This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essenti...This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V.展开更多
Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no informat...Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect.展开更多
The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a sec...The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack.展开更多
A novel traffic sign recognition system is presented in this work. Firstly, the color segmentation and shape classifier based on signature feature of region are used to detect traffic signs in input video sequences. S...A novel traffic sign recognition system is presented in this work. Firstly, the color segmentation and shape classifier based on signature feature of region are used to detect traffic signs in input video sequences. Secondly, traffic sign color-image is preprocessed with gray scaling, and normalized to 64×64 size. Then, image features could be obtained by four levels DT-CWT images. Thirdly, 2DICA and nearest neighbor classifier are united to recognize traffic signs. The whole recognition algorithm is implemented for classification of 50 categories of traffic signs and its recognition accuracy reaches 90%. Comparing image representation DT-CWT with the well-established image representation like template, Gabor, and 2DICA with feature selection techniques such as PCA, LPP, 2DPCA at the same time, the results show that combination method of DT-CWT and 2DICA is useful in traffic signs recognition. Experimental results indicate that the proposed algorithm is robust, effective and accurate.展开更多
This study describes the development of a simple biometric facial recognition system, BFMT, which is designed for use in identifying individuals within a given population. The system is based on digital signatures der...This study describes the development of a simple biometric facial recognition system, BFMT, which is designed for use in identifying individuals within a given population. The system is based on digital signatures derived from facial images of human subjects. The results of the study demonstrate that a particular set of facial features from a simple two-dimensional image can yield a unique digital signature which can be used to identify a subject from a limited population within a controlled environment. The simplicity of the model upon which the system is based can result in commercial facial recognition systems that are more cost-effective to develop than those currently on the market.展开更多
Soon after Roman mint masters began issuing the silver denarius (traditional date 187 B.C.), they discovered that they could employ coinage as newspapers and PR by individualizing the imagery on each side of the coi...Soon after Roman mint masters began issuing the silver denarius (traditional date 187 B.C.), they discovered that they could employ coinage as newspapers and PR by individualizing the imagery on each side of the coin with references to their ancestry, current events, and/or their religious offices to increase their name recognition in order to win votes. It should come as no surprise that the Divine Julius ordered his mint masters to issue coinage that advertised all of the above features to circulate his good reputation in what our modern political scientists would call propaganda. After Julius' enemies began to attack his reputation, some of his partisans boasted of their closeness to him on coinage by recycling specific coin images. What is surprising is how these partisans adopted the exact imagery Julius had used to advertise his own religious résumé on their coinage, even though these religious images could not and did not apply to them specifically. Apparently, Julius' religious résumé no longer demonstrated a religious portfolio, but had transformed into a badge of partisanship, however thinly it applied, so that the religious symbols themselves retained only the function of an association with Julius without their original and intrinsic meaning.展开更多
A face-to-face qualitative interview study was conducted to examine the perceived gender roles and gender identities among 10 to 12 years old girls in Hong Kong. Sixteen girls aged 10 to 12 were asked to take pictures...A face-to-face qualitative interview study was conducted to examine the perceived gender roles and gender identities among 10 to 12 years old girls in Hong Kong. Sixteen girls aged 10 to 12 were asked to take pictures from the media they consumed that illustrated "What girls or women should or should not be; and what girls or women should or should not do". Analysis of interviews and images captured found that celebrities and characters in popular media play a significant role in socializing preadolescent girls on gender roles and gender identity formation. Celebrities and media characters that caught the interviewees' attention were mainly female adult entertainers and media characters. Girls showed admiration of specific talents and personalities of the celebrities and media characters. They paid much attention to the private lives of the celebrities. They learned from celebrities and media characters that certain behaviors were not acceptable in the social arena.展开更多
Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate ...Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate quality problems and find solutions.To address this problem,a knowledge graph based method is employed to extract multi-source heterogeneous cable knowledge entities.The method utilizes the bidirectional encoder representations from transformers(BERT)network to embed word vectors into the input text,then extracts the contextual features of the input sequence through the bidirectional long short-term memory(BiLSTM)network,and finally inputs them into the conditional random field(CRF)network to predict entity categories.Simultaneously,by using the entities extracted by this model as the data layer,a knowledge graph based method has been constructed.Compared to other traditional extraction methods,the entity extraction method used in this study demonstrates significant improvements in metrics such as precision,recall and an F1 score.Ultimately,employing cable test data from a particular aerospace precision machining company,the study has constructed the knowledge graph based method in the field to achieve visualized queries and the traceability and localization of quality problems.展开更多
基金supported by key special project of National Key Research and Development Program (2017YFC0803900)
文摘This paper proposes a cross-layer design to enhance the location privacy under a coordinated medium access control(MAC) protocol for the Internet of Vehicles(Io V). The channel and pseudonym resources are both essential for transmission efficiency and privacy preservation in the Io V. Nevertheless, the MAC protocol and pseudonym scheme are usually studied separately, in which a new MAC layer semantic linking attack could be carried out by analyzing the vehicles' transmission patterns even if they change pseudonyms simultaneously. This paper presents a hierarchical architecture named as the software defined Internet of Vehicles(SDIV). Facilitated by the architecture, a MAC layer aware pseudonym(MAP) scheme is proposed to resist the new attack. In the MAP, RSU clouds coordinate vehicles to change their transmission slots and pseudonyms simultaneously in the mix-zones by measuring the privacy level quantitatively. Security analysis and extensive simulations are conducted to show that the scheme provides reliable safety message broadcasting, improves the location privacy and network throughput in the Io V.
文摘Visual cryptography is a cryptographic technique which emerges in the information security domain in recent years. Each of the sharing sub-keys may be a stochastic noise image or a significative image with no information on the original key. But a mass of sub-keys have to be saved actually, which faces the problem of inconvenient discrimination and management. This paper presents a visual cryptography scheme based on the digital signature for image discrimination and management, applying the digital signature and the time-stamp technology to the visual cryptography scheme. The scheme both solves the problem on the storage and management of the sharing sub-keys, increases the verification of image contents, thus enhances the validity of storage and management without security effect.
基金Supported in part by the National Natural Science Foundation of China under the Grant 60172060
文摘The threshold group signature is an important kind of signature. So far, many threshold group signature schemes have been proposed, but most of them suffer from conspiracy attack and are insecure. In this paper, a secure threshold group signature scheme is proposed. It can not only satisfy the properties of the threshold group signature, but also withstand the conspiracy attack.
基金Projects(90820302, 60805027) supported by the National Natural Science Foundation of ChinaProject(200805330005) supported by Research Fund for Doctoral Program of Higher Education, ChinaProject(2009FJ4030) supported by Academician Foundation of Hunan Province, China
文摘A novel traffic sign recognition system is presented in this work. Firstly, the color segmentation and shape classifier based on signature feature of region are used to detect traffic signs in input video sequences. Secondly, traffic sign color-image is preprocessed with gray scaling, and normalized to 64×64 size. Then, image features could be obtained by four levels DT-CWT images. Thirdly, 2DICA and nearest neighbor classifier are united to recognize traffic signs. The whole recognition algorithm is implemented for classification of 50 categories of traffic signs and its recognition accuracy reaches 90%. Comparing image representation DT-CWT with the well-established image representation like template, Gabor, and 2DICA with feature selection techniques such as PCA, LPP, 2DPCA at the same time, the results show that combination method of DT-CWT and 2DICA is useful in traffic signs recognition. Experimental results indicate that the proposed algorithm is robust, effective and accurate.
文摘This study describes the development of a simple biometric facial recognition system, BFMT, which is designed for use in identifying individuals within a given population. The system is based on digital signatures derived from facial images of human subjects. The results of the study demonstrate that a particular set of facial features from a simple two-dimensional image can yield a unique digital signature which can be used to identify a subject from a limited population within a controlled environment. The simplicity of the model upon which the system is based can result in commercial facial recognition systems that are more cost-effective to develop than those currently on the market.
文摘Soon after Roman mint masters began issuing the silver denarius (traditional date 187 B.C.), they discovered that they could employ coinage as newspapers and PR by individualizing the imagery on each side of the coin with references to their ancestry, current events, and/or their religious offices to increase their name recognition in order to win votes. It should come as no surprise that the Divine Julius ordered his mint masters to issue coinage that advertised all of the above features to circulate his good reputation in what our modern political scientists would call propaganda. After Julius' enemies began to attack his reputation, some of his partisans boasted of their closeness to him on coinage by recycling specific coin images. What is surprising is how these partisans adopted the exact imagery Julius had used to advertise his own religious résumé on their coinage, even though these religious images could not and did not apply to them specifically. Apparently, Julius' religious résumé no longer demonstrated a religious portfolio, but had transformed into a badge of partisanship, however thinly it applied, so that the religious symbols themselves retained only the function of an association with Julius without their original and intrinsic meaning.
文摘A face-to-face qualitative interview study was conducted to examine the perceived gender roles and gender identities among 10 to 12 years old girls in Hong Kong. Sixteen girls aged 10 to 12 were asked to take pictures from the media they consumed that illustrated "What girls or women should or should not be; and what girls or women should or should not do". Analysis of interviews and images captured found that celebrities and characters in popular media play a significant role in socializing preadolescent girls on gender roles and gender identity formation. Celebrities and media characters that caught the interviewees' attention were mainly female adult entertainers and media characters. Girls showed admiration of specific talents and personalities of the celebrities and media characters. They paid much attention to the private lives of the celebrities. They learned from celebrities and media characters that certain behaviors were not acceptable in the social arena.
文摘Nowadays,the internal structure of spacecraft has been increasingly complex.As its“lifeline”,cables require extensive manpower and resources for manual testing,and it is challenging to quickly and accurately locate quality problems and find solutions.To address this problem,a knowledge graph based method is employed to extract multi-source heterogeneous cable knowledge entities.The method utilizes the bidirectional encoder representations from transformers(BERT)network to embed word vectors into the input text,then extracts the contextual features of the input sequence through the bidirectional long short-term memory(BiLSTM)network,and finally inputs them into the conditional random field(CRF)network to predict entity categories.Simultaneously,by using the entities extracted by this model as the data layer,a knowledge graph based method has been constructed.Compared to other traditional extraction methods,the entity extraction method used in this study demonstrates significant improvements in metrics such as precision,recall and an F1 score.Ultimately,employing cable test data from a particular aerospace precision machining company,the study has constructed the knowledge graph based method in the field to achieve visualized queries and the traceability and localization of quality problems.