and secret image sharing, an extended secret image sharing scheme was proposed based on QR code, where \"extended\" means that the generated shares were visually similar to the QR code. The main idea is to control the parameters' selec-tion of polynomial using the binary QR codes. Meanwhile, the average gray difference of the shares was defined as α to measure the similarity between QR-like shares and the origi-nal carrier QR codes. Based on α, a secret sharing algorithm was designed to generate QR-like shares. At last, upper and lower limits of α are introduced through experimental analy-sis, and the relationship between the error correction level of carrier QR code and the lower limit of α.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132635146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Evolutionary Multi- and Many-Objective Optimization Algorithm Based on ISDE + and Region Decomposition 基于ISDE +和区域分解的多目标进化优化算法
Pub Date : 2018-11-01 DOI: 10.1109/CIS2018.2018.00015
Zixian Lin, Hai-Lin Liu, Fangqing Gu
In this paper, we propose an evolutionary multi-and many-objective optimization algorithm combining I_SDE + and region decomposition. It decomposes the objective space into a number of sub-regions by a set of direction vectors and independently calculates the indicator I_SDE + by using the corresponding direction vector in each subregion. Thus, the convergence direction of each sub-region is relatively adjusted. In this way, the proposed algorithm can adapt to various of Pareto Front shapes. The inferior individuals are eliminated according to the value of I_SDE + of each individual one by one. In the experiments, we compare the proposed algorithm with four evolutionary multi-and many-objective optimization algorithms on WFG series with different number of objectives. The result shows that the proposed algorithm promotes diversity and convergence.
本文提出了一种结合I_SDE +和区域分解的进化多目标优化算法。它通过一组方向向量将目标空间分解为多个子区域,并在每个子区域中使用相应的方向向量独立计算指标I_SDE +。因此,各子区域的收敛方向相对调整。这样,该算法可以适应多种Pareto Front形状。根据每个个体的I_SDE +值逐个淘汰劣势个体。在实验中,我们将该算法与四种不同目标数的WFG序列多目标和多目标进化优化算法进行了比较。结果表明,该算法具有较好的多样性和收敛性。
{"title":"An Evolutionary Multi- and Many-Objective Optimization Algorithm Based on ISDE + and Region Decomposition","authors":"Zixian Lin, Hai-Lin Liu, Fangqing Gu","doi":"10.1109/CIS2018.2018.00015","DOIUrl":"https://doi.org/10.1109/CIS2018.2018.00015","url":null,"abstract":"In this paper, we propose an evolutionary multi-and many-objective optimization algorithm combining I_SDE + and region decomposition. It decomposes the objective space into a number of sub-regions by a set of direction vectors and independently calculates the indicator I_SDE + by using the corresponding direction vector in each subregion. Thus, the convergence direction of each sub-region is relatively adjusted. In this way, the proposed algorithm can adapt to various of Pareto Front shapes. The inferior individuals are eliminated according to the value of I_SDE + of each individual one by one. In the experiments, we compare the proposed algorithm with four evolutionary multi-and many-objective optimization algorithms on WFG series with different number of objectives. The result shows that the proposed algorithm promotes diversity and convergence.","PeriodicalId":185099,"journal":{"name":"2018 14th International Conference on Computational Intelligence and Security (CIS)","volume":"68 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133683908","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
期刊
2018 14th International Conference on Computational Intelligence and Security (CIS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1