Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati...Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.展开更多
This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to...This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority.展开更多
In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first sc...In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed.展开更多
The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction proj...The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction project management arm, and all construction companies working for the Housing Authority would be certified to the ISO 9000 standard. This decision is to have a profound and lasting impact on the construction industry in Hong Kong. In 1996, a management enhancement programme is launched. Targeting all 15 000 staff in the housing department, the programme aims at changing the culture of the organization and its partners in delivering high calibre services to customers. This paper examines the motivation and reasons behind the initiatives. It outlines the approach and framework used as the authority changes the mindset of a large department of the civil service.展开更多
We propose the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measu...We propose the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measuring devices and measure intra-palm propagation signals from twenty-one experimental subjects. We also evaluate the verification performance based on Euclidian distance or SVM (support vector machine). The equal error rate in the case of SVM is aovroximatelv 24%.展开更多
The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network...The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.展开更多
The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has...The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has developed significantly in the last 2 decades, so today the production and processing of safe and quality food is of primary importance. Modem food production is based on principles of GAP and GMP (including GHP) and different methods and tools for quality control and assurance (IFS, HACCP, ISO-9000, ISO-9000/2010, ISO-22000, TQM). There are different techniques and methods to produce safe food and to control the quality of the foodstuffs. The modem, up-to-date technologies and measurement techniques involve the application of many physical methods - high pressure, pulsing electrical field, microwave, non-destructive techniques (e.g., INAA, NMR, NIR-NIT, PAS), radiation treatments as well. Using radiation technologies (of course not only nuclear ones) it is possible to fulfil some very important expectations of modem food processing, e.g., decrease of microbial contamination, improvement of sensory properties, increase of storability of food products.展开更多
Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystr...Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last,展开更多
In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plu...In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plus neutral lines picking up 499 samples per period of the fundamental at 50 Hz. To ensure certified measurements, the system gets external certified time and voltage references. The system uses a FTDI Virtual Com Port Driver to communicate data over High Speed RS232 virtual interface and it does not need any advanced programming skill. The choice to use a virtual serial communication makes the data acquisition software portable over many platforms, regardless by the development environment and by the programming language. To test the proposed device some custom software have been written in many programming language (C^#, VB6, LabView, MatLab), moreover in order to characterize the device the most common ADC (analog to digital converter) performing test have been applied.展开更多
An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted in...An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%.展开更多
Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artifici...Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' identification.Therefore,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy information.In this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is proposed.The feature vectors of a fingerprint are constructed through multi-scale LPQ.PCA technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective features.Finally,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training model.Experimental results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition accuracy.This study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection.展开更多
基金The National Natural Science Foundation of China(No.60873101)the Natural Science Foundation of Jiangsu Province(No.BK2008209)the Research Foundation of Nanjing University of Information Science and Technology(No.20080298)
文摘Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.
文摘This study proposes a theoretical quantum authenticated secure communication(QASC) protocol using Einstein-Podolsky-Rosen(EPR) entangle state,which enables a sender to send a secure as well as authenticated message to a receiver within only one step quantum transmission without having the classical channels and the certification authority.
基金Supported by the National Fundamental Research Program under Grant No.2010CB923202Specialized Research Fund for the Doctoral Program of Education Ministry of China under Grant No.20090005120008+1 种基金 the Fundamental Research Funds for the Central Universities under Grant No.BUPT2009RC0710 China National Natural Science Foundation under Grant Nos.60871082,60937003 and 10947151
文摘In this paper we propose two quantum secure direct communication (QSDC) protocols with authentication.The authentication key expansion method is introduced to improve the life of the keys with security.In the first scheme,the third party, called Trent is introduced to authenticate the users that participate in the communication.He sends thepolarized photons in blocks to authenticate communication parties Alice and Bob using the authentication keys.In thecommunication process, polarized single photons are used to serve as the carriers, which transmit the secret messagesdirectly.The second QSDC process with authentication between two parties is also discussed.
文摘The Hong Kong housing authority houses a half po pulation of Hong Kong. It constructs and manages pro perty on a massive scale. In 1989, the housing authority makes the decision that by 1993, its construction project management arm, and all construction companies working for the Housing Authority would be certified to the ISO 9000 standard. This decision is to have a profound and lasting impact on the construction industry in Hong Kong. In 1996, a management enhancement programme is launched. Targeting all 15 000 staff in the housing department, the programme aims at changing the culture of the organization and its partners in delivering high calibre services to customers. This paper examines the motivation and reasons behind the initiatives. It outlines the approach and framework used as the authority changes the mindset of a large department of the civil service.
文摘We propose the use of intra-palm propagation signals as biometrics. The intra-palm propagation signal is a signal that is propagated in the shallow part of the skin of a palm. In this paper, we prepare dedicated measuring devices and measure intra-palm propagation signals from twenty-one experimental subjects. We also evaluate the verification performance based on Euclidian distance or SVM (support vector machine). The equal error rate in the case of SVM is aovroximatelv 24%.
基金ACKNOWLEDGMENT This work was supported by the National Basic Research Program of China (973 Project) (NO.2007CB311100), the National Science Foundation for Young Scholars of China (Grant No.61001091), Beijing Nature Science Foundation(No. 4122012), "next-generation broadband wireless mobile communication network" National Science and Technology major Special issue funding(No. 2012ZX03002003), Funding Program for Academic Human Resources Development in Institutions of Higher Learning Under the Jurisdiction of Beijing Municipality of China and the key technology research and validation issue for the emergency treatment telemedicine public service platform which integrates the military and civilian and bases on the broadband wireless networks(No.2013ZX03006001-005), the issue belongs to Major national science and technology projects.
文摘The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network.But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection,it is easy to cause the loss of identity privacy.In order to solve the abovedescribed problems,this paper presents a trust measurement scheme suitable for clients in the trusted network,the scheme integrates the following attributes such as authentication mechanism,state measurement,and real-time state measurement and so on,and based on the authentication mechanism and the initial state measurement,the scheme uses the realtime state measurement as the core method to complete the trust measurement for the client.This scheme presented in this paper supports both static and dynamic measurements.Overall,the characteristics of this scheme such as fine granularity,dynamic,real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.
文摘The article deals with special questions of some aspects of food safety and application of methods of food physics in food processing and also in food quality control and quality assurance. The role of food safety has developed significantly in the last 2 decades, so today the production and processing of safe and quality food is of primary importance. Modem food production is based on principles of GAP and GMP (including GHP) and different methods and tools for quality control and assurance (IFS, HACCP, ISO-9000, ISO-9000/2010, ISO-22000, TQM). There are different techniques and methods to produce safe food and to control the quality of the foodstuffs. The modem, up-to-date technologies and measurement techniques involve the application of many physical methods - high pressure, pulsing electrical field, microwave, non-destructive techniques (e.g., INAA, NMR, NIR-NIT, PAS), radiation treatments as well. Using radiation technologies (of course not only nuclear ones) it is possible to fulfil some very important expectations of modem food processing, e.g., decrease of microbial contamination, improvement of sensory properties, increase of storability of food products.
基金This paper has been performed in the Project "Key Technology Research of Eavesdropping Detection in the Quantum Security Communication" supported by the National Natural Science Foundation of China
文摘Abstract: In order to improve the recognition accuracy of key stroke authentication, a methodology based on feature extraction of keystroke sequence is presented in this paper. Firstly, the data of the users' keystroke feature information that has too much deviation with the mean deviation is filtered out. Secondly, the probability of each input key is calculated and 10 values which do not have the best features are selected. Thirdly, they are weighed and a score evaluating the extent to which the user could be authenticated successfully is calculated. The benefit of using a third-party data set is more objective and comparable. At last,
文摘In order to provide power quality monitoring activities with metrological certification, a DAS (data acquisition system) has been designed, realized and characterized. The system allows acquisition on tri-phases plus neutral lines picking up 499 samples per period of the fundamental at 50 Hz. To ensure certified measurements, the system gets external certified time and voltage references. The system uses a FTDI Virtual Com Port Driver to communicate data over High Speed RS232 virtual interface and it does not need any advanced programming skill. The choice to use a virtual serial communication makes the data acquisition software portable over many platforms, regardless by the development environment and by the programming language. To test the proposed device some custom software have been written in many programming language (C^#, VB6, LabView, MatLab), moreover in order to characterize the device the most common ADC (analog to digital converter) performing test have been applied.
文摘An information hiding scheme for vector maps is presented to identify the source after the vector map is leaked in some key application areas. In this scheme, the fingerprint image of the map owner can be converted into a character string as the watermark, and then the watermark will be embedded into the coordinate descriptions of the attribute file by the "0-bit value" programming method. This programming algorithm ensures that the accuracy is lossless and the graphics is unchanged for any vector map. Experiments show that the presented hiding scheme has stable robustness, the average similarity rate is 97.2% for fingerprints matching and the false non-match rate is 1.38% in the blocking test. In the opening test, the former reaches 84.46% and the latter reaches 5.56%.
基金supported by the NSFC (U1536206,61232016,U1405254,61373133, 61502242)BK20150925the PAPD fund
文摘Fingerprint authentication system is used to verify users' identification according to the characteristics of their fingerprints.However,this system has some security and privacy problems.For example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' identification.Therefore,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy information.In this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is proposed.The feature vectors of a fingerprint are constructed through multi-scale LPQ.PCA technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective features.Finally,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training model.Experimental results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition accuracy.This study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection.