In computer and system sciences, higher-order cellular automata (HOCA) are a type of cellular automata that evolve over multiple time steps and generate complex patterns, which have various applications, such as secre...
详细信息
In computer and system sciences, higher-order cellular automata (HOCA) are a type of cellular automata that evolve over multiple time steps and generate complex patterns, which have various applications, such as secret-sharing schemes, data compression, and imageencryption. In this paper, we introduce HOCA to quantum many-body physics and construct a series of symmetry-protected topological (SPT) phases of matter, in which symmetries are supported on a great variety of subsystems embbeded in the SPT bulk. We call these phases HOCA-generated SPT (HGSPT) phases. Specifically, we show that HOCA can generate not only well-understood SPTs with symmetries supported on either regular (e.g., linelike subsystems in the two-dimensional cluster model) or fractal subsystems, but also a large class of unexplored SPTs with symmetries supported on more choices of subsystems. One example is mixed-subsystem SPT that has either fractal and linelike subsystem symmetries simultaneously or two distinct types of fractal symmetries simultaneously. Another example is chaotic-subsystem SPT in which chaotic-looking symmetries are significantly different from and thus cannot reduce to fractal or regular subsystem symmetries. We also introduce a new notation system to characterize HGSPTs. We prove that all possible subsystem symmetries in a square lattice can be locally simulated by an HOCA-generated symmetry. As the usual two-point strange correlators are trivial in most HGSPTs, we find that the nontrivial SPT orders can be detected by what we call multi point strange correlators. We propose a universal procedure to design the spatial configuration of the multi point strange correlators for a given HGSPT phase. Specifically, we find deep connections between multi point strange correlators and the spurious topological entanglement entropy (STEE), both exhibiting long-range behavior in a short-range entangled state. Our HOCA approaches and multi point strange correlators pave the way for a uni
The computer system represents data in various format viz (i) Audio, (ii) Video, (iii) Text, (iv) Message, and (v) image format. There are many ways through which, data can be easily transferred. The process of transf...
详细信息
The computer system represents data in various format viz (i) Audio, (ii) Video, (iii) Text, (iv) Message, and (v) image format. There are many ways through which, data can be easily transferred. The process of transferring digital bank cheque image is done with the help of cheque truncation system. It transfers cheque from home branch to clearing bank branch for faster clearance of customer cheque. This helps the banking system to keep transparency of transaction. During the flow of digital bank cheque image, there may be possibility of various attacks like, Cropping, JPEG compression, Median filtering, Gaussian Blur noise, Rotation, Salt & Pepper noise, etc. This arise the issues of copyright protection and security for digital bank cheque image. In this research work, The Combination of Digital image Watermarking Using Neural Network and Advanced encryption and Decryption Technique is Used for Providing Copyright Protection & Security Technique to Digital Bank Cheque image.
This paper unfolds the development of an HDL model on the ASIC platform for the quicker and safer transmission of image data. Secure image encoding was facilitated by the DWT through imagecompression and AES through ...
详细信息
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical ***,the safety of digital medical imaging in remote consultati...
详细信息
In the current dire situation of the corona virus COVID-19,remote consultations were proposed to avoid cross-infection and regional differences in medical ***,the safety of digital medical imaging in remote consultations has also attracted more and more attention from the medical *** ensure the integrity and security of medical images,this paper proposes a robust watermarking algorithm to authenticate and recover from the distorted medical images based on regions of interest(ROI)and integer wavelet transform(IWT).First,the medical image is divided into two different parts,regions of interest and non-interest *** the integrity of ROI is verified using the hash algorithm,and the recovery data of the ROI region is calculated at the same ***,binary images with the basic information of patients are processed by logistic chaotic map encryption,and then the synthetic watermark is embedded in the medical carrier image using IWT *** performance of the proposed algorithm is tested by the simulation experiments based on the MATLAB program in CT images of the *** results show that the algorithm can precisely locate the distorted areas of an image and recover the original ROI on the basis of verifying image *** maximum peak signal to noise ratio(PSNR)value of 51.24 has been achieved,which proves that the watermark is invisible and has strong robustness against noise,compression,and filtering attacks.
The proceedings contain 35 papers. The special focus in this conference is on Parallel and Distributed Computing, Applications, and technologies. The topics include: On the Non-ergodic Convergence Rate of the Directed...
ISBN:
(纸本)9783030692438
The proceedings contain 35 papers. The special focus in this conference is on Parallel and Distributed Computing, Applications, and technologies. The topics include: On the Non-ergodic Convergence Rate of the Directed Nonsmooth Composite Optimization;6D Pose Estimation Based on the Adaptive Weight of RGB-D Feature;blockchain-Based Secure Outsourcing of Fully Homomorphic encryption Using Hidden Ideal Lattice;multiple Projections Learning for Dimensional Reduction;Preventing DDoS Attacks on Bitcoin Memory Pool by the Dynamic Fee Threshold Mechanism;The Compiler of DFC: A Source Code Converter that Transform the Dataflow Code to the Multi-threaded C Code;online Learning-Based Co-task Dispatching with Function Configuration in Edge Computing;System-Level FPGA Routing for Logic Verification with Time-Division Multiplexing;protein Interresidue Contact Prediction Based on Deep Learning and Massive Features from Multi-sequence Alignment;heterogeneous Software Effort Estimation via Cascaded Adversarial Auto-Encoder;see Fine Color from the Rough Black-and-White;data Aggregation Aware Routing for Distributed Training;a New Integer Programming Model for the File Transfer Scheduling Problem;approximation Algorithms for the General Cluster Routing Problem;maximizing Group Coverage in Social Networks;lightLayers: Parameter Efficient Dense and Convolutional Layers for image Classification;the Hybrid Navigation Method in Face of Dynamic Obstacles;a Relaxed Balanced Lock-Free Binary Search Tree;A Dynamic Parameter Tuning Method for High Performance SpMM;data Caching Based Transfer Optimization in Large Scale Networks;a Novel Distributed Reinforcement Learning Method for Classical Chinese Poetry Generation;second-Order Convolutional Neural Network Based on Cholesky compression Strategy;submodular Maximization with Bounded Marginal Values;the Prize-Collecting k-Steiner Tree Problem.
The increasing amount of data generated by space applications poses several challenges due to limited resources available onboard: power, memory, computation, data rate. In this paper, we propose Compressed Sensing (C...
详细信息
The increasing amount of data generated by space applications poses several challenges due to limited resources available onboard: power, memory, computation, data rate. In this paper, we propose Compressed Sensing (CS) as the key tool to face those challenges via compressive imaging. This signal processing technique, only recently applied to space applications, dramatically simplifies the image acquisition featuring native compression/encryption and enabling onboard image analysis, allowing to design simpler and lighter optical systems. In this paper, we try to answer the following question: To what extent are the potential benefits of CS going to materialize in a realistic "space big data" application scenario? To this purpose, we first review compressive imaging techniques and already existing prototypes and concepts, critically discussing the technological issues involved. Then, we propose a set of instrument concepts in the application domains of space science, planetary exploration and earth observation, most suitable for a CS-based application. For the most promising of them, we go deeper into the analysis showing preliminary reconstruction performance tests.
In computer and system sciences, higher-order cellular automata (HOCA) are a type of cellular automata that evolve over multiple time steps and generate complex patterns, which have various applications such as secret...
详细信息
In computer and system sciences, higher-order cellular automata (HOCA) are a type of cellular automata that evolve over multiple time steps and generate complex patterns, which have various applications such as secret sharing schemes, data compression, and imageencryption. In this paper, we introduce HOCA to quantum many-body physics and construct a series of symmetry-protected topological (SPT) phases of matter, in which symmetries are supported on a great variety of subsystems embbeded in the SPT bulk. We call these phases HOCA-generated SPT (HGSPT) phases. Specifically, we show that HOCA can generate not only well-understood SPTs with symmetries supported on either regular (e.g., line-like subsystems in the 2D cluster model) or fractal subsystems, but also a large class of unexplored SPTs with symmetries supported on more choices of subsystems. One example is mixed-subsystem SPT that has either fractal and line-like subsystem symmetries simultaneously or two distinct types of fractal symmetries simultaneously. Another example is chaotic-subsystem SPT in which chaotic-looking symmetries are significantly different from and thus cannot reduce to fractal or regular subsystem symmetries. We also introduce a new notation system to characterize HGSPTs. We prove that all possible subsystem symmetries in square lattice can be locally simulated by an HOCA generated symmetry. As the usual two-point strange correlators are trivial in most HGSPTs, we find that the nontrivial SPT orders can be detected by what we call multi-point strange correlators. We propose a universal procedure to design the spatial configuration of the multi-point strange correlators for a given HGSPT phase. Specifically, we find deep connections between multi-point strange correlators and the spurious topological entanglement entropy (STEE), both exhibiting long range behavior in a short range entangled state. Our HOCA approaches and multi-point strange correlators pave the way for a unified paradigm
A novel reversible data hiding method based on vacating room for specific encryption process in encrypted image is proposed by Huang and Wang in 2020. In their method, they applied pixel value expansion approach to va...
详细信息
With an ever increase usage of multi-media content, such audio, image and video across networks, imagecompression and security of content has become almost a need to users who would want to transmit over such network...
详细信息
ISBN:
(纸本)9781728103693
With an ever increase usage of multi-media content, such audio, image and video across networks, imagecompression and security of content has become almost a need to users who would want to transmit over such networks. Transmitting over such networks, especially with images, may result in some information in an image being lost. For that reason good and efficient encryption methods are needed to store and transmit images while preserving the best imaginable quality features enhanced with security. This paper suggests or develops an efficient imagecompression-encryption scheme based on Discrete wavelet decomposition, SPIHT and Qi hyper-chaos. Pseudo-random numbers generated from Qi hyper chaos and which are in line with the Federal Information Processing Standards (FIPS) and National Institute of Standards and Technology (NIST) were used in this study. The random numbers were used to change the image characteristics and in essence to hide the visual information related to image. To achieve the selective compression-encryption, the 2-D wavelet transform was used to decompose the image into details and approximation components, Set Partitioning in Hierarchical Tree compression method was used to compress the decomposed LL2 image before being encrypted with the bits stream key generated from the Qi hyper-chaos using exclusive or operation. The experimental results demonstrate that the proposed scheme is good for data compression and encryption.
暂无评论