Search results for "Computer Science::Multimedia"

showing 10 items of 35 documents

Stealthy Attacks in Cloud-Connected Linear Impulsive Systems

2018

This paper studies a security problem for a class cloud-connected multi-agent systems, where autonomous agents coordinate via a combination of short-range ad-hoc commu- nication links and long-range cloud services. We consider a simplified model for the dynamics of a cloud-connected multi- agent system and attacks, where the states evolve according to linear time-invariant impulsive dynamics, and attacks are modeled as exogenous inputs designed by an omniscent attacker that alters the continuous and impulsive updates. We propose a definition of attack detectability, characterize the existence of stealthy attacks as a function of the system parameters and attack properties, and design a fami…

0209 industrial biotechnologyClass (computer programming)Authenticationbusiness.industryComputer scienceDistributed computingData_MISCELLANEOUS020208 electrical & electronic engineeringAutonomous agentCyber-physical systemCloud computing02 engineering and technologyFunction (mathematics)Security robotics distributed control and estimation020901 industrial engineering & automationControl theoryComputer Science::Multimedia0202 electrical engineering electronic engineering information engineeringbusinessComputer Science::Cryptography and Security
researchProduct

"Table 1" of "Evidence of a broad structure at an invariant mass of 4.32- GeV/c**2 in the reaction e+ e- ---> pi+ pi- psi(2S) measured at BaBar"

2008

The measured c.m. energy dependence of the cross section with statistical errors only.. Bins with no recorded data are shown as a 'dash'.

3.985-7.985E+ E- ScatteringComputer Science::MultimediaE+ E- --> PI+ PI- PSI(3685)Integrated Cross SectionExclusivePsiCross SectionSIG
researchProduct

Automatic Identification of Watermarks and Watermarking Robustness Using Machine Learning Techniques

2021

The goal of this article is to propose a framework for automatic identification of watermarks from modified host images. The framework can be used with any watermark embedding/extraction system and is based on models built using machine learning (ML) techniques. Any supervised ML approach can be theoretically chosen. An important part of our framework consists in building a stand-alone module, independent of the watermarking system, for generating two types of watermarks datasets. The first type of datasets, that we will name artificially datasets, is generated from the original images by adding noise with an imposed maximum level of noise. The second type contains altered watermarked image…

Artificial neural networkbusiness.industryComputer scienceMachine learningcomputer.software_genreEnsemble learningSupport vector machineIdentification (information)Robustness (computer science)Computer Science::MultimediaNoise (video)Artificial intelligencebusinessHost (network)computerDigital watermarking
researchProduct

Optical security and encryption with totally incoherent light

2001

We present a method for securing and encrypting information optically by use of totally incoherent illumination. Encryption is performed with a multichannel optical processor working under natural (both temporal and spatially incoherent) light. In this way, the information that is to be secured can be codified by use of color signals and self-luminous displays. The encryption key is a phase-only mask, providing high security from counterfeiting. Output encrypted information is recorded as an intensity image that can be easily stored and transmitted optically or electrically. Decryption or authentication can also be performed optically or digitally. Experimental results are presented.

AuthenticationHigh securitybusiness.industryComputer scienceMultispectral imageComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONOptical securityEncryptionAtomic and Molecular Physics and OpticsOptical encryptionDiffractive lensOpticsComputer Science::MultimediabusinessOptical processorComputer Science::DatabasesComputer Science::Cryptography and SecurityOptics Letters
researchProduct

Novel Iris Biometric Watermarking Based on Singular Value Decomposition and Discrete Cosine Transform

2014

Published version of an article in the journal: Mathematical Problems in Engineering. Also available from the publisher at: http://dx.doi.org/10.1155/2014/926170 A novel iris biometric watermarking scheme is proposed focusing on iris recognition instead of the traditional watermark for increasing the security of the digital products. The preprocess of iris image is to be done firstly, which generates the iris biometric template from person's eye images. And then the templates are to be on discrete cosine transform; the value of the discrete cosine is encoded to BCH error control coding. The host image is divided into four areas equally correspondingly. The BCH codes are embedded in the sing…

BiometricsArticle SubjectGeneral MathematicsIris recognitionComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEngineering (all)Robustness (computer science)Computer Science::MultimediaDiscrete cosine transformMathematics (all)Computer visionDigital watermarkingTransform codingMathematicsComputer Science::Cryptography and Securitybusiness.industrylcsh:MathematicsVDP::Technology: 500::Mechanical engineering: 570General EngineeringWatermarkVDP::Technology: 500::Information and communication technology: 550lcsh:QA1-939ComputingMethodologies_PATTERNRECOGNITIONlcsh:TA1-2040Computer Science::Computer Vision and Pattern RecognitionArtificial intelligencebusinesslcsh:Engineering (General). Civil engineering (General)BCH codeMathematics (all); Engineering (all)Mathematical Problems in Engineering
researchProduct

An overview of doping in sports

2019

The history of doping field can be outlined in three major stages: (1) early stage in which drug abuse took place during sports performance and competition and gas chromatography was used for its detection; (2) approximately in the 1970s when androgenic anabolic steroids were introduced; (3) In the recent era when the fields of biochemistry, physiology, toxicology, genomics, genetics, immunology, and molecular biology were integrated and applied routinely. Advanced omics technology and gene doping age may be applied in near future. This review will discuss commonly abused materials, both their adverse and harmful effects, and the alleged benefits in conjunction with the current standards in…

Bioquímicaprotein synthesis[SDV]Life Sciences [q-bio]anabolic androgenic steroidsPharmacologyProtein chemistry01 natural sciencesDopaje03 medical and health sciencesCondensed Matter::Materials SciencePhysics::Popular PhysicsBlood dopingerythropoiesis-stimulating agentsGene dopinghuman urineCondensed Matter::SuperconductivityToxicologíaComputer Science::Multimediaaromatase inhibition030304 developmental biology0303 health sciencesAromatase inhibitionbody compositionChemistryexogenous growth hormone010401 analytical chemistryMedicina deportivaskeletal muscle massAnabolic-Androgenic SteroidsSkeletal muscle massGenética3. Good health0104 chemical sciencesautologous blood transfusionsCondensed Matter::Strongly Correlated Electronshuman activitiesClinical psychology
researchProduct

Bézier surfaces of minimal area: The Dirichlet approach

2004

The Plateau-Bezier problem consists in finding the Bezier surface with minimal area from among all Bezier surfaces with prescribed border. An approximation to the solution of the Plateau-Bezier problem is obtained by replacing the area functional with the Dirichlet functional. Some comparisons between Dirichlet extremals and Bezier surfaces obtained by the use of masks related with minimal surfaces are studied.

Bézier surfacePure mathematicsMinimal surfaceAerospace EngineeringBézier curveComputer Science::Computational GeometryTopologyComputer Graphics and Computer-Aided DesignDirichlet distributionsymbols.namesakeComputer Science::GraphicsModeling and SimulationComputer Science::MultimediaAutomotive EngineeringsymbolsMathematicsComputer Aided Geometric Design
researchProduct

Non-convex Optimization for Resource Allocation in Wireless Device-to-Device Communications

2020

Device-to-device (D2D) communication is considered one of the key frameworks to provide suitable solutions for the exponentially increasing data tra c in mobile telecommunications. In this PhD Thesis, we focus on the resource allocation for underlay D2D communications which often results in a non-convex optimization problem that is computationally demanding. We have also reviewed many of the works on D2D underlay communications and identi ed some of the limitations that were not handled previously, which has motivated our works in this Thesis. Our rst works focus on the joint power allocation and channel assignment problem in the D2D underlay communication scenario for a unicast single-inpu…

Computer Science::Computer Science and Game TheoryComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSComputer Science::MultimediaComputer Science::Networking and Internet ArchitectureVDP::Teknologi: 500::Informasjons- og kommunikasjonsteknologi: 550Computer Science::Information Theory
researchProduct

New key based on tilted lenses for optical encryption

2016

A novel concept based on tilted spherical lenses for optical encryption using Lohmann’s type I systems is presented. The tilt angle of the spherical lenses is used as an encrypted key and the decryption performance is studied both qualitatively (visual image degradation) and quantitatively (mean squared error analysis) by numerical simulations. The paper presents a general mathematical framework in virtue of the dioptric power matrix formalism and oblique central refraction used in the optometry field. Computer simulations show that image information cannot be retrieved after a few degrees of tilt on both spherical lenses in the encryption system. In addition, a preliminary experiment is pr…

Computer sciencebusiness.industryMaterials Science (miscellaneous)ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONEncryption01 natural sciencesGeneralLiterature_MISCELLANEOUSIndustrial and Manufacturing EngineeringOptical encryption010309 optics03 medical and health sciences0302 clinical medicineOpticsComputer Science::Multimedia0103 physical sciences030221 ophthalmology & optometryHybrid cryptosystemBusiness and International ManagementbusinessComputingMethodologies_COMPUTERGRAPHICSComputer Science::Cryptography and SecurityApplied Optics
researchProduct

Anharmonicity deformation and curvature in supersymmetric potentials

1994

An algebraic description of the class of 1D supersymmetric shape invariant potentials is investigated in terms of the shape-invariant-potential (SIP) deformed algebra, the generators of which act both on the dynamical variable and on the parameters of the potentials. The phase space geometry associated with SIP's is studied by means of a coherent state (SIP-CS) path integral and the ray metric of the SIP-CS manifold. The anharmonicity of SIP's results in a inhomogeneous phase space manifold with one Killing vector and with a modified symplectic Kahler structure, and it induces a non constant curvature into the generalized phase space. Analogous results from the phase space geometry of someq…

Constant curvaturePhysicsKilling vector fieldPhase spaceQuantum mechanicsComputer Science::MultimediaAnharmonicityPath integral formulationGeneral Physics and AstronomyInvariant (mathematics)CurvatureSymplectic geometryMathematical physicsCzechoslovak Journal of Physics
researchProduct