首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
An Improved Image Encryption Scheme Based on Line Maps 一种改进的基于线映射的图像加密方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.67
Juan Li, Yong Feng, Xuqiang Yang
In order to avoid the flaw while keeping all the merits of image encryption scheme based on line maps, an improved image encryption scheme is proposed, which extended the original 2D scheme to 3D. An image with size N×M is firstly depicted by a 3D bit matrix, and then it is supposed as composed of 8×M vectors with size N. Line maps are used to stretch the vectors to an array, while the fold map is used to transform the array to a same sized 3D matrix. Simulation results show that the improved image encryption scheme complete pixel permutation and confusion simultaneously, it enhance the security of the original cipher.
为了在保留基于线映射的图像加密方案优点的同时避免这一缺陷,提出了一种改进的图像加密方案,将原来的二维加密方案扩展到三维加密方案。一个大小为N×M的图像首先用一个三维位矩阵来描绘,然后假设它由大小为n的8×M向量组成。线映射用于将向量拉伸成一个数组,而折叠映射用于将数组转换成一个大小相同的三维矩阵。仿真结果表明,改进后的图像加密方案同时完成了像素置换和混淆,提高了原密码的安全性。
{"title":"An Improved Image Encryption Scheme Based on Line Maps","authors":"Juan Li, Yong Feng, Xuqiang Yang","doi":"10.1109/IAS.2009.67","DOIUrl":"https://doi.org/10.1109/IAS.2009.67","url":null,"abstract":"In order to avoid the flaw while keeping all the merits of image encryption scheme based on line maps, an improved image encryption scheme is proposed, which extended the original 2D scheme to 3D. An image with size N×M is firstly depicted by a 3D bit matrix, and then it is supposed as composed of 8×M vectors with size N. Line maps are used to stretch the vectors to an array, while the fold map is used to transform the array to a same sized 3D matrix. Simulation results show that the improved image encryption scheme complete pixel permutation and confusion simultaneously, it enhance the security of the original cipher.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"135 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127351588","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation 基于辐射能量和曲线变换的红外人脸识别
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.24
Zhihua Xie, Shiqian Wu, Guodon Liu, Zhijun Fang
In this paper, a infrared face recognition method using radiant energy conversion and Curvelet transformation is proposed. Firstly, to get the stable feature of thermal face, thermal images are converted into radiant energy images according to Stefan-Boltzmann's law. Secondly, Curvelet transform has better directional and edge representation abilities than widely used wavelet transformation and other classic transformations. Inspired by these attractive attributes of Curvelets in sparse representation of the images, we introduce the idea of decomposing images into their curvelet subbands to extract the principal representative feature, which saves the computational complexity and storage units. Finally, the nearest neighbor classifier is chosen to get the system recognition result. The experiments illustrate that compared with traditional PCA based systems, the proposed system has better performance and requires fewer computations and memory units.
提出了一种基于辐射能转换和曲波变换的红外人脸识别方法。首先,根据Stefan-Boltzmann定律将热图像转换为辐射能图像,得到热面稳定特征;其次,与小波变换和其他经典变换相比,曲波变换具有更好的方向和边缘表示能力。受图像稀疏表示中曲波的这些吸引人的属性的启发,我们引入了将图像分解到曲波子带中提取主要代表特征的思想,从而节省了计算复杂度和存储单元。最后,选择最近邻分类器得到系统识别结果。实验表明,与传统的基于PCA的系统相比,该系统具有更好的性能,并且需要更少的计算量和存储单元。
{"title":"Infrared Face Recognition Based on Radiant Energy and Curvelet Transformation","authors":"Zhihua Xie, Shiqian Wu, Guodon Liu, Zhijun Fang","doi":"10.1109/IAS.2009.24","DOIUrl":"https://doi.org/10.1109/IAS.2009.24","url":null,"abstract":"In this paper, a infrared face recognition method using radiant energy conversion and Curvelet transformation is proposed. Firstly, to get the stable feature of thermal face, thermal images are converted into radiant energy images according to Stefan-Boltzmann's law. Secondly, Curvelet transform has better directional and edge representation abilities than widely used wavelet transformation and other classic transformations. Inspired by these attractive attributes of Curvelets in sparse representation of the images, we introduce the idea of decomposing images into their curvelet subbands to extract the principal representative feature, which saves the computational complexity and storage units. Finally, the nearest neighbor classifier is chosen to get the system recognition result. The experiments illustrate that compared with traditional PCA based systems, the proposed system has better performance and requires fewer computations and memory units.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127355122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A New Authenticated Key Agreement Protocol for Wireless Mobile Networks 一种新的无线移动网络认证密钥协议
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.58
Shin-Jia Hwang, M. Chai
For secure communications over wireless mobile networks, Lu et al proposed their secure authentication key agreement protocol. However, Lu et al’s protocol is vulnerable against Chang and Chang’s parallel guessing attack. To remove the parallel guessing attacks, Chang and Chang also proposed their improvement. However, Chang and Chang’s protocol is still vulnerable against their parallel guessing attack. So our new authenticated key agreement protocol for wireless mobile networks is proposed.
针对无线移动网络上的安全通信,Lu等人提出了安全认证密钥协议。然而,Lu等人的协议对Chang和Chang的并行猜测攻击是脆弱的。为了消除平行猜测攻击,Chang和Chang还提出了他们的改进方法。然而,Chang和Chang的协议仍然容易受到他们的并行猜测攻击。为此,提出了一种新的无线移动网络认证密钥协议。
{"title":"A New Authenticated Key Agreement Protocol for Wireless Mobile Networks","authors":"Shin-Jia Hwang, M. Chai","doi":"10.1109/IAS.2009.58","DOIUrl":"https://doi.org/10.1109/IAS.2009.58","url":null,"abstract":"For secure communications over wireless mobile networks, Lu et al proposed their secure authentication key agreement protocol. However, Lu et al’s protocol is vulnerable against Chang and Chang’s parallel guessing attack. To remove the parallel guessing attacks, Chang and Chang also proposed their improvement. However, Chang and Chang’s protocol is still vulnerable against their parallel guessing attack. So our new authenticated key agreement protocol for wireless mobile networks is proposed.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124796444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM) 基于支持向量机的中文网页分类算法性能分析
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.316
Xiao Gang, Jiancang Xie
Categorizing web automatically for users is a key technique of information society, and the key point of this technique is web training and categorization. This paper researches one of the important algorithm in this field—support vector machines (SVM). By analyzing and simulating 4 kinds of kernel function and 3 ways of feature selection, polynomial kernel function and document frequency is chosen for the best way in SVM algorithm. Meanwhile, pre-process algorithm is given in this paper in order to improve the efficiency of categorization. By simulation, importing pre-process method to SVM enhances the capability of the web categorization both in precision and time-consumption.
面向用户的网页自动分类是信息社会的一项关键技术,而该技术的关键是网页训练和分类。本文研究了其中一种重要的场支持向量机算法。通过对4种核函数和3种特征选择方法的分析和仿真,选择多项式核函数和文档频率作为SVM算法的最佳方法。同时,为了提高分类效率,本文给出了预处理算法。仿真结果表明,在支持向量机中引入预处理方法可以提高web分类的精度和耗时。
{"title":"Performance Analysis of Chinese Webpage Categorizing Algorithm Based on Support Vector Machines (SVM)","authors":"Xiao Gang, Jiancang Xie","doi":"10.1109/IAS.2009.316","DOIUrl":"https://doi.org/10.1109/IAS.2009.316","url":null,"abstract":"Categorizing web automatically for users is a key technique of information society, and the key point of this technique is web training and categorization. This paper researches one of the important algorithm in this field—support vector machines (SVM). By analyzing and simulating 4 kinds of kernel function and 3 ways of feature selection, polynomial kernel function and document frequency is chosen for the best way in SVM algorithm. Meanwhile, pre-process algorithm is given in this paper in order to improve the efficiency of categorization. By simulation, importing pre-process method to SVM enhances the capability of the web categorization both in precision and time-consumption.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123451694","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Adaptable Threshold Decision Method 一种自适应阈值决策方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.96
M. Tsai, Mingchun Wang, Ting-Yuan Chang, Pei-Yan Pai, Y. Chan
Otsu’s thresholding method (OTM) is one of the most commonly used thresholding methods. Unfortunately, the threshold obtained by OTM is biased in favor of the class, whose standard deviation or quantity of data is larger. Besides, one may adopt distinct thresholds in different applications for a same data set. Accordingly, this paper proposes an adaptable threshold decision method (ATDM) to provide the most appropriate thresholds for assorted applications. This paper also proposes a PSO (particle swarm optimization) based parameter detector (PBPD) to decide the fittest parameters which are used by ATDM. Image segmentation extracts the regions of interest from an image for follow-up analyses, and thresholding is one important technique for image segmentation. This paper will employ ATDM to detect the object contours in an image in order to investigate the performance of ATDM. The experiments show that ATDM can give impressive segmentation results.
Otsu阈值法(OTM)是一种最常用的阈值法。不幸的是,OTM获得的阈值偏向于类,因为类的标准差或数据量较大。此外,对于同一数据集,在不同的应用中可能采用不同的阈值。为此,本文提出了一种自适应阈值决策方法(ATDM),为各种应用提供最合适的阈值。本文还提出了一种基于粒子群优化的参数检测器(PBPD)来确定ATDM使用的最合适参数。图像分割从图像中提取感兴趣的区域进行后续分析,阈值分割是图像分割的重要技术之一。本文将利用ATDM检测图像中的目标轮廓,以研究ATDM的性能。实验表明,ATDM分割效果良好。
{"title":"An Adaptable Threshold Decision Method","authors":"M. Tsai, Mingchun Wang, Ting-Yuan Chang, Pei-Yan Pai, Y. Chan","doi":"10.1109/IAS.2009.96","DOIUrl":"https://doi.org/10.1109/IAS.2009.96","url":null,"abstract":"Otsu’s thresholding method (OTM) is one of the most commonly used thresholding methods. Unfortunately, the threshold obtained by OTM is biased in favor of the class, whose standard deviation or quantity of data is larger. Besides, one may adopt distinct thresholds in different applications for a same data set. Accordingly, this paper proposes an adaptable threshold decision method (ATDM) to provide the most appropriate thresholds for assorted applications. This paper also proposes a PSO (particle swarm optimization) based parameter detector (PBPD) to decide the fittest parameters which are used by ATDM. Image segmentation extracts the regions of interest from an image for follow-up analyses, and thresholding is one important technique for image segmentation. This paper will employ ATDM to detect the object contours in an image in order to investigate the performance of ATDM. The experiments show that ATDM can give impressive segmentation results.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123599685","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Low Bit Rate ROI-Based SAR Image Compression 基于低比特率roi的SAR图像压缩
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.179
Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang
Due to large amount of collected data, image compression is both necessary and important for SAR system. Conventional image compression algorithms are incapable of attaining the desired compression while retaining the image fidelity required for processing at the ground station. In this paper, we present a ROI-based SAR image compression system for low bit rate. Region of interest is identified by a multiresolution constant false alarm rate (CFAR) detector and it is encoded with a higher bit rate than background. Performance was tested over the public MSTAR target chips. Results show that SNR of target area with proposed algorithm are higher than that with conventional algorithm and contextual information is preserved.
由于采集数据量大,图像压缩对SAR系统来说是必要且重要的。传统的图像压缩算法不能在保持地面站处理所需的图像保真度的同时获得所需的压缩。本文提出了一种基于roi的低比特率SAR图像压缩系统。感兴趣区域由多分辨率恒定虚警率检测器(CFAR)识别,并以高于背景的比特率进行编码。性能在MSTAR目标芯片上进行了测试。结果表明,该算法比传统算法具有更高的目标区域信噪比,并保留了目标区域的背景信息。
{"title":"Low Bit Rate ROI-Based SAR Image Compression","authors":"Xiao-Hong Yuan, Zhaoda Zhu, Gong Zhang","doi":"10.1109/IAS.2009.179","DOIUrl":"https://doi.org/10.1109/IAS.2009.179","url":null,"abstract":"Due to large amount of collected data, image compression is both necessary and important for SAR system. Conventional image compression algorithms are incapable of attaining the desired compression while retaining the image fidelity required for processing at the ground station. In this paper, we present a ROI-based SAR image compression system for low bit rate. Region of interest is identified by a multiresolution constant false alarm rate (CFAR) detector and it is encoded with a higher bit rate than background. Performance was tested over the public MSTAR target chips. Results show that SNR of target area with proposed algorithm are higher than that with conventional algorithm and contextual information is preserved.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125310792","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized Block 基于归一化块环境交叉和的快速分形图像编码
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.154
Gao-ping Li
Fractal image coding has a fatal drawback of being time consuming in encoding process. In response to this problem, this paper proposed an effective method to limit the searching space, which is mainly based on a newly defined concept of ambient-cross sum of normalized block and a related inequality. In detail, after the codebook blocks are sorted according to their ambient-cross sum features, for an input range block being encoded, the encoder uses the bisection search method to find out the initial-matched block (i.e., the domain block having the closest ambient cross sum features to the input range block being encoded). And then the encoder confines efficiently the searching scope of similarity matching to the vicinity of the initial-matched block. Simulation results show that the proposed scheme gives significant improvement in speed and quality as compared to the baseline algorithm with full search.
分形图像编码有一个致命的缺点,即编码过程耗时长。针对这一问题,本文提出了一种有效的限制搜索空间的方法,该方法主要基于新定义的归一化块环境交叉和概念和相关不等式。具体而言,在码本块根据环境交叉和特征进行排序后,对于正在编码的输入范围块,编码器使用平分搜索方法查找初始匹配块(即与正在编码的输入范围块具有最接近环境交叉和特征的域块)。然后,编码器有效地将相似性匹配的搜索范围限制在初始匹配块的附近。仿真结果表明,与全搜索的基线算法相比,该算法在速度和质量上都有显著提高。
{"title":"Fast Fractal Image Coding Using Ambient-Cross Sum of Normalized Block","authors":"Gao-ping Li","doi":"10.1109/IAS.2009.154","DOIUrl":"https://doi.org/10.1109/IAS.2009.154","url":null,"abstract":"Fractal image coding has a fatal drawback of being time consuming in encoding process. In response to this problem, this paper proposed an effective method to limit the searching space, which is mainly based on a newly defined concept of ambient-cross sum of normalized block and a related inequality. In detail, after the codebook blocks are sorted according to their ambient-cross sum features, for an input range block being encoded, the encoder uses the bisection search method to find out the initial-matched block (i.e., the domain block having the closest ambient cross sum features to the input range block being encoded). And then the encoder confines efficiently the searching scope of similarity matching to the vicinity of the initial-matched block. Simulation results show that the proposed scheme gives significant improvement in speed and quality as compared to the baseline algorithm with full search.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125352892","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A New JPEG Resistant Color Image Watermarking Algorithm Based on Quantization Index Modulation 一种基于量化指标调制的JPEG抗彩色图像水印算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.59
Jie Nie, Zhiqiang Wei, Z. Li
A new color image watermarking algorithm with resistance to JPEG lossy compression based on Quantization Index Modulation (QIM) is proposed in this paper. As it is known, QIM method can achieve a good balance between the embedding bit rate, robustness and distortion between the original image and the composited image by modulating the source signal into different clusters. The corresponding DCT coefficients margins of any two color channels selected from the three as the source signal is substantiated could achieve a high level embedding robustness and a low level distortion in this paper. However, JPEG lossy compression could bring a destructive influence to the watermark since it discards pretty much image information. In this paper, a compensation function is designed to correct the errors caused by JPEG compression. Experiments show the algorithm proposed has a good performance to resist the high compression ratio JPEG lossy compression and other attacks.
提出了一种基于量化指数调制(qm)的抗JPEG有损压缩彩色图像水印算法。众所周知,QIM方法通过将源信号调制成不同的簇,可以很好地平衡原始图像和合成图像之间的嵌入比特率、鲁棒性和失真。本文从三个颜色通道中选取任意两个颜色通道对应的DCT系数边缘作为源信号,可以实现高水平的嵌入鲁棒性和低水平的失真。但是JPEG有损压缩会对水印产生破坏性的影响,因为它会丢弃大量的图像信息。本文设计了一个补偿函数来校正JPEG压缩所产生的误差。实验表明,所提出的算法能够很好地抵抗高压缩比JPEG有损压缩等攻击。
{"title":"A New JPEG Resistant Color Image Watermarking Algorithm Based on Quantization Index Modulation","authors":"Jie Nie, Zhiqiang Wei, Z. Li","doi":"10.1109/IAS.2009.59","DOIUrl":"https://doi.org/10.1109/IAS.2009.59","url":null,"abstract":"A new color image watermarking algorithm with resistance to JPEG lossy compression based on Quantization Index Modulation (QIM) is proposed in this paper. As it is known, QIM method can achieve a good balance between the embedding bit rate, robustness and distortion between the original image and the composited image by modulating the source signal into different clusters. The corresponding DCT coefficients margins of any two color channels selected from the three as the source signal is substantiated could achieve a high level embedding robustness and a low level distortion in this paper. However, JPEG lossy compression could bring a destructive influence to the watermark since it discards pretty much image information. In this paper, a compensation function is designed to correct the errors caused by JPEG compression. Experiments show the algorithm proposed has a good performance to resist the high compression ratio JPEG lossy compression and other attacks.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125507045","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Resistant Secret Sharing Scheme 一种抗保密共享方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.324
Chinchen Chang, Yen-Chang Chen, Chia-Chen Lin
In this paper, we proposed a novel (2, 2) secret sharing scheme applied for grayscale images. This scheme can produce two noise-like shared images that help avoid a secret image being grabbed. The construction phase of shared image consists of producing two shared images of the secret image by a (7, 4) Hamming code operation. To prevent attackers from forging shared images, a logo is embedded into the shared images first by using Tian’s reversible data embedding scheme. Later, the embedded secret image is shuffling by Torus automorphism to enhance its security. Experimental results show that the nois-like shared images can be successfully generated by our proposed scheme.
本文提出了一种适用于灰度图像的(2,2)秘密共享方案。该方案可以产生两个类似噪声的共享图像,从而避免秘密图像被抓取。共享图像的构建阶段是通过(7,4)汉明码运算生成秘密图像的两张共享图像。为了防止攻击者伪造共享图像,首先使用Tian的可逆数据嵌入方案将标识嵌入到共享图像中。然后利用环面自同构对嵌入的秘密图像进行洗牌,以增强其安全性。实验结果表明,该方法可以成功地生成类噪声共享图像。
{"title":"A Resistant Secret Sharing Scheme","authors":"Chinchen Chang, Yen-Chang Chen, Chia-Chen Lin","doi":"10.1109/IAS.2009.324","DOIUrl":"https://doi.org/10.1109/IAS.2009.324","url":null,"abstract":"In this paper, we proposed a novel (2, 2) secret sharing scheme applied for grayscale images. This scheme can produce two noise-like shared images that help avoid a secret image being grabbed. The construction phase of shared image consists of producing two shared images of the secret image by a (7, 4) Hamming code operation. To prevent attackers from forging shared images, a logo is embedded into the shared images first by using Tian’s reversible data embedding scheme. Later, the embedded secret image is shuffling by Torus automorphism to enhance its security. Experimental results show that the nois-like shared images can be successfully generated by our proposed scheme.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115174305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models 基于自适应活动形状模型的胸片肺分割
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.353
Jiann-Shu Lee, Hsing-Hsien Wu, Ming-Zheng Yuan
In this paper, we proposed an automatic lung segmentation method. We designed a ROI based method to estimate a proper initial lung boundary for ASM deformation by deriving the translation and the scaling parameters from the lung ROI. An adaptive ASM, using k-means clustering and silhouette-based cluster validation technique, was proposed to adapt to the lung shape change so that the lung shape variation among people can be overwhelmed. The experiments indicated that the segmentation performance of the adaptive ASM is superior to the traditional ASM approaches.
本文提出了一种自动肺分割方法。我们设计了一种基于ROI的方法,通过肺ROI的平移和缩放参数来估计ASM变形的初始肺边界。采用k-means聚类和基于轮廓的聚类验证技术,提出了一种适应肺形状变化的自适应ASM,以克服人们之间肺形状的变化。实验表明,自适应ASM的分割性能优于传统的ASM方法。
{"title":"Lung Segmentation for Chest Radiograph by Using Adaptive Active Shape Models","authors":"Jiann-Shu Lee, Hsing-Hsien Wu, Ming-Zheng Yuan","doi":"10.1109/IAS.2009.353","DOIUrl":"https://doi.org/10.1109/IAS.2009.353","url":null,"abstract":"In this paper, we proposed an automatic lung segmentation method. We designed a ROI based method to estimate a proper initial lung boundary for ASM deformation by deriving the translation and the scaling parameters from the lung ROI. An adaptive ASM, using k-means clustering and silhouette-based cluster validation technique, was proposed to adapt to the lung shape change so that the lung shape variation among people can be overwhelmed. The experiments indicated that the segmentation performance of the adaptive ASM is superior to the traditional ASM approaches.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"111 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116377282","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 12
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1