An effective image tamper localization and self-recovery scheme that uses the rehashing model is proposed in this paper. The aim of the proposed scheme was to reduce the failure rate in detecting image tamper areas an...
详细信息
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information se- curity, such as for group authentication, cloud storage schemes, secure parallel communication and wir...
详细信息
Threshold secret sharing (SS), also denoted as (t, n) SS, has been used extensively in the area of information se- curity, such as for group authentication, cloud storage schemes, secure parallel communication and wireless mul- tipath routing protocols. However, a (t, n) SS cannot de- tect any deceptions among the dealer and shareholders. Veriable secret sharing (VSS) overcomes the weakness of (t, n) SS in such a way that it is able to detect cheaters by verifying the validity of shares or the correctness of the recovered secret under the condition that both shares and the secret are not compromised. Recently, two non- interactive VSSs based on Asmuth-Bloom's SS were pro- posed by Harn et al. and Liu et al., respectively. Both VSSs require shareholders to examine the range of values of some integers related to the secret before recovering the secret, which is a time-consuming operation. In this paper, we propose a novel integratable VSS mechanism that integrates the concepts of the generalized Chinese remainder theorem (GCRT), Shamir's SS and Asmuth- Bloom's SS. Our proposed VSS can verify that the secret reconstructed by any t or more shareholders is the same as the one that the dealer has generated. Analysis shows that our proposed VSS can provide perfect secrecy and better efficiency.
The almost blank subframe (ABS) has been studied in 3GPP as a way to mitigate downlink interference experienced by cell range expansion (CRE) user equipments (UEs). However, the throughput of CRE UEs highly depends on...
详细信息
ISBN:
(纸本)9781479975358
The almost blank subframe (ABS) has been studied in 3GPP as a way to mitigate downlink interference experienced by cell range expansion (CRE) user equipments (UEs). However, the throughput of CRE UEs highly depends on the ratios of ABS which are statically configured in many situations. The coordinated multi-point (CoMP) is one of the key solutions standardized in LTE-A which can be implemented in CRE with ABS to exploit the abundant spatial resources. And distributed cell selection could help guarantee the UEs' performance under different range expansion biases. In this paper, a distributed CoMP method for CRE with ABS is proposed in heterogeneous networks. Simulation results show that our proposed algorithm provides considerable performance gains in the spectrum efficiency with different bias and users settings.
This paper proposes a multi-objective with dynamic topology particle swarm optimization (PSO) algorithm for solving multi-objective problems, named DTPSO. One of the main drawbacks of classical multi-objective particl...
详细信息
This paper proposes an improved performance metric for multiobjective evolutionary algorithms with user preferences. This metric uses the idea of decomposition to transform the preference information into m+1 points o...
详细信息
Delay Tolerant Networks(DTNs) is a mobile wireless network, in which it is difficult to establish end-to-end paths. Meanwhile, the nodes transmit message copies randomly,resulting in a high overhead of message propaga...
详细信息
Delay Tolerant Networks(DTNs) is a mobile wireless network, in which it is difficult to establish end-to-end paths. Meanwhile, the nodes transmit message copies randomly,resulting in a high overhead of message propagation. In this paper, a Transfer Utility of Node Spray and Wait(TUoN-SNW)routing is proposed to forward the message copies dynamically,which avoid randomness of Spray and Wait routing protocol when message copies are forwarded. And in order to reduce the overhead, a Based on Transfer Utility of Node’s Buffer Scheduling Strategy(BTUoN-BSP) is also applied. Simulation results show that compared with the Spray and Wait(SNW)routing, the algorithms could not only improve the delivery rate but also reduce the overhead of network obviously.
Removal of cloud cover on the satellite remote sensing image can effectively improve the availability of remote sensing images. For thin cloud cover, support vector value contourlet transform is used to achieve multi-...
详细信息
Removal of cloud cover on the satellite remote sensing image can effectively improve the availability of remote sensing images. For thin cloud cover, support vector value contourlet transform is used to achieve multi-scale decomposition of the area of thin cloud cover on remote sensing images. Through enhancing coefficients of high frequency and suppressing coefficients of low frequency, the thin cloud is removed. For thick cloud cover, if the areas of thick cloud cover on multi-source or multi-temporal remote sensing images do not overlap, the multi-output support vector regression learning method is used to remove this kind of thick clouds. If the thick cloud cover areas overlap, by using the multi-output learning of the surrounding areas to predict the surface features of the overlapped thick cloud cover areas, this kind of thick cloud is removed. Experimental results show that the proposed cloud removal method can effectively solve the problems of the cloud overlapping and radiation difference among multi-source images. The cloud removal image is clear and smooth.
A full-rate distributed transmission scheme for two-way multi-antenna wireless cooperative relay networks is proposed in this paper, which is suitable for the universal bidirectional relay communication model that two...
详细信息
A full-rate distributed transmission scheme for two-way multi-antenna wireless cooperative relay networks is proposed in this paper, which is suitable for the universal bidirectional relay communication model that two source terminals and all relays are equipped with multiple antennas. Orthogonal frequency division multiplexing (OFDM) ways are adopted to complete all information transmissions among different nodes. One whole bidirectional data exchange and transmission process between both source terminals mainly includes two stages. In the first stage, the symbols to be transmitted are jointly coded appropriately at two source terminals during several time slots on each sub-carrier, and then broadcasted to all relay nodes respectively. In the second stage, each OFDM modulation symbol is cyclically delayed with proper cyclic delay value at each relay in time domain. In the amplification and forwarding (AF) process, the operated signals at all relays are transmitted to both source terminals successively in time division (TD) ways, only those antennas performing cooperative relay transmissions at each relay node work together during several proper AF time slots. According to the coding and forwarding rules, one source terminal can obtain the original data from the other terminal after eliminating self-interferences. Finally, the proposed scheme can realize full-rate transmissions with low coding and detection complexity, which is applicable to the general bidirectional relay communication case, the coding process is simple and can be extended to design similar relay schemes easily. Simulation results verify the superiority and effectiveness of the proposed scheme.
Delay Tolerant Network (DTN) is an intermittently connected network where there is no complete path from source to destination for most of the time, and routing becomes one of the most challenging and open problems in...
详细信息
We propose a convolutive non-negative matrix factorization method to improve the intelligibility of speech signal in the context of adverse noise environment. The noise bases are prior learned with Non-negative Matrix...
详细信息
暂无评论