A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line construc...A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line constructed based on the reference minutia. Multi-line code is introduced to elevate the performance by combining several single-line codes. Experiments were carried out on a few FVC databases. It has been proven that the proposed method yields relatively low computational complexity as compared to existing minutiae distribution-based methods, while preserving the performance. The equal error rate obtained for FVC2002 DB1 is 4.69% in stolen-key case, and the total arithmetic operations utilized are 14 520 additions and zero multiplication.展开更多
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of ...Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of a biometric in its original format makes it usable only once.Therefore,a cancelable biometric template should be used,so that it can be replaced when it is attacked.Cancelable biometrics aims to enhance the security and privacy of biometric authentication.Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates.In this paper,a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification systems.The considered biometric in this paper is the speech signal.The speech signal is transformed into its spectrogram.Then,the spectrogram is encrypted using two cascaded optical encryption algorithms.The first algorithm is the Optical Scanning Holography(OSH)for its efficiency as an encryption tool.The OSH encrypted spectrogram is encrypted using Double Random Phase Encoding(DRPE)by implementing two Random Phase Masks(RPMs).After the two cascaded optical encryption algorithms,the cancelable template is obtained.The verification is implemented through correlation estimation between enrolled and test templates in their encrypted format.If the correlation value is larger than a threshold value,the user is authorized.The threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two curves.The implementation of optical encryption is adopted using its software rather than the optical setup.The efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation results.It can improve the biometric data security without deteriorating the recognition accuracy.Simulation results give close-to-zero This values for the Equal Error Rate(EER)and close-to-one values for the Area under Receiver Operator Characteristic(AROC)curve.展开更多
Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the...Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the original ones from hacking attempts.A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications.The original biometric is blurred with two co-prime operators.Hence,it can be recovered as the Greatest Common Divisor(GCD)between its two blurred versions.Minimal changes if induced in the biometric image prior to processing with co-prime operators prevents the recovery of the original biometric image through a GCD operation.Hence,the ability to change cancelable templates is guaranteed,since the owner of the biometric can pre-determine and manage the minimal change induced in the biometric image.Furthermore,we test the utility of the proposed algorithm in the single-and multi-biometric scenarios.The multi-biometric scenario depends on compressing face,fingerprint,iris,and palm print images,simultaneously,to generate the cancelable templates.Evaluation metrics such as Equal Error Rate(EER)and Area and Receiver Operator Characteristic curve(AROC)are considered.Simulation results on single-and multi-biometric scenarios show high AROC values up to 99.59%,and low EER values down to 0.04%.展开更多
Biometrics is becoming an important method for human identification. However, once a biometric pattern is stolen, the user will quickly run out of alternatives and all the applications where the associated biometric p...Biometrics is becoming an important method for human identification. However, once a biometric pattern is stolen, the user will quickly run out of alternatives and all the applications where the associated biometric pattern is used become insecure. Cancelable biometrics is a solution. However, traditional cancelable biometric methods treat the transformation process and feature extraction process independently. As a result, this kind of cancelable biometric approach would reduce the recognition accuracy. In this paper, we first analyzed the limitations of traditional cancelable biometric methods, and proposed the Key Incorporation Scheme for Cancelable Biometrics approach that could increase the recognition accuracy while achieving “cancelability”. Then we designed the Gabor Descriptor based Cancelable Iris Recognition method that is a practical implementation of the proposed Key Incorporation Scheme. The experimental results demonstrate that our proposed method can significantly improve the iris recognition accuracy while achieving “cancelability”.展开更多
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological tech...With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit(qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantum mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users' information for the fingerprint identification.展开更多
Aiming at the problem of low recognition rate and poor security in the process of palmprint identity authentication,a cancelable palmprint template generating algorithm is proposed,which is based on local Gabor direct...Aiming at the problem of low recognition rate and poor security in the process of palmprint identity authentication,a cancelable palmprint template generating algorithm is proposed,which is based on local Gabor directional pattern with adaptive threshold by mean(m LGDP),difference local Gabor directional pattern with adaptive threshold by mean(m DLGDP)and feature fusion of them.In this method,the feature code of the image is segmented and the feature vectors are extracted and binarized.Then the Bloom filter is used to achieve many-toone mapping and the location scrambling of palmprint image.Finally,the scrambling result matrix and the user key are irreversibly transformed by the convolution operation to obtain a revocable template of the palmprint image.Both theoretical and experimental results analysis show that,in the case of key loss,the method of feature fusion can enhance the diversity of the original palmprint template effectively,improve the recognition rate efficiently,and have better security.展开更多
Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it...Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it cannot be replaced and rendered unusable. In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue. The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system. In this system, tokenized pseudo-random data is coupled with momentbased facial feature via inner product algorithm. The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key. If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement. Then, the compromised one is rendered completely useless. This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable. Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.展开更多
A new cyclic prefix(CP)-based nonoverlapping FBMC-QAM(CP-NO-FBMC-QAM)system with two prototype filters is proposed in this paper,which satisfies complex orthogonality conditions and good frequency energy confinement a...A new cyclic prefix(CP)-based nonoverlapping FBMC-QAM(CP-NO-FBMC-QAM)system with two prototype filters is proposed in this paper,which satisfies complex orthogonality conditions and good frequency energy confinement at the same time.We analyze its inter-carrier interference/inter-symbol interference(ICI/ISI)over multipath channels.Owing to the additional CP,the ISI of received symbols over multipath channels is eliminated in the proposed system,and the resulting improvement in the signal-to-interference ratio(SIR)performance is evaluated by theoretical analysis.Moreover,for the ICI caused by multipath propagation in received symbols,we develop a method that eliminates the ICI by frequency-domain channel estimation and equalization before the receiver filtering process.The proposed CP-NO-FBMC-QAM system and ICI cancellation method(ICICM)are validated by comparisons of implementation complexity,power spectral density(PSD),bit error rate(BER)and channel estimation performance with conventional CP-based orthogonal frequency division multiplexing(CP-OFDM)and FBMC-QAM systems.展开更多
In this paper,an interference cancellation based neural receiver for superimposed pilot(SIP)in multi-layer transmission is proposed,where the data and pilot are non-orthogonally superimposed in the same time-frequency...In this paper,an interference cancellation based neural receiver for superimposed pilot(SIP)in multi-layer transmission is proposed,where the data and pilot are non-orthogonally superimposed in the same time-frequency resource.Specifically,to deal with the intra-layer and inter-layer interference of SIP under multi-layer transmission,the interference cancellation with superimposed symbol aided channel estimation is leveraged in the neural receiver,accompanied by the pre-design of pilot code-division orthogonal mechanism at transmitter.In addition,to address the complexity issue for inter-vendor collaboration and the generalization problem in practical deployments,respectively,this paper also provides a fixed SIP(F-SIP)design based on constant pilot power ratio and scalable mechanisms for different modulation and coding schemes(MCSs)and transmission layers.Simulation results demonstrate the superiority of the proposed schemes on the performance of block error rate and throughput compared with existing counterparts.展开更多
To enable simultaneous transmit and receive(STAR)on the same frequency in a densely deployed space with multi-interference sources,this work proposes a digitally-assisted analog selfinterference cancellation method,wh...To enable simultaneous transmit and receive(STAR)on the same frequency in a densely deployed space with multi-interference sources,this work proposes a digitally-assisted analog selfinterference cancellation method,which can acquire reference signals through flexible wired/wireless switching access.Based on this method,the Minimum Mean Square Error algorithm with known channel state information is derived in detail,determining the upper limit of the cancellation performance,and the Adaptive Dithered Linear Search algorithm for real-time engineering cancellation is given.The correctness of theoretical analysis is verified by the practical self-interference channel measured by a vector network analyzer.Furthermore,we have designed and implemented the corresponding multiinterference cancellation prototype with the digitallyassisted structure,capable of handling multiple interferences(up to three)and supporting a large receive bandwidth of 100 MHz as well as a wide frequency coverage from 30 MHz to 3000 MHz.Prototype test results demonstrate that in the presence of three interferences,when the single interference bandwidth is 0.2/2/20 MHz(corresponding to the receive bandwidth of 2/20/100 MHz),the cancellation performance can reach 46/32/22 dB or more.展开更多
“civil discourse”amongst multiple individuals with diverse viewpoints is necessary to move toward truth,to maintain democratic buoyancy,and to get the most accurate read on how best to move forward toward our collec...“civil discourse”amongst multiple individuals with diverse viewpoints is necessary to move toward truth,to maintain democratic buoyancy,and to get the most accurate read on how best to move forward toward our collective good,civil discourse is nonetheless under catastrophic threat by contemporary forces that include the sloppy use of the term“hate speech”;the“libelling by labeling”(aka“cancelling”)in the public square of social media;technologically powered disinformation campaigns;and the growth of“safetyism”in academia.In light of these threats,the goal must be to convince educators,particularly philosophical educators,of the need to adopt a whole new focus in education,namely one that puts a spotlight on the fact that the utilization of the freedom of speech to destroy the freedom of speech of others utterly undermines the positive value of freedom of speech.In order to motivate individuals to turn their back on the dopamine rush of shutting someone down,educators must also spend a great deal of time showcasing the merits of“civil discourse”by providing young people with extensive experience in engaging in facilitated“civil discourse”(aka Communities of Philosophical Inquiry)so that its value can be woven into a personal commitment.展开更多
In wideband noncooperative interference cancellation,the reference signals obtained through auxiliary antennas are weighted to cancel with the interference signal.The correlation between the reference signal and the i...In wideband noncooperative interference cancellation,the reference signals obtained through auxiliary antennas are weighted to cancel with the interference signal.The correlation between the reference signal and the interference signal determines interference cancellation performance,while the auxiliary antenna array affects the correlation by influencing the amplitude and phase of the reference signals.This paper analyzes the effect of auxiliary antenna array on multiple performances of wideband noncooperative interference cancellation.Firstly,the array received signal model of wideband interference is established,and the weight vector coupled with the auxiliary antennas array manifold is solved by spectral analysis and eigen-subspace decomposition.Then,multiple performances which include cancellation resolution,grating null,wideband interference cancellation ratio(ICR),and convergence rate are quantitatively characterized with the auxiliary antenna array.It is obtained through analysis that the performances mutually restrict the auxiliary antenna array.Higher cancellation resolution requires larger array aperture,but when the number of auxiliary antennas is fixed,larger array aperture results in more grating nulls.When the auxiliary antennas are closer to the main antenna,the wideband ICR is improved,but the convergence rate is reduced.The conclusions are verified through simulation of one-dimensional uniform array and two-dimensional nonuniform array.The experiments of three arrays are compared,and the results conform well with simulation and support the theoretical analysis.展开更多
This work examines the impact of incorporating the physiological conditions of human cancellous bone,by integrating similar porosity of porous Fe with the cancellous bone under dynamic immersion test.All of the porous...This work examines the impact of incorporating the physiological conditions of human cancellous bone,by integrating similar porosity of porous Fe with the cancellous bone under dynamic immersion test.All of the porous Fe specimens with~80%porosity were immersed in Simulated Body Fluid(SBF)with a flow rate of 0.3 ml/min integrated with cancellous bone for 7,14 and 28 days.Porous Fe with the lowest surface area has the highest degradation rate despite having the lowest relative weight loss.The relationship between fluid induced shear stress and weight loss of specimens have been established.展开更多
The adaptive filtering algorithm with a fixed projection order is unable to adjust its performance in response to changes in the external environment of airborne radars.To overcome this limitation,a new approach is in...The adaptive filtering algorithm with a fixed projection order is unable to adjust its performance in response to changes in the external environment of airborne radars.To overcome this limitation,a new approach is introduced,which is the variable projection order Ekblom norm-promoted adaptive algorithm(VPO-EPAA).The method begins by examining the mean squared deviation(MSD)of the EPAA,deriving a formula for its MSD.Next,it compares the MSD of EPAA at two different projection orders and selects the one that minimizes the MSD as the parameter for the current iteration.Furthermore,the algorithm’s computational complexity is analyzed theoretically.Simulation results from system identification and self-interference cancellation show that the proposed algorithm performs exceptionally well in airborne radar signal self-interference cancellation,even under various noise intensities and types of interference.展开更多
Background:Telehealth has emerged as a powerful tool for managing chronic diseases and mental health conditions,offering increased access to care and improved patient outcomes.However,inequities in digital connectivit...Background:Telehealth has emerged as a powerful tool for managing chronic diseases and mental health conditions,offering increased access to care and improved patient outcomes.However,inequities in digital connectivity and technological resources have created significant disparities in access to these potentially life-changing services,disproportionately impacting marginalized and minoritized communities across the globe.Methods:Data on 473,716 telehealth encounters occurring between January 1,2022,and June 30,2023 were retrieved from the electronic health records(EHR)system used by University Hospitals.These encounters were classified into three groups:attended,canceled,and no-show.Relative risk was calculated based on age,sex,and race,and a multivariate linear regression was performed with age,sex,and race as inputs,to determine their effect on the encounter outcome.Results:Our analysis identified significant differences in relative risk between demographic groups.Patients 20-39 years of age had a high relative risk of cancellation and no-show,and Black patients demonstrated the highest relative risk for cancellation and no-show.The regression analysis illustrated a statistically significant link between no-shows and patients with a cellular plan with no other internet subscription(p<0.001),smartphone ownership(p<0.001),and not having a computer(p<0.05).Conclusions:This study highlights the clinical repercussions of the digital divide,as patients relying on a mobile phone and data plan to attend telehealth visits were more likely to no-show.Current disparities in digital connectivity for historically marginalized populations heightens the risk of creating a digital underclass.There is evidence this study may be applicable in multiple countries across the world.Further research on the causes of the observed no-shows is necessary to ensure equitable delivery of digital healthcare services.展开更多
This paper studies the sensing base station(SBS)that has great potential to improve the safety of vehicles and pedestrians on roads.SBS can detect the targets on the road with communication signals using the integrate...This paper studies the sensing base station(SBS)that has great potential to improve the safety of vehicles and pedestrians on roads.SBS can detect the targets on the road with communication signals using the integrated sensing and communication(ISAC)technique.Compared with vehicle-mounted radar,SBS has a better sensing field due to its higher deployment position,which can help solve the problem of sensing blind areas.In this paper,key technologies of SBS are studied,including the beamforming algorithm,beam scanning scheme,and interference cancellation algorithm.To transmit and receive ISAC signals simultaneously,a double-coupling antenna array is applied.The free detection beam and directional communication beam are proposed for joint communication and sensing to meet the requirements of beamwidth and pointing directions.The joint timespace-frequency domain division multiple access algorithm is proposed to cancel the interference of SBS,including multiuser interference and duplex interference between sensing and communication.Finally,the sensing and communication performance of SBS under the industrial scientific medical power limitation is analyzed and simulated.Simulation results show that the communication rate of SBS can reach over 100 Mbps and the range of sensing and communication can reach about 500 m.展开更多
降噪耳机使用过度竞会导致大脑“听不清”?伦敦青年的经历引发健康警示!An alarming increase in hearing problems among young adults has been linked to Auditory Processing Disorder(APD,听觉处理障碍).Health experts warn that ...降噪耳机使用过度竞会导致大脑“听不清”?伦敦青年的经历引发健康警示!An alarming increase in hearing problems among young adults has been linked to Auditory Processing Disorder(APD,听觉处理障碍).Health experts warn that this issue could be partially associated with the growing use of noise-canceling headphones.展开更多
To guarantee secure communication against eavesdropping and malicious attack,an artificial noise(AN)-aided frequency-hopping(FH)architecture is adopted in this article.But the inevitable time misalignment between the ...To guarantee secure communication against eavesdropping and malicious attack,an artificial noise(AN)-aided frequency-hopping(FH)architecture is adopted in this article.But the inevitable time misalignment between the received signal and locally reconstructed AN will deteriorate the AN cancellation performance,yielding significant secrecy degradation at the FH receiver.In view of this,first,the AN cancellation performance under time misalignment is evaluated via signal to AN-plus-noise ratio,and the system secrecy is analyzed via secrecy rate.Then,to mitigate the performance degradation raised by time misalignment,the transmitting power allocation scheme for AN and confidential signal(CS)is optimized,and the optimal hopping period is designed.Notably,the obtained conclusions in both the performance evaluation and transmitter optimization sections hold no matter whether the eavesdropper can realize FH synchronization or not.Simulations verify that time misalignment will raise non-negligible performance degradation.Besides,the power ratio of AN to CS should decrease as time misalignment increases,and for perfect time synchronization,the transmitting power of AN and CS should be equivalent.In addition,a longer hopping period is preferred for secrecy enhancement when time misalignment gets exacerbated.展开更多
This paper considers the short-range sensing imple-mentation in continuous-wave(CW)phased array systems.We specifically address this CW short-range sensing challenges stemming from the self-interference cancellation(S...This paper considers the short-range sensing imple-mentation in continuous-wave(CW)phased array systems.We specifically address this CW short-range sensing challenges stemming from the self-interference cancellation(SIC)operation and synthesis requirement of arbitrary beampatterns for the sensing purpose,which has rarely been researched before.In this paper,unlike the only existed work that exploits the heuris-tic method and shares no analytical solution,an SIC pattern syn-thesis design is presented with a closed-form solution.By utiliz-ing the null-space projection(NSP)method,the proposed method effectively mitigates the self-interference to enable the in-band full-duplex operation of the array system.Subsequently,the NSP design will be innovatively embedded in a singular value decomposition(SVD)based weighted alternating reserve projec-tion(WARP)approach to efficiently synthesize an arbitrary desired pattern by solving a unique rank-deficient weighted least mean square problem.Numerical results validate the effective-ness of the proposed method in terms of beampattern,SIC per-formance,and sensing performance.展开更多
Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-med...Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-medium length regime.However,this list decoding complexity becomes formidable as the decoding output list size increases.This is primarily incurred by the OSD.Addressing this challenge,this paper proposes the low complexity SCL decoding through reducing the complexity of component code decoding,and pruning the redundant SCL decoding paths.For the former,an efficient skipping rule is introduced for the OSD so that the higher order decoding can be skipped when they are not possible to provide a more likely codeword candidate.It is further extended to the OSD variant,the box-andmatch algorithm(BMA),in facilitating the component code decoding.Moreover,through estimating the correlation distance lower bounds(CDLBs)of the component code decoding outputs,a path pruning(PP)-SCL decoding is proposed to further facilitate the decoding of U-UV codes.In particular,its integration with the improved OSD and BMA is discussed.Simulation results show that significant complexity reduction can be achieved.Consequently,the U-UV codes can outperform the cyclic redundancy check(CRC)-polar codes with a similar decoding complexity.展开更多
文摘A low computational cost cancelable fingerprint template, namely the multi-line codes was proposed. The formulation of a single-line code involves the inspection of minutiae distribution along a straight line constructed based on the reference minutia. Multi-line code is introduced to elevate the performance by combining several single-line codes. Experiments were carried out on a few FVC databases. It has been proven that the proposed method yields relatively low computational complexity as compared to existing minutiae distribution-based methods, while preserving the performance. The equal error rate obtained for FVC2002 DB1 is 4.69% in stolen-key case, and the total arithmetic operations utilized are 14 520 additions and zero multiplication.
基金funded and supported by the Taif University Researchers Supporting Project Number(TURSP-2020/147),Taif University,Taif,Saudi Arabia.
文摘Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of a biometric in its original format makes it usable only once.Therefore,a cancelable biometric template should be used,so that it can be replaced when it is attacked.Cancelable biometrics aims to enhance the security and privacy of biometric authentication.Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates.In this paper,a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification systems.The considered biometric in this paper is the speech signal.The speech signal is transformed into its spectrogram.Then,the spectrogram is encrypted using two cascaded optical encryption algorithms.The first algorithm is the Optical Scanning Holography(OSH)for its efficiency as an encryption tool.The OSH encrypted spectrogram is encrypted using Double Random Phase Encoding(DRPE)by implementing two Random Phase Masks(RPMs).After the two cascaded optical encryption algorithms,the cancelable template is obtained.The verification is implemented through correlation estimation between enrolled and test templates in their encrypted format.If the correlation value is larger than a threshold value,the user is authorized.The threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two curves.The implementation of optical encryption is adopted using its software rather than the optical setup.The efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation results.It can improve the biometric data security without deteriorating the recognition accuracy.Simulation results give close-to-zero This values for the Equal Error Rate(EER)and close-to-one values for the Area under Receiver Operator Characteristic(AROC)curve.
基金This research was funded by the Deanship of Scientific Research at Princess Nourah Bint Abdulrahman University through the Fast-track Research Funding Program to support publication in the top journal(Grant No.42-FTTJ-13).
文摘Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the original ones from hacking attempts.A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications.The original biometric is blurred with two co-prime operators.Hence,it can be recovered as the Greatest Common Divisor(GCD)between its two blurred versions.Minimal changes if induced in the biometric image prior to processing with co-prime operators prevents the recovery of the original biometric image through a GCD operation.Hence,the ability to change cancelable templates is guaranteed,since the owner of the biometric can pre-determine and manage the minimal change induced in the biometric image.Furthermore,we test the utility of the proposed algorithm in the single-and multi-biometric scenarios.The multi-biometric scenario depends on compressing face,fingerprint,iris,and palm print images,simultaneously,to generate the cancelable templates.Evaluation metrics such as Equal Error Rate(EER)and Area and Receiver Operator Characteristic curve(AROC)are considered.Simulation results on single-and multi-biometric scenarios show high AROC values up to 99.59%,and low EER values down to 0.04%.
文摘Biometrics is becoming an important method for human identification. However, once a biometric pattern is stolen, the user will quickly run out of alternatives and all the applications where the associated biometric pattern is used become insecure. Cancelable biometrics is a solution. However, traditional cancelable biometric methods treat the transformation process and feature extraction process independently. As a result, this kind of cancelable biometric approach would reduce the recognition accuracy. In this paper, we first analyzed the limitations of traditional cancelable biometric methods, and proposed the Key Incorporation Scheme for Cancelable Biometrics approach that could increase the recognition accuracy while achieving “cancelability”. Then we designed the Gabor Descriptor based Cancelable Iris Recognition method that is a practical implementation of the proposed Key Incorporation Scheme. The experimental results demonstrate that our proposed method can significantly improve the iris recognition accuracy while achieving “cancelability”.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61379153 and 61572529)
文摘With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit(qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantum mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users' information for the fingerprint identification.
基金supported by the National Natural Science Foundation of China(61301091,61802302)the Scientific Research Program Funded by Shaanxi Provincial Education Department(18JK0717)+2 种基金the Natural Science Basic Research Plan in Shaanxi Province of China(2015JQ6262)the Open Foundation of State Key Laboratory of Information Security(2015-MS-14)the New Star Team of Xi'an University of Posts and Telecommunications
文摘Aiming at the problem of low recognition rate and poor security in the process of palmprint identity authentication,a cancelable palmprint template generating algorithm is proposed,which is based on local Gabor directional pattern with adaptive threshold by mean(m LGDP),difference local Gabor directional pattern with adaptive threshold by mean(m DLGDP)and feature fusion of them.In this method,the feature code of the image is segmented and the feature vectors are extracted and binarized.Then the Bloom filter is used to achieve many-toone mapping and the location scrambling of palmprint image.Finally,the scrambling result matrix and the user key are irreversibly transformed by the convolution operation to obtain a revocable template of the palmprint image.Both theoretical and experimental results analysis show that,in the case of key loss,the method of feature fusion can enhance the diversity of the original palmprint template effectively,improve the recognition rate efficiently,and have better security.
文摘Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it cannot be replaced and rendered unusable. In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue. The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system. In this system, tokenized pseudo-random data is coupled with momentbased facial feature via inner product algorithm. The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key. If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement. Then, the compromised one is rendered completely useless. This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable. Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations.
文摘A new cyclic prefix(CP)-based nonoverlapping FBMC-QAM(CP-NO-FBMC-QAM)system with two prototype filters is proposed in this paper,which satisfies complex orthogonality conditions and good frequency energy confinement at the same time.We analyze its inter-carrier interference/inter-symbol interference(ICI/ISI)over multipath channels.Owing to the additional CP,the ISI of received symbols over multipath channels is eliminated in the proposed system,and the resulting improvement in the signal-to-interference ratio(SIR)performance is evaluated by theoretical analysis.Moreover,for the ICI caused by multipath propagation in received symbols,we develop a method that eliminates the ICI by frequency-domain channel estimation and equalization before the receiver filtering process.The proposed CP-NO-FBMC-QAM system and ICI cancellation method(ICICM)are validated by comparisons of implementation complexity,power spectral density(PSD),bit error rate(BER)and channel estimation performance with conventional CP-based orthogonal frequency division multiplexing(CP-OFDM)and FBMC-QAM systems.
文摘In this paper,an interference cancellation based neural receiver for superimposed pilot(SIP)in multi-layer transmission is proposed,where the data and pilot are non-orthogonally superimposed in the same time-frequency resource.Specifically,to deal with the intra-layer and inter-layer interference of SIP under multi-layer transmission,the interference cancellation with superimposed symbol aided channel estimation is leveraged in the neural receiver,accompanied by the pre-design of pilot code-division orthogonal mechanism at transmitter.In addition,to address the complexity issue for inter-vendor collaboration and the generalization problem in practical deployments,respectively,this paper also provides a fixed SIP(F-SIP)design based on constant pilot power ratio and scalable mechanisms for different modulation and coding schemes(MCSs)and transmission layers.Simulation results demonstrate the superiority of the proposed schemes on the performance of block error rate and throughput compared with existing counterparts.
基金supported in part by the National Natural Science Foundation of China under Grant 62071094in part by the National Key Laboratory of Wireless Communications Foundation under Grant IFN202402in part by the Postdoctoral Fellowship Program(Grade C)of China Postdoctoral Science Foundation under Grant GZC20240217.
文摘To enable simultaneous transmit and receive(STAR)on the same frequency in a densely deployed space with multi-interference sources,this work proposes a digitally-assisted analog selfinterference cancellation method,which can acquire reference signals through flexible wired/wireless switching access.Based on this method,the Minimum Mean Square Error algorithm with known channel state information is derived in detail,determining the upper limit of the cancellation performance,and the Adaptive Dithered Linear Search algorithm for real-time engineering cancellation is given.The correctness of theoretical analysis is verified by the practical self-interference channel measured by a vector network analyzer.Furthermore,we have designed and implemented the corresponding multiinterference cancellation prototype with the digitallyassisted structure,capable of handling multiple interferences(up to three)and supporting a large receive bandwidth of 100 MHz as well as a wide frequency coverage from 30 MHz to 3000 MHz.Prototype test results demonstrate that in the presence of three interferences,when the single interference bandwidth is 0.2/2/20 MHz(corresponding to the receive bandwidth of 2/20/100 MHz),the cancellation performance can reach 46/32/22 dB or more.
文摘“civil discourse”amongst multiple individuals with diverse viewpoints is necessary to move toward truth,to maintain democratic buoyancy,and to get the most accurate read on how best to move forward toward our collective good,civil discourse is nonetheless under catastrophic threat by contemporary forces that include the sloppy use of the term“hate speech”;the“libelling by labeling”(aka“cancelling”)in the public square of social media;technologically powered disinformation campaigns;and the growth of“safetyism”in academia.In light of these threats,the goal must be to convince educators,particularly philosophical educators,of the need to adopt a whole new focus in education,namely one that puts a spotlight on the fact that the utilization of the freedom of speech to destroy the freedom of speech of others utterly undermines the positive value of freedom of speech.In order to motivate individuals to turn their back on the dopamine rush of shutting someone down,educators must also spend a great deal of time showcasing the merits of“civil discourse”by providing young people with extensive experience in engaging in facilitated“civil discourse”(aka Communities of Philosophical Inquiry)so that its value can be woven into a personal commitment.
基金supported by the National Fund for Distinguished Young Scholars(52025072)the National Natural Science Foundation of China(52177012)the Foundation of National Key Laboratory of Science and Technology(614221722051301).
文摘In wideband noncooperative interference cancellation,the reference signals obtained through auxiliary antennas are weighted to cancel with the interference signal.The correlation between the reference signal and the interference signal determines interference cancellation performance,while the auxiliary antenna array affects the correlation by influencing the amplitude and phase of the reference signals.This paper analyzes the effect of auxiliary antenna array on multiple performances of wideband noncooperative interference cancellation.Firstly,the array received signal model of wideband interference is established,and the weight vector coupled with the auxiliary antennas array manifold is solved by spectral analysis and eigen-subspace decomposition.Then,multiple performances which include cancellation resolution,grating null,wideband interference cancellation ratio(ICR),and convergence rate are quantitatively characterized with the auxiliary antenna array.It is obtained through analysis that the performances mutually restrict the auxiliary antenna array.Higher cancellation resolution requires larger array aperture,but when the number of auxiliary antennas is fixed,larger array aperture results in more grating nulls.When the auxiliary antennas are closer to the main antenna,the wideband ICR is improved,but the convergence rate is reduced.The conclusions are verified through simulation of one-dimensional uniform array and two-dimensional nonuniform array.The experiments of three arrays are compared,and the results conform well with simulation and support the theoretical analysis.
基金funded by the Ministry of Higher Education,Malaysia under the Fundamental Research Grant Scheme(FRGS/1/2018/TK03/UTM/02/8).
文摘This work examines the impact of incorporating the physiological conditions of human cancellous bone,by integrating similar porosity of porous Fe with the cancellous bone under dynamic immersion test.All of the porous Fe specimens with~80%porosity were immersed in Simulated Body Fluid(SBF)with a flow rate of 0.3 ml/min integrated with cancellous bone for 7,14 and 28 days.Porous Fe with the lowest surface area has the highest degradation rate despite having the lowest relative weight loss.The relationship between fluid induced shear stress and weight loss of specimens have been established.
基金supported by the Shan⁃dong Provincial Natural Science Foundation(No.ZR2022MF314).
文摘The adaptive filtering algorithm with a fixed projection order is unable to adjust its performance in response to changes in the external environment of airborne radars.To overcome this limitation,a new approach is introduced,which is the variable projection order Ekblom norm-promoted adaptive algorithm(VPO-EPAA).The method begins by examining the mean squared deviation(MSD)of the EPAA,deriving a formula for its MSD.Next,it compares the MSD of EPAA at two different projection orders and selects the one that minimizes the MSD as the parameter for the current iteration.Furthermore,the algorithm’s computational complexity is analyzed theoretically.Simulation results from system identification and self-interference cancellation show that the proposed algorithm performs exceptionally well in airborne radar signal self-interference cancellation,even under various noise intensities and types of interference.
文摘Background:Telehealth has emerged as a powerful tool for managing chronic diseases and mental health conditions,offering increased access to care and improved patient outcomes.However,inequities in digital connectivity and technological resources have created significant disparities in access to these potentially life-changing services,disproportionately impacting marginalized and minoritized communities across the globe.Methods:Data on 473,716 telehealth encounters occurring between January 1,2022,and June 30,2023 were retrieved from the electronic health records(EHR)system used by University Hospitals.These encounters were classified into three groups:attended,canceled,and no-show.Relative risk was calculated based on age,sex,and race,and a multivariate linear regression was performed with age,sex,and race as inputs,to determine their effect on the encounter outcome.Results:Our analysis identified significant differences in relative risk between demographic groups.Patients 20-39 years of age had a high relative risk of cancellation and no-show,and Black patients demonstrated the highest relative risk for cancellation and no-show.The regression analysis illustrated a statistically significant link between no-shows and patients with a cellular plan with no other internet subscription(p<0.001),smartphone ownership(p<0.001),and not having a computer(p<0.05).Conclusions:This study highlights the clinical repercussions of the digital divide,as patients relying on a mobile phone and data plan to attend telehealth visits were more likely to no-show.Current disparities in digital connectivity for historically marginalized populations heightens the risk of creating a digital underclass.There is evidence this study may be applicable in multiple countries across the world.Further research on the causes of the observed no-shows is necessary to ensure equitable delivery of digital healthcare services.
基金supported in part by the National Natural Science Foundation of China under Grant U21B2014,Grant 92267202,and Grant 62271081.
文摘This paper studies the sensing base station(SBS)that has great potential to improve the safety of vehicles and pedestrians on roads.SBS can detect the targets on the road with communication signals using the integrated sensing and communication(ISAC)technique.Compared with vehicle-mounted radar,SBS has a better sensing field due to its higher deployment position,which can help solve the problem of sensing blind areas.In this paper,key technologies of SBS are studied,including the beamforming algorithm,beam scanning scheme,and interference cancellation algorithm.To transmit and receive ISAC signals simultaneously,a double-coupling antenna array is applied.The free detection beam and directional communication beam are proposed for joint communication and sensing to meet the requirements of beamwidth and pointing directions.The joint timespace-frequency domain division multiple access algorithm is proposed to cancel the interference of SBS,including multiuser interference and duplex interference between sensing and communication.Finally,the sensing and communication performance of SBS under the industrial scientific medical power limitation is analyzed and simulated.Simulation results show that the communication rate of SBS can reach over 100 Mbps and the range of sensing and communication can reach about 500 m.
文摘降噪耳机使用过度竞会导致大脑“听不清”?伦敦青年的经历引发健康警示!An alarming increase in hearing problems among young adults has been linked to Auditory Processing Disorder(APD,听觉处理障碍).Health experts warn that this issue could be partially associated with the growing use of noise-canceling headphones.
基金supported in part by the National Natural Science Foundation of China under Grant 62071094in part by the National Key Laboratory of Wireless Communications Foundation under Grant IFN202402in part by the Postdoctoral Fellowship Program(Grade C)of China Postdoctoral Science Foundation under Grant GZC20240217.
文摘To guarantee secure communication against eavesdropping and malicious attack,an artificial noise(AN)-aided frequency-hopping(FH)architecture is adopted in this article.But the inevitable time misalignment between the received signal and locally reconstructed AN will deteriorate the AN cancellation performance,yielding significant secrecy degradation at the FH receiver.In view of this,first,the AN cancellation performance under time misalignment is evaluated via signal to AN-plus-noise ratio,and the system secrecy is analyzed via secrecy rate.Then,to mitigate the performance degradation raised by time misalignment,the transmitting power allocation scheme for AN and confidential signal(CS)is optimized,and the optimal hopping period is designed.Notably,the obtained conclusions in both the performance evaluation and transmitter optimization sections hold no matter whether the eavesdropper can realize FH synchronization or not.Simulations verify that time misalignment will raise non-negligible performance degradation.Besides,the power ratio of AN to CS should decrease as time misalignment increases,and for perfect time synchronization,the transmitting power of AN and CS should be equivalent.In addition,a longer hopping period is preferred for secrecy enhancement when time misalignment gets exacerbated.
基金supported by the National Natural Science Foundation of China(62001227)the Academy of Finland(315858341489).
文摘This paper considers the short-range sensing imple-mentation in continuous-wave(CW)phased array systems.We specifically address this CW short-range sensing challenges stemming from the self-interference cancellation(SIC)operation and synthesis requirement of arbitrary beampatterns for the sensing purpose,which has rarely been researched before.In this paper,unlike the only existed work that exploits the heuris-tic method and shares no analytical solution,an SIC pattern syn-thesis design is presented with a closed-form solution.By utiliz-ing the null-space projection(NSP)method,the proposed method effectively mitigates the self-interference to enable the in-band full-duplex operation of the array system.Subsequently,the NSP design will be innovatively embedded in a singular value decomposition(SVD)based weighted alternating reserve projec-tion(WARP)approach to efficiently synthesize an arbitrary desired pattern by solving a unique rank-deficient weighted least mean square problem.Numerical results validate the effective-ness of the proposed method in terms of beampattern,SIC per-formance,and sensing performance.
基金supported by the National Natural Science Foundation of China(NSFC)with project ID 62071498the Guangdong National Science Foundation(GDNSF)with project ID 2024A1515010213.
文摘Constituted by BCH component codes and its ordered statistics decoding(OSD),the successive cancellation list(SCL)decoding of U-UV structural codes can provide competent error-correction performance in the short-to-medium length regime.However,this list decoding complexity becomes formidable as the decoding output list size increases.This is primarily incurred by the OSD.Addressing this challenge,this paper proposes the low complexity SCL decoding through reducing the complexity of component code decoding,and pruning the redundant SCL decoding paths.For the former,an efficient skipping rule is introduced for the OSD so that the higher order decoding can be skipped when they are not possible to provide a more likely codeword candidate.It is further extended to the OSD variant,the box-andmatch algorithm(BMA),in facilitating the component code decoding.Moreover,through estimating the correlation distance lower bounds(CDLBs)of the component code decoding outputs,a path pruning(PP)-SCL decoding is proposed to further facilitate the decoding of U-UV codes.In particular,its integration with the improved OSD and BMA is discussed.Simulation results show that significant complexity reduction can be achieved.Consequently,the U-UV codes can outperform the cyclic redundancy check(CRC)-polar codes with a similar decoding complexity.