首页 > 最新文献

2014 10th International Conference on Communications (COMM)最新文献

英文 中文
An image encryption algorithm with a chaotic dynamical system based Sudoku Grid 一种基于数独网格的混沌动态系统图像加密算法
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866666
A. Diaconu
Nowadays, increasingly more, it seems that using the most popular games' sets of rules, particularly on new images' encryption algorithms designing branch, leads to crystallization of a new paradigm in the field of cryptography. Motivated by this, present paper aims to assess performances of a digital images' encryption scheme that uses chaos-based Sudoku Grids.
如今,似乎越来越多地使用最流行的游戏规则集,特别是在新图像的加密算法设计分支上,导致了密码学领域新范式的结晶。基于此,本文旨在评估使用基于混沌的数独网格的数字图像加密方案的性能。
{"title":"An image encryption algorithm with a chaotic dynamical system based Sudoku Grid","authors":"A. Diaconu","doi":"10.1109/ICCOMM.2014.6866666","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866666","url":null,"abstract":"Nowadays, increasingly more, it seems that using the most popular games' sets of rules, particularly on new images' encryption algorithms designing branch, leads to crystallization of a new paradigm in the field of cryptography. Motivated by this, present paper aims to assess performances of a digital images' encryption scheme that uses chaos-based Sudoku Grids.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131689630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Knowledge Management System for military universities cooperation 军事院校合作知识管理系统
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866667
Ladislav Burita
The paper describes the Knowledge Management System (KMS) about military universities (MilUNI), mostly in the NATO environment, but it also includes all European countries. The goal of the MilUNI is to support the cooperation among universities in education, research, and the staff and students exchange. The KMS is based on the Topic Maps theory using the AToM (Aion Topic Maps engine) software. Special attention is paid to the ontology design, Knowledge Base (KB) development, and application processing when using the KMS. The KMS includes the KB with interface for administrator, architect, and editor and the Knowledge Portal for user access. The search procedures in the KMS are mentioned. The paper concludes with suggestions for the further development of the system.
本文介绍了军事大学知识管理系统(MilUNI),主要是在北约环境下,但也包括所有欧洲国家。MilUNI的目标是支持大学之间在教育、研究和教职员工和学生交流方面的合作。KMS以主题地图理论为基础,使用AToM (ion Topic Maps引擎)软件。在使用知识管理系统时,重点关注了本体设计、知识库开发和应用程序处理。KMS包括具有供管理员、架构师和编辑使用的接口的知识库,以及供用户访问的知识门户。介绍了KMS中的搜索程序。最后对系统的进一步发展提出了建议。
{"title":"Knowledge Management System for military universities cooperation","authors":"Ladislav Burita","doi":"10.1109/ICCOMM.2014.6866667","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866667","url":null,"abstract":"The paper describes the Knowledge Management System (KMS) about military universities (MilUNI), mostly in the NATO environment, but it also includes all European countries. The goal of the MilUNI is to support the cooperation among universities in education, research, and the staff and students exchange. The KMS is based on the Topic Maps theory using the AToM (Aion Topic Maps engine) software. Special attention is paid to the ontology design, Knowledge Base (KB) development, and application processing when using the KMS. The KMS includes the KB with interface for administrator, architect, and editor and the Knowledge Portal for user access. The search procedures in the KMS are mentioned. The paper concludes with suggestions for the further development of the system.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124043907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An overview of cloud middleware services for interconnection of healthcare platforms 用于医疗保健平台互连的云中间件服务概述
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866753
Adelina Ochian, G. Suciu, O. Fratu, C. Voicu, Victor Suciu
Using heterogeneous clouds has been considered to improve performance of big-data analytics for healthcare platforms. However, the problem of the delay when transferring big-data over the network needs to be addressed. The purpose of this paper is to analyze and compare existing cloud computing environments (PaaS, IaaS) in order to implement middleware services. Understanding the differences and similarities between cloud technologies will help in the interconnection of healthcare platforms. The paper provides a general overview of the techniques and interfaces for cloud computing middleware services, and proposes a cloud architecture for healthcare. Cloud middleware enables heterogeneous devices to act as data sources and to integrate data from other healthcare platforms, but specific APIs need to be developed. Furthermore, security and management problems need to be addressed, given the heterogeneous nature of the communication and computing environment. The present paper fills a gap in the electronic healthcare register literature by providing an overview of cloud computing middleware services and standardized interfaces for the integration with medical devices.
人们认为使用异构云可以提高医疗保健平台的大数据分析性能。然而,大数据在网络上传输时的延迟问题需要解决。本文的目的是分析和比较现有的云计算环境(PaaS, IaaS),以便实现中间件服务。了解云技术之间的异同将有助于医疗保健平台的互连。本文概述了云计算中间件服务的技术和接口,并提出了用于医疗保健的云架构。云中间件使异构设备能够充当数据源并集成来自其他医疗保健平台的数据,但需要开发特定的api。此外,考虑到通信和计算环境的异构性质,还需要解决安全和管理问题。本文通过概述云计算中间件服务和与医疗设备集成的标准化接口,填补了电子医疗登记文献中的空白。
{"title":"An overview of cloud middleware services for interconnection of healthcare platforms","authors":"Adelina Ochian, G. Suciu, O. Fratu, C. Voicu, Victor Suciu","doi":"10.1109/ICCOMM.2014.6866753","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866753","url":null,"abstract":"Using heterogeneous clouds has been considered to improve performance of big-data analytics for healthcare platforms. However, the problem of the delay when transferring big-data over the network needs to be addressed. The purpose of this paper is to analyze and compare existing cloud computing environments (PaaS, IaaS) in order to implement middleware services. Understanding the differences and similarities between cloud technologies will help in the interconnection of healthcare platforms. The paper provides a general overview of the techniques and interfaces for cloud computing middleware services, and proposes a cloud architecture for healthcare. Cloud middleware enables heterogeneous devices to act as data sources and to integrate data from other healthcare platforms, but specific APIs need to be developed. Furthermore, security and management problems need to be addressed, given the heterogeneous nature of the communication and computing environment. The present paper fills a gap in the electronic healthcare register literature by providing an overview of cloud computing middleware services and standardized interfaces for the integration with medical devices.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129971866","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
Emotional speech classification in consensus building 共识构建中的情绪言语分类
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866670
Ning He, Shuoqing Yao, O. Yoshie
In this paper we introduce a novel approach that robust automatic speech features recognition of one's emotion is achieved in a classification model named decision forest. The 13th order of Mel-frequency ceptstrum coefficients (MFCC) vector is processed as the multivariate data that will be imported to our classifier. In order to draw underlying and inductive information behind the MFCC feature, our decision forest classifier contains two stages to make classification, a supervised clustering based pattern extraction stage and a soft discretization based decision forest stage. Finally, a Japanese emotion corpus used for training and evaluation is described in detail. The results in recognition of six discrete emotions exceeded a mean value of 81% recognition rate.
本文介绍了一种新的方法,即在决策森林分类模型中实现对人的情绪语音特征的鲁棒自动识别。将13阶mel频率倒频谱系数(MFCC)向量处理为将导入到分类器中的多变量数据。为了提取MFCC特征背后的底层和归纳信息,我们的决策森林分类器包含两个阶段进行分类,即基于监督聚类的模式提取阶段和基于软离散化的决策森林阶段。最后,详细介绍了一个用于训练和评价的日语情感语料库。对六种离散情绪的识别结果超过了81%的识别率平均值。
{"title":"Emotional speech classification in consensus building","authors":"Ning He, Shuoqing Yao, O. Yoshie","doi":"10.1109/ICCOMM.2014.6866670","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866670","url":null,"abstract":"In this paper we introduce a novel approach that robust automatic speech features recognition of one's emotion is achieved in a classification model named decision forest. The 13th order of Mel-frequency ceptstrum coefficients (MFCC) vector is processed as the multivariate data that will be imported to our classifier. In order to draw underlying and inductive information behind the MFCC feature, our decision forest classifier contains two stages to make classification, a supervised clustering based pattern extraction stage and a soft discretization based decision forest stage. Finally, a Japanese emotion corpus used for training and evaluation is described in detail. The results in recognition of six discrete emotions exceeded a mean value of 81% recognition rate.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"69 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130774708","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Recurrence Plot Analysis for characterization of appliance load signature 用电负荷特征的递归图分析
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866747
F. Popescu, F. Enache, I. Vizitiu, P. Ciotirnae
In this paper we propose a new approach for characterization of home appliances load signature (electrical fingerprint) from Recurrence Plot Analysis (RPA) perspective, with the goal of non-intrusive appliance load monitoring (NIALM), promoted as enabling technology to save energy consumption and to lower consumers electrical bills. In our research work, RPA is adopted as an analysis tool of non-linear load current waveform in phase space and it is considered as innovative signal processing method alongside the traditional time and frequency based methods.
本文从递归图分析(RPA)的角度提出了一种表征家电负荷特征(电指纹)的新方法,目的是实现非侵入式电器负荷监测(NIALM),并将其推广为节能和降低消费者电费的使能技术。在我们的研究中,采用RPA作为相空间非线性负载电流波形的分析工具,被认为是继传统的基于时间和频率的信号处理方法之后的一种创新的信号处理方法。
{"title":"Recurrence Plot Analysis for characterization of appliance load signature","authors":"F. Popescu, F. Enache, I. Vizitiu, P. Ciotirnae","doi":"10.1109/ICCOMM.2014.6866747","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866747","url":null,"abstract":"In this paper we propose a new approach for characterization of home appliances load signature (electrical fingerprint) from Recurrence Plot Analysis (RPA) perspective, with the goal of non-intrusive appliance load monitoring (NIALM), promoted as enabling technology to save energy consumption and to lower consumers electrical bills. In our research work, RPA is adopted as an analysis tool of non-linear load current waveform in phase space and it is considered as innovative signal processing method alongside the traditional time and frequency based methods.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127960221","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 18
An anonymous voting system based on homomorphic encryption 基于同态加密的匿名投票系统
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866682
Yingming Zhao, Yue Pan, Sanchao Wang, Junxing Zhang
In this paper we present an electronic voting system based on Homomorphic encryption to ensure anonymity, privacy, and reliability in the voting. Homomorphic encryption is a subset of privacy homomorphism. It is capable of computing the encrypted data directly and also encrypting the result of the operation automatically. For this reason it has a wide range of applications including secure multi-party computation, database encryption, electronic voting, etc. In this paper, we make use of the homomorphic encryption mechanism to design and implement an electronic voting system that supports the separation of privileges among voters, tellers, and announcers. Our experimental results show the system not only ensures anonymity in voting but also presents cheating during the counting process.
为了保证投票过程的匿名性、保密性和可靠性,提出了一种基于同态加密的电子投票系统。同态加密是隐私同态的一个子集。它可以直接计算加密后的数据,也可以对操作结果进行自动加密。因此,它具有广泛的应用,包括安全多方计算,数据库加密,电子投票等。在本文中,我们利用同态加密机制来设计和实现一个支持选民、出纳员和播音员之间特权分离的电子投票系统。实验结果表明,该系统不仅保证了投票的匿名性,而且在计票过程中也存在作弊现象。
{"title":"An anonymous voting system based on homomorphic encryption","authors":"Yingming Zhao, Yue Pan, Sanchao Wang, Junxing Zhang","doi":"10.1109/ICCOMM.2014.6866682","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866682","url":null,"abstract":"In this paper we present an electronic voting system based on Homomorphic encryption to ensure anonymity, privacy, and reliability in the voting. Homomorphic encryption is a subset of privacy homomorphism. It is capable of computing the encrypted data directly and also encrypting the result of the operation automatically. For this reason it has a wide range of applications including secure multi-party computation, database encryption, electronic voting, etc. In this paper, we make use of the homomorphic encryption mechanism to design and implement an electronic voting system that supports the separation of privileges among voters, tellers, and announcers. Our experimental results show the system not only ensures anonymity in voting but also presents cheating during the counting process.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125545735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
On the outage probability of dual-hop AF relaying over Nakagami-m fading channels 中川衰落信道上双跳AF中继的中断概率
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866766
A. Paun, C. Vladeanu
This paper presents an analytical study on the outage performance of dual-hop amplify-and-forward relaying systems operating over flat Nakagami-m fading channels. More specifically, the cumulative distribution function (CDF) of the end-to-end signal-to-noise ratio (SNR) is derived. We consider the case of non-integer values for fading shape factors, m, at each of two consecutive hops. The tighter analytical expression for the CDF, obtained using the bivariate H-function and G-function, is applied to evaluate the outage probability of the system under study. The analytical results of the outage probability are in accordance with Monte-Carlo simulation results and outperform the previously reported upper bounds for the low and medium SNR.
本文分析研究了在平坦Nakagami-m衰落信道上工作的双跳放大转发中继系统的中断性能。具体地说,推导了端到端信噪比(SNR)的累积分布函数(CDF)。我们考虑衰落形状因子m的非整数值的情况,在两个连续跳中的每一个。利用二元h函数和g函数得到的CDF的更严格解析表达式,用于评估所研究系统的中断概率。中断概率的分析结果与蒙特卡罗模拟结果一致,优于先前报道的低信噪比和中信噪比的上界。
{"title":"On the outage probability of dual-hop AF relaying over Nakagami-m fading channels","authors":"A. Paun, C. Vladeanu","doi":"10.1109/ICCOMM.2014.6866766","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866766","url":null,"abstract":"This paper presents an analytical study on the outage performance of dual-hop amplify-and-forward relaying systems operating over flat Nakagami-m fading channels. More specifically, the cumulative distribution function (CDF) of the end-to-end signal-to-noise ratio (SNR) is derived. We consider the case of non-integer values for fading shape factors, m, at each of two consecutive hops. The tighter analytical expression for the CDF, obtained using the bivariate H-function and G-function, is applied to evaluate the outage probability of the system under study. The analytical results of the outage probability are in accordance with Monte-Carlo simulation results and outperform the previously reported upper bounds for the low and medium SNR.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126494719","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Accuracy evaluation of the theoretical approximation of the mean mutual information per coded bit in coordinated multi point transmissions 协调多点传输中每编码位平均互信息理论近似的精度评价
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866718
D. Popescu, M. Varga, V. Bota
The increased demand of spectrally efficient wireless transmissions requires accurate performance prediction mechanisms. A promising prediction method for OFDM transmission using convolutional turbo codes is based on the mean mutual information per coded bits. This paper aims to study the accuracy provided by the theoretical method used to compute the mean mutual information per coded bit presented in literature by comparison to the results obtained from measurements. The results obtained showed that for point-to-point transmissions over both Gaussian and frequency-selective channels, the theoretical method provides good accuracies while for coordinated multipoint transmissions over frequency-selective channels, the analytical method loses its accuracy as the distributions of the combined LLRs can no longer be considered combinations of Gaussian distributions.
对频谱高效无线传输的需求不断增加,需要精确的性能预测机制。基于每编码位的平均互信息是一种很有前途的基于卷积turbo码的OFDM传输预测方法。本文旨在通过与实测结果的比较,研究文献中计算每编码位平均互信息的理论方法所提供的精度。结果表明,对于高斯信道和选频信道上的点对点传输,理论方法都能提供较好的精度,而对于选频信道上的多点协调传输,解析方法的精度下降,因为组合后的llr分布不再是高斯分布的组合。
{"title":"Accuracy evaluation of the theoretical approximation of the mean mutual information per coded bit in coordinated multi point transmissions","authors":"D. Popescu, M. Varga, V. Bota","doi":"10.1109/ICCOMM.2014.6866718","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866718","url":null,"abstract":"The increased demand of spectrally efficient wireless transmissions requires accurate performance prediction mechanisms. A promising prediction method for OFDM transmission using convolutional turbo codes is based on the mean mutual information per coded bits. This paper aims to study the accuracy provided by the theoretical method used to compute the mean mutual information per coded bit presented in literature by comparison to the results obtained from measurements. The results obtained showed that for point-to-point transmissions over both Gaussian and frequency-selective channels, the theoretical method provides good accuracies while for coordinated multipoint transmissions over frequency-selective channels, the analytical method loses its accuracy as the distributions of the combined LLRs can no longer be considered combinations of Gaussian distributions.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"137 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116609490","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Securing communication in cyber-physical systems using steganography and cryptography 使用隐写术和密码学保护网络物理系统中的通信
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866697
Laura Vegh, L. Miclea
In a time where technologies come and go, when most of the areas of our lives are rely one way or another on electronic devices and the internet, security is a crucial aspect, always needed. Technologies may rise and fall, but the area of security remains necessary at all times. For this reason the research for new algorithms, new and improved methods is constant. Cyber-physical systems are designed as a network of interconnected devices with physical input and output and represent a new direction in the information systems world. In the present paper we present a solution for the security of communication in cyber-physical systems with hierarchical access by combining cryptography and steganography.
在一个科技日新月异的时代,当我们生活的大部分领域都以这样或那样的方式依赖于电子设备和互联网时,安全是一个至关重要的方面,总是需要的。技术可能会起起落落,但安全领域始终是必要的。因此,对新算法、新方法和改进方法的研究是不断的。信息物理系统被设计为具有物理输入和输出的互联设备网络,代表了信息系统领域的一个新方向。本文提出了一种结合密码学和隐写术的分层访问网络物理系统通信安全解决方案。
{"title":"Securing communication in cyber-physical systems using steganography and cryptography","authors":"Laura Vegh, L. Miclea","doi":"10.1109/ICCOMM.2014.6866697","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866697","url":null,"abstract":"In a time where technologies come and go, when most of the areas of our lives are rely one way or another on electronic devices and the internet, security is a crucial aspect, always needed. Technologies may rise and fall, but the area of security remains necessary at all times. For this reason the research for new algorithms, new and improved methods is constant. Cyber-physical systems are designed as a network of interconnected devices with physical input and output and represent a new direction in the information systems world. In the present paper we present a solution for the security of communication in cyber-physical systems with hierarchical access by combining cryptography and steganography.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"93 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134165911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Efficient and robust perceptual hashing using log-polar image representation 使用对数极图像表示的高效鲁棒感知哈希
Pub Date : 2014-05-29 DOI: 10.1109/ICCOMM.2014.6866755
Cezar Plesca, Luciana Morogan
Robust image hashing seeks to transform a given input image into a shorter hashed version using a key-dependent non-invertible transform. These hashes find extensive applications in content authentication, image indexing for database search and watermarking. Modern robust hashing algorithms consist of feature extraction, a randomization stage to introduce non-invertibility, followed by quantization and binary encoding to produce a binary hash. This paper describes a novel algorithm for generating an image hash based on Log-Polar transform features. The Log-Polar transform is a part of the Fourier-Mellin transformation, often used in image recognition and registration techniques due to its invariant properties to geometric operations. First, we show that the proposed perceptual hash is resistant to content-preserving operations like compression, noise addition, moderate geometric and filtering. Second, we illustrate the discriminative capability of our hash in order to rapidly distinguish between two perceptually different images. Third, we study the security of our method for image authentication purposes. Finally, we show that the proposed hashing method can provide both excellent security and robustness.
鲁棒图像哈希寻求使用依赖键的不可逆变换将给定的输入图像转换为更短的哈希版本。这些散列在内容认证、数据库搜索的图像索引和水印中有广泛的应用。现代鲁棒哈希算法包括特征提取、引入不可逆性的随机化阶段、量化和二进制编码以产生二进制哈希。本文提出了一种基于对数极坐标变换特征生成图像哈希的新算法。对数极坐标变换是傅里叶-梅林变换的一部分,由于其对几何运算的不变性,常用于图像识别和配准技术。首先,我们证明了所提出的感知哈希可以抵抗内容保留操作,如压缩、噪声添加、适度几何和滤波。其次,我们说明了哈希的判别能力,以便快速区分两个感知不同的图像。第三,我们研究了图像认证方法的安全性。最后,我们证明了所提出的哈希方法可以提供良好的安全性和鲁棒性。
{"title":"Efficient and robust perceptual hashing using log-polar image representation","authors":"Cezar Plesca, Luciana Morogan","doi":"10.1109/ICCOMM.2014.6866755","DOIUrl":"https://doi.org/10.1109/ICCOMM.2014.6866755","url":null,"abstract":"Robust image hashing seeks to transform a given input image into a shorter hashed version using a key-dependent non-invertible transform. These hashes find extensive applications in content authentication, image indexing for database search and watermarking. Modern robust hashing algorithms consist of feature extraction, a randomization stage to introduce non-invertibility, followed by quantization and binary encoding to produce a binary hash. This paper describes a novel algorithm for generating an image hash based on Log-Polar transform features. The Log-Polar transform is a part of the Fourier-Mellin transformation, often used in image recognition and registration techniques due to its invariant properties to geometric operations. First, we show that the proposed perceptual hash is resistant to content-preserving operations like compression, noise addition, moderate geometric and filtering. Second, we illustrate the discriminative capability of our hash in order to rapidly distinguish between two perceptually different images. Third, we study the security of our method for image authentication purposes. Finally, we show that the proposed hashing method can provide both excellent security and robustness.","PeriodicalId":366043,"journal":{"name":"2014 10th International Conference on Communications (COMM)","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2014-05-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116712630","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2014 10th International Conference on Communications (COMM)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1