The definition of good codes for error-detection is given. It is proved that a (n, k) linear block code in GF(q) are the good code for error-detection, if and only if its dual code is also. A series of new results abo...The definition of good codes for error-detection is given. It is proved that a (n, k) linear block code in GF(q) are the good code for error-detection, if and only if its dual code is also. A series of new results about the good codes for error-detection are derived. New lower bounds for undetected error probabilities are obtained, which are relative to n and k only, and not the weight structure of the codes.展开更多
Holography is an essential technique of generating three-dimensional images.Recently,quantum holography with undetected photons(QHUP)has emerged as a groundbreaking method capable of capturing complex amplitude images...Holography is an essential technique of generating three-dimensional images.Recently,quantum holography with undetected photons(QHUP)has emerged as a groundbreaking method capable of capturing complex amplitude images.Despite its potential,the practical application of QHUP has been limited by susceptibility to phase disturbances,low interference visibility,and limited spatial resolution.Deep learning,recognized for its ability in processing complex data,holds significant promise in addressing these challenges.In this report,we present an ample advancement in QHUP achieved by harnessing the power of deep learning to extract images from single-shot holograms,resulting in vastly reduced noise and distortion,alongside a notable enhancement in spatial resolution.The proposed and demonstrated deep learning QHUP(DL-QHUP)methodology offers a transformative solution by delivering high-speed imaging,improved spatial resolution,and superior noise resilience,making it suitable for diverse applications across an array of research fields stretching from biomedical imaging to remote sensing.DL-QHUP signifies a crucial leap forward in the realm of holography,demonstrating its immense potential to revolutionize imaging capabilities and pave the way for advancements in various scientific disciplines.The integration of DL-QHUP promises to unlock new possibilities in imaging applications,transcending existing limitations and offering unparalleled performance in challenging environments.展开更多
IT is known that the average undetected error probability (UEP) of a binary [n, k] code Con a binary symmetric channel with crossover probability p is given byP<sub>e</sub>(p) = sum from i=1 A<sub&g...IT is known that the average undetected error probability (UEP) of a binary [n, k] code Con a binary symmetric channel with crossover probability p is given byP<sub>e</sub>(p) = sum from i=1 A<sub>i</sub>p<sup>i</sup>(1-p)<sup>n-1</sup>, (1)where (A<sub>0</sub>, A<sub>1</sub>,…, A<sub>n</sub>) is the weight distribution of C. If for all 0≤p≤0.5, P<sub>e</sub>(p)≤P<sub>e</sub>(0. 5) = 2<sup>k-n</sup>-2<sup>-n</sup>, then C is called good for error detection. Moreover, if P<sub>e</sub> (p) ismonotonously increasing in the interval [0, 0.5], then C is called proper. Clearly, propercodes are good.展开更多
Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on pas...Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness.展开更多
Supernova 1987 A is a core collapse supernova in the Large Magellanic Cloud, inside which the product is most likely a neutron star. Despite the most sensitive available detection instruments from radio to γ-ray wave...Supernova 1987 A is a core collapse supernova in the Large Magellanic Cloud, inside which the product is most likely a neutron star. Despite the most sensitive available detection instruments from radio to γ-ray wavebands being exploited in the pass thirty years, there have not yet been any pulse signals detected. By considering the density of the medium plasma in the remnant of 1987 A, we find that the plasma cut-off frequency is approximately7 GHz, a value higher than the conventional observational waveband of radio pulsars. As derived, with the expansion of the supernova remnant, the radio signal will be detected in 2073 A.D. at 3 GHz.展开更多
In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze t...In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze the relation between steganographic capacity and affecting factors(image size, steganography operator, loading band, embedding intensity and image complexity). Then we design a steganography analyzer architecture and a steganographic algorithm which can dynamically increase the steganographic capacity. Compared with other methods of embedding capacity estimation in DCT domain, the proposed methods utilizes general steganalysis methods rather than one specific steganalysis technique and takes five essential factors into account, which improves the commonality and comprehensiveness of capacity estimation, respectively. The experimental results show that steganographic capacity for quantization index modulation(QIM) is almost twice that of spread spectrum(SS) based on MCUU model.展开更多
Image steganography algorithms based on deep learning are often trained using either spatial-or frequency-domain features.It is difficult for features from a single domain to comprehensively express the content of an ...Image steganography algorithms based on deep learning are often trained using either spatial-or frequency-domain features.It is difficult for features from a single domain to comprehensively express the content of an entire image,which usually leads to poor performance because steganography is commonly multi-task.To solve this problem,this paper proposes a robust image steganography algorithm based on feature score maps,called the secure and robust image steganography network(SRIS-Net).First,instead of spatial-domain steganography,our proposed algorithm utilizes a convolutional neural network to obtain shallow spatial-domain features.These features are decomposed by Laplacian pyramid frequency-domain decomposition(LPFDD)to hide secret information in the different frequency sub-bands with a progressive assisted hiding strategy that significantly reduces the influence of the secret information on the cover image,achieving significant invisibility and robust performance.In addition,we propose a global–local embedding module(GLEM)to achieve embedding by considering the overall structure of the image and the local details,and a dual multi-scale aggregation sub-network(DMSubNet)to perform multi-scale reconstruction to improve the quality of the carrier image.For security,we propose a dual-task discriminator structure,while giving a real/fake judgment of the image,which can generate a feature score map of the cover image’s region of interest(ROI)to guide the embedding module to generate a carrier image with higher imperceptibility and undetectability.Experimental results on BOSSBase show that our SRIS-Net outperforms mainstream methods in terms of undetectability and robustness,with more than 9.2 and 3.4 dB improvement in visual quality,respectively,and the capacity can be increased up to approximately 72–96 bits per pixel.展开更多
The undetected error probability and error detection capability of shortened Hamming codes and their dual codes are studied in this paper. We also obtain some interesting properties for the shortened Simplex codes.
A TPG system, SABATPG, is given based on a generic structural model of large circuits. Three techniques of partial implication, aftereffect of identified undetectable faults and shared sensitization with new concepts ...A TPG system, SABATPG, is given based on a generic structural model of large circuits. Three techniques of partial implication, aftereffect of identified undetectable faults and shared sensitization with new concepts of localization and aftereffect are employed in the system to improve FAN algorithm. Experiments for the 10 ISCAS benchmark circuits show that the computing time of SABATPG for test generation is 19.42% less than that of FAN algorithm.展开更多
文摘The definition of good codes for error-detection is given. It is proved that a (n, k) linear block code in GF(q) are the good code for error-detection, if and only if its dual code is also. A series of new results about the good codes for error-detection are derived. New lower bounds for undetected error probabilities are obtained, which are relative to n and k only, and not the weight structure of the codes.
基金The National Natural Science Foundation of China(Grant No.11934011,62075194,U21A6006)The National Key Research and Development Program of China(Grant No.2019YFA0308100,2023YFB2806000,2022YFA1204700)+2 种基金The Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB28000000)The Open Program of the State Key Laboratory of Advanced Optical Communication Systems and Networks at Shanghai Jiao Tong University(Grant No.2023GZKF024)The Fundamental Research Funds for the Central Universities.The Information Technology Center and State Key Lab of CAD&CG.
文摘Holography is an essential technique of generating three-dimensional images.Recently,quantum holography with undetected photons(QHUP)has emerged as a groundbreaking method capable of capturing complex amplitude images.Despite its potential,the practical application of QHUP has been limited by susceptibility to phase disturbances,low interference visibility,and limited spatial resolution.Deep learning,recognized for its ability in processing complex data,holds significant promise in addressing these challenges.In this report,we present an ample advancement in QHUP achieved by harnessing the power of deep learning to extract images from single-shot holograms,resulting in vastly reduced noise and distortion,alongside a notable enhancement in spatial resolution.The proposed and demonstrated deep learning QHUP(DL-QHUP)methodology offers a transformative solution by delivering high-speed imaging,improved spatial resolution,and superior noise resilience,making it suitable for diverse applications across an array of research fields stretching from biomedical imaging to remote sensing.DL-QHUP signifies a crucial leap forward in the realm of holography,demonstrating its immense potential to revolutionize imaging capabilities and pave the way for advancements in various scientific disciplines.The integration of DL-QHUP promises to unlock new possibilities in imaging applications,transcending existing limitations and offering unparalleled performance in challenging environments.
文摘IT is known that the average undetected error probability (UEP) of a binary [n, k] code Con a binary symmetric channel with crossover probability p is given byP<sub>e</sub>(p) = sum from i=1 A<sub>i</sub>p<sup>i</sup>(1-p)<sup>n-1</sup>, (1)where (A<sub>0</sub>, A<sub>1</sub>,…, A<sub>n</sub>) is the weight distribution of C. If for all 0≤p≤0.5, P<sub>e</sub>(p)≤P<sub>e</sub>(0. 5) = 2<sup>k-n</sup>-2<sup>-n</sup>, then C is called good for error detection. Moreover, if P<sub>e</sub> (p) ismonotonously increasing in the interval [0, 0.5], then C is called proper. Clearly, propercodes are good.
基金the National Science Council (Nos. NSC 99-2218-E-011-014 and NSC 100-2219-E-011-002)
文摘Three-party password authenticated key exchange (3PAKE) protocol plays a significant role in the history of secure communication area in which two clients agree a robust session key in an authentic manner based on passwords. In recent years, researchers focused on developing simple 3PAKE (S-3PAKE) protocol to gain system e?ciency while preserving security robustness for the system. In this study, we first demonstrate how an undetectable on-line dictionary attack can be successfully applied over three existing S-3PAKE schemes. An error correction code (ECC) based S-3PAKE protocol is then introduced to eliminate the identified authentication weakness.
基金Supported by the National Basic Research Program of China under Grant No 2015CB857100the National Key Research and Development Program of China under Grant No 2017YFA0402600the National Natural Science Foundation of China under Grant Nos 11173034,11703003 and U1731238
文摘Supernova 1987 A is a core collapse supernova in the Large Magellanic Cloud, inside which the product is most likely a neutron star. Despite the most sensitive available detection instruments from radio to γ-ray wavebands being exploited in the pass thirty years, there have not yet been any pulse signals detected. By considering the density of the medium plasma in the remnant of 1987 A, we find that the plasma cut-off frequency is approximately7 GHz, a value higher than the conventional observational waveband of radio pulsars. As derived, with the expansion of the supernova remnant, the radio signal will be detected in 2073 A.D. at 3 GHz.
基金Supported by the National Natural Science Foundation of China(61170271,61170272,61272310,61373131,61573316)Zhejiang Provincial Natural Science Foundation of China(LY15F020032,LQ12 F02016,LQ15E050006)
文摘In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze the relation between steganographic capacity and affecting factors(image size, steganography operator, loading band, embedding intensity and image complexity). Then we design a steganography analyzer architecture and a steganographic algorithm which can dynamically increase the steganographic capacity. Compared with other methods of embedding capacity estimation in DCT domain, the proposed methods utilizes general steganalysis methods rather than one specific steganalysis technique and takes five essential factors into account, which improves the commonality and comprehensiveness of capacity estimation, respectively. The experimental results show that steganographic capacity for quantization index modulation(QIM) is almost twice that of spread spectrum(SS) based on MCUU model.
基金Project supported by the National Natural Science Foundation of China(No.62062023)the Guizhou Science and Technology Plan Project(No.ZK[2021]-YB314)。
文摘Image steganography algorithms based on deep learning are often trained using either spatial-or frequency-domain features.It is difficult for features from a single domain to comprehensively express the content of an entire image,which usually leads to poor performance because steganography is commonly multi-task.To solve this problem,this paper proposes a robust image steganography algorithm based on feature score maps,called the secure and robust image steganography network(SRIS-Net).First,instead of spatial-domain steganography,our proposed algorithm utilizes a convolutional neural network to obtain shallow spatial-domain features.These features are decomposed by Laplacian pyramid frequency-domain decomposition(LPFDD)to hide secret information in the different frequency sub-bands with a progressive assisted hiding strategy that significantly reduces the influence of the secret information on the cover image,achieving significant invisibility and robust performance.In addition,we propose a global–local embedding module(GLEM)to achieve embedding by considering the overall structure of the image and the local details,and a dual multi-scale aggregation sub-network(DMSubNet)to perform multi-scale reconstruction to improve the quality of the carrier image.For security,we propose a dual-task discriminator structure,while giving a real/fake judgment of the image,which can generate a feature score map of the cover image’s region of interest(ROI)to guide the embedding module to generate a carrier image with higher imperceptibility and undetectability.Experimental results on BOSSBase show that our SRIS-Net outperforms mainstream methods in terms of undetectability and robustness,with more than 9.2 and 3.4 dB improvement in visual quality,respectively,and the capacity can be increased up to approximately 72–96 bits per pixel.
基金supported by the National Natural Science Foundation of China, No. 69802008.
文摘The undetected error probability and error detection capability of shortened Hamming codes and their dual codes are studied in this paper. We also obtain some interesting properties for the shortened Simplex codes.
文摘A TPG system, SABATPG, is given based on a generic structural model of large circuits. Three techniques of partial implication, aftereffect of identified undetectable faults and shared sensitization with new concepts of localization and aftereffect are employed in the system to improve FAN algorithm. Experiments for the 10 ISCAS benchmark circuits show that the computing time of SABATPG for test generation is 19.42% less than that of FAN algorithm.