The face recognition biometric technology, as one of the main applications, has been researched and improved by more and more people. In recent years, linear sparse representation being advantageous in improving the c...
详细信息
The face recognition biometric technology, as one of the main applications, has been researched and improved by more and more people. In recent years, linear sparse representation being advantageous in improving the classification becomes a research hotspot, and it has similar advantage by increasing the inter-class scatter and decreasing the intra-class scatter of training samples. In this paper, we fuse the characteristics of linear sparse representation and discrimination of class scatter and present a new constraint model, which requires not only minimum recovered residual and projection matrix's energy, but also requires maximum inter-class scatter and minimum intra-class scatter after projection. Then we use the projection matrix solved by constraint equation to recover the test sample by each class, the final classified result is the class which has minimum recovered residual. We test three different face databases and the experimental results show that we proposed method has better classification results.
An region of interesting compression algorithm of still image is *** algorithm that is based on embedded block coding with optimized truncation(EBCOT)encodes the interested region of the *** to the character of image ...
详细信息
ISBN:
(纸本)9781479951499
An region of interesting compression algorithm of still image is *** algorithm that is based on embedded block coding with optimized truncation(EBCOT)encodes the interested region of the *** to the character of image edge,an improved canny edge detection algorithm is proposed before the wavelet transform,without the participation of automatic extraction of artificial region-of-interest(ROI)by using the dilation and erosion operation in *** ROI coding algorithms is *** information can be encoded with high priority at the same time by constructing a weighted function,giving reasonable weight for ROI code block,and reducing the wavelet coefficients effect on the context region of the ROI code *** proposed method improves the quality of the reconstructed image of *** show that the reconstructed ROI image quality is significantly improved under low bit rate or high,and the reconstructed image background region(BG)quality can be also improved.
In this paper, we introduce a framework of social evolutionary games (SEG) for investigating the evolution of social networks. In a SEG, a coevolutionary mechanism is adopted by agents who aim to improve his short-ter...
详细信息
In this paper, we introduce a framework of social evolutionary games (SEG) for investigating the evolution of social networks. In a SEG, a coevolutionary mechanism is adopted by agents who aim to improve his short-term utility and long-term reputation. Two examples are presented to demonstrate SEG, prisoner's dilemma game for pairwise interaction and public goods game for group interaction. Numerical simulations are performed on the two examples with different parameter settings, and the results indicates that SEG can be used as a metaphor for investigating the evolution of social networks in some scenarios.
Based on Attribute-Based Encryption (ABE), a variety of access control schemes have been constructed in cloud computing. However, in these schemes, the ciphertext overhead goes linearly with the number of attributes u...
详细信息
Based on Attribute-Based Encryption (ABE), a variety of access control schemes have been constructed in cloud computing. However, in these schemes, the ciphertext overhead goes linearly with the number of attributes used in encryption. To address this concern, a CCP-ABE (Constant-size Ciphertext Policy ABE) based access control scheme is proposed. The original data is encrypted by a symmetric key;then symmetric key is encrypted under an AND-gate access policy. Only the user who possesses a set of attributes that satisfy the policy can recover the symmetric key. The security of the proposed scheme is proved based on security of the CPA (Chosen Plaintext Attack) secure CCP-ABE scheme. Moreover, a method of constructing CCA (Chosen Ciphertext attack) secure CCP-ABE schemes is introduced. Performance analysis indicates that the ciphertext overhead over the number of attributes included in ciphertext is constant-size rather than linearity.
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellma...
详细信息
Recently, Wang et al. presented a new construction of attribute-based signature with policy-and-endorsement mechanism. The existential unforgeability of their scheme was claimed to be based on the strong Diffie-Hellman assumption in the random oracle model. Unfortunately, by carefully revisiting the design and security proof of Wang et alfs scheme, we show that their scheme cannot provide unforgeability, namely, a forger, whose attributes do not satisfy a given signing predicate, can also generate valid signatures. We also point out the flaws in Wang et al.'s proof.
The document plays an important role in the development of cloud computing. The user obtains and shares information by the electronic document. It is rich in content and various in representations. But the challenge t...
详细信息
ISBN:
(纸本)9781479974351
The document plays an important role in the development of cloud computing. The user obtains and shares information by the electronic document. It is rich in content and various in representations. But the challenge to security is also brought. For the secure requirement for document in cloud, firstly, we will propose a novel user-based document secure management mechanism which introduces the re-encryption. The re-encrypted key will be generated according the access control conditions, so that the encryption of document creation will be combined with access control. Secondly, we will present the corresponding protocols and the implementation of the mechanism. Finally, the analysis of properties will be made.
Lasso simultaneously conducts variable selection and supervised regression. In this paper, we extend Lasso to multiple output prediction, which belongs to the categories of structured learning. Though structured learn...
详细信息
ISBN:
(纸本)9781479943012
Lasso simultaneously conducts variable selection and supervised regression. In this paper, we extend Lasso to multiple output prediction, which belongs to the categories of structured learning. Though structured learning makes use of both input and output simultaneously, the joint feature mapping in current framework of structured learning is usually application-specific. As a result, ad hoc heuristics have to be employed to design different joint feature mapping functions for different applications, which results in the lackness of generalization ability for multiple output prediction. To address this limitation, in this paper, we propose to augment Lasso with output by decoupling the joint feature mapping function of traditional structured learning. The contribution of this paper is three-fold: 1) The augmented Lasso conducts regression and variable selection on both the input and output features, and thus the learned model could fit an output with both the selected input variables and the other correlated outputs. 2) To be more general, we set up nonlinear dependencies among output variables by generalized Lasso. 3) Moreover, the Augmented Lagrangian Method (ALM) with Alternating Direction Minimizing (ADM) strategy is used to find the optimal model parameters. The extensive experimental results demonstrate the effectiveness of the proposed method.
In the existing adaptively secure ABE (attribute-based encryption) schemes, the decryption cost goes linearly with the number of attributes that are used in decryption. An adaptively secure key-policy ABE (FKP-ABE) sc...
详细信息
In this paper, we have introduced a cross-layer design model which is based on multimedia services in order to favor the QoS demand in wireless mesh networks. By means of this model the relevant parameters in each lay...
详细信息
In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its...
详细信息
In recent years, some collaborative threshold authenticated encryption schemes were put forward to ease the workloads of the individual signers. Unfortunately, the original scheme was found to have design flaws in its signature generation phase, however the improvements of the original one are all proved to be inefficient. In order to remedy the security flaws and improve the performance, a novel robust collaborative threshold authenticated encryption scheme is proposed in this paper. Based on the elliptic curve cryptography and the message linkage technology, this scheme can realize efficient encryption and authentication of large messages. Analysis shows that the proposed scheme is theoretically correct and has better performance. The scheme can be further applied into distributed environments, such as cloud storage and computingnetworks, dynamic alliance of enterprises and virtual organizations.
暂无评论