This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The propos...This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications.展开更多
A contour shape descriptor based on discrete Fourier transform (DFT) and a K-means al- gorithm modified self-organizing feature map (SOFM) neural network are established for shape clus- tering. The given shape is ...A contour shape descriptor based on discrete Fourier transform (DFT) and a K-means al- gorithm modified self-organizing feature map (SOFM) neural network are established for shape clus- tering. The given shape is first sampled uniformly in the polar coordinate. Then the discrete series is transformed to frequency domain and constructed to a shape characteristics vector. Firstly, sample set is roughly clustered using SOFM neural network to reduce the scale of samples. K-means algo- rithm is then applied to improve the performance of SOFM neural network and process the accurate clustering. K-means algorithm also increases the controllability of the clustering. The K-means algo- rithm modified SOFM neural network is used to cluster the shape characteristics vectors which is previously constructed. With leaf shapes as an example, the simulation results show that this method is effective to cluster the contour shapes.展开更多
To handle the electromagnetic problems of the bi-static radar cross section (RCS) calculation of scatterer in a wide fre- quency band, a finite-difference time-domain (FDTD) extrapolation method combining with dis...To handle the electromagnetic problems of the bi-static radar cross section (RCS) calculation of scatterer in a wide fre- quency band, a finite-difference time-domain (FDTD) extrapolation method combining with discrete Fourier transform (DFT) is pro- posed. By comparing the formulas between the steady state field extrapolation method and the transient field extrapolation method, a novel extrapolation method combining with DFT used in FDTD is proposed when a transient field incident wave is introduced. With the proposed method, the full-angle RCS distribution in a wide fre- quency band can be achieved through one-time FDTD calculation. Afterwards, the back-scattering RCS distributions of a double olive body and a sphere-cone body are calculated. Numerical results verify the validity of the proposed method.展开更多
Linear complexity is an important standard to scale the randomicity of stream ciphers. The distribution function of a sequence complexity measure gives the function expression for the number of sequences with a given ...Linear complexity is an important standard to scale the randomicity of stream ciphers. The distribution function of a sequence complexity measure gives the function expression for the number of sequences with a given complexity measure value. In this paper, we mainly determine the distribution function of sequences with period over using Discrete Fourier Transform (DFT), where and the characteristics of are odd primes, gcd and is a primitive root modulo The results presented can be used to study the randomness of periodic sequences and the analysis and design of stream cipher.展开更多
We have realized a watermark embedding system based on audio perceptual masking and brought forward a watermark detection system using pre\|processing technology. We can detect watermark from watermarked audio without...We have realized a watermark embedding system based on audio perceptual masking and brought forward a watermark detection system using pre\|processing technology. We can detect watermark from watermarked audio without original audio by using this method. The results have indicated that this embedding and detecting method is robust, on the premise of not affecting the hearing quality, it can resist those attacks such as MPEG compressing, filtering and adding white noise.展开更多
The amount of digital data is increasing every day. At every step of our daily lives, we deal with technologies in which our data are stored(e.g., mobile phones and laptops), and this is one of the main reasons for th...The amount of digital data is increasing every day. At every step of our daily lives, we deal with technologies in which our data are stored(e.g., mobile phones and laptops), and this is one of the main reasons for the design of various types of encryption and user identity verification algorithms. These algorithms are meant not only to fulfill the desire of protecting data but also to address the possibility of granting access of specific digital data to selected individuals. This process brings with it the problem of identity verification. This paper discusses the problem of voice verification and presents a voice verification method based on artificial intelligence methods.Numerous tests are performed herein to demonstrate the effectiveness of the presented solution. The research results are shown and discussed in terms of the advantages and disadvantages of the solution.展开更多
Under dynamic conditions, the signals of power system have time-varying magnitude and frequency, which might lead to considerable errors for synchrophasor measurement. The traditional discrete Fourier transform (DFT) ...Under dynamic conditions, the signals of power system have time-varying magnitude and frequency, which might lead to considerable errors for synchrophasor measurement. The traditional discrete Fourier transform (DFT) based algorithms used in Phasor Measurement Unit (PMU) are hard to meet the requirements of measurement accuracy because of the existence of spectral leakage. A dynamic phasor measurement algorithm is proposed in this paper in which the input sampled data are considered as non-stationary signals with amplitude modulation-frequency modulation (AM-FM) form, and the measurement is achieved by AM-FM demodulation. An angle-shifted energy operator (ASEO) is used to extract the instantaneous amplitude and low pass differential filter is introduced for frequency estimation. Simulation results indicate that the proposed algorithm can effectively improve the phasor measurement accuracy and has very short response time for PMU under dynamic conditions.展开更多
基金This research was funded by Deanship of Scientific Research,Taif University Researches Supporting Project number(TURSP-2020/216),Taif University,Taif,Saudi Arabia.
文摘This paper introduces an efficient image cryptography system.The pro-posed image cryptography system is based on employing the two-dimensional(2D)chaotic henon map(CHM)in the Discrete Fourier Transform(DFT).The proposed DFT-based CHM image cryptography has two procedures which are the encryption and decryption procedures.In the proposed DFT-based CHM image cryptography,the confusion is employed using the CHM while the diffu-sion is realized using the DFT.So,the proposed DFT-based CHM image crypto-graphy achieves both confusion and diffusion characteristics.The encryption procedure starts by applying the DFT on the image then the DFT transformed image is scrambled using the CHM and the inverse DFT is applied to get the final-ly encrypted image.The decryption procedure follows the inverse procedure of encryption.The proposed DFT-based CHM image cryptography system is exam-ined using a set of security tests like statistical tests,entropy tests,differential tests,and sensitivity tests.The obtained results confirm and ensure the superiority of the proposed DFT-based CHM image cryptography system.These outcomes encourage the employment of the proposed DFT-based CHM image cryptography system in real-time image and video applications.
基金Supported by Guangdong Province Key Science and TechnologyItem(2011A010801005,2010A080402015)the National NaturalScience Foundation of China(61171142)
文摘A contour shape descriptor based on discrete Fourier transform (DFT) and a K-means al- gorithm modified self-organizing feature map (SOFM) neural network are established for shape clus- tering. The given shape is first sampled uniformly in the polar coordinate. Then the discrete series is transformed to frequency domain and constructed to a shape characteristics vector. Firstly, sample set is roughly clustered using SOFM neural network to reduce the scale of samples. K-means algo- rithm is then applied to improve the performance of SOFM neural network and process the accurate clustering. K-means algorithm also increases the controllability of the clustering. The K-means algo- rithm modified SOFM neural network is used to cluster the shape characteristics vectors which is previously constructed. With leaf shapes as an example, the simulation results show that this method is effective to cluster the contour shapes.
基金supported by the National Natural Science Foundation of China(61401361)the Fundamental Research Funds for the Central Universities of China(31020150104)
文摘To handle the electromagnetic problems of the bi-static radar cross section (RCS) calculation of scatterer in a wide fre- quency band, a finite-difference time-domain (FDTD) extrapolation method combining with discrete Fourier transform (DFT) is pro- posed. By comparing the formulas between the steady state field extrapolation method and the transient field extrapolation method, a novel extrapolation method combining with DFT used in FDTD is proposed when a transient field incident wave is introduced. With the proposed method, the full-angle RCS distribution in a wide fre- quency band can be achieved through one-time FDTD calculation. Afterwards, the back-scattering RCS distributions of a double olive body and a sphere-cone body are calculated. Numerical results verify the validity of the proposed method.
基金Supported by the National Natural Science Foundation of China (No. 60973125)
文摘Linear complexity is an important standard to scale the randomicity of stream ciphers. The distribution function of a sequence complexity measure gives the function expression for the number of sequences with a given complexity measure value. In this paper, we mainly determine the distribution function of sequences with period over using Discrete Fourier Transform (DFT), where and the characteristics of are odd primes, gcd and is a primitive root modulo The results presented can be used to study the randomness of periodic sequences and the analysis and design of stream cipher.
文摘We have realized a watermark embedding system based on audio perceptual masking and brought forward a watermark detection system using pre\|processing technology. We can detect watermark from watermarked audio without original audio by using this method. The results have indicated that this embedding and detecting method is robust, on the premise of not affecting the hearing quality, it can resist those attacks such as MPEG compressing, filtering and adding white noise.
基金this project from the Diamond Grant 2016 (No. 0080/DIA/2016/45) funded by the Polish Ministry of Science and Higher Education
文摘The amount of digital data is increasing every day. At every step of our daily lives, we deal with technologies in which our data are stored(e.g., mobile phones and laptops), and this is one of the main reasons for the design of various types of encryption and user identity verification algorithms. These algorithms are meant not only to fulfill the desire of protecting data but also to address the possibility of granting access of specific digital data to selected individuals. This process brings with it the problem of identity verification. This paper discusses the problem of voice verification and presents a voice verification method based on artificial intelligence methods.Numerous tests are performed herein to demonstrate the effectiveness of the presented solution. The research results are shown and discussed in terms of the advantages and disadvantages of the solution.
基金supported by the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No.20090002110040)
文摘Under dynamic conditions, the signals of power system have time-varying magnitude and frequency, which might lead to considerable errors for synchrophasor measurement. The traditional discrete Fourier transform (DFT) based algorithms used in Phasor Measurement Unit (PMU) are hard to meet the requirements of measurement accuracy because of the existence of spectral leakage. A dynamic phasor measurement algorithm is proposed in this paper in which the input sampled data are considered as non-stationary signals with amplitude modulation-frequency modulation (AM-FM) form, and the measurement is achieved by AM-FM demodulation. An angle-shifted energy operator (ASEO) is used to extract the instantaneous amplitude and low pass differential filter is introduced for frequency estimation. Simulation results indicate that the proposed algorithm can effectively improve the phasor measurement accuracy and has very short response time for PMU under dynamic conditions.