In this paper, we propose an identities(JD) based watermarking scheme for Java programs. In our scheme, the watermark is generated by participants' identities, embedded via the watermarked opaque predicates, and v...
详细信息
The decentralized and anonymous characteristics of P2P environments make the task of controlling access to sharing information more difficult, which cannot be done by traditional access control methods. In this paper,...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
Recently, Authentication protocol has been recognized as an important factor for grid computing security. This paper described a new simple and efficient Grid authentication system providing user anonymity. Our system...
详细信息
After studying about human auditory system and narrowband communications system model, a narrowband audio hiding algorithm based on human auditory system was presented. A lot of experiments proved that the algorithm h...
详细信息
After studying about human auditory system and narrowband communications system model, a narrowband audio hiding algorithm based on human auditory system was presented. A lot of experiments proved that the algorithm had strong robustness to prevent many attacks from such as D/A, A/D, channel noise and so on. In time domain, frequency domain, especially for hearing, it had high transparence. What's more, the algorithm, whose hiding capacity reached up to 20 bit/s, had intelligent blind detection property and can be used in many domains.
Because the processing speed of intrusion detection system can hardly keep pace with the high-speed development of network, improving the speed of intrusion detection has been the problem starved for solve. By adoptin...
详细信息
Batch verification can provide large computational savings when multiple signatures are verified together. Recently, some batch verifying signature schemes have been proposed from bilinear pairings. In this paper, we ...
详细信息
Batch verification can provide large computational savings when multiple signatures are verified together. Recently, some batch verifying signature schemes have been proposed from bilinear pairings. In this paper, we show that an attacker can cheat a verifier to accept invalid signatures in these batch verifying schemes. We also show that randomized batch verification technique can be used to avoid these attacks.
It is a trend to construct unattended substation in power system *** paper systematically analyses the superiority and limitation of MATLAB and Visual C++ and illustrates how to compile m-files to cpp-files by MATLAB ...
详细信息
ISBN:
(纸本)0863416381
It is a trend to construct unattended substation in power system *** paper systematically analyses the superiority and limitation of MATLAB and Visual C++ and illustrates how to compile m-files to cpp-files by MATLAB engines and integrate cpp-files code into existing C++ projects by Visual C++ to realize intelligent function on image recognition used for unattended *** intelligent function can effectively test illegal intrusion and fires through the detection and recognition of moving goals by three-image difference method and self-adapting threshold value segmentation algorithm and detect situations of disconnection link by use of image crop and image index processing and give warnings to alarm system. Because of lacking of brightness of image or nonlinear brightness and being influenced by kinds of noise,this paper determines to adopt contrast enhanced algorithm and high-frequency enhanced algorithm to repair grey-scale distribution and uses median filtering to remove noise of image. In the end,this paper brings forward the expectation about the image recognition of the unattended substation. When non-uniform of image illumination distribution, grey-scale of background changes largely and image segmentation has not the fittest threshold, so the paper uses self-adapting threshold segmentation algorithm to gain the image segmentation.
This paper presents a two-level framework for news video segmentation. Our framework is established-based upon a similar framework as in. We extended the original framework by adding rule-based pre-segmentation module...
详细信息
This paper presents a two-level framework for news video segmentation. Our framework is established-based upon a similar framework as in. We extended the original framework by adding rule-based pre-segmentation module, similarity measurement module and new features. We perform decision tree at the shot level and HMM (hidden Markov models) analysis at the story level, respectively. Experiment result with a training set of 24 hours (967 story units) news video from CCTV-9 (China Central TV-International) and a testing set of 24 hours (779 story units) news video from several TV-channels show that our semi-automatic system can achieve 81.5% of F1 value in the case of CCTV-9
In this paper, we propose a method to find the anomalous behaviors in network traffic. We map the network connection records into different feature spaces typically of high dimension according to their protocols and s...
详细信息
ISBN:
(纸本)1424406048
In this paper, we propose a method to find the anomalous behaviors in network traffic. We map the network connection records into different feature spaces typically of high dimension according to their protocols and services. In training, we perform clustering to group training data points into clusters, from which we select some clusters as normal and known-attack profile according to a simple, but effect, criterion. For those training data excluded from the profile, we use them to build a specific classifier. The classifier has two distinct characteristics: one is that it regards each data point in the feature space with the limited influence scope, which is served as the decisive bounds of the classifier, and the other is that it has the "default" label to recognize those novel attacks. We present a novel classification algorithm, influence-based classification algorithm, to deal with ambiguous data. Our system is tested on the KDD Cup 1999 data. Results show that it is superior to other data mining based approaches in detection performance, especially in detection of PROBE and U2R attacks
暂无评论