2009 Fifth International Conference on Information Assurance and Security最新文献

筛选
英文 中文
Whole Frame Loss Recovery Algorithm for H.264 Decoders H.264解码器的全帧丢失恢复算法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.170
Min Li, Bo Wang
{"title":"Whole Frame Loss Recovery Algorithm for H.264 Decoders","authors":"Min Li, Bo Wang","doi":"10.1109/IAS.2009.170","DOIUrl":"https://doi.org/10.1109/IAS.2009.170","url":null,"abstract":"In this paper, we develop a whole frame loss recovery method for H.264 by using block-based motion vector extrapolation in the decoder. Firstly,we propose a variable-size block motion vetor extrapolation algorithm to construct the motion vectors for the lost frame from available neighboring frame. Then, a more complete motion vector field is obtained by performing median filtering. At last, the blocks without motion vectors are concealed by using linear interpolation algorithm. Experimental results show that this method can alleviate the shortcomings of the fixed-size method effectively and provide better performance than other concealment methods.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132942114","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
An Improved Iris Recognition Method Based on Gray Surface Matching 一种改进的基于灰度匹配的虹膜识别方法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.57
Dong-Mei Wu, Jiang-Nan Wang
{"title":"An Improved Iris Recognition Method Based on Gray Surface Matching","authors":"Dong-Mei Wu, Jiang-Nan Wang","doi":"10.1109/IAS.2009.57","DOIUrl":"https://doi.org/10.1109/IAS.2009.57","url":null,"abstract":"A new method is proposed to overcome illumination intensity difference influences the recognition result which occurs during collecting session in this paper. The problem is not effective solved in original algorithm. This algorithm proposes to match after moving two matching feature surfaces to one equivalence gray plane. It also uses the theory of gray surface matching based on feature analysis but another distance is considered for reducing calculation quantity. Firstly, it calculates the gray difference of two pixels which comes from doing subtraction between two different surfaces and gets the gray difference surface. Secondly, it computes the square of the gray difference surface and considers this square as the distance between the two surfaces. At last, it compares the result with a given threshold to implement iris recognition. Simulation and experimental results are shown to illustrate this method performance for both correct recognition rate and the whole recognition time.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128846782","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval 改进的加权特征融合算法及其在图像检索中的应用
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.95
Mei Wang, Li Wang
{"title":"An Improved Fusion Algorithm of the Weighted Features and its Application in Image Retrieval","authors":"Mei Wang, Li Wang","doi":"10.1109/IAS.2009.95","DOIUrl":"https://doi.org/10.1109/IAS.2009.95","url":null,"abstract":"In order to improve the average recall rate and the average precision rate of image retrieval, an improved fusion algorithm of the weighted features is presented. Firstly,the shape features of images are extracted by using the moment invariant method based on 7 central moments. Meanwhile,the texture features of images are calculated by using the Gray-level Co-occurrence matrix. Then the elements of the vectors are normalized respectively. In the next step, the Euclidian distance,the squared Euclidian distance and the City-Block distance are calculated. The Mean values of the 3 kinds of distances are obtained and used as the shape distance and the texture distance. Finally,the weighted feature vectors are fused and the similarities between images are obtained and used as the measure bases to implement the image retrieval. The experiments show that the tangible results of image retrieval are realized and the average recall rate and the average precision rate are improved.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131867209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Method for Accessing Trusted Services Based on Service-Oriented Architecture 基于面向服务体系结构的可信服务访问方法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.173
Xin Yu, Yu Bai
{"title":"A Method for Accessing Trusted Services Based on Service-Oriented Architecture","authors":"Xin Yu, Yu Bai","doi":"10.1109/IAS.2009.173","DOIUrl":"https://doi.org/10.1109/IAS.2009.173","url":null,"abstract":"Service-oriented architecture provides flexible methods for systems development and integration. It is widely adopted in web services. On the basis of studying service-oriented architecture and web service security standards, this paper proposes a method for accessing trusted services based on service-oriented architecture and gives out a system implementation model.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115532258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Application and Research of Mobile E-commerce Security Based on WPKI 基于WPKI的移动电子商务安全应用与研究
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.243
Feng Tian, Xiao-bing Han, Ying Wei
{"title":"Application and Research of Mobile E-commerce Security Based on WPKI","authors":"Feng Tian, Xiao-bing Han, Ying Wei","doi":"10.1109/IAS.2009.243","DOIUrl":"https://doi.org/10.1109/IAS.2009.243","url":null,"abstract":"In order to solve the data integrity, non-repudiation, confidentiality and operation inefficiency of the mobile e-commerce, in this paper, mobile e-commerce Security Model is established. The design is based on mobile e-commerce architecture, analyzing the digital signature authentication process and data security transmission procedure in the system. Delamination modularized software design method is applied, and simulation results is carried out in the system based on OPNET and C++. The system adds the WIM smart card in the mobile terminal, and uses elliptic curve cryptography (ECC) encryption arithmetic, it complete the data encryption integrity authentication personal identification fast. By analysis of the procedure of the system and simulation results, the system has the advantage of fast operation, high security and high channel availability, which can satisfies the basic needs of mobile e-commerce.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115565855","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Modified Feature Based Image Watermarking Scheme in NSCT Domain 一种改进的基于NSCT域特征的图像水印方案
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.339
Liu Yang, B. Guo, Jianmin Lv
{"title":"A Modified Feature Based Image Watermarking Scheme in NSCT Domain","authors":"Liu Yang, B. Guo, Jianmin Lv","doi":"10.1109/IAS.2009.339","DOIUrl":"https://doi.org/10.1109/IAS.2009.339","url":null,"abstract":"In this article, we present a modified robust image watermarking scheme based on the scale-invariant feature transform (SIFT). The watermark is embedded into some local regions extracted from the original image. During embedding, the initial region is divided into some cirque sub-regions with the same area, and each watermark bit is embedded into one sub-region. Besides, it is embedded in the Non-subsampled Contourlet Transform (NSCT) domain to enhance watermark robustness. Experimental results have demonstrated the efficiency of the proposed scheme.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122133302","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on System of Chinese Document Copy Detection 中文文档副本检测系统的研究
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.210
Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, W. Deng
{"title":"Research on System of Chinese Document Copy Detection","authors":"Yuzhu Cheng, Chunrong Qiu, Weiqi Tang, W. Deng","doi":"10.1109/IAS.2009.210","DOIUrl":"https://doi.org/10.1109/IAS.2009.210","url":null,"abstract":"Text copying is easy to do but not easy to be detected. Copy detection is a delicate ground. It determines whether a document is copied from others or not. It helps to verify and to detect paper redistribution, thesis plagiarism or copyright violation. A novel method of Chinese text copy detection design and implementation is discussed in this paper, based on theory of Mathematical Expression of Chinese Characters. It can implement the functions include Characteristic reconstruction, registration and detection. Experimental results show that the system has the advantages on detecting accuracy and high speed.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124037433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation 结合非子采样轮廓变换和总变异的新型自适应图像去噪方法
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.18
Xiaoyue Wu, B. Guo, Shengli Qu, Zhuo Wang
{"title":"A New Adaptive Image Denoising Method Combining the Nonsubsampled Contourlet Transform and Total Variation","authors":"Xiaoyue Wu, B. Guo, Shengli Qu, Zhuo Wang","doi":"10.1109/IAS.2009.18","DOIUrl":"https://doi.org/10.1109/IAS.2009.18","url":null,"abstract":"This paper presents a new adaptive image denoising scheme by combining the nonsubsampled Contourlet transform (NSCT) and total variation model. The original image is first decomposed using NSCT .Then the mean squared error (MSE) is estimated based on Stein’s unbiased risk estimation(SURE). The noise of each decomposed subband is reduced using the linear adaptive threshold function, which can be constructed based on the MSE, producing the preliminary primary denoised image after reconstruction. Then the preliminary primary denoised image is further filtered using the total variation model, producing the final denoised image. Experiments show that the proposed scheme can remove the pseudo-Gibbs artifacts and image noise effectively. Besides, it outperforms the existing schemes in regard of both the peak-signal-to-noise-ratio (PSNR) and the edge preservation ability.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"73 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125980427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation 基于线性方程的块特征相关图像水印篡改检测
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.147
Chin-Feng Lee, Kuo-Nan Chen, Chinchen Chang, Meng-Cheng Tsai
{"title":"A Block Feature Correlation Based Image Watermarking for Tamper Detection Using Linear Equation","authors":"Chin-Feng Lee, Kuo-Nan Chen, Chinchen Chang, Meng-Cheng Tsai","doi":"10.1109/IAS.2009.147","DOIUrl":"https://doi.org/10.1109/IAS.2009.147","url":null,"abstract":"A new watermark method for detecting image tampering is proposed in this paper. First, an authentication number is created by using a pair of watermark pixels as the coefficients of a linear function. The central pixel of a host block as the input data to the linear function. The authentication information of that block is then embedded into the host image using the LSB matching revisited embedding procedure. In the detection stage, ISB matching revisited will be applied to extract the authentication information and to verify whether the image blocks have been tampered with. The authentication information establishes the block feature correlation. This kind of correlation helps resist VQ attack.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"95 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127079196","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Study on Ultrasonic Ranging System Design 超声波测距系统设计研究
2009 Fifth International Conference on Information Assurance and Security Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.352
Lihua Deng
{"title":"Study on Ultrasonic Ranging System Design","authors":"Lihua Deng","doi":"10.1109/IAS.2009.352","DOIUrl":"https://doi.org/10.1109/IAS.2009.352","url":null,"abstract":"Ultrasonic Ranging System is different precision when it has been used in an occasion. Generally its errors are larger and often can not meet the application requirements. In this paper, new ultrasonic ranging system which can be used to non-contact measure distance in special occasion was designed by single-chip, ultrasonic ranging technology and sensor technology. Distance measurement data and temperature were displayed through LCD screen and the transmitting and receiving of ultrasonic were controlled by single-chip microcomputer according to the time difference location method to measure the distance. in order to improve measurement accuracy, temperature sensor has used to measure temperature and compensate temperature, the system also uses a voice broadcast system, which makes it higher accuracy, more convenient and extensive applications.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"09 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127399266","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信