Detecting double Joint Photographic Experts Group (JPEG) compressionfor color images is vital in the field of image forensics. In previousresearches, there have been various approaches to detecting double JPEGcompress...Detecting double Joint Photographic Experts Group (JPEG) compressionfor color images is vital in the field of image forensics. In previousresearches, there have been various approaches to detecting double JPEGcompression with different quantization matrices. However, the detectionof double JPEG color images with the same quantization matrix is stilla challenging task. An effective detection approach to extract features isproposed in this paper by combining traditional analysis with ConvolutionalNeural Networks (CNN). On the one hand, the number of nonzero pixels andthe sum of pixel values of color space conversion error are provided with 12-dimensional features through experiments. On the other hand, the roundingerror, the truncation error and the quantization coefficient matrix are used togenerate a total of 128-dimensional features via a specially designed CNN. Insuch aCNN, convolutional layers with fixed kernel of 1×1 and Dropout layersare adopted to prevent overfitting of the model, and an average pooling layeris used to extract local characteristics. In this approach, the Support VectorMachine (SVM) classifier is applied to distinguishwhether a given color imageis primarily or secondarily compressed. The approach is also suitable for thecase when customized needs are considered. The experimental results showthat the proposed approach is more effective than some existing ones whenthe compression quality factors are low.展开更多
Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculatin...Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication,data,energy,etc.,to detect and evaluate vehicle nodes.However,it is difficult to effectively assess the trust level of a vehicle node only by message forwarding,data consistency,and energy sufficiency.In order to resolve these problems,a novel mechanism and a new trust calculating model is proposed in this paper.First,the four tuple method is adopted,to qualitatively describing various types of nodes of IoV;Second,analyzing the behavioral features and correlation of various nodes based on route forwarding rate,data forwarding rate and physical location;third,designing double layer detection feature parameters with the ability to detect uncooperative nodes and malicious nodes;fourth,establishing a node correlative detection model with a double layer structure by combining the network layer and the perception layer.Accordingly,we conducted simulation experiments to verify the accuracy and time of this detection method under different speed-rate topological conditions of IoV.The results show that comparing with methods which only considers energy or communication parameters,the method proposed in this paper has obvious advantages in the detection of uncooperative and malicious nodes of IoV;especially,with the double detection feature parameters and node correlative detection model combined,detection accuracy is effectively improved,and the calculation time of node detection is largely reduced.展开更多
Echo cancellation plays an important role in current Internet protocol(IP) based voice interactive systems. Voice state detection is an essential part in echo cancellation. It mainly comprises two parts: double tal...Echo cancellation plays an important role in current Internet protocol(IP) based voice interactive systems. Voice state detection is an essential part in echo cancellation. It mainly comprises two parts: double talk detection(DTD) and voice activity detection(VAD). DTD is used to detect doubletalk and prevent filter divergence in the presence of near-end speech, and VAD is used to determine the near-end voice activity and output silence indicator when near-end is silent. However, DTD straightforwardly proceeded may mistakenly declare double talk under double silent condition, coefficients update under the far-end silence condition may lead to filter divergence, and current VAD algorithms may misjudge the residual echo from the near end to be far-end voice. Therefore, a voice detection algorithm combining DTD and far-end VAD is proposed. DTD is implemented when VAD declares far-end speech, filtering and coefficients update will be halted when VAD declares far-end silence, and the far-end VAD adopted is multi-feature VAD based on short-time energy and correlation. The new algorithm can improve the accuracy of DTD, prevent filter divergence, and exclude the circumstance that far-end signal only contains residual echo from near end. Actual test results show that the voice state decision of the new algorithm is accurate, and the performance of echo cancellation is improved.展开更多
Previous research shows that few-cycle laser(FCL) pulses with low energy and without a bias field can be used to coherently detect terahertz(THz) pulses. As we know, it is very difficult to stabilize the carrier e...Previous research shows that few-cycle laser(FCL) pulses with low energy and without a bias field can be used to coherently detect terahertz(THz) pulses. As we know, it is very difficult to stabilize the carrier envelope phase(CEP) of FCL pulses, i.e., there are some random fluctuations for the CEP. Here we theoretically investigate the influence of such instability on the accuracy of THz detection. Our results show that although there is an optimum CEP for THz detection, the fluctuations of the CEP will lead to terrible thorns on the detected THz waveform. In order to solve this problem, we propose an approach using two few-cycle laser pulses with opposite CEPs, i.e., their CEPs are differed by π.展开更多
基金Supported by the Fundamental Research Funds for the Central Universities (No.500421126)。
文摘Detecting double Joint Photographic Experts Group (JPEG) compressionfor color images is vital in the field of image forensics. In previousresearches, there have been various approaches to detecting double JPEGcompression with different quantization matrices. However, the detectionof double JPEG color images with the same quantization matrix is stilla challenging task. An effective detection approach to extract features isproposed in this paper by combining traditional analysis with ConvolutionalNeural Networks (CNN). On the one hand, the number of nonzero pixels andthe sum of pixel values of color space conversion error are provided with 12-dimensional features through experiments. On the other hand, the roundingerror, the truncation error and the quantization coefficient matrix are used togenerate a total of 128-dimensional features via a specially designed CNN. Insuch aCNN, convolutional layers with fixed kernel of 1×1 and Dropout layersare adopted to prevent overfitting of the model, and an average pooling layeris used to extract local characteristics. In this approach, the Support VectorMachine (SVM) classifier is applied to distinguishwhether a given color imageis primarily or secondarily compressed. The approach is also suitable for thecase when customized needs are considered. The experimental results showthat the proposed approach is more effective than some existing ones whenthe compression quality factors are low.
基金This research is supported by the National Natural Science Foundations of China under Grants Nos.61862040,61762060 and 61762059The authors gratefully acknowledge the anonymous reviewers for their helpful comments and suggestions.
文摘Undoubtedly,uncooperative or malicious nodes threaten the safety of Internet of Vehicles(IoV)by destroying routing or data.To this end,some researchers have designed some node detection mechanisms and trust calculating algorithms based on some different feature parameters of IoV such as communication,data,energy,etc.,to detect and evaluate vehicle nodes.However,it is difficult to effectively assess the trust level of a vehicle node only by message forwarding,data consistency,and energy sufficiency.In order to resolve these problems,a novel mechanism and a new trust calculating model is proposed in this paper.First,the four tuple method is adopted,to qualitatively describing various types of nodes of IoV;Second,analyzing the behavioral features and correlation of various nodes based on route forwarding rate,data forwarding rate and physical location;third,designing double layer detection feature parameters with the ability to detect uncooperative nodes and malicious nodes;fourth,establishing a node correlative detection model with a double layer structure by combining the network layer and the perception layer.Accordingly,we conducted simulation experiments to verify the accuracy and time of this detection method under different speed-rate topological conditions of IoV.The results show that comparing with methods which only considers energy or communication parameters,the method proposed in this paper has obvious advantages in the detection of uncooperative and malicious nodes of IoV;especially,with the double detection feature parameters and node correlative detection model combined,detection accuracy is effectively improved,and the calculation time of node detection is largely reduced.
基金supported by the National Youth Science Fund Project(61501052)the National Natural Science Foundation of China(61271182)
文摘Echo cancellation plays an important role in current Internet protocol(IP) based voice interactive systems. Voice state detection is an essential part in echo cancellation. It mainly comprises two parts: double talk detection(DTD) and voice activity detection(VAD). DTD is used to detect doubletalk and prevent filter divergence in the presence of near-end speech, and VAD is used to determine the near-end voice activity and output silence indicator when near-end is silent. However, DTD straightforwardly proceeded may mistakenly declare double talk under double silent condition, coefficients update under the far-end silence condition may lead to filter divergence, and current VAD algorithms may misjudge the residual echo from the near end to be far-end voice. Therefore, a voice detection algorithm combining DTD and far-end VAD is proposed. DTD is implemented when VAD declares far-end speech, filtering and coefficients update will be halted when VAD declares far-end silence, and the far-end VAD adopted is multi-feature VAD based on short-time energy and correlation. The new algorithm can improve the accuracy of DTD, prevent filter divergence, and exclude the circumstance that far-end signal only contains residual echo from near end. Actual test results show that the voice state decision of the new algorithm is accurate, and the performance of echo cancellation is improved.
基金supported by the National Natural Science Foundation of China(Nos. 61475054 and 11574105)the Fundamental Research Funds for the Central Universities (No. 2017KFYXJJ029)
文摘Previous research shows that few-cycle laser(FCL) pulses with low energy and without a bias field can be used to coherently detect terahertz(THz) pulses. As we know, it is very difficult to stabilize the carrier envelope phase(CEP) of FCL pulses, i.e., there are some random fluctuations for the CEP. Here we theoretically investigate the influence of such instability on the accuracy of THz detection. Our results show that although there is an optimum CEP for THz detection, the fluctuations of the CEP will lead to terrible thorns on the detected THz waveform. In order to solve this problem, we propose an approach using two few-cycle laser pulses with opposite CEPs, i.e., their CEPs are differed by π.