首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
Whole Frame Loss Recovery Algorithm for H.264 Decoders H.264解码器的全帧丢失恢复算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.170
Min Li, Bo Wang
In this paper, we develop a whole frame loss recovery method for H.264 by using block-based motion vector extrapolation in the decoder. Firstly,we propose a variable-size block motion vetor extrapolation algorithm to construct the motion vectors for the lost frame from available neighboring frame. Then, a more complete motion vector field is obtained by performing median filtering. At last, the blocks without motion vectors are concealed by using linear interpolation algorithm. Experimental results show that this method can alleviate the shortcomings of the fixed-size method effectively and provide better performance than other concealment methods.
本文在解码器中采用基于块的运动矢量外推,开发了一种H.264的全帧丢失恢复方法。首先,我们提出了一种可变大小的块运动矢量外推算法,从可用的相邻帧中构造丢失帧的运动矢量。然后,通过中值滤波得到更完整的运动向量场。最后,利用线性插值算法对没有运动矢量的块进行隐藏。实验结果表明,该方法有效地缓解了固定大小隐藏方法的不足,具有比其他隐藏方法更好的性能。
{"title":"Whole Frame Loss Recovery Algorithm for H.264 Decoders","authors":"Min Li, Bo Wang","doi":"10.1109/IAS.2009.170","DOIUrl":"https://doi.org/10.1109/IAS.2009.170","url":null,"abstract":"In this paper, we develop a whole frame loss recovery method for H.264 by using block-based motion vector extrapolation in the decoder. Firstly,we propose a variable-size block motion vetor extrapolation algorithm to construct the motion vectors for the lost frame from available neighboring frame. Then, a more complete motion vector field is obtained by performing median filtering. At last, the blocks without motion vectors are concealed by using linear interpolation algorithm. Experimental results show that this method can alleviate the shortcomings of the fixed-size method effectively and provide better performance than other concealment methods.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Iris Recognition Method Based on Gray Surface Matching 一种改进的基于灰度匹配的虹膜识别方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.57
Dong-Mei Wu, Jiang-Nan Wang
A new method is proposed to overcome illumination intensity difference influences the recognition result which occurs during collecting session in this paper. The problem is not effective solved in original algorithm. This algorithm proposes to match after moving two matching feature surfaces to one equivalence gray plane. It also uses the theory of gray surface matching based on feature analysis but another distance is considered for reducing calculation quantity. Firstly, it calculates the gray difference of two pixels which comes from doing subtraction between two different surfaces and gets the gray difference surface. Secondly, it computes the square of the gray difference surface and considers this square as the distance between the two surfaces. At last, it compares the result with a given threshold to implement iris recognition. Simulation and experimental results are shown to illustrate this method performance for both correct recognition rate and the whole recognition time.
提出了一种克服采集过程中光照强度差异对识别结果影响的新方法。原来的算法不能有效地解决这一问题。该算法提出将两个匹配的特征面移动到一个等价的灰平面上进行匹配。该方法也采用了基于特征分析的灰度表面匹配理论,但为了减少计算量,考虑了另一种距离。首先,计算两个像素点的灰度差值,得到两个不同表面的灰度差值;其次,计算灰度差曲面的平方,并将该平方作为两个曲面之间的距离;最后,将结果与给定阈值进行比较,实现虹膜识别。仿真和实验结果表明,该方法在正确识别率和整体识别时间上都取得了良好的效果。
{"title":"An Improved Iris Recognition Method Based on Gray Surface Matching","authors":"Dong-Mei Wu, Jiang-Nan Wang","doi":"10.1109/IAS.2009.57","DOIUrl":"https://doi.org/10.1109/IAS.2009.57","url":null,"abstract":"A new method is proposed to overcome illumination intensity difference influences the recognition result which occurs during collecting session in this paper. The problem is not effective solved in original algorithm. This algorithm proposes to match after moving two matching feature surfaces to one equivalence gray plane. It also uses the theory of gray surface matching based on feature analysis but another distance is considered for reducing calculation quantity. Firstly, it calculates the gray difference of two pixels which comes from doing subtraction between two different surfaces and gets the gray difference surface. Secondly, it computes the square of the gray difference surface and considers this square as the distance between the two surfaces. At last, it compares the result with a given threshold to implement iris recognition. Simulation and experimental results are shown to illustrate this method performance for both correct recognition rate and the whole recognition time.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128846782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval 改进的加权特征融合算法及其在图像检索中的应用
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.95
Mei Wang, Li Wang
In order to improve the average recall rate and the average precision rate of image retrieval, an improved fusion algorithm of the weighted features is presented. Firstly,the shape features of images are extracted by using the moment invariant method based on 7 central moments. Meanwhile,the texture features of images are calculated by using the Gray-level Co-occurrence matrix. Then the elements of the vectors are normalized respectively. In the next step, the Euclidian distance,the squared Euclidian distance and the City-Block distance are calculated. The Mean values of the 3 kinds of distances are obtained and used as the shape distance and the texture distance. Finally,the weighted feature vectors are fused and the similarities between images are obtained and used as the measure bases to implement the image retrieval. The experiments show that the tangible results of image retrieval are realized and the average recall rate and the average precision rate are improved.
为了提高图像检索的平均查全率和平均查准率,提出了一种改进的加权特征融合算法。首先,采用基于7个中心矩的矩不变方法提取图像的形状特征;同时,利用灰度共生矩阵计算图像的纹理特征。然后分别对向量的元素进行归一化处理。下一步,计算欧几里得距离、欧几里得距离的平方和城市街区距离。得到这三种距离的均值,分别作为形状距离和纹理距离。最后,对加权特征向量进行融合,得到图像之间的相似度,并以此为度量基础实现图像检索。实验表明,该方法实现了图像检索的实际效果,提高了平均查全率和平均查准率。
{"title":"An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval","authors":"Mei Wang, Li Wang","doi":"10.1109/IAS.2009.95","DOIUrl":"https://doi.org/10.1109/IAS.2009.95","url":null,"abstract":"In order to improve the average recall rate and the average precision rate of image retrieval, an improved fusion algorithm of the weighted features is presented. Firstly,the shape features of images are extracted by using the moment invariant method based on 7 central moments. Meanwhile,the texture features of images are calculated by using the Gray-level Co-occurrence matrix. Then the elements of the vectors are normalized respectively. In the next step, the Euclidian distance,the squared Euclidian distance and the City-Block distance are calculated. The Mean values of the 3 kinds of distances are obtained and used as the shape distance and the texture distance. Finally,the weighted feature vectors are fused and the similarities between images are obtained and used as the measure bases to implement the image retrieval. The experiments show that the tangible results of image retrieval are realized and the average recall rate and the average precision rate are improved.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method for Accessing Trusted Services Based on Service-Oriented Architecture 基于面向服务体系结构的可信服务访问方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.173
Xin Yu, Yu Bai
Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in web services. On the basis of studying service-oriented architecture and web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.
面向服务的体系结构为系统开发和集成提供了灵活的方法。它在web服务中被广泛采用。在研究面向服务体系结构和web服务安全标准的基础上,提出了一种基于面向服务体系结构的可信服务访问方法,并给出了系统实现模型。
{"title":"A Method for Accessing Trusted Services Based on Service-Oriented Architecture","authors":"Xin Yu, Yu Bai","doi":"10.1109/IAS.2009.173","DOIUrl":"https://doi.org/10.1109/IAS.2009.173","url":null,"abstract":"Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in web services. On the basis of studying service-oriented architecture and web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application and Research of Mobile E-commerce Security Based on WPKI 基于WPKI的移动电子商务安全应用与研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.243
Feng Tian, Xiao-bing Han, Ying Wei
In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce Security Model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method is applied, and simulation results is carried out in the system based on OPNET and C++. The system adds the WIM smart card in the mobile terminal, and uses elliptic curve cryptography (ECC) encryption arithmetic, it complete the data encryption integrity authentication personal identification fast. By analysis of the procedure of the system and simulation results, the system has the advantage of fast operation, high security and high channel availability, which can satisfies the basic needs of mobile e-commerce.
为了解决移动电子商务的数据完整性、不可否认性、保密性和运营效率低下等问题,本文建立了移动电子商务安全模型。本设计基于移动电子商务架构,分析了系统中的数字签名认证过程和数据安全传输过程。采用分层模块化软件设计方法,并在基于OPNET和c++的系统中进行了仿真实验。系统在移动终端中加入WIM智能卡,并采用椭圆曲线加密(ECC)加密算法,快速完成数据加密完整性认证和个人身份识别。通过对系统流程和仿真结果的分析,该系统具有运行速度快、安全性高、通道可用性高等优点,能够满足移动电子商务的基本需求。
{"title":"Application and Research of Mobile E-commerce Security Based on WPKI","authors":"Feng Tian, Xiao-bing Han, Ying Wei","doi":"10.1109/IAS.2009.243","DOIUrl":"https://doi.org/10.1109/IAS.2009.243","url":null,"abstract":"In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce Security Model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method is applied, and simulation results is carried out in the system based on OPNET and C++. The system adds the WIM smart card in the mobile terminal, and uses elliptic curve cryptography (ECC) encryption arithmetic, it complete the data encryption integrity authentication personal identification fast. By analysis of the procedure of the system and simulation results, the system has the advantage of fast operation, high security and high channel availability, which can satisfies the basic needs of mobile e-commerce.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115565855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Modified Feature Based Image Watermarking Scheme in NSCT Domain 一种改进的基于NSCT域特征的图像水印方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.339
Liu Yang, B. Guo, Jianmin Lv
In this article, we present a modified robust image watermarking scheme based on the scale-invariant feature transform (SIFT). The watermark is embedded into some local regions extracted from the original image. During embedding, the initial region is divided into some cirque sub-regions with the same area, and each watermark bit is embedded into one sub-region. Besides, it is embedded in the Non-subsampled Contourlet Transform (NSCT) domain to enhance watermark robustness. Experimental results have demonstrated the efficiency of the proposed scheme.
本文提出了一种基于尺度不变特征变换(SIFT)的改进鲁棒图像水印方案。水印嵌入到从原始图像中提取的局部区域中。在嵌入过程中,初始区域被分割成若干个面积相同的圆形子区域,每个水印位被嵌入到一个子区域中。此外,该算法被嵌入到非下采样Contourlet变换(NSCT)域中,增强了水印的鲁棒性。实验结果证明了该方案的有效性。
{"title":"A Modified Feature Based Image Watermarking Scheme in NSCT Domain","authors":"Liu Yang, B. Guo, Jianmin Lv","doi":"10.1109/IAS.2009.339","DOIUrl":"https://doi.org/10.1109/IAS.2009.339","url":null,"abstract":"In this article, we present a modified robust image watermarking scheme based on the scale-invariant feature transform (SIFT). The watermark is embedded into some local regions extracted from the original image. During embedding, the initial region is divided into some cirque sub-regions with the same area, and each watermark bit is embedded into one sub-region. Besides, it is embedded in the Non-subsampled Contourlet Transform (NSCT) domain to enhance watermark robustness. Experimental results have demonstrated the efficiency of the proposed scheme.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on System of Chinese Document Copy Detection 中文文档副本检测系统的研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.210
Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, W. Deng
Text copying is easy to do but not easy to be detected. Copy detection is a delicate ground. It determines whether a document is copied from others or not. It helps to verify and to detect paper redistribution, thesis plagiarism or copyright violation. A novel method of Chinese text copy detection design and implementation is discussed in this paper, based on theory of Mathematical Expression of Chinese Characters. It can implement the functions include Characteristic reconstruction, registration and detection. Experimental results show that the system has the advantages on detecting accuracy and high speed.
文本复制很容易做到,但不容易被发现。复制检测是一个微妙的领域。它确定文档是否从其他文档复制过来。它有助于验证和检测论文再分发,论文剽窃或侵犯版权。本文以汉字数学表达理论为基础,讨论了一种新的中文文本副本检测方法的设计与实现。它可以实现特征重构、配准和检测等功能。实验结果表明,该系统具有检测精度高、速度快等优点。
{"title":"Research on System of Chinese Document Copy Detection","authors":"Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, W. Deng","doi":"10.1109/IAS.2009.210","DOIUrl":"https://doi.org/10.1109/IAS.2009.210","url":null,"abstract":"Text copying is easy to do but not easy to be detected. Copy detection is a delicate ground. It determines whether a document is copied from others or not. It helps to verify and to detect paper redistribution, thesis plagiarism or copyright violation. A novel method of Chinese text copy detection design and implementation is discussed in this paper, based on theory of Mathematical Expression of Chinese Characters. It can implement the functions include Characteristic reconstruction, registration and detection. Experimental results show that the system has the advantages on detecting accuracy and high speed.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation 结合非子采样轮廓变换和总变异的新型自适应图像去噪方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.18
Xiaoyue Wu, B. Guo, Shengli Qu, Zhuo Wang
This paper presents a new adaptive image denoising scheme by combining the nonsubsampled Contourlet transform (NSCT) and total variation model. The original image is first decomposed using NSCT .Then the mean squared error (MSE) is estimated based on Stein’s unbiased risk estimation(SURE). The noise of each decomposed subband is reduced using the linear adaptive threshold function, which can be constructed based on the MSE, producing the preliminary primary denoised image after reconstruction. Then the preliminary primary denoised image is further filtered using the total variation model, producing the final denoised image. Experiments show that the proposed scheme can remove the pseudo-Gibbs artifacts and image noise effectively. Besides, it outperforms the existing schemes in regard of both the peak-signal-to-noise-ratio (PSNR) and the edge preservation ability.
提出了一种将非下采样Contourlet变换(NSCT)与全变分模型相结合的自适应图像去噪方法。首先使用NSCT对原始图像进行分解,然后基于Stein 's无偏风险估计(SURE)估计均方误差(MSE)。利用线性自适应阈值函数对分解后各子带的噪声进行降噪,并基于MSE构造该阈值函数,得到重构后的初步初级去噪图像。然后利用总变分模型对初步初级去噪图像进行进一步滤波,得到最终去噪图像。实验表明,该方法能有效去除伪吉布斯伪影和图像噪声。此外,在峰值信噪比(PSNR)和边缘保持能力方面都优于现有方案。
{"title":"A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation","authors":"Xiaoyue Wu, B. Guo, Shengli Qu, Zhuo Wang","doi":"10.1109/IAS.2009.18","DOIUrl":"https://doi.org/10.1109/IAS.2009.18","url":null,"abstract":"This paper presents a new adaptive image denoising scheme by combining the nonsubsampled Contourlet transform (NSCT) and total variation model. The original image is first decomposed using NSCT .Then the mean squared error (MSE) is estimated based on Stein’s unbiased risk estimation(SURE). The noise of each decomposed subband is reduced using the linear adaptive threshold function, which can be constructed based on the MSE, producing the preliminary primary denoised image after reconstruction. Then the preliminary primary denoised image is further filtered using the total variation model, producing the final denoised image. Experiments show that the proposed scheme can remove the pseudo-Gibbs artifacts and image noise effectively. Besides, it outperforms the existing schemes in regard of both the peak-signal-to-noise-ratio (PSNR) and the edge preservation ability.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125980427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation 基于线性方程的块特征相关图像水印篡改检测
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.147
Chin-Feng Lee, Kuo-Nan Chen, Chinchen Chang, Meng-Cheng Tsai
A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.
提出了一种新的检测图像篡改的水印方法。首先,使用一对水印像素作为线性函数的系数来创建认证号。主机块的中心像素,作为线性函数的输入数据。然后使用重新访问的LSB匹配嵌入过程将该块的身份验证信息嵌入到主机映像中。在检测阶段,通过重新访问ISB匹配提取认证信息,验证图像块是否被篡改。认证信息建立块特征的相关性。这种相关性有助于抵御VQ攻击。
{"title":"A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation","authors":"Chin-Feng Lee, Kuo-Nan Chen, Chinchen Chang, Meng-Cheng Tsai","doi":"10.1109/IAS.2009.147","DOIUrl":"https://doi.org/10.1109/IAS.2009.147","url":null,"abstract":"A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on Ultrasonic Ranging System Design 超声波测距系统设计研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.352
Lihua Deng
Ultrasonic Ranging System is different precision when it has been used in an occasion. Generally its errors are larger and often can not meet the application requirements. In this paper, new ultrasonic ranging system which can be used to non-contact measure distance in special occasion was designed by single-chip, ultrasonic ranging technology and sensor technology. Distance measurement data and temperature were displayed through LCD screen and the transmitting and receiving of ultrasonic were controlled by single-chip microcomputer according to the time difference location method to measure the distance. in order to improve measurement accuracy, temperature sensor has used to measure temperature and compensate temperature, the system also uses a voice broadcast system, which makes it higher accuracy, more convenient and extensive applications.
超声波测距系统在不同场合的使用精度不同。一般其误差较大,往往不能满足应用要求。本文采用单片机、超声波测距技术和传感器技术,设计了一种新型的可用于特殊场合非接触式距离测量的超声波测距系统。通过液晶屏显示距离测量数据和温度,单片机控制超声波的发射和接收,根据时差定位法测量距离。为了提高测量精度,采用了温度传感器来测量温度和补偿温度,系统还采用了语音广播系统,使其精度更高,更方便,应用更广泛。
{"title":"Study on Ultrasonic Ranging System Design","authors":"Lihua Deng","doi":"10.1109/IAS.2009.352","DOIUrl":"https://doi.org/10.1109/IAS.2009.352","url":null,"abstract":"Ultrasonic Ranging System is different precision when it has been used in an occasion. Generally its errors are larger and often can not meet the application requirements. In this paper, new ultrasonic ranging system which can be used to non-contact measure distance in special occasion was designed by single-chip, ultrasonic ranging technology and sensor technology. Distance measurement data and temperature were displayed through LCD screen and the transmitting and receiving of ultrasonic were controlled by single-chip microcomputer according to the time difference location method to measure the distance. in order to improve measurement accuracy, temperature sensor has used to measure temperature and compensate temperature, the system also uses a voice broadcast system, which makes it higher accuracy, more convenient and extensive applications.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127399266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1