首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
Parallel 3-Pixel Labeling Method and its Hardware Architecture Design 并行三像素标注方法及其硬件架构设计
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.74
Shyue-Wen Yang, M. Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsuing Chen, S. Tseng
In this paper, we present a parallel connected component labeling method and its VLSI architecture design. The proposed method can assign labels to three pixels simultaneously for the raster scan input and then generate three label equivalences rapidly. We also present 3 arrays to process all label mergence. Based on the proposed method, we develop the hardware design for real-time application. The parallel architecture efficiently reduces total execution cycle significantly. From the experimental results, our 3-pixel labeling design can save 66% and 33% of the execution cycle comparing with the designs by 1-pixel labeling and 2-pixel labeling approaches, respectively.
本文提出了一种并联元件标注方法及其VLSI架构设计。该方法可以同时为栅格扫描输入的三个像素分配标签,然后快速生成三个标签等价。我们还提供了3个数组来处理所有的标签合并。在此基础上,进行了实时应用的硬件设计。并行架构有效地缩短了总执行周期。从实验结果来看,我们的3像素标注设计比1像素标注和2像素标注设计分别节省66%和33%的执行周期。
{"title":"Parallel 3-Pixel Labeling Method and its Hardware Architecture Design","authors":"Shyue-Wen Yang, M. Sheu, Jun-Jie Lin, Chuang-Chun Hu, Tzu-Hsuing Chen, S. Tseng","doi":"10.1109/IAS.2009.74","DOIUrl":"https://doi.org/10.1109/IAS.2009.74","url":null,"abstract":"In this paper, we present a parallel connected component labeling method and its VLSI architecture design. The proposed method can assign labels to three pixels simultaneously for the raster scan input and then generate three label equivalences rapidly. We also present 3 arrays to process all label mergence. Based on the proposed method, we develop the hardware design for real-time application. The parallel architecture efficiently reduces total execution cycle significantly. From the experimental results, our 3-pixel labeling design can save 66% and 33% of the execution cycle comparing with the designs by 1-pixel labeling and 2-pixel labeling approaches, respectively.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128964102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity 基于大变化灵敏度的接地网腐蚀诊断
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.241
Liqiang Liu, Xianjue Luo, Tao Niu, Kai Wang
The method of corrosion diagnosis for substation grounding grids based on large change sensitivity is proposed. By analyzing the node voltages, the large change sensitivity of the port voltages in response to the branch resistances is given and the nonlinear optimal model of corrosion diagnosis is established. The diagnosis equations based on the differential sensitivity were set up in traditional methods. Contrasting with them, the equations established in the paper is more appropriate for the real corrosion case. To insure the independency of diagnosis equations, the optimal selection method of test ports is put up. The effectiveness of algorithm is validated by the simulation of substation grounding grids.
提出了基于大变化敏感性的变电站接地网腐蚀诊断方法。通过对节点电压的分析,给出了端口电压对支路电阻的大变化敏感性,建立了腐蚀诊断的非线性最优模型。在传统的诊断方法中,建立了基于差分灵敏度的诊断方程。与之相比,本文所建立的方程更符合实际腐蚀情况。为了保证诊断方程的独立性,提出了测试端口的优选方法。通过变电站接地网的仿真验证了算法的有效性。
{"title":"Grounding Grid Corrosion Diagnosis Based on Large Change Sensitivity","authors":"Liqiang Liu, Xianjue Luo, Tao Niu, Kai Wang","doi":"10.1109/IAS.2009.241","DOIUrl":"https://doi.org/10.1109/IAS.2009.241","url":null,"abstract":"The method of corrosion diagnosis for substation grounding grids based on large change sensitivity is proposed. By analyzing the node voltages, the large change sensitivity of the port voltages in response to the branch resistances is given and the nonlinear optimal model of corrosion diagnosis is established. The diagnosis equations based on the differential sensitivity were set up in traditional methods. Contrasting with them, the equations established in the paper is more appropriate for the real corrosion case. To insure the independency of diagnosis equations, the optimal selection method of test ports is put up. The effectiveness of algorithm is validated by the simulation of substation grounding grids.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129048333","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Improved Weighted-Feature Clustering Algorithm for K-anonymity 一种改进的k -匿名加权特征聚类算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.311
Lijian Lu, Xiaojun Ye
Chiu proposed a clustering algorithm adjusting the numeric feature weights automatically for k-anonymity implementation and this approach gave a better clustering quality over the traditional generalization and suppression methods. In this paper, we propose an improved weighted-feature clustering algorithm which takes the weight of categorical attributes and the thesis of optimal k-partition into consideration. To show the effectiveness of our method, we do some information loss experiments to compare it with greedy k-member clustering algorithm.
Chiu提出了一种自动调整数字特征权重的k-匿名聚类算法,该算法比传统的泛化和抑制方法具有更好的聚类质量。在本文中,我们提出了一种改进的加权特征聚类算法,该算法考虑了分类属性的权重和最优k划分的命题。为了证明该方法的有效性,我们做了一些信息丢失实验,将其与贪婪k成员聚类算法进行了比较。
{"title":"An Improved Weighted-Feature Clustering Algorithm for K-anonymity","authors":"Lijian Lu, Xiaojun Ye","doi":"10.1109/IAS.2009.311","DOIUrl":"https://doi.org/10.1109/IAS.2009.311","url":null,"abstract":"Chiu proposed a clustering algorithm adjusting the numeric feature weights automatically for k-anonymity implementation and this approach gave a better clustering quality over the traditional generalization and suppression methods. In this paper, we propose an improved weighted-feature clustering algorithm which takes the weight of categorical attributes and the thesis of optimal k-partition into consideration. To show the effectiveness of our method, we do some information loss experiments to compare it with greedy k-member clustering algorithm.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129110202","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Distributed Video Coding Based on Multiple Description 基于多描述的分布式视频编码
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.196
Hon-Shing Ma, Yao Zhao, Chunyu Lin, Anhong Wang
In our paper, we propose a novel distributed video coding (DVC) scheme using the theory of multiple description (MD), in which key frame is encoded by MD codec and transmitted over the corresponding channel. This scheme combines the advantage of DVC as well as robustness of MD, and exploits three different methods to generate multiple descriptions for the key frames that are essential to side information. Experiments demonstrate that it can get better performance than some general DVC methods. Besides, it demonstrates higher robustness in packet-loss channel than general DVC due to the MD algorithm.
本文利用多重描述(MD)理论提出了一种新的分布式视频编码(DVC)方案,其中关键帧由多重描述编解码器编码并在相应的信道上传输。该方案结合了DVC的优点和MD的鲁棒性,利用三种不同的方法对边线信息所必需的关键帧生成多个描述。实验表明,该方法比一般的DVC方法具有更好的性能。此外,由于采用了MD算法,该算法在丢包信道中比一般DVC具有更高的鲁棒性。
{"title":"Distributed Video Coding Based on Multiple Description","authors":"Hon-Shing Ma, Yao Zhao, Chunyu Lin, Anhong Wang","doi":"10.1109/IAS.2009.196","DOIUrl":"https://doi.org/10.1109/IAS.2009.196","url":null,"abstract":"In our paper, we propose a novel distributed video coding (DVC) scheme using the theory of multiple description (MD), in which key frame is encoded by MD codec and transmitted over the corresponding channel. This scheme combines the advantage of DVC as well as robustness of MD, and exploits three different methods to generate multiple descriptions for the key frames that are essential to side information. Experiments demonstrate that it can get better performance than some general DVC methods. Besides, it demonstrates higher robustness in packet-loss channel than general DVC due to the MD algorithm.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"02 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129136698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Intra-mode Dependent Coding Method for Image Compression 图像压缩的模内相关编码方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.346
Yung-Chiang Wei, Jui-Che Teng, Chien-Wen Chung
H.264/AVC based lossless image compression is a latest and extent technique for data compression. Block based intra-prediction is originally exploited in this extension. DPCM based intra-prediction is an outstanding technique to improve the compression ratio for this research area. In this paper, we propose an intra-mode dependent coding scheme to further improve the performance of DPCM-based compression technique. Different scan orders prior to entropy coding is considered to fit the various data attributes after predictions for different intra-modes.
基于H.264/AVC的无损图像压缩是一种最新、最广泛的数据压缩技术。基于块的内部预测最初在这个扩展中被利用。基于DPCM的内预测是该研究领域提高压缩比的一种优秀技术。为了进一步提高基于dpcm的压缩技术的性能,本文提出了一种模式内相关的编码方案。在对不同的内模进行预测后,在熵编码之前考虑不同的扫描顺序来拟合不同的数据属性。
{"title":"Intra-mode Dependent Coding Method for Image Compression","authors":"Yung-Chiang Wei, Jui-Che Teng, Chien-Wen Chung","doi":"10.1109/IAS.2009.346","DOIUrl":"https://doi.org/10.1109/IAS.2009.346","url":null,"abstract":"H.264/AVC based lossless image compression is a latest and extent technique for data compression. Block based intra-prediction is originally exploited in this extension. DPCM based intra-prediction is an outstanding technique to improve the compression ratio for this research area. In this paper, we propose an intra-mode dependent coding scheme to further improve the performance of DPCM-based compression technique. Different scan orders prior to entropy coding is considered to fit the various data attributes after predictions for different intra-modes.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130256309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform 基于HHT和小波变换的自相似网络流量异常检测
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.219
Xiaorong Cheng, Kun Xie, Dong Wang
Network traffic anomaly detection can be done through the self-similar analysis of network traffic. In this case, the abnormal condition of network can be indicated by investigating if the performance parameters of real time data locate at the acceptable ranges. A common method of estimating self-similar parameter is the Wavelet transform. However, the Wavelet transform fails to exclude the influence of non-stationary signal’s periodicity and trend term. In view of the fact that Hilbert-Huang Transform (HHT) has unique advantage on non-stationary signal treatment, in this paper, a refined self-similar parameter estimation algorithm is designed through the combination of wavelet analysis and Hilbert-Huang Transform and a set of experiments are run to verify the improvement in the accuracy of parameter estimation and network traffic anomaly detection.
网络流量异常检测可以通过对网络流量的自相似分析来实现。在这种情况下,可以通过考察实时数据的性能参数是否处于可接受的范围来判断网络的异常情况。一种常用的自相似参数估计方法是小波变换。然而,小波变换不能排除非平稳信号的周期性和趋势项的影响。鉴于Hilbert-Huang变换(Hilbert-Huang Transform, HHT)在非平稳信号处理上具有独特的优势,本文将小波分析与Hilbert-Huang变换相结合,设计了一种改进的自相似参数估计算法,并进行了一组实验,验证了参数估计精度和网络流量异常检测精度的提高。
{"title":"Network Traffic Anomaly Detection Based on Self-Similarity Using HHT and Wavelet Transform","authors":"Xiaorong Cheng, Kun Xie, Dong Wang","doi":"10.1109/IAS.2009.219","DOIUrl":"https://doi.org/10.1109/IAS.2009.219","url":null,"abstract":"Network traffic anomaly detection can be done through the self-similar analysis of network traffic. In this case, the abnormal condition of network can be indicated by investigating if the performance parameters of real time data locate at the acceptable ranges. A common method of estimating self-similar parameter is the Wavelet transform. However, the Wavelet transform fails to exclude the influence of non-stationary signal’s periodicity and trend term. In view of the fact that Hilbert-Huang Transform (HHT) has unique advantage on non-stationary signal treatment, in this paper, a refined self-similar parameter estimation algorithm is designed through the combination of wavelet analysis and Hilbert-Huang Transform and a set of experiments are run to verify the improvement in the accuracy of parameter estimation and network traffic anomaly detection.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130279549","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks 基于sip的无线网络零丢包切换机制
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.323
Ching-Lung Chang, Jia-Yi Syu, Y. Chu
As mobile wireless networks increase in popularity and pervasiveness, seamless mobility is an important issue for uninterrupted services in ubiquitous network environments. In this paper, we propose a zero packet loss handoff mechanism for real-time streaming services, which is based on the SIP protocol cooperated with mobile agent, multicast, and buffering technique to overcome the impact of handoff delay in SIP-based wireless networks. The simulation results reveal that the proposed scheme has a great performance in packet loss and higher QoS during handoff. Furthermore, we realize and evaluate the proposed scheme by applying MP3-music streaming on the system.
随着移动无线网络的普及和普及,无缝移动性是在无处不在的网络环境中实现不间断服务的一个重要问题。本文提出了一种基于SIP协议的实时流业务零丢包切换机制,该机制与移动代理、组播和缓冲技术相结合,克服了基于SIP的无线网络中切换延迟的影响。仿真结果表明,该方案在切换过程中具有较好的丢包性能和较高的QoS。在此基础上,通过对mp3音乐流媒体的应用,对所提出的方案进行了实现和评价。
{"title":"Zero Packet Loss Hand-off Mechanism in SIP-Based Wireless Networks","authors":"Ching-Lung Chang, Jia-Yi Syu, Y. Chu","doi":"10.1109/IAS.2009.323","DOIUrl":"https://doi.org/10.1109/IAS.2009.323","url":null,"abstract":"As mobile wireless networks increase in popularity and pervasiveness, seamless mobility is an important issue for uninterrupted services in ubiquitous network environments. In this paper, we propose a zero packet loss handoff mechanism for real-time streaming services, which is based on the SIP protocol cooperated with mobile agent, multicast, and buffering technique to overcome the impact of handoff delay in SIP-based wireless networks. The simulation results reveal that the proposed scheme has a great performance in packet loss and higher QoS during handoff. Furthermore, we realize and evaluate the proposed scheme by applying MP3-music streaming on the system.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130291886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design of DBA Algorithm in EPON Uplike EPON Uplike中DBA算法的设计
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.272
Ya-min Wang, Yan Liu
Ethernet Passive Optical Network (EPON) has combined the advantages of Ethernet and Passive Optical Network (PON). High speed accessing at lower price has been realized in this way. In this paper, based on CBR (Constant Bit Rate), design issues of Dynamic Bandwidth Allocation (DBA) are studied and the improved DBA algorithm is proposed. Ensure effectively Quality of Service (QoS) of the entire EPON and fairness of bandwidth allocation, and meet the request of the current network with multi-service, multi-level priorities. Provide reference for the standard of multi-service QoS in EPON uplink bandwidth allocation.
以太网无源光网络(EPON)结合了以太网和无源光网络(PON)的优点。通过这种方式实现了低价格的高速接入。本文在恒定比特率(CBR)的基础上,研究了动态带宽分配(DBA)的设计问题,提出了改进的DBA算法。有效保证整个EPON的QoS (Quality of Service)和带宽分配的公平性,满足当前网络多业务、多层次优先级的需求。为EPON上行带宽分配中的多业务QoS标准提供参考。
{"title":"Design of DBA Algorithm in EPON Uplike","authors":"Ya-min Wang, Yan Liu","doi":"10.1109/IAS.2009.272","DOIUrl":"https://doi.org/10.1109/IAS.2009.272","url":null,"abstract":"Ethernet Passive Optical Network (EPON) has combined the advantages of Ethernet and Passive Optical Network (PON). High speed accessing at lower price has been realized in this way. In this paper, based on CBR (Constant Bit Rate), design issues of Dynamic Bandwidth Allocation (DBA) are studied and the improved DBA algorithm is proposed. Ensure effectively Quality of Service (QoS) of the entire EPON and fairness of bandwidth allocation, and meet the request of the current network with multi-service, multi-level priorities. Provide reference for the standard of multi-service QoS in EPON uplink bandwidth allocation.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127898293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme 吕武多代理多重签名方案的数论攻击
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.130
Fanyu Kong, Jia Yu
Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter $N$ and $Q$ by using efficient number-theoretic algorithms when $Q$ is roughly larger than the square root of $N$. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case.
Y. D. Lyuu和M. L. Wu提出了一种改进的多代理多重签名方案,并声称该方案可以抵抗伪造攻击。后来,郭立国和王立国发现了对吕武计划的内部攻击。本文提出了一种新的对Lyuu-Wu方案的攻击,当Q$大致大于N$的平方根时,利用有效的数论算法将参数$N$和$Q$分解。由此可见,在这种情况下,Lyuu-Wu的方案遭受了代理签名者的伪造攻击。
{"title":"Number-Theoretic Attack on Lyuu-Wu's Multi-proxy Multi-signature Scheme","authors":"Fanyu Kong, Jia Yu","doi":"10.1109/IAS.2009.130","DOIUrl":"https://doi.org/10.1109/IAS.2009.130","url":null,"abstract":"Y. D. Lyuu and M. L. Wu had proposed an improved multi-proxy multi-signature scheme, which was claimed to resist the forge attack. Lately, L. Guo and G. Wang found an inside attack on the Lyuu-Wu's scheme. In this paper, we propose a new attack on Lyuu-Wu's scheme, which can factor the parameter $N$ and $Q$ by using efficient number-theoretic algorithms when $Q$ is roughly larger than the square root of $N$. It follows that Lyuu-Wu's scheme suffers from the forge attack from the proxy signers in that case.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128863787","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection 基于内容复制检测的指纹序列匹配新算法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.284
Rongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang
Content-based copy detection (CBCD) is more and more important in the field of information security, assurance, copyright protection etc. The sequences matching, one of the key technologies in CBCD, is very critical for querying quickly and accurately. In this paper, we propose a novel fingerprint sequences matching algorithm based on the dynamic programming. This method is universal to all kinds of fingerprint sequences matching. We examined this method with experiments at last in this paper. The experimental results demonstrate it’s effective in sequences matching.
基于内容的复制检测(CBCD)在信息安全、保障、版权保护等领域发挥着越来越重要的作用。序列匹配是实现快速、准确查询的关键技术之一。本文提出了一种基于动态规划的指纹序列匹配算法。该方法适用于各种类型的指纹序列匹配。本文最后用实验对该方法进行了验证。实验结果表明,该方法在序列匹配中是有效的。
{"title":"A New Fingerprint Sequences Matching Algorithm for Content-Based Copy Detection","authors":"Rongxian Nie, Guiguang Ding, Jianmin Wang, Li Zhang","doi":"10.1109/IAS.2009.284","DOIUrl":"https://doi.org/10.1109/IAS.2009.284","url":null,"abstract":"Content-based copy detection (CBCD) is more and more important in the field of information security, assurance, copyright protection etc. The sequences matching, one of the key technologies in CBCD, is very critical for querying quickly and accurately. In this paper, we propose a novel fingerprint sequences matching algorithm based on the dynamic programming. This method is universal to all kinds of fingerprint sequences matching. We examined this method with experiments at last in this paper. The experimental results demonstrate it’s effective in sequences matching.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125362600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1