为探索GS1 Digital Link技术在产品物流中的应用潜力,分析研究了GS1系统和GS1 Digital Link的基本结构、编码特点以及技术优势,充分利用GS1 Digital Link技术可以为产品从源头到零售整个物流过程提供相关对象的Web地址编码的特点,以鲜...为探索GS1 Digital Link技术在产品物流中的应用潜力,分析研究了GS1系统和GS1 Digital Link的基本结构、编码特点以及技术优势,充分利用GS1 Digital Link技术可以为产品从源头到零售整个物流过程提供相关对象的Web地址编码的特点,以鲜活大闸蟹物流过程为例,构建了基于GS1 Digital Link的鲜活大闸蟹Web编码,为实现产品营销与追溯提供了标准化、动态化、多样化的编码数据支撑。展开更多
The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection qu...The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection quality of anti-counterfeiting codes and weak differentiation of anti-counterfeiting codes for high-quality counterfeits.Developing an anticounterfeiting code authentication algorithm based on mobile phones is of great commercial value.Although the existing algorithms developed based on special equipment can effectively identify forged anti-counterfeiting codes,the anti-counterfeiting code identification scheme based on mobile phones is still in its infancy.To address the small differences in texture features,low response speed and excessively large deep learning models used in mobile phone anti-counterfeiting and identification scenarios,we propose a feature-guided double pool attention network(FG-DPANet)to solve the reprinting forgery problem of printing anti-counterfeiting codes.To address the slight differences in texture features in high-quality reprinted anti-counterfeiting codes,we propose a feature guidance algorithm that creatively combines the texture features and the inherent noise feature of the scanner and printer introduced in the reprinting process to identify anti-counterfeiting code authenticity.The introduction of noise features effectively makes up for the small texture difference of high-quality anti-counterfeiting codes.The double pool attention network(DPANet)is a lightweight double pool attention residual network.Under the condition of ensuring detection accuracy,DPANet can simplify the network structure as much as possible,improve the network reasoning speed,and run better on mobile devices with low computing power.We conducted a series of experiments to evaluate the FG-DPANet proposed in this paper.Experimental results show that the proposed FG-DPANet can resist highquality and small-size anti-counterfeiting code reprint forgery.By comparing with the existing algorithm based on texture,it is shown that the proposed method has a higher authentication accuracy.Last but not least,the proposed scheme has been evaluated in the anti-counterfeiting code blurring scene,and the results show that our proposed method can well resist slight blurring of anti-counterfeiting images.展开更多
With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each ...With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each individual and does not change over time. Genetic information has been used to identify individuals in a variety of contexts, such as criminal investigations, paternity tests, and medical research. In this study, each individual’s genetic makeup has been formatted to create a secure, unique code that incorporates various elements, such as species, gender, and the genetic identification code itself. The combinations of markers required for this code have been derived from common single nucleotide polymorphisms (SNPs), points of variation found in the human genome. The final output is in the form of a 24 numerical code with each number having three possible combinations. The custom code can then be utilized to create various modes of identification on the decentralized blockchain network as well as personalized services and products that offer users a novel way to uniquely identify themselves in ways that were not possible before.展开更多
The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensi...The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensing system. The time domain signal of every code sequence is collected by the data acquisition card (DAQ). A shift-averaging technique is applied in the frequency domain for the reason that the local oscillator (LO) in the coherent detection is fix-frequency deviated from the primary source. With the 31-bit simplex code, the signal-to-noise ratio (SNR) has 3.5-dB enhancement with the same single pulse traces, accordant with the theoretical analysis. The frequency fluctuation for simplex codes is 14.01 MHz less than that for a single pulse as to 4-m spatial resolution. The results are believed to be beneficial for the BOTDR performance improvement.展开更多
Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronizati...Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization.展开更多
The multilevel modulation techniques nf M-Differential Amplitude Phase Shift Keying (DAPSK) have been proposed in combination with Turbo code scheme for digital radio broadcasting bands below 30 MHz radio channel. Com...The multilevel modulation techniques nf M-Differential Amplitude Phase Shift Keying (DAPSK) have been proposed in combination with Turbo code scheme for digital radio broadcasting bands below 30 MHz radio channel. Comparison of this modulation method with channel coding in an Additive White Gaussian Noise (AWGN) and multi-path fading channels has been presented. The analysis provides an iterative decoding of the Turbo code.展开更多
In Digital Radio Mondiale (DRM) system, achieving good audio quality becomes a challenge due to its limited band-width of 9 or 10kHz and the very bad lading channels. Therefore, DRM needs highly efficient channel co...In Digital Radio Mondiale (DRM) system, achieving good audio quality becomes a challenge due to its limited band-width of 9 or 10kHz and the very bad lading channels. Therefore, DRM needs highly efficient channel coding schemes. This paper, proposes the schemes which use the Low-Density Parity-Check (LDPC) coded Bit-Interleaved Coded Modulation (BICM) schemes for the implementation of DRM systems. Simulation results show that the proposed system is more efficient than the Rate Compatible Punctured Convolutional (RCPC) coded DRM system on various broadcast channels, and may be recommended as a coding technology for Digital Amplitude Modulation Broadcasting (DAMB) systems of China.展开更多
The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the ...The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the results of a proposed modulation using a variation of the autocorrelation of pseudo-random codes to carry information. The work also presents the generation of multiple orthogonal axes to increase the bit rate thus improving the channel efficiency.展开更多
Digital Number(DN)是信息科学关于信息采集的术语,需要界定和理顺DN各方面的关系,解决DN在遥感技术、数学、计算机科学的表达问题。阐述DN基本认识及其应有常态,给出DN名称和DN含义,梳理DN来源及其演变,明确DN与模拟量关系、DN与数值...Digital Number(DN)是信息科学关于信息采集的术语,需要界定和理顺DN各方面的关系,解决DN在遥感技术、数学、计算机科学的表达问题。阐述DN基本认识及其应有常态,给出DN名称和DN含义,梳理DN来源及其演变,明确DN与模拟量关系、DN与数值关系及DN与非DN界限,陈述数字结构、数字标识及不同系统层面DN,形成10方面正面共识,供分析对照。对DN表达问题归纳为DN代表关系、技术关系、数学关系、数值关系、标识关系5种类型,分析这些相应关系的表达缺陷,对DN有关方面做表达示范。创新成果:界定DN与模拟量关系;归纳DN的感性错误与其错误导向关系;重新解释数值及数值类型,对数值做定义,数值类型应包括DN分支,数值应包括DN来源成员;完善DN、数值及非数值式中参数的相应描述;规范数字术语在数字技术及数学的使用。达到提高DN及其关联的认识,促进数学的发展,利于消除遥感技术、数学、计算机科学出现的DN各种表达问题。展开更多
Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerpr...Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one.展开更多
In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts th...In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.展开更多
To compensate for nonlinear distortion introduced by RF power amplifiers (PAs) with memory effects, two correlated models, namely an extended memory polynomial (EMP) model and a memory lookup table (LUT) model, ...To compensate for nonlinear distortion introduced by RF power amplifiers (PAs) with memory effects, two correlated models, namely an extended memory polynomial (EMP) model and a memory lookup table (LUT) model, are proposed for predistorter design. Two adaptive digital predistortion (ADPD) schemes with indirect learning architecture are presented. One adopts the EMP model and the recursive least square (RLS) algorithm, and the other utilizes the memory LUT model and the least mean square (LMS) algorithm. Simulation results demonstrate that the EMP-based ADPD yields the best linearization performance in terms of suppressing spectral regrowth. It is also shown that the ADPD based on memory LUT makes optimum tradeoff between performance and computational complexity.展开更多
A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC o...A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.展开更多
The algorithm of fingerprint constructing for still images based on weighted image structure model is proposed. The error correcting codes that are perfect in weighted Hamming metric are used as a base for fingerprint...The algorithm of fingerprint constructing for still images based on weighted image structure model is proposed. The error correcting codes that are perfect in weighted Hamming metric are used as a base for fingerprint constructing.展开更多
The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high...The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos.展开更多
文摘为探索GS1 Digital Link技术在产品物流中的应用潜力,分析研究了GS1系统和GS1 Digital Link的基本结构、编码特点以及技术优势,充分利用GS1 Digital Link技术可以为产品从源头到零售整个物流过程提供相关对象的Web地址编码的特点,以鲜活大闸蟹物流过程为例,构建了基于GS1 Digital Link的鲜活大闸蟹Web编码,为实现产品营销与追溯提供了标准化、动态化、多样化的编码数据支撑。
基金This work is supported by Supported by the National Key Research and Development Program of China under Grant No.2020YFF0304902the Science and Technology Research Project of Jiangxi Provincial Department of Education under Grant No.GJJ202511。
文摘The authenticity identification of anti-counterfeiting codes based on mobile phone platforms is affected by lighting environment,photographing habits,camera resolution and other factors,resulting in poor collection quality of anti-counterfeiting codes and weak differentiation of anti-counterfeiting codes for high-quality counterfeits.Developing an anticounterfeiting code authentication algorithm based on mobile phones is of great commercial value.Although the existing algorithms developed based on special equipment can effectively identify forged anti-counterfeiting codes,the anti-counterfeiting code identification scheme based on mobile phones is still in its infancy.To address the small differences in texture features,low response speed and excessively large deep learning models used in mobile phone anti-counterfeiting and identification scenarios,we propose a feature-guided double pool attention network(FG-DPANet)to solve the reprinting forgery problem of printing anti-counterfeiting codes.To address the slight differences in texture features in high-quality reprinted anti-counterfeiting codes,we propose a feature guidance algorithm that creatively combines the texture features and the inherent noise feature of the scanner and printer introduced in the reprinting process to identify anti-counterfeiting code authenticity.The introduction of noise features effectively makes up for the small texture difference of high-quality anti-counterfeiting codes.The double pool attention network(DPANet)is a lightweight double pool attention residual network.Under the condition of ensuring detection accuracy,DPANet can simplify the network structure as much as possible,improve the network reasoning speed,and run better on mobile devices with low computing power.We conducted a series of experiments to evaluate the FG-DPANet proposed in this paper.Experimental results show that the proposed FG-DPANet can resist highquality and small-size anti-counterfeiting code reprint forgery.By comparing with the existing algorithm based on texture,it is shown that the proposed method has a higher authentication accuracy.Last but not least,the proposed scheme has been evaluated in the anti-counterfeiting code blurring scene,and the results show that our proposed method can well resist slight blurring of anti-counterfeiting images.
文摘With over 10 million points of genetic variation from person to person, every individual’s genome is unique and provides a highly reliable form of identification. This is because the genetic code is specific to each individual and does not change over time. Genetic information has been used to identify individuals in a variety of contexts, such as criminal investigations, paternity tests, and medical research. In this study, each individual’s genetic makeup has been formatted to create a secure, unique code that incorporates various elements, such as species, gender, and the genetic identification code itself. The combinations of markers required for this code have been derived from common single nucleotide polymorphisms (SNPs), points of variation found in the human genome. The final output is in the form of a 24 numerical code with each number having three possible combinations. The custom code can then be utilized to create various modes of identification on the decentralized blockchain network as well as personalized services and products that offer users a novel way to uniquely identify themselves in ways that were not possible before.
基金supported by the National High Technology Research and Development Program of China(Grant No.2012AA041203)the National Natural Science Foundation of China(Grant Nos.61377062 and 31201377)+1 种基金the Program of Shanghai Excellent Technical Leaders,China(Grant No.13XD1425400)the Doctorial Fund of Zhengzhou University of Light Industry,China(Grant No.2013BSJJ012)
文摘The digital coherent detection technique has been investigated without any frequency-scanning device in the Brillouin optical time domain reflectometry (BOTDR), where the simplex pulse codes are applied in the sensing system. The time domain signal of every code sequence is collected by the data acquisition card (DAQ). A shift-averaging technique is applied in the frequency domain for the reason that the local oscillator (LO) in the coherent detection is fix-frequency deviated from the primary source. With the 31-bit simplex code, the signal-to-noise ratio (SNR) has 3.5-dB enhancement with the same single pulse traces, accordant with the theoretical analysis. The frequency fluctuation for simplex codes is 14.01 MHz less than that for a single pulse as to 4-m spatial resolution. The results are believed to be beneficial for the BOTDR performance improvement.
基金National Natural Science Foundation of China(No.61272432)Qingdao Science and Technology Development Plan(No.12-1-4-6-(10)-jch)
文摘Watermarking system based on quantization index modulation (QIM) is increasingly popular in high payload applications,but it is inherently fragile against amplitude scaling attacks.In order to resist desynchronization attacks of QIM digital watermarking,a low density parity check (LDPC) code-aided QIM watermarking algorithm is proposed,and the performance of QIM watermarking system can be improved by incorporating LDPC code with message passing estimation/detection framework.Using the theory of iterative estimation and decoding,the watermark signal is decoded by the proposed algorithm through iterative estimation of amplitude scaling parameters and decoding of watermark.The performance of the proposed algorithm is closer to the dirty paper Shannon limit than that of repetition code aided algorithm when the algorithm is attacked by the additive white Gaussian noise.For constant amplitude scaling attacks,the proposed algorithm can obtain the accurate estimation of amplitude scaling parameters.The simulation result shows that the algorithm can obtain similar performance compared to the algorithm without desynchronization.
基金Supported by the National Natural Science Foundation of China (No.60072013)
文摘The multilevel modulation techniques nf M-Differential Amplitude Phase Shift Keying (DAPSK) have been proposed in combination with Turbo code scheme for digital radio broadcasting bands below 30 MHz radio channel. Comparison of this modulation method with channel coding in an Additive White Gaussian Noise (AWGN) and multi-path fading channels has been presented. The analysis provides an iterative decoding of the Turbo code.
基金Supported by the National Natural Science Foundation of China(No.60072013).
文摘In Digital Radio Mondiale (DRM) system, achieving good audio quality becomes a challenge due to its limited band-width of 9 or 10kHz and the very bad lading channels. Therefore, DRM needs highly efficient channel coding schemes. This paper, proposes the schemes which use the Low-Density Parity-Check (LDPC) coded Bit-Interleaved Coded Modulation (BICM) schemes for the implementation of DRM systems. Simulation results show that the proposed system is more efficient than the Rate Compatible Punctured Convolutional (RCPC) coded DRM system on various broadcast channels, and may be recommended as a coding technology for Digital Amplitude Modulation Broadcasting (DAMB) systems of China.
文摘The frequency bands used in mobile communications are allocated according to the type of application. With the need for more channels, the frequency spectrum has become a scarce natural resource. This study shows the results of a proposed modulation using a variation of the autocorrelation of pseudo-random codes to carry information. The work also presents the generation of multiple orthogonal axes to increase the bit rate thus improving the channel efficiency.
基金This project was supported by the National Science Foundation of China (60763009)China Postdoctoral Science Foundation (2005038041)Hainan Natural Science Foundation (80528).
文摘Two signature systems based on smart cards and fingerprint features are proposed. In one signature system, the cryptographic key is stored in the smart card and is only accessible when the signer's extracted fingerprint features match his stored template. To resist being tampered on public channel, the user's message and the signed message are encrypted by the signer's public key and the user's public key, respectively. In the other signature system, the keys are generated by combining the signer's fingerprint features, check bits, and a rememberable key, and there are no matching process and keys stored on the smart card. Additionally, there is generally more than one public key in this system, that is, there exist some pseudo public keys except a real one.
基金Funded by the National Natural Science Foundation of China(No.50335020)the International Cooperation Project(No.2003CA007)
文摘In this paper,we propose a novel wavelet-domain digital image watermarking scheme on copyright protection based on network manufacture environment.It codes the watermarking with error correcting coding and encrypts the watermarking with chaotic encryption.It embeds the watermarking into the coefficients which have large absolute values in the middle-frequency parts got by Discrete Wavelet Transform (DWT) repeatedly.The extraction doesn’t need the original image.Experiment results show that the proposed scheme is easy to implement,and has good robustness to some attacks,such as JPEG compression,average filtering,median filtering,wiener filtering,pepper (?) salt noise,especially to cropping and scaling.In order to solve the prob- lem of the copyright protection of the network manufacture production,the problems of digital image production such as tamper preventing and watermarking attacks preventing and so on are discussed.It solves the problems of manufacture information such as secure exchange and transmissions and production copyright protection and so on.
文摘To compensate for nonlinear distortion introduced by RF power amplifiers (PAs) with memory effects, two correlated models, namely an extended memory polynomial (EMP) model and a memory lookup table (LUT) model, are proposed for predistorter design. Two adaptive digital predistortion (ADPD) schemes with indirect learning architecture are presented. One adopts the EMP model and the recursive least square (RLS) algorithm, and the other utilizes the memory LUT model and the least mean square (LMS) algorithm. Simulation results demonstrate that the EMP-based ADPD yields the best linearization performance in terms of suppressing spectral regrowth. It is also shown that the ADPD based on memory LUT makes optimum tradeoff between performance and computational complexity.
基金Supported bythe National Natural Science Foundationof China (60175001)
文摘A novel video data authentication model based on digital video watermarking and MAC (message authentication code) in multicast protocol is proposed in this paper, The digital watermarking which composes of the MAC of the significant vid eo content, the key and instant authentication data is embedded into the insignificant video component by the MLUT (modified look-up table) video watermarking technology. We explain a method that does not require storage of each data packet for a time, thus making receiver not vulnerable to DOS (denial of service) attack. So the video packets can be authenticated instantly without large volume buffer in the receivers. TESLA (timed efficient stream loss tolerant authentication) does not explain how to select the suitable value for d, which is an important parameter in multicast source authentication. So we give a method to calculate the key disclosure delay (number of intervals). Simulation results show that the proposed algorithms improve the performance of data source authentication in multicast.
文摘The algorithm of fingerprint constructing for still images based on weighted image structure model is proposed. The error correcting codes that are perfect in weighted Hamming metric are used as a base for fingerprint constructing.
文摘The feasibility of the hybrid chaotic sequences as the spreading codes in code divided multiple access(CDMA) system is analyzed. The design and realization of the digital hybrid chaotic sequence generator by very high speed integrated circuit hardware description language(VHDL) are described. A valid hazard canceledl method is presented. Computer simulations show that the stable digital sequence waveforms can be produced. The correlations of the digital hybrid chaotic sequences are compared with those of m-sequences. The results show that the correlations of the digital hybrid chaotic sequences are almost as good as those of m-sequences. The works in this paper explored a road for the practical applications of chaos.