Internet applications become increasingly widely used for millions of people in the world and on the other hand the accidents or disruptions of service are also dramatically increasing. Accidents or Disruptions occur ...
详细信息
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employ...
详细信息
ISBN:
(纸本)300018726X
Moving object segmentation in the compressed domain plays an important role in many real-time applications, e.g. video indexing, video surveillance, etc. H.264/AVC is the up-to-date video coding standard, which employs several new coding tools and provides a different video format. In this paper, a robust spatio-temporal segmentation approach to extract moving objects in the compressed domain for H.264 video stream is proposed. Coarse moving objects are firstly extracted from the motion vector field through the MRF classification process. Spatial segmentation is based on the HT coefficient, which is used to refine the object boundary of temporal segmentation results. Fusion of spatio-temporal segmentation is based on region projection based labeling technique. Further edge refinement is performed to smooth the object boundaries. The performance of the proposed approach is illustrated by simulation carried on several test sequences. Experimental results show that the proposed approach can provide the visually similar results as by using spatial domain process with much less computational complexity.
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delega...
详细信息
The paper puts forward a new proof of compliance algorithm in PolicyMaker, the algorithm applies graphic theory's DFS notion and the dynamic character, in the face of withdrawing the delegation, deletes the delegation side, then newly searches, finds other chain discovery until the end. It solves the negative credentials, compared with the time and space complicated degree of the original arithmetic, the algorithm is more simple and shortcut.
Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was prese...
详细信息
Quantum key agreement is one of the approaches to unconditional security. Since 1980's, different protocols for quantum key agreement have been proposed and analyzed. A new quantum key agreement protocol was presented in 2004, and a detailed analysis to the protocol was given. The possible game played between legitimate users and the enemy was described:sitting in the middle, an adversary can play a "man-in-the-middle" attack to cheat the sender and receiver. The information leaked to the adversary is essential to the length of the final quantum secret key. It was shown how to determine the amount of information leaked to the enemy and the amount of uncertainty between the legitimate sender and receiver.
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failures and moreover we cannot prevent all...
详细信息
Cluster systems have been gradually more popular and are being broadly used in a variety of applications. On the other hand, many of those systems are not tolerant to system failures and moreover we cannot prevent all faults and attacks. In this paper, we analyze a cluster system's ability to maintain the critical services even in face of faulty and intrusions with 4th Generation security Mechanism: Regeneration. The experiments have been demonstrated that the proposed mechanism can be used to analyze and proactively manage the effects of cluster network faults and attacks, and restore accordingly. The survivability level is greatly enhanced by the addition of functionality to targeted systems while maintaining the critical service and avoiding large incremental costs.
By applying the secret sharing system and the zero knowledge proof protocol, this paper presents a new time constraint delegation of the decryption scheme based on trust agent platforms, which solves the problem that ...
详细信息
By applying the secret sharing system and the zero knowledge proof protocol, this paper presents a new time constraint delegation of the decryption scheme based on trust agent platforms, which solves the problem that the accessed peer cannot offer instant data when it is offline. This scheme carries out encryption and decryption by using ElGamal cryptography. It defines the delegating-agents protocol, the produce of the delegation-key protocol and the decryption protocol, thus implementing the cheat-resisted and quorum controlled time constraint delegation of decryption. And the new scheme is supplemented to settle the problems of the key being renewed dynamically, the agent being added or deleted and the agent's information being maintained. Compared with the previous time constraint delegation of the decryption scheme, it improves security, flexibility and efficiency.
In the gap Diffie-Hellman group, based on the bilinear Diffie-Hellman intractable assumption and the security two-party computation protocol, a new efficient anonymous fingerprint scheme is proposed. This scheme is no...
详细信息
In the gap Diffie-Hellman group, based on the bilinear Diffie-Hellman intractable assumption and the security two-party computation protocol, a new efficient anonymous fingerprint scheme is proposed. This scheme is not only short in key size due to the use of the elliptic cryptosystem, but also efficient in computation because of bilinear mapping.
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project resear...
详细信息
ISBN:
(数字)9783319074528
ISBN:
(纸本)9783319074511
This State-of-the-Art Survey contains a selection of papers representing state-of-the-art results in the engineering of secure software-based Future Internet services and systems, produced by the NESSoS project researchers. The engineering approach of the network of Excellence NESSoS, funded by the European Commission, is based on the principle of addressing security concerns from the very beginning in all software development phases, thus contributing to reduce the amount of software vulnerabilities and enabling the systematic treatment of security needs through the engineering process. The 15 papers included in this volume deal with the main NESSoS research areas: security requirements for Future Internet services; creating secure service architectures and secure service design; supporting programming environments for secure and composable services; enabling security assurance and integrating former results in a risk-aware and cost-aware software life-cycle.
暂无评论