Since there is good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection, reversible data hiding in encrypted image (RDHEI) has attracted inc...
详细信息
ISBN:
(纸本)9781479999897
Since there is good potential for practical applications such as encrypted image authentication, content owner identification and privacy protection, reversible data hiding in encrypted image (RDHEI) has attracted increasing attention in recent years. In this paper, we propose and evaluate a new separable RDHEI framework. Additional data can be embedded into a cipher image previously encrypted using Josephus traversal and a stream cipher. A block histogram shifting (BHS) approach using self-hidden peak pixels is adopted to perform reversible data embedding. Depending on the keys held, legal receivers can extract only the embedded data with the data hiding key, or, they can decrypt an image very similar to the original with the decryption key. They can extract both the embedded data and recover the original image error-free if both keys are available. The results demonstrate that higher embedding payload, better quality of decrypted-marked image and error-free image recovery are achieved.
Human salience of pedestrians images is distinctive and has been shown importantly in person re-identification (or pedestrians identification) problem. Thus, how to obtain the salient area of pedestrian images is impo...
详细信息
In this paper, we analyzed the blindness of traditional clustering algorithms, which select cluster head based on residual energy. Then we proposed the Dynamic Clustering Algorithm (DCA) in Mobile Wireless Sensor Netw...
详细信息
In this paper, a new method of non contact and on-line measurement is presented for the change of the axis of the rotation axis. Under the condition of a constant light source, the image of the original position and t...
详细信息
This paper describes an image compression method based on block truncation coding (BTC) and linear regression coding (LRC) hybrid strategy. BTC is simple and easy to use, but only two representative values can not ade...
详细信息
Reversible data hiding in encrypted image (RDHEI) is an emerging technology since it has good potential for practical applications such as encrypted image authentication, content owner identification and privacy prote...
详细信息
The performance of nodes shows great differences in Delay Tolerant Network (DTN). In order to estimate the performance of nodes in a more effective way, we put forwarded the concept of historic throughput ratio of nod...
详细信息
Aiming at the shortage that Kinetic-molecular theory optimization algorithm (KMTOA) is more likely to show premature convergence and the accuracy of searching for the optimum needs to be improved, a Kinetic-molecular ...
Aiming at the shortage that Kinetic-molecular theory optimization algorithm (KMTOA) is more likely to show premature convergence and the accuracy of searching for the optimum needs to be improved, a Kinetic-molecular theory optimization algorithm (KCKMTOA) based on Kent chaotic mapping was proposed. The algorithm utilizes the characteristics of chaotic algorithm, such as ergodicity, non-periodicity, randomness etc. When algorithm falls into the local optimum, Kent chaotic mapping is used to perform chaotic search around the local optimum to replace partial particles of original particle swarm in order to jump out from the local optimum to find the global optimum. As the algorithm is carried out, the radius of chaotic search decreases linearly, so as to ensure the precision of searching and speed of the algorithm. 20 classical test functions are taken into consideration in simulation experiments. After making a comprehensive comparison for the performance of searching for the optimum of DE, GA, QPSO, KMTOA and KCKMTOA in 20 classical test functions, the results of experiments show that this algorithm has obvious advantages in precision, speed and robustness optimization etc.
Graphical representation is a very efficient tool for visual analysis of protein sequences. In this paper, a novel 2D graphical representation scheme is proposed on the basis of a newly introduced concept, named chara...
详细信息
Graphical representation is a very efficient tool for visual analysis of protein sequences. In this paper, a novel 2D graphical representation scheme is proposed on the basis of a newly introduced concept, named characteristic model of the protein sequences. After obtaining the 2D graphics of protein sequences, two numerical characterizations of them is designed as descriptors to analyze the nine DN5 protein sequences, simulation and analysis results show that, comparing with existing methods, our method is not only visible, intuitional, and simple, but also has no circuit or degeneracy, and even more important, since the storage space required by our method is constant and has nothing to do with the length of protein sequences, then it can keep excellent visual inspection for long protein sequences.
The traditional LTE-A algorithm validation is limited to pure computer software simulation, which can't simulate the actual link scenes, missing scene parameters, the simulation results is invaluable in practice. ...
详细信息
ISBN:
(纸本)9781467386456
The traditional LTE-A algorithm validation is limited to pure computer software simulation, which can't simulate the actual link scenes, missing scene parameters, the simulation results is invaluable in practice. Therefore, this paper designs LTE-A hardware-in-the-loop simulation system based on software-defined radio device USRP, and the physical layer real-time test level downlink is designed on the system. The downlink scheduled by the scheduling algorithm of the PC simulation platform, with scene parameters feedback to MAC layer in real time. The downlink designed with power interference between cells and users simulate the actual scene. Compare to current design of LTE hardware-in-the-loop simulation, this design presents data interaction between MAC layer and physical layer, implement of specific requirements for physical layer link, instead of generation of vector signal only. The results show that the system is running normally with easy scalability.
暂无评论