修车大队一品楼qm论坛51一品茶楼论坛,栖凤楼品茶全国楼凤app软件 ,栖凤阁全国论坛入口,广州百花丛bhc论坛杭州百花坊妃子阁

oe1(光电查) - 科学论文

27 条数据
?? 中文(中国)
  • Cosine-transform-based chaotic system for image encryption

    摘要: Chaos is known as a natural candidate for cryptography applications owing to its properties such as unpredictability and initial state sensitivity. However, certain chaos-based cryptosystems have been proven to exhibit various security defects because their used chaotic maps do not have complex dynamical behaviors. To address this problem, this paper introduces a cosine-transform-based chaotic system (CTBCS). Using two chaotic maps as seed maps, the CTBCS can produce chaotic maps with complex dynamical behaviors. For illustration, we produce three chaotic maps using the CTBCS and analyze their chaos complexity. Using one of the generated chaotic maps, we further propose an image encryption scheme. The encryption scheme uses high-efficiency scrambling to separate adjacent pixels and employs random order substitution to spread a small change in the plain-image to all pixels of the cipher-image. The performance evaluation demonstrates that the chaotic maps generated by the CTBCS exhibit substantially more complicated chaotic behaviors than the existing ones. The simulation results indicate the reliability of the proposed image encryption scheme. Moreover, the security analysis demonstrates that the proposed image encryption scheme provides a higher level of security than several advanced image encryption schemes.

    关键词: Image privacy,Chaotic system,Image encryption,Cryptography,Security analysis,Chaos-based encryption

    更新于2025-09-23 15:23:52

  • Multiview Layer Fusion Model for Action Recognition Using RGBD Images

    摘要: Vision-based action recognition encounters different challenges in practice, including recognition of the subject from any viewpoint, processing of data in real time, and offering privacy in a real-world setting. Even recognizing profile-based human actions, a subset of vision-based action recognition, is a considerable challenge in computer vision which forms the basis for an understanding of complex actions, activities, and behaviors, especially in healthcare applications and video surveillance systems. Accordingly, we introduce a novel method to construct a layer feature model for a profile-based solution that allows the fusion of features for multiview depth images. This model enables recognition from several viewpoints with low complexity at a real-time running speed of 63 fps for four profile-based actions: standing/walking, sitting, stooping, and lying. The experiment using the Northwestern-UCLA 3D dataset resulted in an average precision of 86.40%. With the i3DPost dataset, the experiment achieved an average precision of 93.00%. With the PSU multiview profile-based action dataset, a new dataset for multiple viewpoints which provides profile-based action RGBD images built by our group, we achieved an average precision of 99.31%.

    关键词: privacy-preserving surveillance,layer fusion model,real-time processing,Multiview action recognition,RGBD images,depth-based features

    更新于2025-09-23 15:22:29

  • [IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Designing with Luminescent Solar Concentrator Photovoltaics

    摘要: In a pro?le matchmaking application of mobile social networks, users need to reveal their interests to each other in order to ?nd the common interests. A malicious user may harm a user by knowing his personal information. Therefore, mutual interests need to be found in a privacy preserving manner. In this paper, we propose an ef?cient privacy protection and interests sharing protocol referred to as PRivacy-aware Interest Sharing and Matching (PRISM). PRISM enables users to discover mutual interests without revealing their interests. Unlike existing approaches, PRISM does not require revealing the interests to a trusted server. Moreover, the protocol considers attacking scenarios that have not been addressed previously and provides an ef?cient solution. The inherent mechanism reveals any cheating attempt by a malicious user. PRISM also proposes the procedure to eliminate Sybil attacks. We analyze the security of PRISM against both passive and active attacks. Through implementation, we also present a detailed analysis of the performance of PRISM and compare it with existing approaches. The results show the effectiveness of PRISM without any signi?cant performance degradation.

    关键词: privacy,Mobile social networks,pro?le matchmaking,interests

    更新于2025-09-23 15:21:01

  • [IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Novel Scheme For Extracting Maximum Power From Fa?§ade Based Building Integrated Photovoltaics

    摘要: Providing top-k query services is relevant for storage servers which collect valuable ?les/data and process queries for data owners and mobile users. However, this kind of service could incur severe security concerns, because hackers or even the managers/administrators of the servers may steal important data sets and deceive users into responding to forged or incomplete query results. Therefore, these data sets need to be preserved in privacy, and moreover, the users should have the capability to verify the authenticity and integrity of the query results. As users will demand distinct information with various preferences and time domains in the pragmatic world, the traditional top-k queries are insuf?cient to satisfy their demands. To solve the problem, we provide the functional top-k queries in multi-dimensional space, such that the users can launch queries on the conjunction and sum of the dimensions/attributes. Some recent works have studied how to preserve data privacy and/or integrity for top-k queries on data storage applications. However, these prior works are limited to traditional top-k queries in preserving data privacy and/or integrity without permitting to systematically process top-k queries over encrypted domain in multi-dimensional space and without providing an ef?ciently veri?able mechanism for the corresponding query results. In this paper, we propose an ef?cient and effective method, called SFTopk, which addresses more challenging security problems in data privacy and veri?able functional top-k queries in multi-dimensional space. From performance evaluation experiments, it is shown that our proposed method is much more ef?cient than the prior works in terms of communication overhead and computation cost.

    关键词: functional top-k query,authenticity,data storage,integrity,correctness,Privacy

    更新于2025-09-23 15:21:01

  • [Lecture Notes in Computer Science] Pattern Recognition and Computer Vision Volume 11258 (First Chinese Conference, PRCV 2018, Guangzhou, China, November 23-26, 2018, Proceedings, Part III) || Face Detection and Encryption for Privacy Preserving in Surveillance Video

    摘要: A number of techniques have recently been proposed for privacy preserving in video surveillance. Most of them are irreversible or have interference effect to the observation and recognition of human activities. In this paper, we address these issues by developing an effective method including face detection and encryption. In face detection, skin-color based approach fusing with fuzzy clustering is produced to detect facial candidates coarsely, and then we re?ne face by using SVM classi?er. In face encryption, a reversible hybrid encryption (decryption) scheme based on spatial and value scrambling models is proposed. Simulation results verify the proposed mechanism can effectively detect and obscure faces while leaving the activities comprehensible and has high key sensibility for reducing the probability of attacking.

    关键词: Privacy preserving,Reversible,Video surveillance,Face detection,Face encryption

    更新于2025-09-23 15:21:01

  • [IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Electron and hole partial specific resistances: a framework to understand contacts to solar cells

    摘要: Several approaches have been proposed to anonymize relational databases using the criterion of k-anonymity, to avoid the disclosure of sensitive information by re-identification attacks. A relational database is said to meet the criterion of k-anonymity if each record is identical to at least (k ? 1) other records in terms of quasi-identifier attribute values. To anonymize a transactional database and satisfy the constraint of k-anonymity, each item must successively be considered as a quasi-identifier attribute. But this process greatly increases dimensionality, and thus also the computational complexity of anonymization, and information loss. In this paper, a novel efficient anonymization system called PTA is proposed to not only anonymize transactional data with a small information loss but also to reduce the computational complexity of the anonymization process. The PTA system consists of three modules, which are the Pre-processing module, the TSP module, and the Anonymity model, to anonymize transactional data and guarantees that at least k-anonymity is achieved: a pre-processing module, a traveling salesman problem module, and an anonymization module. Extensive experiments have been carried to compare the efficiency of the designed approach with the state-of-the-art anonymization algorithms in terms of scalability, runtime, and information loss. Results indicate that the proposed PTA system outperforms the compared algorithms in all respects.

    关键词: Anonymity,privacy preserving data mining,TSP,divide-and-conquer,Gray sort

    更新于2025-09-23 15:19:57

  • [IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - How Gettering Affects the Temperature Sensitivity of the Implied Open Circuit Voltage of Multicrystalline Silicon Wafers

    摘要: Biometrics is commonly used in many automated verification systems offering several advantages over traditional verification methods. Since biometric features are associated with individuals, their leakage will violate individuals’ privacy, which can cause serious and continued problems as the biometric data from a person are irreplaceable. To protect the biometric data containing privacy information, a number of privacy-preserving biometric schemes (PPBSs) have been developed over the last decade, but they have various drawbacks. The aim of this paper is to provide a comprehensive overview of the existing PPBSs and give guidance for future privacy-preserving biometric research. In particular, we explain the functional mechanisms of popular PPBSs and present the state-of-the-art privacy-preserving biometric methods based on these mechanisms. Furthermore, we discuss the drawbacks of the existing PPBSs and point out the challenges and future research directions in PPBSs.

    关键词: biometric data,automated verification system,Privacy protection

    更新于2025-09-23 15:19:57

  • [IEEE 2019 IEEE Radiation Effects Data Workshop (IEEE) (in conjunction with NSREC 2019) - San Antonio, TX, USA (2019.7.8-2019.7.12)] 2019 IEEE Radiation Effects Data Workshop - Laser-Induced Micro SEL Characterization of SRAM Devices

    摘要: According to the growth of mobile devices equipped with a GPS receiver, a variety of location-based services (LBSs) have been launched. Since location information may reveal private information, preserving location privacy has become a significant issue. Previous studies proposed methods to preserve a users’ privacy; however, most of them do not take physical constraints into consideration. In this paper, we focus on such constraints and propose a location privacy preservation method that can be applicable to a real environment. In particular, our method anonymizes the user’s location by generating dummies which we simulate to behave like real human. It also considers traceability of the user’s locations to quickly recover from an accidental reveal of the user’s location. We conduct an experiment using five users’ real GPS trajectories and compared our method with previous studies. The results show that our method ensures to anonymize the user’s location within a pre-determined range. It also avoids fixing the relative positions of the user and dummies, which may give a hint for an LBS provider to identify the real user. In addition, we conducted a user experiment with 22 participants to evaluate the robustness of our method against humans. We asked participants to observe movements of a user and dummies and try to find the real user. As a result, we confirmed that our method can anonymize the users’ locations even against human’s observation.

    关键词: privacy,Location-based service,pervasive computing

    更新于2025-09-23 15:19:57

  • [IEEE 2019 IEEE 17th International Conference on Industrial Informatics (INDIN) - Helsinki, Finland (2019.7.22-2019.7.25)] 2019 IEEE 17th International Conference on Industrial Informatics (INDIN) - A Deep Learning Method for Material Performance Recognition in Laser Additive Manufacturing

    摘要: This paper presents a novel security architecture for protecting the integrity of iris images and templates using watermarking and visual cryptography (VC). The proposed scheme offers a complete protection framework for the iris biometrics which consists of two stages: the first stage is for iris image protection, while the second is for the iris template. First, for protecting the iris image, a watermark text which carries personal information is embedded in the middle band frequency region of the iris image using a novel watermarking algorithm that randomly interchanges multiple middle band pairs of the discrete cosine transform. Second, for iris template protection, the binary iris template is divided into two shares using VC, where one share is stored in the database and the other is kept with the user on a smart card. In addition, the SHA-2 hash function is utilized to maintain the integrity of the stored iris template in both the database and smart card. The experimental and comparison results on the CASIA V4 and UBIRIS V1 iris databases demonstrate that the proposed framework preserves the privacy of the iris images and templates and retains robustness to malicious attacks, while it does not have a discernible effect on the recognition performance.

    关键词: security and privacy protection,iris recognition,smart card,visual cryptography,Biometrics,template security,watermarking

    更新于2025-09-23 15:19:57

  • [IEEE 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Chicago, IL, USA (2019.6.16-2019.6.21)] 2019 IEEE 46th Photovoltaic Specialists Conference (PVSC) - Predicting Open-Circuit Voltages in Atomically-Thin Monolayer Transition Metal Dichalcogenides-Based Solar Cells

    摘要: District-wide real-time information sharing provides new opportunities to optimize infrastructures and, for example, the energy consumption of smart cities. However, information collection introduces new privacy threats that must be addressed. Existing anonymization solutions are not sufficient for the brokering of streaming real-time measurements. Advanced adversaries may utilize information available from different sources and correlation analyses to reveal a measurement’s actual source. We analyze security and privacy requirements and design a privacy-enhancing architecture for an information brokering platform. We propose an adaptive pseudonymization framework to make privacy attacks harder and to gain real-time awareness of the robustness of the privacy protection of platforms. Finally, we present an initial evaluation of the proposal using real-world energy consumption measurements.

    关键词: authentication,privacy,real-time,smart city,Access control,anonymity,security,information sharing

    更新于2025-09-23 15:19:57