期刊文献+
共找到277篇文章
< 1 2 14 >
每页显示 20 50 100
Cancelable Speaker Identification System Based on Optical-Like Encryption Algorithms 被引量:1
1
作者 Safaa El-Gazar Walid El-Shafai +4 位作者 Ghada El-Banby Hesham F.A.Hamed Gerges M.Salama Mohammed Abd-Elnaby Fathi E.Abd El-Samie 《Computer Systems Science & Engineering》 SCIE EI 2022年第10期87-102,共16页
Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of ... Biometric authentication is a rapidly growing trend that is gaining increasing attention in the last decades.It achieves safe access to systems using biometrics instead of the traditional passwords.The utilization of a biometric in its original format makes it usable only once.Therefore,a cancelable biometric template should be used,so that it can be replaced when it is attacked.Cancelable biometrics aims to enhance the security and privacy of biometric authentication.Digital encryption is an efficient technique to be used in order to generate cancelable biometric templates.In this paper,a highly-secure encryption algorithm is proposed to ensure secure biometric data in verification systems.The considered biometric in this paper is the speech signal.The speech signal is transformed into its spectrogram.Then,the spectrogram is encrypted using two cascaded optical encryption algorithms.The first algorithm is the Optical Scanning Holography(OSH)for its efficiency as an encryption tool.The OSH encrypted spectrogram is encrypted using Double Random Phase Encoding(DRPE)by implementing two Random Phase Masks(RPMs).After the two cascaded optical encryption algorithms,the cancelable template is obtained.The verification is implemented through correlation estimation between enrolled and test templates in their encrypted format.If the correlation value is larger than a threshold value,the user is authorized.The threshold value can be determined from the genuine and imposter correlation distribution curves as the midpoint between the two curves.The implementation of optical encryption is adopted using its software rather than the optical setup.The efficiency of the proposed cancelable biometric algorithm is illustrated by the simulation results.It can improve the biometric data security without deteriorating the recognition accuracy.Simulation results give close-to-zero This values for the Equal Error Rate(EER)and close-to-one values for the Area under Receiver Operator Characteristic(AROC)curve. 展开更多
关键词 cancelable biometrics SPECTROGRAM OSH DRPE EER AROC
下载PDF
An Efficient GCD-Based Cancelable Biometric Algorithm for Single and Multiple Biometrics
2
作者 Naglaa F.Soliman Abeer D.Algarni +2 位作者 Walid El-Shafai Fathi E.Abd El-Samie Ghada M.El Banby 《Computers, Materials & Continua》 SCIE EI 2021年第11期1571-1595,共25页
Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the... Cancelable biometrics are required in most remote access applications that need an authentication stage such as the cloud and Internet of Things(IoT)networks.The objective of using cancelable biometrics is to save the original ones from hacking attempts.A generalized algorithm to generate cancelable templates that is applicable on both single and multiple biometrics is proposed in this paper to be considered for cloud and IoT applications.The original biometric is blurred with two co-prime operators.Hence,it can be recovered as the Greatest Common Divisor(GCD)between its two blurred versions.Minimal changes if induced in the biometric image prior to processing with co-prime operators prevents the recovery of the original biometric image through a GCD operation.Hence,the ability to change cancelable templates is guaranteed,since the owner of the biometric can pre-determine and manage the minimal change induced in the biometric image.Furthermore,we test the utility of the proposed algorithm in the single-and multi-biometric scenarios.The multi-biometric scenario depends on compressing face,fingerprint,iris,and palm print images,simultaneously,to generate the cancelable templates.Evaluation metrics such as Equal Error Rate(EER)and Area and Receiver Operator Characteristic curve(AROC)are considered.Simulation results on single-and multi-biometric scenarios show high AROC values up to 99.59%,and low EER values down to 0.04%. 展开更多
关键词 CLOUD IOT cancelable biometrics GCD single-and multi-biometrics security applications
下载PDF
Key Incorporation Scheme for Cancelable Biometrics
3
作者 Eliza Yingzi Du Kai Yang Zhi Zhou 《Journal of Information Security》 2011年第4期185-194,共10页
Biometrics is becoming an important method for human identification. However, once a biometric pattern is stolen, the user will quickly run out of alternatives and all the applications where the associated biometric p... Biometrics is becoming an important method for human identification. However, once a biometric pattern is stolen, the user will quickly run out of alternatives and all the applications where the associated biometric pattern is used become insecure. Cancelable biometrics is a solution. However, traditional cancelable biometric methods treat the transformation process and feature extraction process independently. As a result, this kind of cancelable biometric approach would reduce the recognition accuracy. In this paper, we first analyzed the limitations of traditional cancelable biometric methods, and proposed the Key Incorporation Scheme for Cancelable Biometrics approach that could increase the recognition accuracy while achieving “cancelability”. Then we designed the Gabor Descriptor based Cancelable Iris Recognition method that is a practical implementation of the proposed Key Incorporation Scheme. The experimental results demonstrate that our proposed method can significantly improve the iris recognition accuracy while achieving “cancelability”. 展开更多
关键词 cancelable IRIS RECOGNITION Gabor DESCRIPTOR RECOGNITION Capacity KEY Incorporation SCHEME for cancelable BIOMETRICS
下载PDF
Cancelable remote quantum fingerprint templates protection scheme
4
作者 廖骎 郭迎 黄端 《Chinese Physics B》 SCIE EI CAS CSCD 2017年第9期39-47,共9页
With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological tech... With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit(qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantum mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users' information for the fingerprint identification. 展开更多
关键词 quantum communication fingerprint identification cancelable template
下载PDF
Cancelable palmprint template generating algorithm based on adaptive threshold 被引量:2
5
作者 Min Xiangshen Fan Jiulun Zhang Xuefeng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2019年第1期1-11,共11页
Aiming at the problem of low recognition rate and poor security in the process of palmprint identity authentication,a cancelable palmprint template generating algorithm is proposed,which is based on local Gabor direct... Aiming at the problem of low recognition rate and poor security in the process of palmprint identity authentication,a cancelable palmprint template generating algorithm is proposed,which is based on local Gabor directional pattern with adaptive threshold by mean(m LGDP),difference local Gabor directional pattern with adaptive threshold by mean(m DLGDP)and feature fusion of them.In this method,the feature code of the image is segmented and the feature vectors are extracted and binarized.Then the Bloom filter is used to achieve many-toone mapping and the location scrambling of palmprint image.Finally,the scrambling result matrix and the user key are irreversibly transformed by the convolution operation to obtain a revocable template of the palmprint image.Both theoretical and experimental results analysis show that,in the case of key loss,the method of feature fusion can enhance the diversity of the original palmprint template effectively,improve the recognition rate efficiently,and have better security. 展开更多
关键词 cancelable PALMPRINT TEMPLATE GABOR adaptive THRESHOLD feature fusion
原文传递
Off-Grid Compressed Channel Estimation with Parallel Interference Cancellation for Millimeter Wave Massive MIMO
6
作者 Liu Jinru Tian Yongqing +1 位作者 Liu Danpu Zhang Zhilong 《China Communications》 SCIE CSCD 2024年第3期51-65,共15页
Millimeter wave(mmWave)massive multiple-input multiple-output(MIMO)plays an important role in the fifth-generation(5G)mobile communications and beyond wireless communication systems owing to its potential of high capa... Millimeter wave(mmWave)massive multiple-input multiple-output(MIMO)plays an important role in the fifth-generation(5G)mobile communications and beyond wireless communication systems owing to its potential of high capacity.However,channel estimation has become very challenging due to the use of massive MIMO antenna array.Fortunately,the mmWave channel has strong sparsity in the spatial angle domain,and the compressed sensing technology can be used to convert the original channel matrix into the sparse matrix of discrete angle grid.Thus the high-dimensional channel matrix estimation is transformed into a sparse recovery problem with greatly reduced computational complexity.However,the path angle in the actual scene appears randomly and is unlikely to be completely located on the quantization angle grid,thus leading to the problem of power leakage.Moreover,multiple paths with the random distribution of angles will bring about serious interpath interference and further deteriorate the performance of channel estimation.To address these off-grid issues,we propose a parallel interference cancellation assisted multi-grid matching pursuit(PIC-MGMP)algorithm in this paper.The proposed algorithm consists of three stages,including coarse estimation,refined estimation,and inter-path cyclic iterative inter-ference cancellation.More specifically,the angular resolution can be improved by locally refining the grid to reduce power leakage,while the inter-path interference is eliminated by parallel interference cancellation(PIC),and the two together improve the estimation accuracy.Simulation results show that compared with the traditional orthogonal matching pursuit(OMP)algorithm,the normalized mean square error(NMSE)of the proposed algorithm decreases by over 14dB in the case of 2 paths. 展开更多
关键词 channel estimation compressed sensing inter-path interference millimeter wave massive MIMO OFF-GRID parallel interference cancellation
下载PDF
A low-profile metamaterial absorber with ultrawideband reflectionless and wide-angular stability
7
作者 Feihong Lin Zhongming Yan +3 位作者 Ping Wang Yu Wang Hongcheng Zhou Haoran Lu 《Defence Technology(防务技术)》 SCIE EI CAS CSCD 2024年第4期258-268,共11页
An ultrawideband reflectionless metamaterial absorber(MA)is proposed by replacing the metallic ground with the complementary split-ring resonator(CSRR)structure.The proposed MA exhibits-10 d B reflectivity spectrum fr... An ultrawideband reflectionless metamaterial absorber(MA)is proposed by replacing the metallic ground with the complementary split-ring resonator(CSRR)structure.The proposed MA exhibits-10 d B reflectivity spectrum from 1 GHz to 20 GHz,which maintains more than 90%absorption from 1.5 GHz to20 GHz.Furthermore,it achieves angle stability for TE and TM polarization at oblique incident angles up to 40°and 65°,respectively.To achieve broadband absorption spectrum,we have adopted a single-layer high-impedance surface(HIS)loaded with a double-layer magnetic material(MM)structure.To further realize the RCS reduction into a lower frequency range,we have employed the scattering cancellation technology into the traditional metallic ground.Finally,we have fabricated a sample exhibiting the 10 d B RCS reduction from 1 GHz to 20 GHz with a thickness of 10 mm.Measurement and simulation results confirm that the proposed MA exhibits excellent comprehensive performance,making it suitable for many practical applications. 展开更多
关键词 Metamaterial absorber(MA) Magnetic material(MM) High-impedance surface(HIS) Scattering cancellation technology ULTRAWIDEBAND Wide-angular stable
下载PDF
Coherent optical frequency transfer via 972-km fiber link
8
作者 邓雪 张翔 +8 位作者 臧琦 焦东东 王丹 刘杰 高静 许冠军 董瑞芳 刘涛 张首刚 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第2期277-282,共6页
We demonstrate coherent optical frequency dissemination over a distance of 972 km by cascading two spans where the phase noise is passively compensated for.Instead of employing a phase discriminator and a phase lockin... We demonstrate coherent optical frequency dissemination over a distance of 972 km by cascading two spans where the phase noise is passively compensated for.Instead of employing a phase discriminator and a phase locking loop in the conventional active phase control scheme,the passive phase noise cancellation is realized by feeding double-trip beat-note frequency to the driver of the acoustic optical modulator at the local site.This passive scheme exhibits fine robustness and reliability,making it suitable for long-distance and noisy fiber links.An optical regeneration station is used in the link for signal amplification and cascaded transmission.The phase noise cancellation and transfer instability of the 972-km link is investigated,and transfer instability of 1.1×10^(-19)at 10^(4)s is achieved.This work provides a promising method for realizing optical frequency distribution over thousands of kilometers by using fiber links. 展开更多
关键词 optical frequency transfer fiber link phase noise cancellation
下载PDF
Turbo Message Passing Based Burst Interference Cancellation for Data Detection in Massive MIMO-OFDM Systems
9
作者 Wenjun Jiang Zhihao Ou +1 位作者 Xiaojun Yuan Li Wang 《China Communications》 SCIE CSCD 2024年第2期143-154,共12页
This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst inte... This paper investigates the fundamental data detection problem with burst interference in massive multiple-input multiple-output orthogonal frequency division multiplexing(MIMO-OFDM) systems. In particular, burst interference may occur only on data symbols but not on pilot symbols, which means that interference information cannot be premeasured. To cancel the burst interference, we first revisit the uplink multi-user system and develop a matrixform system model, where the covariance pattern and the low-rank property of the interference matrix is discussed. Then, we propose a turbo message passing based burst interference cancellation(TMP-BIC) algorithm to solve the data detection problem, where the constellation information of target data is fully exploited to refine its estimate. Furthermore, in the TMP-BIC algorithm, we design one module to cope with the interference matrix by exploiting its lowrank property. Numerical results demonstrate that the proposed algorithm can effectively mitigate the adverse effects of burst interference and approach the interference-free bound. 展开更多
关键词 burst interference cancellation data detection massive multiple-input multiple-output(MIMO) message passing orthogonal frequency division multiplexing(OFDM)
下载PDF
Two-Factor Cancelable Biometrics Authenticator
10
作者 彭颖涵 Andrew T. B. J David N. C. L 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第1期54-59,共6页
Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it... Biometrics-based authentication system offers advantages of providing high reliability and accuracy. However the contemporary authentication system is impuissance to compromise. If a biometrics data is compromised, it cannot be replaced and rendered unusable. In this paper, a cancelable biometrics-based authenticator is proposed to solve this irrevocability issue. The proposed approach is a two-factor authentication system, which requires both of the random data and facial feature in order to access the system. In this system, tokenized pseudo-random data is coupled with momentbased facial feature via inner product algorithm. The output of the product is then discretized to generate a set of private binary code, coined as 2factor-Hashing code, which is acted as verification key. If this biometrics-based verification key is compromised, a new one can be issued by replacing a different set of random number via token replacement. Then, the compromised one is rendered completely useless. This feature offers an extra protection layer against biometrics fabrication since the verification code is replaceable. Experimental results demonstrate that the proposed system provides zero Equal Error Rate in which there is a clear separation in between the genuine and the imposter distribution populations. 展开更多
关键词 cancelable biometrics face recognition Geometric moments pseudo Zernike moment
原文传递
Active Cancelation of Acoustic Noise in Waveguides by Standard Control Task Decision Usage
11
作者 Alexey A. Pudovkin 《Journal of Applied Mathematics and Physics》 2024年第4期1188-1202,共15页
Cybernetic decision variants were analyzed in order to use for physical task of active noise cancelation. 10 dB mean active noise cancellation is demonstrated in two decades frequency band by usage of cybernetic decis... Cybernetic decision variants were analyzed in order to use for physical task of active noise cancelation. 10 dB mean active noise cancellation is demonstrated in two decades frequency band by usage of cybernetic decision for acoustical duct physical scale model. The used decision was found on minimization of acoustical field power transfer function from the beginning of waveguide to their end. 展开更多
关键词 Waveguide Noise Active Cancelation CONTROL Synthesis Procedure H2
下载PDF
Face Templates Encryption Technique Based on Random Projection and Deep Learning
12
作者 Mayada Tarek 《Computer Systems Science & Engineering》 SCIE EI 2023年第3期2049-2063,共15页
Cancellable biometrics is the solution for the trade-off between two concepts:Biometrics for Security and Security for Biometrics.The cancelable template is stored in the authentication system’s database rather than ... Cancellable biometrics is the solution for the trade-off between two concepts:Biometrics for Security and Security for Biometrics.The cancelable template is stored in the authentication system’s database rather than the original biometric data.In case of the database is compromised,it is easy for the template to be canceled and regenerated from the same biometric data.Recoverability of the cancelable template comes from the diversity of the cancelable transformation parameters(cancelable key).Therefore,the cancelable key must be secret to be used in the system authentication process as a second authentication factor in con-junction with the biometric data.The main contribution of this paper is to tackle the risks of stolen/lost/shared cancelable keys by using biometric trait(in different feature domains)as the only authentication factor,in addition to achieving good performance with high security.The standard Generative Adversarial Network(GAN)is proposed as an encryption tool that needs the cancelable key during the training phase,and the testing phase depends only on the biometric trait.Additionally,random projection transformation is employed to increase the proposed system’s security and performance.The proposed transformation system is tested using the standard ORL face database,and the experiments are done by applying different features domains.Moreover,a security analysis for the proposed transformation system is presented. 展开更多
关键词 cancelable biometrics(CBs) random projection ORL face database generative adversarial network(GAN)
下载PDF
A Golden Decade of Polar Codes:From Basic Principle to 5G Applications 被引量:1
13
作者 Kai Niu Ping Zhang +2 位作者 Jincheng Dai Zhongwei Si Chao Dong 《China Communications》 SCIE CSCD 2023年第2期94-121,共28页
After the pursuit of seventy years,the invention of polar codes indicates that we have found the first capacity-achieving coding with low complexity construction and decoding,which is the great breakthrough of the cod... After the pursuit of seventy years,the invention of polar codes indicates that we have found the first capacity-achieving coding with low complexity construction and decoding,which is the great breakthrough of the coding theory in the past two decades.In this survey,we retrospect the history of polar codes and summarize the advancement in the past ten years.First,the primary principle of channel polarization is investigated such that the basic construction,coding method and the classic successive cancellation(SC)decoding are reviewed.Second,in order to improve the performance of the finite code length,we introduce the guiding principle and conclude five design criteria for the construction,design and implementation of the polar code in the practical communication system based on the exemplar schemes in the literature.Especially,we explain the design principle behind the concatenated coding and rate matching of polar codes in 5G wireless system.Furthermore,the improved SC decoding algorithms,such as SC list(SCL)decoding and SC stack(SCS)decoding etc.,are investigated and compared.Finally,the research prospects of polar codes for the future 6G communication system are explored,including the optimization of short polar codes,coding construction in fading channels,polar coded modulation and HARQ,and the polar coded transmission,namely polar processing.Predictably,as a new coding methodology,polar codes will shine a light on communication theory and unveil a revolution in transmission technology. 展开更多
关键词 polar codes channel polarization successive cancellation decoding polar coded modulation polar processing
下载PDF
Deep Learning Aided SCL Decoding of Polar Codes with Shifted-Pruning 被引量:1
14
作者 Yang Lu Mingmin Zhao +2 位作者 Ming Lei Chan Wang Minjian Zhao 《China Communications》 SCIE CSCD 2023年第1期153-170,共18页
Recently,a generalized successive cancellation list(SCL)decoder implemented with shiftedpruning(SP)scheme,namely the SCL-SP-ωdecoder,is presented for polar codes,which is able to shift the pruning window at mostωtim... Recently,a generalized successive cancellation list(SCL)decoder implemented with shiftedpruning(SP)scheme,namely the SCL-SP-ωdecoder,is presented for polar codes,which is able to shift the pruning window at mostωtimes during each SCL re-decoding attempt to prevent the correct path from being eliminated.The candidate positions for applying the SP scheme are selected by a shifting metric based on the probability that the elimination occurs.However,the number of exponential/logarithm operations involved in the SCL-SP-ωdecoder grows linearly with the number of information bits and list size,which leads to high computational complexity.In this paper,we present a detailed analysis of the SCL-SP-ωdecoder in terms of the decoding performance and complexity,which unveils that the choice of the shifting metric is essential for improving the decoding performance and reducing the re-decoding attempts simultaneously.Then,we introduce a simplified metric derived from the path metric(PM)domain,and a custom-tailored deep learning(DL)network is further designed to enhance the efficiency of the proposed simplified metric.The proposed metrics are both free of transcendental functions and hence,are more hardware-friendly than the existing metrics.Simulation results show that the proposed DL-aided metric provides the best error correction performance as comparison with the state of the art. 展开更多
关键词 polar codes successive cancellation list decoding deep learning shifted-pruning path metric
下载PDF
Modeling Target Detection and Performance Analysis of Electronic Countermeasures for Phased Radar 被引量:1
15
作者 T.Jagadesh B.Sheela Rani 《Intelligent Automation & Soft Computing》 SCIE 2023年第1期449-463,共15页
Interference is a key factor in radar return misdetection.Strong interference might make it difficult to detect the signal or targets.When interference occurs in the sidelobes of the antenna pattern,Sidelobe Cancellat... Interference is a key factor in radar return misdetection.Strong interference might make it difficult to detect the signal or targets.When interference occurs in the sidelobes of the antenna pattern,Sidelobe Cancellation(SLC)and Sidelobe Blanking are two unique solutions to solve this problem(SLB).Aside from this approach,the probability of false alert and likelihood of detection are the most essential parameters in radar.The chance of a false alarm for any radar system should be minimal,and as a result,the probability of detection should be high.There are several interference cancellation strategies in the literature that are used to sustain consistent false alarms regardless of the clutter environment.With the necessity for interference cancellation methods and the constant false alarm rate(CFAR),the Maisel SLC algorithm has been modified to create a new algorithm for recognizing targets in the presence of severe interference.The received radar returns and interference are simulated as non-stationary in this approach,and side-lobe interference is cancelled using an adaptive algorithm.By comparing the performance of adaptive algorithms,simulation results are shown.In a severe clutter situation,the simulation results demonstrate a considerable increase in target recognition and signal to noise ratio when compared to the previous technique. 展开更多
关键词 Sidelobe canceller sidelobe blanking constant false alarm rate CLUTTER jammer cancellation ratio probability of detection
下载PDF
List-Serial Pipelined Hardware Architecture for SCL Decoding of Polar Codes
16
作者 Zhongxiu Feng Cong Niu +3 位作者 Zhengyu Zhang Jiaxi Zhou Daiming Qu Tao Jiang 《China Communications》 SCIE CSCD 2023年第3期175-184,共10页
For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from h... For polar codes,the performance of successive cancellation list(SCL)decoding is capable of approaching that of maximum likelihood decoding.However,the existing hardware architectures for the SCL decoding suffer from high hardware complexity due to calculating L decoding paths simultaneously,which are unfriendly to the devices with limited logical resources,such as field programmable gate arrays(FPGAs).In this paper,we propose a list-serial pipelined hardware architecture with low complexity for the SCL decoding,where the serial calculation and the pipelined operation are elegantly combined to strike a balance between the complexity and the latency.Moreover,we employ only one successive cancellation(SC)decoder core without L×L crossbars,and reduce the number of inputs of the metric sorter from 2L to L+2.Finally,the FPGA implementations show that the hardware resource consumption is significantly reduced with negligible decoding performance loss. 展开更多
关键词 successive cancellation list decoding po-lar codes hardware implementation pipelined archi-tecture
下载PDF
Group-Based Successive Interference Cancellation for Multi-Antenna NOMA System with Error Propagation
17
作者 Cheng Hu Hong Wang +1 位作者 Changxiang Li Rongfang Song 《China Communications》 SCIE CSCD 2023年第8期276-287,共12页
Non-orthogonal multiple access(NOMA)is viewed as a key technique to improve the spectrum efficiency and solve the issue of massive connectivity.However,for power domain NOMA,the required overall transmit power should ... Non-orthogonal multiple access(NOMA)is viewed as a key technique to improve the spectrum efficiency and solve the issue of massive connectivity.However,for power domain NOMA,the required overall transmit power should be increased rapidly with the increasing number of users in order to ensure that the signal-to-interference-plus-noise ratio reaches a predefined threshold.In addition,since the successive interference cancellation(SIC)is adopted,the error propagation would become more serious as the order of SIC increases.Aiming at minimizing the total transmit power and satisfying each user’s service requirement,this paper proposes a novel framework with group-based SIC for the deep integration between power domain NOMA and multi-antenna technology.Based on the proposed framework,a joint optimization of power control and equalizer design is investigated to minimize transmit power consumption for uplink multi-antenna NOMA system with error propagations.Based on the relationship between the equalizer and the transmit power coefficients,the original problem is transformed to a transmit power optimization problem,which is further addressed by a parallel iteration algorithm.It is shown by simulations that,in terms of the total power consumption,the proposed scheme outperforms the conventional OMA and the existing cluster-based NOMA schemes. 展开更多
关键词 multi-antenna NOMA group-based successive interference cancellation error propagation power control
下载PDF
Optical Ciphering Scheme for Cancellable Speaker Identification System
18
作者 Walid El-Shafai Marwa A.Elsayed +5 位作者 Mohsen A.Rashwan Moawad I.Dessouky Adel S.El-Fishawy Naglaa F.Soliman Amel A.Alhussan Fathi EAbd El-Samie 《Computer Systems Science & Engineering》 SCIE EI 2023年第4期563-578,共16页
Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics.... Most current security and authentication systems are based on personal biometrics.The security problem is a major issue in the field of biometric systems.This is due to the use in databases of the original biometrics.Then biometrics will forever be lost if these databases are attacked.Protecting privacy is the most important goal of cancelable biometrics.In order to protect privacy,therefore,cancelable biometrics should be non-invertible in such a way that no information can be inverted from the cancelable biometric templates stored in personal identification/verification databases.One methodology to achieve non-invertibility is the employment of non-invertible transforms.This work suggests an encryption process for cancellable speaker identification using a hybrid encryption system.This system includes the 3D Jigsaw transforms and Fractional Fourier Transform(FrFT).The proposed scheme is compared with the optical Double Random Phase Encoding(DRPE)encryption process.The evaluation of simulation results of cancellable biometrics shows that the algorithm proposed is secure,authoritative,and feasible.The encryption and cancelability effects are good and reveal good performance.Also,it introduces recommended security and robustness levels for its utilization for achieving efficient cancellable biometrics systems. 展开更多
关键词 Cancellable biometrics jigsaw transform FrFT DRPE speaker identification
下载PDF
Efficient Hardware Design of a Secure Cancellable Biometric Cryptosystem
19
作者 Lamiaa A.Abou Elazm Walid El-Shafai +6 位作者 Sameh Ibrahim Mohamed G.Egila H.Shawkey Mohamed K.H.Elsaid Naglaa F.Soliman Hussah Nasser AlEisa Fathi E.Abd El-Samie 《Intelligent Automation & Soft Computing》 SCIE 2023年第4期929-955,共27页
Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the secur... Biometric security is a growing trend,as it supports the authentication of persons using confidential biometric data.Most of the transmitted data in multi-media systems are susceptible to attacks,which affect the security of these sys-tems.Biometric systems provide sufficient protection and privacy for users.The recently-introduced cancellable biometric recognition systems have not been investigated in the presence of different types of attacks.In addition,they have not been studied on different and large biometric datasets.Another point that deserves consideration is the hardware implementation of cancellable biometric recognition systems.This paper presents a suggested hybrid cancellable biometric recognition system based on a 3D chaotic cryptosystem.The rationale behind the utilization of the 3D chaotic cryptosystem is to guarantee strong encryption of biometric templates,and hence enhance the security and privacy of users.The suggested cryptosystem adds significant permutation and diffusion to the encrypted biometric templates.We introduce some sort of attack analysis in this paper to prove the robustness of the proposed cryptosystem against attacks.In addition,a Field Programmable Gate Array(FPGA)implementation of the pro-posed system is introduced.The obtained results with the proposed cryptosystem are compared with those of the traditional encryption schemes,such as Double Random Phase Encoding(DRPE)to reveal superiority,and hence high recogni-tion performance of the proposed cancellable biometric recognition system.The obtained results prove that the proposed cryptosystem enhances the security and leads to better efficiency of the cancellable biometric recognition system in the presence of different types of attacks. 展开更多
关键词 Information security cancellable biometric recognition systems CRYPTANALYSIS 3D chaotic map ENCRYPTION FPGA
下载PDF
Intelligent reflecting surface-assisted cognitive radio-inspired rate-splitting multiple access systems
20
作者 Peixu Liu Gang Jing +2 位作者 Hongwu Liu Liang Yang Theodoros A.Tsiftsis 《Digital Communications and Networks》 SCIE CSCD 2023年第3期655-666,共12页
Intelligent reflecting surface(IRS)has been widely regarded as a promising technology for configuring wireless propagation environments.In this paper,we utilize IRS to assist transmission of a secondary user(SU)in a c... Intelligent reflecting surface(IRS)has been widely regarded as a promising technology for configuring wireless propagation environments.In this paper,we utilize IRS to assist transmission of a secondary user(SU)in a cognitive radio-inspired rate-splitting multiple access(CR-RSMA)system in which a primary user's(PU's)quality of service(QoS)requirements must be guaranteed.Without introducing intolerable interference to deteriorate the PU's outage performance,the SU conducts rate-splitting to transmit its signal to the base-station through the direct link and IRS reflecting channels.For the IRS-assisted CR-RSMA(IRS-CR-RSMA)scheme,we derive the optimal transmit power allocation,target rate allocation,and successive interference cancellation decoding order to enhance the outage performance of the SU.The closed-form expression for the SU's outage probability achieved by the IRS-CR-RSMA scheme is derived.Various simulation results are presented to clarify the enhanced outage performance achieved by the proposed IRS-CR-RSMA scheme over the CR-RSMA scheme. 展开更多
关键词 Rate-splitting multiple access(RSMA) Intelligent reflecting surface(IRS) Successive interference cancellation(SIC) Cognitive radio
下载PDF
上一页 1 2 14 下一页 到第
使用帮助 返回顶部