In this paper, an overall introduction of fingerprint encryption algorithm is made, and then a fingerprint encryption algorithm with error correction is designed by adding error correction mechanism. This new fingerpr...
详细信息
In this paper, an overall introduction of fingerprint encryption algorithm is made, and then a fingerprint encryption algorithm with error correction is designed by adding error correction mechanism. This new fingerprint encryption algorithm can produce stochastic key in the form of multinomial coefficient by using the binary system sequencer, encrypt fingerprint, and use the Lagrange difference value to restore the multinomial during authenticating. Due to using the cyclic redundancy check code to find out the most accurate key, the accuracy of this algorithm can be ensured. Experimental result indicates that the fuzzy vault algorithm with error correction can well realize the template protection, and meet the requirements of biological information security protection. In addition, it also indicates that the system's safety performance can be enhanced by changing the key's length.
The memristor-based resistive random access memory (ReRAM) has been emerged because of its beneficial properties such as non-volatility, high density, and process scalability. However, ReRAM also suffers from process ...
详细信息
ISBN:
(纸本)9781538679609
The memristor-based resistive random access memory (ReRAM) has been emerged because of its beneficial properties such as non-volatility, high density, and process scalability. However, ReRAM also suffers from process variation caused by down scaling of device size and operating voltage level. In this paper, we propose a new reliable ReRAM architecture with heterogeneous ECC-based subblock architecture focusing on reducing implementation overhead. Experimental results show that the proposed approach reduces the number of parity bits by 18.80 %, area by 20.43 %, respectively, and increases the code rate by 3.90 % compared to those of conventional homogeneous ECC scheme.
A simulation framework based on a physical-layer based abstraction to predict physical layer performances and to compare different forward errorcorrecting (FEC) codes is presented. This framework is used to jointly d...
详细信息
ISBN:
(纸本)9781510630772
A simulation framework based on a physical-layer based abstraction to predict physical layer performances and to compare different forward errorcorrecting (FEC) codes is presented. This framework is used to jointly design interleaving and FEC schemes for free space optical link. A sub-class of regular Low-Density Parity-Check codes is shown to be an interesting alternative to current space communication standard for optical links that require low error floor and high decoder throughput. End-to-end simulations show the feasibility of error free link from a LEO satellite to a high complexity ground station at 25Gbits/s and from a LEO satellite to low complexity optical ground station at 10 Gbits/s. The proposed protection scheme is composed of FG LDPC code and a bit interleaver to span the burst of errors.
Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the sy...
详细信息
ISBN:
(纸本)9781509037650
Biometric template protection is one of the most important issues in biometric authentication system. It is vital because once the biometric template is being attacked, the intruder could introduce him/her into the system without following the proper enrolment procedures. Previous related biometric template works have some limitations in terms of lower accuracy level and high correlations between templates. These two problems may lead to false accept attacks and cross-matching attacks on these templates. To mitigate these problems, this research aims to increase the accuracy level by reducing errors in biometric template and to reduce correlation between biometric templates by generating uncorrelated feature vectors to reduce error in biometric template in order to increase accuracy level and generate uncorrelated feature vectors. To reduce errors and to generate uncorrelated feature vectors, errorcorrectingcode (ECC) based on combination of LDPC and RS and Holistic-based Feature Extraction based on LDA, PCA and ICA are designed respectively. The proof of concept is tested on Iris biometric templates using X number of samples from the Y benchmark image repository. The results showed that the proposed template protection technique is able to increase accuracy level by A% and reduce correlation between biometric templates to B%. Thus, this technique is a viable and practical template protection technique without degrading the iris recognition performance.
In this paper, a new ECC (errorcorrectingcode) solution for DRAM (dynamic random access memory) in computing systems is proposed. Existing papers on ECC for DRAM systems do not consider storage space for metadata. T...
详细信息
In this paper, a new ECC (errorcorrectingcode) solution for DRAM (dynamic random access memory) in computing systems is proposed. Existing papers on ECC for DRAM systems do not consider storage space for metadata. The methodology proposed in this paper considers storing metadata attached to a cacheline data in DRAM. We infer the maximum number of single-chip error correction cases that a linear code can support while considering metadata storage space. This can be said to be the maximum theoretical correction probability for a single chip error. A methodology to construct a code with maximum single-chip error correction is presented. A decoding methodology for the code is proposed. The proposed ECC solution can correct not only single chip failure but also additional small bit errors. We calculate the correction capability of the proposed methodology and verified it through simulation. The encoder and decoder hardware were synthesized and compared with existing methodologies.
Recently, linear complementary dual(LCD) codes have garnered substantial interest within coding theory research due to their diverse applications and favorable attributes. This paper directs its attention to the const...
详细信息
Recently, linear complementary dual(LCD) codes have garnered substantial interest within coding theory research due to their diverse applications and favorable attributes. This paper directs its attention to the construction of binary and ternary LCD codes leveraging curiosity-driven reinforcement learning(RL). By establishing reward and devising well-reasoned mappings from actions to states, it aims to facilitate the successful synthesis of binary or ternary LCD codes. Experimental results indicate that LCD codes constructed using RL exhibit slightly superior error-correction performance compared to those conventionally constructed LCD codes and those developed via standard RL *** paper introduces novel binary and ternary LCD codes with enhanced minimum distance ***, it showcases how random network distillation aids agents in exploring beyond local optima,enhancing the overall performance of the models without compromising convergence.
Phase Change Memory (PCM) is considered one of the most promising scalable non-volatile main memory alternatives to DRAM. It provides similar to 4x-5x cost per bit advantage over DRAM, thus enabling cost-effective den...
详细信息
Phase Change Memory (PCM) is considered one of the most promising scalable non-volatile main memory alternatives to DRAM. It provides similar to 4x-5x cost per bit advantage over DRAM, thus enabling cost-effective dense main memory solution. However, PCM accesses are slower than DRAM, which leads to significantly poorer overall system performance (upto 80% higher execution time for memory intensive applications based on our analysis). To use PCM as a viable DRAM replacement, the performance gap between the two memory technologies has to be bridged, primarily by improving PCM read latency. In this work we propose an optimized PCM architecture, PCM-Duplicate, that trades off capacity to improve PCM read latency. In PCM-Duplicate, every row in the PCM subarray has a duplicate row. During memory read, both the rows are activated simultaneously. As a result, the bitline discharges through two PCM cells. This reduces the discharge time significantly, bringing down the overall sensing latency by > 3x compared to baseline PCM. While the overall PCM density benefit over DRAM halves, it still provides 2x more capacity than DRAM while having almost comparable read latency. PCM-Duplicate can either be used as low-cost DRAM main memory alternative or it can be used to replace the DRAM-based last level cache used in today's hybrid main memory systems for the slower PCM memories. Both these system options not only improve main memory capacity but also allow main memory based persistence by replacing DRAM and making the entire main memory non-volatile.
In this study, we focus on a technique that embeds an electronically readable watermark directly on printed materials. This technique is used in the single-dot pattern method proposed by Kaneda et al. In the existing ...
详细信息
ISBN:
(纸本)9781479953905
In this study, we focus on a technique that embeds an electronically readable watermark directly on printed materials. This technique is used in the single-dot pattern method proposed by Kaneda et al. In the existing method, we extend a media size to A4 and improve an extraction rate over 99%. In this paper, if we change the type of printer, we verified the difference of basically the same the information extraction results. We also apply this technique on paper-based document with foreground and get successful embedding and extracting information without error by using error-correctingcodes.
In this paper, we introduce a novel class of real number codes termed as R-spectral codes, derived from real symmetric operators. Our focus is on addressing the challenges associated with error correction in communica...
详细信息
In this paper, we introduce a novel class of real number codes termed as R-spectral codes, derived from real symmetric operators. Our focus is on addressing the challenges associated with error correction in communication systems utilizing real number codes. Our study initiates with a meticulous definition and analysis of the fundamental properties of R-spectral codes. These properties serve as the foundation for comprehending the distinctive characteristics that R-spectral codes offer, ensuring the integrity and reliability of transmitted data. Our exploration extends to the construction of maximum distance separable (MDS) R-spectral codes, which boast the maximum error correction capability. As a culmination of our research, we present an efficient decoding technique tailored for R-spectral codes. Leveraging an MDS R-spectral code and our decoding technique, we achieve optimal error correction and ensure good numerical stability. This innovative approach opens new avenues for enhancing the performance of real-number codes in practical applications.
In a celebrated result from the 60’s, Berlekamp showed that feedback can be used to increase the maximum fraction of adversarial noise that can be tolerated by binary errorcorrectingcodes from14 to13. However, his ...
详细信息
暂无评论