The concept of dual image reversible data hiding(DIRDH) is the technique that can produce two camouflage images after embedding secret data into one original image.Moreover,not only can the secret data be extracted ...The concept of dual image reversible data hiding(DIRDH) is the technique that can produce two camouflage images after embedding secret data into one original image.Moreover,not only can the secret data be extracted from two camouflage images but also the original image can be recovered.To achieve high image quality,Lu et al.'s method applied least-significant-bit(LSB) matching revisited to DIRDH.In order to further improve the image quality,the proposed method modifies LSB matching revisited rules and applies them to DIRDH.According to the experimental results,the image quality of the proposed method is better than that of Lu et al.'s method.展开更多
In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, expansion, and permuted choices. They are generally presented in the form of matrixes and realize...In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, expansion, and permuted choices. They are generally presented in the form of matrixes and realized by using table look-up technique in the implementation of the cryptosystem. This paper presents explicit formulas for the initial permutation IP, its inverse IP-1 , the expansion function E, and the permuted choice PC_1. It also gives the program realizations of these functions in C++ applying these formulas. With the advantage of the omission of the storage space for these matrixes and the tedious inputs of tables in the implementations of DES, our experimental results shows that the explicit formulas are useful in some situations, such as wireless sensor networks where the memory capacity is limited, especially when the size of file for encrypting is not too large, preferably smaller than 256KB.展开更多
This paper presents a description and performance evaluation of a new bit-level, lossless, adaptive, and asymmetric data compression scheme that is based on the adaptive character wordlength (ACW(n)) algorithm. Th...This paper presents a description and performance evaluation of a new bit-level, lossless, adaptive, and asymmetric data compression scheme that is based on the adaptive character wordlength (ACW(n)) algorithm. The proposed scheme enhances the compression ratio of the ACW(n) algorithm by dividing the binary sequence into a number of subsequences (s), each of them satisfying the condition that the number of decimal values (d) of the n-bit length characters is equal to or less than 256. Therefore, the new scheme is referred to as ACW(n, s), where n is the adaptive character wordlength and s is the number of subsequences. The new scheme was used to compress a number of text files from standard corpora. The obtained results demonstrate that the ACW(n, s) scheme achieves higher compression ratio than many widely used compression algorithms and it achieves a competitive performance compared to state-of-the-art compression tools.展开更多
Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization ...Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization (VQ) indices, but the encoding strategies adopted by their scheme expand the final codestream. This paper designs four embedding and encoding strategies to improve Wang et aL's scheme. The experiment result of the proposed scheme compared with that of the Wang et aL's scheme reduces the bit rates of the final codestream by 4.6% and raises the payload by 1.09% on average.展开更多
UAV data link has been considered as an important part of UAV communication system, through which the UAV could communicate with warships. However, constant coding and modulation scheme that UAV adopts does not make f...UAV data link has been considered as an important part of UAV communication system, through which the UAV could communicate with warships. However, constant coding and modulation scheme that UAV adopts does not make full use of the channel capacity when UAV communicates with warships in a good channel environment. In order to improve channel capacity and spectral efficiency, adaptive coded modulation technology is studied. Based on maritime channel model, SNR estimation technology and adaptive threshold determination technology, the simulation of UAV data link communication is carried out in this paper. Theoretic analysis and simulation results show that according to changes in maritime channel state, UAV can dynamically adjust the adaptive coded modulation scheme on the condition of meeting target Bit-Error-Rate (BER), the maximum amount of data transfer is non-adaptive systems three times.展开更多
Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s no...Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud.展开更多
本文针对动平台分布式雷达硬件资源受限时的协同探测需求展开研究,提出了一种基于节点自适应低比特量化的异构数据协同探测算法。首先,建立动平台分布式雷达自适应低比特量化的异构数据模型,推导关于目标多维未知状态与传播衰减的似然...本文针对动平台分布式雷达硬件资源受限时的协同探测需求展开研究,提出了一种基于节点自适应低比特量化的异构数据协同探测算法。首先,建立动平台分布式雷达自适应低比特量化的异构数据模型,推导关于目标多维未知状态与传播衰减的似然函数。其次,分析低比特量化非线性变换导致的多维未知参数耦合特性,构建其求解目标函数,设计基于批量梯度下降与差分进化算法的多维参数联合估计算法。最后,基于广义似然比检测(Generalized Likelihood Ratio Test,GLRT)准则推导动平台分布式雷达的异构检测器及其统计特性,设计恒虚警检测门限,论证系统的理论性能。通过两组仿真实验对应的数值计算结果证明所提方法的有效性和鲁棒性,验证了该算法具有广阔的应用前景。展开更多
基金supported by MOST under Grants No.105-2410-H-468-010 and No.105-2221-E-468-019
文摘The concept of dual image reversible data hiding(DIRDH) is the technique that can produce two camouflage images after embedding secret data into one original image.Moreover,not only can the secret data be extracted from two camouflage images but also the original image can be recovered.To achieve high image quality,Lu et al.'s method applied least-significant-bit(LSB) matching revisited to DIRDH.In order to further improve the image quality,the proposed method modifies LSB matching revisited rules and applies them to DIRDH.According to the experimental results,the image quality of the proposed method is better than that of Lu et al.'s method.
基金Supported by the National Natural Science Foundation of China (61272045)Natural Science Foundation of Outstanding Youth Team Project of Zhejiang Province (R1090138)Project of the State Key Laboratory of Information Security (Institute of Information Engineering, Chinese Academy of Sciences, Beijing)
文摘In the data encryption standard (DES) algorithm, there exist several bit-switching functions, including permutations, expansion, and permuted choices. They are generally presented in the form of matrixes and realized by using table look-up technique in the implementation of the cryptosystem. This paper presents explicit formulas for the initial permutation IP, its inverse IP-1 , the expansion function E, and the permuted choice PC_1. It also gives the program realizations of these functions in C++ applying these formulas. With the advantage of the omission of the storage space for these matrixes and the tedious inputs of tables in the implementations of DES, our experimental results shows that the explicit formulas are useful in some situations, such as wireless sensor networks where the memory capacity is limited, especially when the size of file for encrypting is not too large, preferably smaller than 256KB.
文摘This paper presents a description and performance evaluation of a new bit-level, lossless, adaptive, and asymmetric data compression scheme that is based on the adaptive character wordlength (ACW(n)) algorithm. The proposed scheme enhances the compression ratio of the ACW(n) algorithm by dividing the binary sequence into a number of subsequences (s), each of them satisfying the condition that the number of decimal values (d) of the n-bit length characters is equal to or less than 256. Therefore, the new scheme is referred to as ACW(n, s), where n is the adaptive character wordlength and s is the number of subsequences. The new scheme was used to compress a number of text files from standard corpora. The obtained results demonstrate that the ACW(n, s) scheme achieves higher compression ratio than many widely used compression algorithms and it achieves a competitive performance compared to state-of-the-art compression tools.
基金supported by the National Science Council,Taiwan under Grant No.NSC 99-2221-E-324-040-MY2
文摘Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization (VQ) indices, but the encoding strategies adopted by their scheme expand the final codestream. This paper designs four embedding and encoding strategies to improve Wang et aL's scheme. The experiment result of the proposed scheme compared with that of the Wang et aL's scheme reduces the bit rates of the final codestream by 4.6% and raises the payload by 1.09% on average.
文摘UAV data link has been considered as an important part of UAV communication system, through which the UAV could communicate with warships. However, constant coding and modulation scheme that UAV adopts does not make full use of the channel capacity when UAV communicates with warships in a good channel environment. In order to improve channel capacity and spectral efficiency, adaptive coded modulation technology is studied. Based on maritime channel model, SNR estimation technology and adaptive threshold determination technology, the simulation of UAV data link communication is carried out in this paper. Theoretic analysis and simulation results show that according to changes in maritime channel state, UAV can dynamically adjust the adaptive coded modulation scheme on the condition of meeting target Bit-Error-Rate (BER), the maximum amount of data transfer is non-adaptive systems three times.
文摘Cloud computing is a kind of computing that depends on shared figuring assets instead of having nearby servers or individual gadgets to deal with applications. Technology is moving to the cloud more and more. It’s not just a trend, the shift away from ancient package models to package as service has steadily gained momentum over the last ten years. Looking forward, the following decade of cloud computing guarantees significantly more approaches to work from anyplace, utilizing cell phones. Cloud computing focused on better performances, better scalability and resource consumption but it also has some security issue with the data stored in it. The proposed algorithm intents to come with some solutions that will reduce the security threats and ensure far better security to the data stored in cloud.
文摘本文针对动平台分布式雷达硬件资源受限时的协同探测需求展开研究,提出了一种基于节点自适应低比特量化的异构数据协同探测算法。首先,建立动平台分布式雷达自适应低比特量化的异构数据模型,推导关于目标多维未知状态与传播衰减的似然函数。其次,分析低比特量化非线性变换导致的多维未知参数耦合特性,构建其求解目标函数,设计基于批量梯度下降与差分进化算法的多维参数联合估计算法。最后,基于广义似然比检测(Generalized Likelihood Ratio Test,GLRT)准则推导动平台分布式雷达的异构检测器及其统计特性,设计恒虚警检测门限,论证系统的理论性能。通过两组仿真实验对应的数值计算结果证明所提方法的有效性和鲁棒性,验证了该算法具有广阔的应用前景。