Photo Response Non-Uniformity (PRNU) noise based source attribution is a well known technique to verify the source camera of an anonymous image or video. Researchers have proposed various counter measures to PRNU base...
详细信息
Photo Response Non-Uniformity (PRNU) noise based source attribution is a well known technique to verify the source camera of an anonymous image or video. Researchers have proposed various counter measures to PRNU based source camera attribution. Forced seam-carving is a recently proposed counter forensics measure that was proposed to defeat PRNU based source attribution by disturbing the alignment of PRNU noise patterns. This paper shows that given a multiple number of seam-carved images, source attribution can still be reliably made even if the size of a non-carved image block is less than the recommended size of 50×50.
Dynamic symbolic execution (DSE) is a well-known program test technology which can generate test cases automatically through collecting constraints of the paths represented by symbolic value. Automated test based on D...
详细信息
Dynamic symbolic execution (DSE) is a well-known program test technology which can generate test cases automatically through collecting constraints of the paths represented by symbolic value. Automated test based on DSE targets at covering all paths and branches in a limited time. Although DSE has been investigated for a few years, several challenges still exist which hinder the actual usage. Path explosion is one of the greatest challenges to solve, which decreases the test performance. Analyzing complexity of the execution paths of different test programs, and investigating the factors associated with the test efficiency become very important in the software testing life cycle.
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model (MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electri...
详细信息
In order to optimize the ladder-pricing scheme in Shanghai, we present a multi-objective optimization model (MOOM). To build this model, first we use price elasticity theory;divide the ladder pricing into peak electricity bill and valley electricity bill in the time dimension to model the single-user demand response. Second based on the single-user demand response model, combined with the overall users’ electricity distribution density function, we build an all-users demand response model. The proposed model has two objectives: minimize energy consumption and maximize residents’ satisfaction. Simulation results confirm that the proposed model can optimize the ladder-pricing scheme.
Although PRNU (Photo Response Non-Uniformity)-based methods have been proposed to verify the source camera of a non-stabilized video, these methods may not be adequate for stabilized videos. The use of video stabiliza...
详细信息
ISBN:
(纸本)9781509011391
Although PRNU (Photo Response Non-Uniformity)-based methods have been proposed to verify the source camera of a non-stabilized video, these methods may not be adequate for stabilized videos. The use of video stabilization has been increasing in recent years with the development of novel stabilization software and the availability of stabilization in smart-phone cameras. This paper presents a PRNU-based source camera attribution method for out-of-camera stabilized video (i.e., stabilization applied after the video is captured). The scheme can (i) automatically determine if a given video is stabilized, (ii) calculate the fingerprint from a stabilized video, and (iii) effectively correlate the fingerprint computed from a stabilized video (i.e., anonymous video) with a fingerprint computed from another stabilized or non-stabilized video (i.e., a known video). Furthermore, experimental results show that the source camera of an anonymous non-stabilized video can be verified using a fingerprint computed from a set of images.
Hierarchical Interconnection Network (HIN) is indispensable for the practical implementation of future generation massively parallel computer systems which consists of hundred thousands nodes or even millions of nodes...
详细信息
ISBN:
(纸本)9781509045228
Hierarchical Interconnection Network (HIN) is indispensable for the practical implementation of future generation massively parallel computer systems which consists of hundred thousands nodes or even millions of nodes. Because it yields good performance with low cost due to reduction of communication links and by exploring the locality in the communication & traffic patterns. A Midimew connected Mesh Network (MMN) is an HIN comprised of numerous basic modules, where the basic modules are 2D-mesh networks and they are hierarchically interconnected using midimew network to construct the higher level networks. In this paper, we present the architecture of a MMN and evaluate the time-cost effective factor of MMN, TESH, mesh, and torus networks. It is found that the proposed MMN yields slightly high time-cost effectiveness factor with small diameter and average distance as compared to other networks. Overall, performance with respect to time-cost effectiveness factor with small diameter and average distance suggests that the proposed MMN will be a indispensable choice for the next generation massively parallel computer systems.
Cloud computing is an evolutionary model for distributed computing, which consists of centralized data centers providing resources for massive scalable computing. Major security challenges are the generation, distribu...
详细信息
ISBN:
(纸本)9781467385497
Cloud computing is an evolutionary model for distributed computing, which consists of centralized data centers providing resources for massive scalable computing. Major security challenges are the generation, distribution, and usage of encryption keys in cloud systems. One of ways to provide security, proxy re-encryption scheme is proposed, in which a semi-trusted proxy transforms a cipher-text for data sender into a cipher-text for data receiver without seeing the underlying plaintext. This paper proposes a new re-encryption scheme for secure data sharing, which is based on a trusted authority. Experimental results show that our scheme attains good performance than the other previous schemes.
Multi-view video streaming is essential for various mobile 3D and immersive applications that can capture the same scene from multiple angles. However, the large traffic volume of multi-view streaming will drain the b...
详细信息
ISBN:
(纸本)9781467372596
Multi-view video streaming is essential for various mobile 3D and immersive applications that can capture the same scene from multiple angles. However, the large traffic volume of multi-view streaming will drain the battery power quickly. This paper studies the power efficient delivery of 3D content with multi-view video coding (MVC) in the emerging 802.11-like MIMO wireless systems, and the purpose is to minimize the power consumption with the video quality guarantee. We propose an efficient algorithm to perform antenna assignment and transmission power allocation, by exploiting both the source coding characteristics of MVC and channel diversity of multiple antennas. A proof-of-concept system, namely PoM, is designed on the software radio platform and is evaluated in realistic indoor environments. To the best of our knowledge, this is the first practical system for energy efficient multi-view video streaming. Experimental results show that PoM can significantly save energy in the transmission by 12% ~ 65% on average when the required PSNR decreases from 45dB to 35dB.
There is a trend that more and more enterprises utilize SDN (Software Defined Network) technology to manage the network of their cloud platform. For example, cloud computing datacenters define their own virtual networ...
详细信息
There is a trend that more and more enterprises utilize SDN (Software Defined Network) technology to manage the network of their cloud platform. For example, cloud computing datacenters define their own virtual networks or virtual firewalls using SDN controller. Tenants need the network components of cloud platform to call northbound interfaces of SDN controller if they want to manage the network of cloud platform. If there are a large number of tenants, the interaction between the cloud platform and the SDN controller is very frequent. In order to simplify this process, we propose a policy-driven based batch processing network operation SDN controller scheme in which the cloud datacenter manager sends the SDN-related policies to the SDN controller, and the SDN controller processes the policies received according to user's permissions and operations priority. The management of network resources can integrate with other resources management in the cloud datacenter environment effectively. We then build a prototype, a policy-driven SDN controller (PDSDN), to demonstrate the efficiency and performance of our design.
As more and more organizations move to cloud, it is inevitable that cross-organizational collaboration will need to be supported in the cloud. In this paper, we explore models for collaboration among clouds whose reso...
详细信息
暂无评论