Current Issue : April - June Volume : 2013 Issue Number : 2 Articles : 5 Articles
In order to generate color test image consistent with human perception in aspect of saturation, lightness, and hue of image, we\r\npropose a saturation test image design method based on CIEDE2000 color difference formula. This method exploits the subjective\r\nsaturation parameter C of CIEDE2000 to get a series of test images with different saturation but same lightness and hue. It is\r\nfound experimentally that the vision perception has linear relationship with the saturation parameter C. This kind of saturation\r\ntest image has various applications, such as in the checking of color masking effect in visual experiments and the testing of the\r\nvisual effects of image similarity component....
Oblivious transfer (OT) protocols mainly contain three categories: 1-out-of-2 OT, 1-out-of-n OT, and k-out-of-n OT. In most\r\ncases, they are treated as cryptographic primitives and are usually executed without consideration of possible attacks that might\r\nfrequently occur in an open network, such as an impersonation, replaying, or man-in-the-middle attack. Therefore, when used in\r\ncertain applications, such as mental poker games and fair contract signings, some extra mechanisms must be combined to ensure\r\nthe security of the protocol. However, after a combination, we found that very few of the resulting schemes are efficient enough in\r\nterms of communicational cost, which is a significant concern for generic commercial transactions. Therefore, we propose a novel\r\nk-out-of-n oblivious transfer protocol based on bilinear pairing, which not only satisfies the requirements of a k-out-of-n OT\r\nprotocol, but also provides mutual authentication to resist malicious attacks. Meanwhile, it is efficient in terms of communication\r\ncost....
Application Layer Forward Error Correction (AL-FEC) with rateless codes can be applied to protect the video data over lossy\r\nchannels. Expanding Window Random Linear Codes (EW RLCs) are a flexible unequal error protection fountain coding scheme\r\nwhich can provide prioritized data transmission. In this paper, we propose a system that exploits systematic EW RLC for\r\nH.264/Advanced Video Coding (AVC) slice-partitioned data. The system prioritizes slices based on their PSNR contribution to\r\nreconstruction as well as temporal significance. Simulation results demonstrate usefulness of using relative slice priority with\r\nsystematic codes for multimedia broadcast applications....
Security of the multimedia data including image and video is one of the basic requirements for the telecommunications and\r\ncomputer networks. In this paper, we consider a simple and lightweight stream encryption algorithm for image encryption, and a\r\nseries of tests are performed to confirm suitability of the described encryption algorithm. These tests include visual test, histogram\r\nanalysis, information entropy, encryption quality, correlation analysis, differential analysis, and performance analysis. Based on\r\nthis analysis, it can be concluded that the present algorithm in comparison to A5/1 and W7 stream ciphers has the same security\r\nlevel, is better in terms of the speed of performance, and is used for real-time applications....
Recently,many local review websites such as Yelp are emerging, which have greatly facilitated people�s daily life such as cuisine hunting.\r\nHowever they failed to meet travelers� demands because travelers are more concerned about a city�s local specialties instead of\r\nthe city�s high ranked restaurants. To solve this problem, this paper presents a local specialty mining algorithm, which utilizes both\r\nthe structured data from local review websites and the unstructured user-generated content (UGC) from community Q&A websites,\r\nand travelogues. The proposed algorithm extracts dish names from local review data to build a document for each city, and\r\napplies tfidf weighting algorithm on these documents to rank dishes. Dish-city correlations are calculated from unstructured UGC,\r\nand combined with the tfidf ranking score to discover local specialties. Finally, duplicates in the local specialty mining results are\r\nmerged. A recommendation service is built to present local specialties to travelers, along with specialties� associated restaurants,\r\nQ&A threads, and travelogues. Experiments on a large data set show that the proposed algorithm can achieve a good performance,\r\nand compared to using local review data alone, leveraging unstructured UGC can boost the mining performance a lot, especially\r\nin large cities....
Loading....