Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati...Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.展开更多
The effect of strong reflection interfaces, such as free surface, seabed, is strong; thus, the coupling of multiples and waves reduces the quality of ocean-bottom cable seismic data. Using the different polarity respo...The effect of strong reflection interfaces, such as free surface, seabed, is strong; thus, the coupling of multiples and waves reduces the quality of ocean-bottom cable seismic data. Using the different polarity response of hydrophones and geophones to downgoing wave fields, dual-sensor summation can eliminate receiver-side multiples, enhance primaries, and improve the resolution of seismic data. We present a dual-sensor summation method based on the equipoise pseudo-multichannel adaptive matching filter. Compared with traditional methods, the proposed method is totally data driven and does not depend on the reflection coefficient; moreover, good results are obtained using synthetic and real data.展开更多
Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identif...Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat.展开更多
A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed forma...A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed format or in a JPEG compressed format.Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios.The tampered region is detected by computing the averaged sum of absolute difference(ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors.The experimental results show the advantages of the proposed method:capability of detecting small and/or multiple tampered regions,simple computation,and hence fast speed in processing.展开更多
In this paper,a Joint Early Detection and Early Stopping (JEDES) approach for effectively reducing the complexity of turbo decoding with negligible performance loss is proposed. It combines the effectiveness of both e...In this paper,a Joint Early Detection and Early Stopping (JEDES) approach for effectively reducing the complexity of turbo decoding with negligible performance loss is proposed. It combines the effectiveness of both early detection and early stopping techniques. Our simulation results demon-strated that the proposed JEDES scheme based on cyclic redundancy check and trellis splicing can achieve a complexity saving of 15% to 20% at practical bit error rates over the idealized GENIE stopping scheme,which is widely accepted as the theoretically best possible early stopping scheme.展开更多
Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approach...Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance.展开更多
With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image a...With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery that copied a part of an image and pasted it on the other region in the same image. First, the method divides the image into overlapping blocks. It uses LPQ (local phase quantization) to label each block. The column average value of labeled blocks constitutes the feature vector for the block. Similarity among the feature vectors gives a clue about the forgery. Local phase quantization has not been used to detect copy move forgery in the literature before. Experimental results show that, the method has higher accuracy ratios and lower false negative values under blurring operation at high levels compared to other methods. Our method can also detect multiple copy move forgery.展开更多
基金The National Natural Science Foundation of China(No.60873101)the Natural Science Foundation of Jiangsu Province(No.BK2008209)the Research Foundation of Nanjing University of Information Science and Technology(No.20080298)
文摘Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.
基金supported jointly by the National Science Foundation Project(Grant No.41176077 and 41230318)
文摘The effect of strong reflection interfaces, such as free surface, seabed, is strong; thus, the coupling of multiples and waves reduces the quality of ocean-bottom cable seismic data. Using the different polarity response of hydrophones and geophones to downgoing wave fields, dual-sensor summation can eliminate receiver-side multiples, enhance primaries, and improve the resolution of seismic data. We present a dual-sensor summation method based on the equipoise pseudo-multichannel adaptive matching filter. Compared with traditional methods, the proposed method is totally data driven and does not depend on the reflection coefficient; moreover, good results are obtained using synthetic and real data.
基金Supported by the Natural Science Foundation of Tianjin(No.15JCYBJC15500)
文摘Most existing methods for image copy-move forgery detection(CMFD)operate on grayscale images. Although the keypoint-based methods have the advantages of strong robustness and low computational cost,they cannot identify the flat duplicated regions without reliable extracted features. In this paper, we propose a new CMFD method by using speeded-up robust feature(SURF)in the opponent color space. Our method starts by converting the inspected image from RGB to the opponent color space. The color gradient per pixel is calculated and taken as the work space for SURF to extract the keypoints. The matched keypoints are clustered and their geometric transformations are estimated. Finally, the false matches are removed. Experimental results show that the proposed technique can effectively expose the duplicated regions with various transformations, even when the duplication regions are flat.
基金Project(61172184) supported by the National Natural Science Foundation of ChinaProject(200902482) supported by China Postdoctoral Science Foundation Specially Funded ProjectProject(12JJ6062) supported by the Natural Science Foundation of Hunan Province,China
文摘A blind digital image forensic method for detecting copy-paste forgery between JPEG images was proposed.Two copy-paste tampering scenarios were introduced at first:the tampered image was saved in an uncompressed format or in a JPEG compressed format.Then the proposed detection method was analyzed and simulated for all the cases of the two tampering scenarios.The tampered region is detected by computing the averaged sum of absolute difference(ASAD) images between the examined image and a resaved JPEG compressed image at different quality factors.The experimental results show the advantages of the proposed method:capability of detecting small and/or multiple tampered regions,simple computation,and hence fast speed in processing.
基金the National Natural Science Foundation of China (NSFC)the Research Grants Council of Hong Kong (RGC) joint research scheme (No.60218001/N_ HKUST617-02 and No.60272070).
文摘In this paper,a Joint Early Detection and Early Stopping (JEDES) approach for effectively reducing the complexity of turbo decoding with negligible performance loss is proposed. It combines the effectiveness of both early detection and early stopping techniques. Our simulation results demon-strated that the proposed JEDES scheme based on cyclic redundancy check and trellis splicing can achieve a complexity saving of 15% to 20% at practical bit error rates over the idealized GENIE stopping scheme,which is widely accepted as the theoretically best possible early stopping scheme.
基金supported in part by the National Natural Science Foundation of China under grant No.(61472429,61070192,91018008,61303074,61170240)Beijing Natural Science Foundation under grant No.4122041+1 种基金National High-Tech Research Development Program of China under grant No.2007AA01Z414National Science and Technology Major Project of China under grant No.2012ZX01039-004
文摘Copy-Move Forgery(CMF) is one of the simple and effective operations to create forged digital images.Recently,techniques based on Scale Invariant Features Transform(SIFT) are widely used to detect CMF.Various approaches under the SIFT-based framework are the most acceptable ways to CMF detection due to their robust performance.However,for some CMF images,these approaches cannot produce satisfactory detection results.For instance,the number of the matched keypoints may be too less to prove an image to be a CMF image or to generate an accurate result.Sometimes these approaches may even produce error results.According to our observations,one of the reasons is that detection results produced by the SIFT-based framework depend highly on parameters whose values are often determined with experiences.These values are only applicable to a few images,which limits their application.To solve the problem,a novel approach named as CMF Detection with Particle Swarm Optimization(CMFDPSO) is proposed in this paper.CMFD-PSO integrates the Particle Swarm Optimization(PSO) algorithm into the SIFT-based framework.It utilizes the PSO algorithm to generate customized parameter values for images,which are used for CMF detection under the SIFT-based framework.Experimental results show that CMFD-PSO has good performance.
文摘With the rapid development of powerful image, editing software makes the forgery of the digital image easy. Researchers proposed methods to cope with image authentication in recent years. We proposed a passive image authentication technique to determine the copy move forgery that copied a part of an image and pasted it on the other region in the same image. First, the method divides the image into overlapping blocks. It uses LPQ (local phase quantization) to label each block. The column average value of labeled blocks constitutes the feature vector for the block. Similarity among the feature vectors gives a clue about the forgery. Local phase quantization has not been used to detect copy move forgery in the literature before. Experimental results show that, the method has higher accuracy ratios and lower false negative values under blurring operation at high levels compared to other methods. Our method can also detect multiple copy move forgery.