In this paper, an RGB color image encryption method based on the Lorenz chaotic system and DNA computation is presented. This method can not only change the location of the image pixel but also change the pixel values...
详细信息
In this paper, an RGB color image encryption method based on the Lorenz chaotic system and DNA computation is presented. This method can not only change the location of the image pixel but also change the pixel values. Firstly, we split the RGB color image into R, G, B three components. Then, we use the 2D-hyperchaotic sequence to disorder the location of R, G, B three-component pixels. Secondly, three different chaotic sequences are generated by a one-dimensional logistic chaotic map, and the pixel values of the three components R, G, B can be scrambled through the three logistic chaotic sequences. Then the R, G, B digital images can be transformed into DNA coding matrices based on DNA coding rules. Thirdly, 3D chaotic sequences are generated by use of Lorenz chaotic system and are encoded based on DNA encoding rules in order to generate three DNA sequences. Finally, the encrypted image can be obtained by utilizing DNA operations on the DNA sequences of three components R, G, B and DNA sequences generated by the Lorenz chaotic system. The experiment results and encryption effect demonstrate that the proposed scheme is effective, and it has strong sensibility, high security, and good ability of resisting statistic attack.
A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system is presented. Different from the traditional DNA encryption methods, our algorithm is not use complex biological operati...
详细信息
A novel couple images encryption algorithm based on DNA subsequence operation and chaotic system is presented. Different from the traditional DNA encryption methods, our algorithm is not use complex biological operation, but just uses the idea of DNA subsequence operation (such as elongation operation, truncation operation, and deletion operation). And then, do the DNA addition operation under the Chen's Hyper-chaotic map in this image cipher. The simulation experimental results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack and statistical attack.
Face recognition has become a research hotspot in the field of pattern recognition and artificial intelligence. Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are two traditional methods in ...
详细信息
Face recognition has become a research hotspot in the field of pattern recognition and artificial intelligence. Principal Component Analysis (PCA) and Linear Discriminant Analysis (LDA) are two traditional methods in pattern recognition. In this paper, we propose a novel method based on PCA image reconstruction and LDA for face recognition. First, the inner-classes covariance matrix for feature extraction is used as generating matrix and then eigenvectors from each person is obtained, then we obtain the reconstructed images. Moreover, the residual images are computed by subtracting reconstructed images from original face images. Furthermore, the residual images are applied by LDA to obtain the coefficient matrices. Finally, the features are utilized to train and test SVMs for face recognition. The simulation experiments illustrate the effectivity of this method on the ORL face database.
A new image fusion encryption algorithm based on image fusion and DNA sequence operation and hyper-chaotic system is presented. Firstly, two DNA sequences matrices are obtained by encoding the original image and the k...
详细信息
A new image fusion encryption algorithm based on image fusion and DNA sequence operation and hyper-chaotic system is presented. Firstly, two DNA sequences matrices are obtained by encoding the original image and the key image. Secondly, using the chaotic sequences generated by Chen's hyper-chaotic maps to scramble the locations of elements from the DNA sequence matrix which generated form original image. Thirdly, XOR the scrambled DNA matrix and the random DNA matrix by using DNA sequence addition operation. At last, decoding the DNA sequence matrix, we will get the encrypted image. The simulation experimental results and security analysis show that our algorithm not only has good encryption effect, but also has the ability of resisting exhaustive attack and statistical attack.
Unconventional emergency is essentially a developing process that event state variable changes from steady to transient, then to a new steady state. This paper uses plant growth dynamics theory to study microcosmic dy...
详细信息
To resist on general attacks, such as compression, noising and geometric distortion attacks is a common requirement for digital image watermarking or data hiding techniques comparing with rotation, scaling and transla...
详细信息
ISBN:
(纸本)9780819495587
To resist on general attacks, such as compression, noising and geometric distortion attacks is a common requirement for digital image watermarking or data hiding techniques comparing with rotation, scaling and translation(RST) attacks which are considered to be more challenging. Based on invariant centroid and LPM which is also used to analyze the angle of rotation and ratio of scaling influence after attacks of watermarked image combining with chaotic system and a novel adaptive coefficient α, this paper presents a robust and invisible digital image watermarking technology. The experiment results show that this method has high invisibility and robust, especially withstand RST attacks.
This paper presents a hybrid method for synthesizing natural animation of facial expression with data from motion capture. The captured expression was transferred from the space of source performance to that of a 3D t...
详细信息
For the existing motion capture (MoCap) data processing methods, manual interventions are always inevitable, most of which are derived from the data tracking process. This paper addresses the problem of tracking non-r...
For the existing motion capture (MoCap) data processing methods, manual interventions are always inevitable, most of which are derived from the data tracking process. This paper addresses the problem of tracking non-rigid 3D facial motions from sequences of raw MoCap data in the presence of noise, outliers and long time missing. We present a novel dynamic spatiotemporal framework to automatically solve the problem. First, based on a 3D facial topological structure, a sophisticated non-rigid motion interpreter (SNRMI) is put forward; together with a dynamic searching scheme, it cannot only track the non-missing data to the maximum extent but recover missing data (it can accurately recover more than five adjacent markers under long time (about 5 seconds) missing) accurately. To rule out wrong tracks of the markers labeled in open structures (such as mouth, eyes), a semantic-based heuristic checking method was raised. Second, since the existing methods have not taken the noise propagation problem into account, a forward processing framework is presented to solve the problem. Another contribution is the proposed method could track facial non-rigid motions automatically and forward, and is believed to greatly reduce even eliminate the requirements of human interventions during the facial MoCap data processing. Experimental results proved the effectiveness, robustness and accuracy of our system.
A new product conceptual design approach is put forward based on Hopfield neural networks models. By research on the mechanisms of Hopfield neural networks, the associative simulation approaches are proposed. The appr...
详细信息
A new product conceptual design approach is put forward based on Hopfield neural networks models. By research on the mechanisms of Hopfield neural networks, the associative simulation approaches are proposed. The approach is given by Hebb learn- ing law, Hopfield neural networks and crossover and mutation. The calculating models and the calculating formulas for the concep- tual design are put forward. Finally, an example for the conceptual design of a solar energy lamp is given. The better results are ob- tained in the conceptual design.
Recently, graphics processing units (GPUs) have opened up new opportunities for speeding up general-purpose parallel applications due to their massive computational power and up to hundreds of thousands of threads ena...
详细信息
ISBN:
(纸本)9781450319003
Recently, graphics processing units (GPUs) have opened up new opportunities for speeding up general-purpose parallel applications due to their massive computational power and up to hundreds of thousands of threads enabled by programming models such as CUDA. However, due to the serial nature of existing micro-architecture simulators, these massively parallel architectures and workloads need to be simulated sequentially. As a result, simulating GPGPU architectures with typical benchmarks and input data sets is extremely time-consuming. This paper addresses the GPGPU architecture simulation challenge by generating miniature, yet representative GPGPU kernels. We first summarize the static characteristics of an existing GPGPU kernel in a profile, and analyze its dynamic behavior using the novel concept of the divergence flow statistics graph (DFSG). We subsequently use a GPGPU kernel synthesizing framework to generate a miniature proxy of the original kernel, which can reduce simulation time significantly. The key idea is to reduce the number of simulated instructions by decreasing per-thread iteration counts of loops. Our experimental results show that our approach can accelerate GPGPU architecture simulation by a factor of 88X on average and up to 589X with an average IPC relative error of 5.6%.
暂无评论