Due to the efficient and secure requirements of image transmission, a number of research works have been done to encrypt the compressed image. Inspired by the arithmetic coding and chaotic map which are used to compre...
详细信息
Due to the efficient and secure requirements of image transmission, a number of research works have been done to encrypt the compressed image. Inspired by the arithmetic coding and chaotic map which are used to compress and encrypt image, respectively. In this paper, a scheme is proposed to encrypt the compressed image by chaotic map and arithmetic coding. This scheme compresses the image row by row which is firstly permuted by two logistic maps before arithmetic coding. It not only enhances the security of arithmetic coding, but also improves the compression ratio. To further improve the security of binary data which has been compressed, we use the chaotic maps to encrypt the data, and set different parameters and initial value for chaotic maps. In order to possess high sensitivities of key and plain-image, the keys that are employed to determine the parameter and initial value of chaotic maps are related to the plain-image. The experimental results validate the effect of the proposed scheme and demonstrate that the compressed and encrypted image is secure and convenient for transmission.
New image encryption based on DNA encoding combined with chaotic system is proposed. The algorithm uses chaotic system to disturb the pixel locations and pixel values and then DNA encodings according to quaternary cod...
详细信息
New image encryption based on DNA encoding combined with chaotic system is proposed. The algorithm uses chaotic system to disturb the pixel locations and pixel values and then DNA encodings according to quaternary code rules are carried out. The pseudo DNA operations are controlled by the quaternary chaotic sequences. At last the image encryption through DNA decoding is achieved. The theoretical analysis and experimental results show that the algorithm improves the encoding efficiency, enhances the security of the ciphertext, has a large key space and a high key sensitivity, it is able to resist the statistical and exhaustive attacks.
In the field of virtual reality, Collision Detection Technology was widely developed for improving the performance of 3D Graphics. Following rapid growth of virtual objects with complex shapes, conventional methods pe...
详细信息
In the field of virtual reality, Collision Detection Technology was widely developed for improving the performance of 3D Graphics. Following rapid growth of virtual objects with complex shapes, conventional methods perform harder to effectively detect the collision. Facing the problem, we presented a collision detection algorithm based on improved quantum particle swarm optimization. Firstly, we converted the collision detection problem into nonlinear constrained optimization problem. Secondly, we employed the Euclidean distance to evaluate whether there was collision between two objects. Then, we improved the quantum particle swarm optimization (QPSO) algorithm by (1) using quantum HΕgate and quantum rotation gate in changing quantum probability amplitude, (2) changing the mutation operator with Quantum Hadamard Gate and (3) modifying constant Inertia Weight to random inertia weight. In the end, the results of numerical simulation and analysis were provided to verify the validity of our algorithm.
Plant growth simulation algorithm (PGSA) is a kind of bionic intelligent optimization algorithm. Based on the plant phototropism as heuristic criterion, this algorithm takes the feasible region of different optimizati...
详细信息
Face recognition is an important research hotspot. More and more new methods have been proposed in recent years. In this paper, we propose a novel face recognition method which is based on PCA and logistic regression....
详细信息
Face recognition is an important research hotspot. More and more new methods have been proposed in recent years. In this paper, we propose a novel face recognition method which is based on PCA and logistic regression. PCA is one of the most important methods in pattern recognition. Therefore, in our method, PCA is used to extract feature and reduce the dimensions of process data. Afterwards, we present a novel classification algorithm and use logistic regression as the classifier for face recognition. The experimental results on two different face databases are presented to illustrate the efficacy of our proposed method.
To reveal the inner control mechanism of organism is an important content in the research of bioinformatics. The proliferation of a variety of high-throughput biological data for the reconstruction of gene regulatory ...
详细信息
It has been proved that information encoding and processing in DNA is an important problem for biomolecular computing, including the encoding design problem. In recent years, there has been growing interest in the app...
详细信息
This paper proposes an approach about obstacle collision-free motion planning of space manipulator by utilizing a Configuration-Oriented Artificial Potential Field method in 3-D space environment. Firstly, the artific...
This paper proposes an approach about obstacle collision-free motion planning of space manipulator by utilizing a Configuration-Oriented Artificial Potential Field method in 3-D space environment. Firstly, the artificial potential field method, which is usually used in 2-D space, is extended to 3-D space. Secondly, improving the artificial potential field method enables to carry out obstacle avoidance planning for the configuration of entire space manipulator (including the end-effector and links). Finally, the approach is combined with the inverse kinematics calculation which is based on the Generalized Jacobian Matrix for planning a collision-free motion of space manipulator. At the end of the article, by simulating the method mentioned above, the validity of the proposed method is verified.
Because DNA self-assembly technique has its unique molecular function and control of nanomaterials synthesis, DNA computing model based on the self-assembly owns great prospects for development. At present, humans hav...
详细信息
In this paper, we present an effective algorithm based on the Oriented Bounding Box (OBB). Particularly, the article focus on how to reduce the amount of the time that the intersection of bounding boxes are detected f...
详细信息
In this paper, we present an effective algorithm based on the Oriented Bounding Box (OBB). Particularly, the article focus on how to reduce the amount of the time that the intersection of bounding boxes are detected for increasing the efficiency of collision detection algorithm through the following three steps. Firstly, the detection time of bounding box intersection is decreased by a pre-treatment method. Secondly, we optimize the traversal approach of the bounding box tree and reduce the depth of the two fork tree under take into account the temporal and spatial correlation of motion of virtual environment. Then, we reduce the breadth of tree result from this algorithm compares the distance between the bounding boxes and traverse the node of distance that near the tree. At last, the validity of the algorithm is verified by programming simulations.
暂无评论