In the past, several approaches have been proposed to produce high quality solid textures. Unfortunately, they often suffer from several synthesis artifacts, such as color blurry, bad texture structures, introducing a...
详细信息
In the past, several approaches have been proposed to produce high quality solid textures. Unfortunately, they often suffer from several synthesis artifacts, such as color blurry, bad texture structures, introducing aberrant voxel colors and so on. In this paper, we present a novel algorithm for synthesizing high quality solid textures from 2D exemplars. We adopt an optimization framework with the k-coherence search and the discrete solver for solid texture synthesis. The texture optimization approach is integrated with a new kind of histogram matching, position histogram matching, which effectively causes the global statistics of the synthesized solid textures to match those of the exemplars. Experimental results show that our synthesized results do not suffer from color blurry, and most texture structures are preserved well, outperforming the previous solid texture synthesis algorithms in terms of the synthesis quality.
In this paper we indicate the concept of Dynamic Data Flow Graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds wat...
详细信息
ISBN:
(纸本)9781424448999
In this paper we indicate the concept of Dynamic Data Flow Graph based on the dynamic data dependency during execution of software. On this basis, we propose a dynamic software watermarking algorithm, which embeds watermarking information into DDFG of software, and discuss the implementation of embedding and extracting watermark. Finally we analyze the performance of this algorithm.
We design a fully hierarchical proxy blind signature scheme. Then we propose an efficient fair off-line electronic cash system based on the fully hierarchical proxy blind signature scheme with provable security. Our e...
详细信息
Facial aging synthesis is one of the main topics in computer graphics. This paper proposes a synthetic approach to 3D aging faces by using color Gabor wavelet and texture transplant techniques. Based on 3D aging templ...
详细信息
Facial aging synthesis is one of the main topics in computer graphics. This paper proposes a synthetic approach to 3D aging faces by using color Gabor wavelet and texture transplant techniques. Based on 3D aging templates, the color Gabor wavelet transform is carried out first to extract the high-frequency sub-images from the texture maps, in which is contained the texture feature of aging skin. Then the corresponding sub-images of target facial images are replaced and fused. The transplant of aging texture towards target face is finally achieved through wavelet reconstruction. The experimental results show that the aging features can be extracted effectively by wavelet transform and be used to synthesize the 3D aging face of the target face.
The technique of using orthogonal sequences to embed digital watermarks is described. It is shown that embedding with sequences which are orthogonal to the cover image can enhance the detection reliability and improve...
详细信息
The technique of using orthogonal sequences to embed digital watermarks is described. It is shown that embedding with sequences which are orthogonal to the cover image can enhance the detection reliability and improve the system performance and robustness compared to using random sequences. Algorithms to generate such orthogonal sequences are introduced and the performance results are compared. Results indicate that the more than 1000 bit payload is realised for printed photographs (512 times 512 pixels).
The reaction mechanism of CO and Fe 2 O 3 in a chemical-looping combustion (CLC) was studied based on density functional theory (DFT) at B3LYP level in this paper. The structures of all reactants, intermediate, trans...
详细信息
The reaction mechanism of CO and Fe 2 O 3 in a chemical-looping combustion (CLC) was studied based on density functional theory (DFT) at B3LYP level in this paper. The structures of all reactants, intermediate, transition structures and products of this reaction had been optimized and characterized. The reaction path was validated by means of the intrinsic reaction coordinate (IRC) approach. The result showed that the reaction was divided into two steps, the adsorbed CO molecule on Fe 2 O 3 surface formed a medium state with one broken Fe-O bond in step1, and in step2, O atom broken here oxidized a subsequent CO molecule in the fuel reactor. Thus, Fe 2 O 3 molecule transport O from air to oxide CO continually in the CLC process. The activation energy and rate coefficients of the two steps were also obtained.
Digital rights management (DRM) is the technological solution to control the distribution and usage of digital assets. However, existing solutions are vulnerable to various attacks in the context where the consumer ca...
详细信息
Digital rights management (DRM) is the technological solution to control the distribution and usage of digital assets. However, existing solutions are vulnerable to various attacks in the context where the consumer can control the platform totally. To improve the security of DRM solutions the paper proposes a secure DRM architecture based on TPM which is called TBDRM. It ensures that content is always under the control of the license and such license is secure and fresh during its lifecycle. Compared with other DRM solutions, TBDRM can prevent replay attack and improper access enforced through cracked software.
作者:
Daofeng LiLize GuBin SunXinxin NiuYixian YangInformation Security Center
State Key Laboratory of Networking and Switching Technology Key Laboratory of network and information attack & defense technology of MOE National Engineering Laboratory for Disaster Backup and RecoveryBeijing University of Po
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing ...
详细信息
Router has acted as more and more important role in the large-scale network. In the meantime, the security of the router become more seriously. In this paper, we propose a new algorithm to decide a credential routing path from the start router to the end one based on the trust theory that considers the trustworthy of link, the cost of link and the trustworthy of router as the critical factors so as to utilize the principle of the grey correlation degree to obtain a credential routing path, instead of weighted mean in existed methods of trust measurement. We guarantee that packet can secure transfer under the credential routing path and identify the remote routers that are subject to attacks.
Usually there are leading DNS resolution operations in normal network access scenarios and at the same time the relative connection success ratio is very high; but there is no leading DNS resolution operation in netwo...
详细信息
Usually there are leading DNS resolution operations in normal network access scenarios and at the same time the relative connection success ratio is very high; but there is no leading DNS resolution operation in network scanning scenarios and the relative connection success ratio is very low. For convenience in this paper we named the network access connection attempt without leading DNS resolution operation as Suspicious Network Access (SNA). A network scanning detection approach is proposed in this paper by the analysis of SNAs' response ratio and the randomness of their target IP addresses for each host in LAN. Since the proposed approach only takes the SNAs into account and the interference from normal network access can be decreased effectively, it can detect network scanning attacks with high accuracy and efficiency. The experiment results in simulation network scenario showed that the proposed approach support the detection of TCP-SYN and ICMP type network scanning attacks and also support the detection of stealth network scanning attacks as well.
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a ...
详细信息
ISBN:
(纸本)9781424442843
Existing techniques based on behavior semantics for information theft malware detection have the main shortcomings of low path coverage and disability of finding hidden malicious behaviors. In this paper we propose a static method for the detection of information theft malware to overcome these shortcomings. It is particularly efficienct for inter-procedure taint analysis, and it is suitable for complicated malware detection, such as Trojan and Bot. Its static style makes it able to find hidden malicious behaviors. We also present an implementation of our method that works on x86 executables and a set of experimental studies validate its good efficiency and effectiveness.
暂无评论