Search results for "Computer Science::Multimedia"
showing 10 items of 35 documents
Stealthy Attacks in Cloud-Connected Linear Impulsive Systems
2018
This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…
"Table 1" of "Evidence of a broad structure at an invariant mass of 4.32- GeV/c**2 in the reaction e+ e- ---> pi+ pi- psi(2S) measured at BaBar"
2008
The measured c.m. energy dependence of the cross section with statistical errors only.. Bins with no recorded data are shown as a 'dash'.
Automatic Identification of Watermarks and Watermarking Robustness Using Machine Learning Techniques
2021
The goal of this article is to propose a framework for automatic identification of watermarks from modified host images. The framework can be used with any watermark embedding/extraction system and is based on models built using machine learning (ML) techniques. Any supervised ML approach can be theoretically chosen. An important part of our framework consists in building a stand-alone module, independent of the watermarking system, for generating two types of watermarks datasets. The first type of datasets, that we will name artificially datasets, is generated from the original images by adding noise with an imposed maximum level of noise. The second type contains altered watermarked image…
Optical security and encryption with totally incoherent light
2001
We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.
Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform
2014
Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2014/926170 A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the sing…
An overview of doping in sports
2019
The history of doping field can be outlined in three major stages: (1) early stage in which drug abuse took place during sports performance and competition and gas chromatography was used for its detection; (2) approximately in the 1970s when androgenic anabolic steroids were introduced; (3) In the recent era when the fields of biochemistry, physiology, toxicology, genomics, genetics, immunology, and molecular biology were integrated and applied routinely. Advanced omics technology and gene doping age may be applied in near future. This review will discuss commonly abused materials, both their adverse and harmful effects, and the alleged benefits in conjunction with the current standards in…
Bézier surfaces of minimal area: The Dirichlet approach
2004
The Plateau-Bezier problem consists in finding the Bezier surface with minimal area from among all Bezier surfaces with prescribed border. An approximation to the solution of the Plateau-Bezier problem is obtained by replacing the area functional with the Dirichlet functional. Some comparisons between Dirichlet extremals and Bezier surfaces obtained by the use of masks related with minimal surfaces are studied.
Non-convex Optimization for Resource Allocation in Wireless Device-to-Device Communications
2020
Device-to-device (D2D) communication is considered one of the key frameworks to provide suitable solutions for the exponentially increasing data tra c in mobile telecommunications. In this PhD Thesis, we focus on the resource allocation for underlay D2D communications which often results in a non-convex optimization problem that is computationally demanding. We have also reviewed many of the works on D2D underlay communications and identi ed some of the limitations that were not handled previously, which has motivated our works in this Thesis. Our rst works focus on the joint power allocation and channel assignment problem in the D2D underlay communication scenario for a unicast single-inpu…
New key based on tilted lenses for optical encryption
2016
A novel concept based on tilted spherical lenses for optical encryption using Lohmann’s type I systems is presented. The tilt angle of the spherical lenses is used as an encrypted key and the decryption performance is studied both qualitatively (visual image degradation) and quantitatively (mean squared error analysis) by numerical simulations. The paper presents a general mathematical framework in virtue of the dioptric power matrix formalism and oblique central refraction used in the optometry field. Computer simulations show that image information cannot be retrieved after a few degrees of tilt on both spherical lenses in the encryption system. In addition, a preliminary experiment is pr…
Anharmonicity deformation and curvature in supersymmetric potentials
1994
An algebraic description of the class of 1D supersymmetric shape invariant potentials is investigated in terms of the shape-invariant-potential (SIP) deformed algebra, the generators of which act both on the dynamical variable and on the parameters of the potentials. The phase space geometry associated with SIP's is studied by means of a coherent state (SIP-CS) path integral and the ray metric of the SIP-CS manifold. The anharmonicity of SIP's results in a inhomogeneous phase space manifold with one Killing vector and with a modified symplectic Kahler structure, and it induces a non constant curvature into the generalized phase space. Analogous results from the phase space geometry of someq…