Geometric algorithms are widely used in many scientific fields like computer vision, computer graphics. To guarantee the correctness of these algorithms, it's important to apply formal method to them. In this pape...
详细信息
Visual codebook based texture analysis and image recognition is popular for its robustness to affine transformation and illumination variation. It is based on the affine invariable descriptors of local patches extract...
详细信息
Visual codebook based texture analysis and image recognition is popular for its robustness to affine transformation and illumination variation. It is based on the affine invariable descriptors of local patches extracted by region detector, and then represents the image by histogram of the codebook constructed by the feature vector quantization. The most commonly used vector quantization method is k-means. But due to the limitations of predefined number of clusters and local minimum update rule, we show that k-means would fail to code the most discriminable descriptors. Another defect of k-means is that the computational complexity is extremely high. In this paper, we proposed a nonparametric vector quantization method based on mean shift, and use locality-sensitive hashing (LSH) to reduce the cost of the nearest neighborhood query in the mean-shift iterations. The performance of proposed method is demonstrated in several image classification tasks. We also show that the information Gain or Mutual information based feature selection based on our codebook further improves the performance.
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive se...
详细信息
In this paper,we show how to use the dual techniques in the subgroups to give a secure identity-based broadcast encryption(IBBE) scheme with constant-size ciphertexts. Our scheme achieves the full security(adaptive security) under three static(i.e. non q-based) assumptions. It is worth noting that only recently Waters gives a short ciphertext broadcast encryption system that is even adaptively secure under the simple assumptions. One feature of our methodology is that it is relatively simple to leverage our techniques to get adaptive security.
Affine transformation detection can be used in many computer vision and other applications. This paper presents a new method for affine transformation detection. The state-of-the-art methods are mainly divided into tw...
详细信息
National critical infrastructure is a typical complex system with the characteristics of self-organized criticality. In this paper, we firstly analyze the basic concepts of national critical infrastructure and the ass...
详细信息
The quality of virtual view based on multi-view video (MVD) plus depth format is often evaluated by PSNR or subjectively judged. However, due to synthesizing arbitrary view images, the virtual view images mostly hav...
详细信息
The quality of virtual view based on multi-view video (MVD) plus depth format is often evaluated by PSNR or subjectively judged. However, due to synthesizing arbitrary view images, the virtual view images mostly have no reference images and are only assessed using non-reference. Virtual view images synthesized by depth estimation reference software (DERS) and view synthesis reference software (VSRS) often accompanied with blockiness and other distortions on the edge. In addition, matching level for the depth map and the corresponding texture maps of left and right views also affects the quality of the virtual view. This paper compares the edge similarity of the depth and the corresponding texture maps which generate the intermediate virtual view and combined with the virtual view's blockiness which causing blur to evaluate the quality of the virtual view. Experiment results show that the proposed method can reflect the quality of the virtual view better.
Batina et al. have proposed a privacy-preserving grouping-proof RFID protocol with colluding tag prevention (CTP) recently which relies exclusively on the use of Elliptic Curve Cryptography (ECC). In this paper, we sh...
详细信息
Batina et al. have proposed a privacy-preserving grouping-proof RFID protocol with colluding tag prevention (CTP) recently which relies exclusively on the use of Elliptic Curve Cryptography (ECC). In this paper, we show that this proposed protocol is not secure against the tracking attack. To make this attack successfully, the adversary needs to execute three phases. Firstly, the attacker just eavesdrops on the messages exchanged between Reader and Tags. Secondly, the attacker impersonates Reader to replay the message which is got from the first phase. Finally, the adversary acts as a man in the middle to tamper the messages exchanged between Reader and Tag B. Then we propose an enhancement and prove that the revision is secure against the tracking attack which keeps other security properties.
This paper investigates the problem of robust H∞ filtering for a class of uncertain nonlinear stochastic time-delay systems with Markovian jump parameters. The system under consideration contains parameter uncertaint...
详细信息
A new book-lending system is designed and analyzed based on logic Petri nets in this paper. The batch processing function and indeterminacy of readers are included in the system. Its logic Petri net model is establish...
详细信息
In a Wireless Sensor Networks (WSN), there are normally one or several sensor nodes working as Access Points (AP), which are able to provide a relay for other sensors to an external Internet connection. Since WSNs are...
详细信息
暂无评论