Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols h...
详细信息
Current identity-based (ID) cryptosystem lacks the mechanisms of two-party authentication and user's private key distribution. Some ID-based signcryption schemes and ID-based authenticated key agreement protocols have been presented, but they cannot solve the problem completely. A novel ID-based authentication scheme based on ID-based encrypfion (IBE) and fingerprint hashing method is proposed to solve the difficulties in the IBE scheme, which includes message receiver authenticating the sender, the trusted authority (TA) authenticating the users and transmitting the private key to them. Furthermore, the scheme extends the application of fingerprint authentication from terminal to network and protects against fingerprint data fabrication. The fingerprint authentication method consists of two factors. This method combines a token key, for example, the USB key, with the user's fingerprint hash by mixing a pseudo-random number with the fingerprint feature. The security and experimental efficiency meet the requirements of practical applications.
Current information security techniques based on cryptography are facing a challenge of lacking the exact connection between cryptographic key and legitimate users. Biometrics, which refers to distinctive physiologica...
详细信息
Current information security techniques based on cryptography are facing a challenge of lacking the exact connection between cryptographic key and legitimate users. Biometrics, which refers to distinctive physiological and behavioral characteristics of human beings, is a more reliable indicator of identity than traditional authentication system such as passwords-based or tokens-based. However, researches on the seamless integration biometric technologies, e.g., fingerprint recognition, with cryptosystem have not been conducted until recent years. In this paper, we provide an overview of recent advancements in fingerprint recognition algorithm with a special focus on the enhancement of low-quality fingerprints and the matching of the distorted fingerprint images, and discuss two representative methods of key release and key generation scheme based on fingerprints. We also propose two solutions for the application in identity authentication without trustworthy thirdparty in the network environment, and application in digital media protection, aiming to assure the secrecy of fingerprint template and fingerprint-based user authentication.
In this paper,the pursuit-evasion game with state and control constraints is solved to achieve the Nash equilibrium of both the pursuer and the evader with an iterative self-play *** the condition where the Hamiltonia...
详细信息
In this paper,the pursuit-evasion game with state and control constraints is solved to achieve the Nash equilibrium of both the pursuer and the evader with an iterative self-play *** the condition where the Hamiltonian formed by means of Pontryagin’s maximum principle has the unique solution,it can be proven that the iterative control law converges to the Nash equilibrium ***,the strong nonlinearity of the ordinary differential equations formulated by Pontryagin’s maximum principle makes the control policy difficult to figured *** the system dynamics employed in this manuscript contains a high dimensional state vector with *** practical applications,such as the control of aircraft,the provided overload is ***,in this paper,we consider the optimal strategy of pursuit-evasion games with constant constraint on the control,while some state vectors are restricted by the function of the *** address the challenges,the optimal control problems are transformed into nonlinear programming problems through the direct collocation ***,two numerical cases of the aircraft pursuit-evasion scenario are given to demonstrate the effectiveness of the presented method to obtain the optimal control of both the pursuer and the evader.
As one of the most effective vehicles for ocean development and exploration,underwater gliding robots(UGRs)have the unique characteristics of low energy consumption and strong ***,by borrowing the motion principles of...
详细信息
As one of the most effective vehicles for ocean development and exploration,underwater gliding robots(UGRs)have the unique characteristics of low energy consumption and strong ***,by borrowing the motion principles of current underwater robots,a variety of novel UGRs have emerged with improving their maneuverability,concealment,and environmental friendliness,which significantly broadens the ocean *** this paper,we provide a comprehensive review of underwater gliding robots,including prototype design and their key *** the perspective of motion characteristics,we categorize the underwater gliding robots in terms of traditional underwater gliders(UGs),hybrid-driven UGs,bio-inspired UGs,thermal UGs,and ***,their buoyancy driven system,dynamic and energy model,and motion control are concluded with detailed ***,we have discussed the current critical issues and future *** review offers valuable insight into the development of next-generation underwater robots well-suited for various oceanic applications,and aims to gain more attention of researchers and engineers to this growing field.
This paper proposes a new strategy for a humanoid robot to approach and operate a valve based on colour and shape constraints. It consists of four stages, namely rough base approaching, fine base approaching, rough ha...
详细信息
This paper proposes a new strategy for a humanoid robot to approach and operate a valve based on colour and shape constraints. It consists of four stages, namely rough base approaching, fine base approaching, rough hand approaching and fine hand approaching and grasping. The robot estimates the object's position using its stereo-vision at the first stage. A new visual positioning method is used to determine the valve's position and pose in the robot's frame in the second stage. When its hands are near the valve, a visual servoing method is employed to catch the handle of the valve via cameras in end-effectors. The advantages of both eye-in-head and eye-to-hand systems are exploited. Experimental results are presented to verify the effectiveness of the proposed method.
This paper introduces a fingerprint identification algorithm by clustering similarity with the view to overcome the dilemmas encountered in fingerprint identification. To decrease multi-spectrum noises in a fingerprin...
详细信息
This paper introduces a fingerprint identification algorithm by clustering similarity with the view to overcome the dilemmas encountered in fingerprint identification. To decrease multi-spectrum noises in a fingerprint, we first use a dyadic scale space (DSS) method for image enhancement. The second step describes the relative features among minutiae by building a minutia-simplex which contains a pair of minutiae and their local associated ridge information, with its transformation-variant and invariant relative features applied for comprehensive similarity measurement and for parameter estimation respectively. The clustering method is employed to estimate the transformation space. Finally, multi-resolution technique is used to find an optimal transformation model for getting the maximal mutual information between the input and the template features. The experimental results including the performance evaluation by the 2nd International Verification Competition in 2002 (FVC2002), over the four fingerprint databases of FVC2002 indicate that our method is promising in an automatic fingerprint identification system (AFIS).
In this paper, a class of continuous-time nonlinear multi-person zero-sum differential game problems is solved using an iterative adaptive dynamic programming (ADP) method. The idea is to use ADP technique to obtain t...
详细信息
This paper deals with the finite-horizon optimal tracking control for a class of discrete-time nonlinear systems using the iterative adaptive dynamic programming (ADP) algorithm. First, the optimal tracking problem is...
详细信息
WE are in an exciting new intelligent era where various Web 3.0 systems emerge and flourish.[1]–[3].In this new epoch,the collaboration of data and knowledge,humans and machines,actual and virtual worlds is undergoin...
详细信息
WE are in an exciting new intelligent era where various Web 3.0 systems emerge and flourish.[1]–[3].In this new epoch,the collaboration of data and knowledge,humans and machines,actual and virtual worlds is undergoing an unprecedented diversification and community-driven transformation,unveiling an open future full of boundless ***,the value of dispersed data extends far beyond passive storage and application.
In this paper,we develop a distributed solver for a group of strict(non-strict)linear matrix inequalities over a multi-agent network,where each agent only knows one inequality,and all agents co-operate to reach a cons...
详细信息
In this paper,we develop a distributed solver for a group of strict(non-strict)linear matrix inequalities over a multi-agent network,where each agent only knows one inequality,and all agents co-operate to reach a consensus solution in the intersection of all the feasible *** formulation is transformed into a distributed optimization problem by introducing slack variables and consensus ***,by the primal–dual methods,a distributed algorithm is proposed with the help of projection operators and derivative ***,the convergence of the algorithm is analyzed,followed by illustrative simulations.
暂无评论