This paper proposes a novel use of 2D barcodes to store biometric data, in particular for facial recognition, which represents one of the least invasive biometric techniques. To accomplish this, we deploy 2D color bar...
详细信息
ISBN:
(纸本)9788360810484
This paper proposes a novel use of 2D barcodes to store biometric data, in particular for facial recognition, which represents one of the least invasive biometric techniques. To accomplish this, we deploy 2D color barcodes, which allow larger storage capabilities than traditional 2D barcodes. To improve the quality of facial recognition, we combine local feature descriptors, such as SURF descriptors, together with shape landmarks identified through statistical models for discriminating faces. The biometric information can be secured through digital signature algorithms, in order to protect biometric data from malicious tampering. The use of color barcodes is crucial in this setting, as traditional barcodes cannot store a suitable number of SURF descriptors for discriminating faces and cannot even afford to store an additional cryptographic payload. We report the results of an experimental evaluation of our system on real-world data sets (i.e., a face database).
A true quantum signature algorithm based on continuous-variable entanglement state is proposed. In the suggested algorithm, a key-pair, i.e. private signature key and public verification key, is generated based on a o...
详细信息
A true quantum signature algorithm based on continuous-variable entanglement state is proposed. In the suggested algorithm, a key-pair, i.e. private signature key and public verification key, is generated based on a one-way function. By employing the signature key, a message state is encoded into a 2k-particle entangled state and a two-particle entangled state is prepared. The resulting states are exploited as a signature of the message state. The signature can be decoded under the verification key when it needs to be verified. Subsequently, a decoded message state and a two-particle entangled state are obtained. To compare the decoded states and the original states, a quantum circuit for comparing these states is exploited. Making use of measurement results of the quantum circuit one can judge the authenticity of the received signature. According to the security requirement of the signature scheme, the suggested algorithm has been proven to be theoretically secure by using the Shannon information theory.
In this paper, we propose a trust opinion aggregation scheme in vehicular ad-hoc networks, to support trust models used to evaluate the quality of information shared among peers in the environment. Our scheme extends ...
详细信息
ISBN:
(纸本)9781424435746
In this paper, we propose a trust opinion aggregation scheme in vehicular ad-hoc networks, to support trust models used to evaluate the quality of information shared among peers in the environment. Our scheme extends an existing identity-based aggregate signature algorithm to correctly combine signatures for multiple messages into one aggregate signature and eliminate signature redundancy. As a result, our proposed scheme is secure and archives both space efficiency and time efficiency, as confirmed by our comparative analysis.
Mobile Agent can simulate human behavior and relationships,and have some intelligence and be able to operate independently and provide the appropriate *** the network run-time,Mobile Agent is easy to be attacked by ma...
详细信息
Mobile Agent can simulate human behavior and relationships,and have some intelligence and be able to operate independently and provide the appropriate *** the network run-time,Mobile Agent is easy to be attacked by malicious *** is not an easy task to us to protect Mobile Agent from the malicious hosts' attacks,because Mobile Agent fully exposed to the environment in which they run,the environment is in control of Mobile Agent's code and *** Mobile Agent security issues,as well as the characteristics of proxy signature algorithm,this paper designed a Mobile Agent Security Policy based on the proxy signature algorithm,to solve the problem of Mobile Agent to be attacked by malicious hosts.
A variable step size normalized sign algorithm (VSS-NSA) is proposed, for acoustic echo cancelation, which adjusts its step size automatically by matching the L_(1) norm of the a posteriori error to that of the backgr...
详细信息
ISBN:
(纸本)9781424442959;9781424442966
A variable step size normalized sign algorithm (VSS-NSA) is proposed, for acoustic echo cancelation, which adjusts its step size automatically by matching the L_(1) norm of the a posteriori error to that of the background noise plus near-end signal. Simulation results show that the new algorithm combined with double-talk detection outperforms the dual sign algorithm (DSA) and the normalized triple-state sign algorithm (NTSSA) in terms of convergence rate and stability.
In the course of data transfer extremely vulnerable to be eavesdropped, defrauds, tampered or replayed (Relay) routing by information security. Thus, the SLDMRP (Security Lightweight Distribution Multicast Routing Pro...
详细信息
ISBN:
(纸本)9781424436927
In the course of data transfer extremely vulnerable to be eavesdropped, defrauds, tampered or replayed (Relay) routing by information security. Thus, the SLDMRP (Security Lightweight Distribution Multicast Routing Protocol) based on security was put forward in this paper. This protocol is designed on the basis of the multicast routing LDMRP, while this protocol creating and maintaining multicast group, sending control message, carrying out security policy which underwrite and verify the data packets, in order to prevent the control message from eavesdropping and tampering. Finally, using NS2, to prove the effectiveness of signature and verify The simulation results: SLDMRP, which is using of SHA-1 and RSA encryption algorithm to verify the signature and security policy is effective.
Wang's basic digital signature scheme and its new variation is cracked. The proposed signature forging algorithm makes no assumptions on operations of the schemes and is as efficient as the signing algorithm.
Wang's basic digital signature scheme and its new variation is cracked. The proposed signature forging algorithm makes no assumptions on operations of the schemes and is as efficient as the signing algorithm.
The convergence analysis of a sign algorithm with decreasing gain, when governing the weights of an adaptive filter, is presented. The analysis is done in a noiseless case. A rigorous proof of almost-sure convergence ...
详细信息
The convergence analysis of a sign algorithm with decreasing gain, when governing the weights of an adaptive filter, is presented. The analysis is done in a noiseless case. A rigorous proof of almost-sure convergence to the optimal filter is attained under a weak-ergodicity assumption that includes the case, important in practice, of correlated observations.
暂无评论