The advent of social networks and cloud computing has made social multimedia sharing in social networks become easier and more efficient. The lowered cost of redistribution, however, also invites much motivation for large-scale copyright infringement, so it is necessary to safeguard multimedia sharing for security and privacy. In this paper, we proposed a novel framework for joint fingerprinting and encryption (JFE) based on Cellular Automata (CA) and social network analysis (SNA) with the purpose of protecting media distribution in social networks. The motivation is to map the hierarchical community structure of social networks into the tree structure of Discrete Wavelet Transform (DWT) for fingerprinting and encryption. First, the fingerprint code is produced by using SNA. Then the obtained fingerprints are embedded into the DWT domain. Afterwards, CA is used for permutation in the DWT domain. Finally, the image is diffused with XOR operation in the spatial domain. The proposed method, to the best of our knowledge, is the first JFE method using CA and SNA in hybrid domains for security and privacy in social networks. The use of fingerprinting along with encryption can provide a double-layer protection for media sharing in social networks. Both theoretical analysis and experimental results validate the effectiveness of the proposed scheme. 相似文献
Concrete specimens made with ordinary portland cement or ordinary portland cement incorporating fly ash with the replacement of 10% or 20%, ground blast furnace slag with the replacement of 15% or 30%, or 15% fly ash and 15% ground blast furnace slag were made and exposed to a cyclic sulfate environment. Concrete properties including relative dynamic elastic modulus, chloride ion diffusion coefficient, compressive strength and flexural strength were measured. Effect of mineral admixtures on the cyclic sulfa... 相似文献
Cognitive radios such as intelligent phones and Bluetooth devices have been considered essential goods in next-generation communication systems.Such devices will have to share the same frequency band owing to the limited bandwidth resource.To improve spectrum efciency,we formulate multi-channel power allocation as a market competitive equilibrium(CE)problem,and prove that its solution exists and is unique under the condition of weak interference.We then propose two distributed power allocation algorithms achieving CE,namely the fast convergent power allocation algorithm(FCPAA)and the social-fairness-aware FCPAA(SFAF).Theoretical analysis and simulation results demonstrate that the proposed algorithms lead to better system performance in terms of the guaranteed interference temperature constraint using the price mechanism instead of a strategy based on the Nash equilibrium.Moreover,it is shown that the FCPAA maximizes total utility,and converges more quickly than the method addressed in prior research with the help of improved round-robin rules.However,the FCPAA cannot ensure the same social fairness among secondary users as the SFAF scheme in both the non-fading channel and Rayleigh fading channel;the SFAF balances the individual utility by adjusting each user’s budget at the expense of a small quantity of system total throughput. 相似文献
This paper suggests elegant two enhancement approaches for rib chest images. The first approach is based on adaptive contrast and luminance model (ACLM).The second approach is depended on mixing the Exponential Contrast Limited Adaptive Histogram Equalization model (ECLAHE) with the Local Histogram Equalization (LHE). The idea of this approach is depended on applying on rib chest radiograph and make optimization for clip limit for ECLAHE. This second algorithm has helped rib chest radiograph details are more important for the detection of cancerous cells. The performance qualities of the suggested models are entropy, average gradient, contrast factor, Sobel magnitude, lightness order error and the similarity of edges point of views. The second approach presents enhancement of rib chest images with better resolution visual details and quality metrics point of views with comparing the first approach.
Pavement images are widely used in transportation agencies to detect cracks accurately so that the best proper plans of maintenance and rehabilitation could be made. Although crack in a pavement image is perceived because the intensity of crack pixels contrasts with that of the pavement background, there are still challenges in distinguishing cracks from complex textures, heavy noise, and interference. Unlike the intensity or the first-order edge feature of crack, this paper proposes the second-order directional derivative to characterize the directional valley-like structure of crack. The multi-scale Hessian structure is first proposed to analytically adapt to the direction and valley of cracking in the Gaussian scale space. The crack structure field is then proposed to mimic the curvilinear propagation of crack in the local area, which is iteratively applied at every point of the crack curve to infer the crack structure at the gaps and intersections. Finally, the most salient centerline of the crack within its curvilinear buffer is exactly located with non-maximum suppression along the perpendicular direction of crack. The experiments on large numbers of images of various crack types and with diverse conditions of noise, illumination and interference demonstrate the proposed method can detect pavement cracks well with an average Precision, Recall and F-measure of 92.4%, 88.4%, and 90.4% respectively. Also, the proposed method achieves the best performance of crack detection on the benchmark datasets among methods that also require no training and publicly offer the detection results for every image. 相似文献
为提高智能体系统对攻击的免疫力,研究了测量攻击下的适应力分布式状态估计方法。每个智能体对系统状态进行连续的本地线性测量。由于不同智能体的本地测量模型相互异构,对系统状态可能不具有本地可观测性,且攻击者能够操控部分智能体的测量数据,随意改变其测量结果。而智能体的目标是协同处理本地测量数据,并正确估计出未知的系统状态。因此,该问题的挑战在于在不对真实测量数据和恶意智能体的测量数据进行分辨时,如何设计算法估计得到真实的系统状态。为了解决这个问题,设计了适应性分布式最大后验概率估计算法。在该算法中,只要恶意智能体的数量小于某个特定值,所有智能体都能够收敛到系统状态。首先,根据卡尔曼滤波给出集中式最大后验概率(Maximum A Posteriori,MAP)估计方法,并与分布式一致性结合,进而得到分布式最大后验概率估计方法。然后,考虑到测量攻击,从估计一致性的角度,利用自适应饱和度增益设计了适应性分布式最大后验概率估计方法。最后,通过仿真实验验证算法的有效性。 相似文献