Fingerprint authentication system is used to verify users' identification according to the characteristics of their ***,this system has some security and privacy *** example,some artificial fingerprints can trick ...
详细信息
Fingerprint authentication system is used to verify users' identification according to the characteristics of their ***,this system has some security and privacy *** example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' ***,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy *** this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is *** feature vectors of a fingerprint are constructed through multi-scale *** technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective ***,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training *** results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition *** study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection.
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public *** paper concentrates on steganalysis against spatial least significant bit(LSB) matching,whi...
详细信息
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public *** paper concentrates on steganalysis against spatial least significant bit(LSB) matching,which is the prototype of many advanced information hiding *** existing algorithms deal with steganalysis problems by using the dependencies between adjacent *** another aspect,this paper calculates the differences among pixel pairs and proves that the histogram of difference values will be smoothed by stego *** calculate the difference histogram characteristic function(DHCF) and deduce that the moment of DHCFs(DHCFM) will be diminished after stego bits are hidden in the ***,we compute the DHCFMs as the discriminative *** calibrate the features by decreasing the influence of image content on them and train support vector machine classifiers based on the calibrated *** results demonstrate that the DHCFMs calculated with nonadjacent pixels are helpful to detect stego messages hidden by LSB matching.
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol c...
详细信息
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants...
详细信息
Recently, Liu et al. [Commun. Theor. Phys. 57(2012) 583] proposed a quantum private comparison protocol based on entanglement swapping of Bell states, which aims to securely compare the equality of two participants' information with the help of a semi-honest third party(TP). However, the present study points out there is a fatal loophole in Liu et al.'s protocol, and TP can make Bell-basis measurement to know all the participants' secret inputs without being detected. To fix the problem, a simple solution, which uses one-time eavesdropper checking with decoy photons instead of twice eavesdropper checking with Bell states, is demonstrated. Compared with the original protocol,it not only reduces the Bell states consumption but also simplifies the protocol steps.
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is...
详细信息
Recently, Li et al. presented a two-party quantum private comparison scheme using Greenberger-- Horne-Zeitinger (GHZ) states and error-correcting code (ECC) lint. J. Theor. Phys. 52, 2818 (2013)], claiming it is fault-tolerant and could be performed in a non-ideal scenario. However, there ex- ists a fatal loophole in their private comparison scheme under a special attack, namely the twice- Hadamard-CNOT attack. Specifically, a malicious party may intercept the other party's particles and execute Hadamard operations on the intercepted particles as well as on his or her own particles. Then, the malicious party could sequentially perform a controlled-NOT (CNOT) operation between intercepted particles and the auxiliary particles, as well as between his or her own particles and the auxiliary particles prepared in advance. By measuring the auxiliary particles, the secret input will be revealed to the malicious party without being detected. For resisting this special attack, a feasible improved scheme is proposed by introducing a permutation operator before the third party (TP) sends the particle sequences to each participant.
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribu...
详细信息
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribute authority can access all encrypted data,which is known as the key escrow *** addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE *** this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user ***,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access ***,an efficient user revocation mechanism is achieved using a version key that supports forward and backward *** analysis proves that our scheme is secure and efficient in user authorization and revocation.
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro...
详细信息
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and arousing *** take advantage of the complexity of the object texture and consider that under certain circumstances,the object texture is more complex than the background of the image,so the foreground object is more suitable for steganography than the *** the basis of instance segmentation,such as Mask R-CNN,the proposed method hides secret information into each object's region by using the masks of instance segmentation,thus realizing the information hiding of the foreground object without *** method not only makes it more efficient for the receiver to extract information,but also proves to be more secure and robust by experiments.
Atmospheric PM2.5 is a pollutant that has a major impact on the atmospheric environment and human health. Based on LSTM, we construct two prediction models, Stack LSTM and Encoder-Decoder, and evaluate the prediction ...
详细信息
Social media network analysis has become very popular in recent years. How do real networks evolve over time? What are the normal evolving behaviors in a social media network? In order to extract behaviors occurring r...
详细信息
In order to eliminate the effect of varying illumination on face recognition, a novel illumination invariant method based on homomorphic filtering and LoG operator is proposed. The method first performs homomorphic fi...
详细信息
In order to eliminate the effect of varying illumination on face recognition, a novel illumination invariant method based on homomorphic filtering and LoG operator is proposed. The method first performs homomorphic filtering on image under various lighting conditions, whose key component is a Difference of Gaussian (DoG) filter, which can effectively reduce the effect of varying illumination. Then a LoG operator is used for illumination invariant extraction. Experimental results on the Yale face database B and CMU PIE database show that the proposed method can effectively eliminate the effect of varying illumination on face recognition, and the extracted illumination invariant is robust.
暂无评论