首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
A nonlinear image encryption scheme using phase-truncated Fourier transform (PTFT) and natural logarithms is proposed in this paper. With the help of the PTFT, the input image is truncated into phase and amplitude parts at the Fourier plane. The phase-only information is kept as the secret key for the decryption, and the amplitude distribution is modulated by adding an undercover amplitude random mask in the encryption process. Furthermore, the encrypted data is kept hidden inside the face biometric-based phase mask key using the base changing rule of logarithms for secure transmission. This phase mask is generated through principal component analysis. Numerical experiments show the feasibility and the validity of the proposed nonlinear scheme. The performance of the proposed scheme has been studied against the brute force attacks and the amplitude-phase retrieval attack. Simulation results are presented to illustrate the enhanced system performance with desired advantages in comparison to the linear cryptosystem.  相似文献   

2.
《成像科学杂志》2013,61(2):212-218
Abstract

Recognition accuracy of a single biometric authentication system is often much limited; hence, a multimodal biometric approach for identity verification is proposed. A new way of person authentication based on five-competent traits, namely, iris, ear, palm print, fingerprint and retina, is proposed in this paper. Each metric is analysed individually to get the matching scores from the corresponding feature sets. These scores are then combined using weighted sum fusion rule. In order to provide liveness verification for our authentication system, we employ the retinal blood vessel pattern recognition. To validate our approach, several experiments were conducted on the images obtained from five different datasets. The experimental results reveal that this multimodal biometric verification system is much more reliable and precise than the single biometric approaches.  相似文献   

3.
Biometric recognition has become a common and reliable way to authenticate the identity of a person. Multimodal biometrics has become an interest of areas for researches in the recent past as it provides more reliability and accuracy. In multimodal biometric recognition, score level fusion has been a very promising approach to improve the overall system's accuracy. In this paper, score level fusion is carried out using three categories of classifiers like, rule classifier (fuzzy classifier), lazy classifier (Naïve Bayes) and learning classifiers (ABC-NN). These three classifiers have their own advantages and disadvantages so the hybridization of classifiers leads to provide overall improvements. The proposed technique consists of three modules, namely processing module, classifier module and combination module. Finally, the proposed fusion method is applied to remote biometric authentication. The implementation is carried out using MATLAB and the evaluation metrics employed are False Acceptance Rate (FAR), False Rejection Rate (FRR) and accuracy. The proposed technique is also compared with other techniques and by employing various combinations of modalities. From the results, we can observe that the proposed technique has achieved better accuracy value and Receiver Operating Characteristic (ROC) curves when compared to other techniques. The proposed technique reached maximum accuracy of having 95% and shows the effectiveness of the proposed technique.  相似文献   

4.
Secure optical storage that uses fully phase encryption   总被引:6,自引:0,他引:6  
Tan X  Matoba O  Shimura T  Kuroda K  Javidi B 《Applied optics》2000,39(35):6689-6694
A secure holographic memory system that uses fully phase encryption is presented. Two-dimensional arrays of data are phase encoded. Each array is then transformed into a stationary white-noise-like pattern by use of a random-phase mask located at the input plane and another at the Fourier plane. This encrypted information is then stored holographically in a photorefractive LiNbO(3):Fe crystal. The original phase-encoded data can be recovered, by use of the two random-phase masks, with a phase-conjugate readout beam. This phase information can then be converted back to intensity information with an interferometer. Recording multiple images by use of angular multiplexing is demonstrated. The influence of a limited system bandwidth on the quality of reconstructed data is evaluated numerically. These computer simulation results show that a fully phase-based encryption system generally performs better than an amplitude-based encryption system when the system bandwidth is limited by a moderate amount.  相似文献   

5.
6.
Some biomolecules are able to generate directional forces by rectifying random thermal motions. This allows these molecular machines to perform mechanical tasks such as intracellular cargo transport or muscle contraction in plants and animals. Although some artificial molecular machines have been synthesized and used collectively to perform mechanical tasks, so far there have been no direct measurements of mechanical processes at the single-molecule level. Here we report measurements of the mechanical work performed by a synthetic molecule less than 5?nm long. We show that biased Brownian motion of the sub-molecular components in a hydrogen-bonded [2]rotaxane-a molecular ring threaded onto a molecular axle-can be harnessed to generate significant directional forces. We used the cantilever of an atomic force microscope to apply a mechanical load to the ring during single-molecule pulling-relaxing cycles. The ring was pulled along the axle, away from the thermodynamically favoured binding site, and was then found to travel back to this site against an external load of 30?pN. Using fluctuation theorems, we were able to relate measurements of the work done at the level of individual rotaxane molecules to the free-energy change as previously determined from ensemble measurements. The results show that individual rotaxanes can generate directional forces of similar magnitude to those generated by natural molecular machines.  相似文献   

7.
8.
Consider a basic “price-only” supply chain interaction in which the “players” are a manufacturer and a retailer. The manufacturer sets the wholesale price ($w/unit) of a product she supplies to a retailer, who in turn sets the retail price ($p/unit) at which he sells to the consumers. The product's demand curve is a function of p. The players select to play one of several non-cooperative games such as the manufacturer-Stackelberg game. How should the players set their prices w and p? Most existing studies assume information symmetry i.e., the cost and market parameters are known equally and perfectly to both players. In reality, the retailer's knowledge of the manufacturing cost c is often controlled by the manufacturer. This paper considers explicitly the asymmetry of knowledge in c. This approach reveals interesting and surprising deviations from earlier symmetrical-c-knowledge results. Moreover, the approach also ameliorates some of the internal inconsistencies within the symmetric-information framework. We also show how the effect of knowledge asymmetry varies with the shape of the demand curve and with the degree of relative dominance between the players. We find that under a linear demand curve a manufacturer should overstate c, which is an intuitively expected result. However, under an iso-elastic demand curve she benefits herself and the entire system by understating c, which is counter-intuitive. Also, under asymmetric c-knowledge, the simultaneous decision (or “vertical Nash”) game becomes non-viable under a linear demand curve, but the game becomes quite viable and desirable under an iso-elastic demand curve.  相似文献   

9.
Secure optical memory system with polarization encryption   总被引:3,自引:0,他引:3  
A novel secure holographic memory system with polarization encoding is proposed. Two-dimensional original data are encoded as a two-dimensional polarization distribution. The polarization state at each pixel is scrambled by a mask that changes the polarization state into a random state. The mask can rotate the direction of the principal axes of the elliptically polarized light and can change the phase retardation at each pixel. The light with the random polarization state is stored as a hologram that can produce the vector phase-conjugate beam. In the decryption the vector phase-conjugation readout can recover the original polarization state by use of the same mask used in the encryption. Experimental results of encryption and decryption with a bacteriorhodopsin film are presented.  相似文献   

10.
M Vijay  G Indumathi 《Sadhana》2018,43(12):198
Biometric systems have gained considerable significance as they are highly employed in the security applications. Achieving human recognition is easier and cheaper and the single modality employed for the recognition faces a lot of challenges due to the environmental factors. Thus, the paper proposes a multimodal recognition system based on the Multi-Support Vector Neural Network (MSVNN). The algorithm proposed is the Glowworm Penguin Search Optimization Algorithm (GwPeSOA), which is a modification of the Glowworm Optimization Algorithm (GOA) with the Penguin Search Optimization Algorithm (PeSOA). The proposed method employs two modalities: the ear and the finger vein modalities; the features of the ear image are obtained using the proposed BiComp masking method of feature extraction, whereas the features from the finger vein are extracted using the Repeated Line Tracking (RLT) method. The features obtained are applied to the MSVNN classifier to recognize the person with good accuracy and the proposed BiComp Mask offers robust features for the extraction. The experimentation using the proposed method attained a better accuracy, specificity and sensitivity at a rate of 0.95, 0.95 and 0.9868, respectively.  相似文献   

11.
We use pyroelectric detectors that are differential in nature to detect motion in humans by their heat emissions. Coded Fresnel lens arrays create boundaries that help to localize humans in space as well as to classify the nature of their motion. We design and implement a low-cost biometric tracking system by using off-the-shelf components. We demonstrate two classification methods by using data gathered from sensor clusters of dual-element pyroelectric detectors with coded Fresnel lens arrays. We propose two algorithms for person identification, a more generalized spectral clustering method and a more rigorous example that uses principal component regression to perform a blind classification.  相似文献   

12.
The advantages of medical waste incineration include the sterilization of bacteria, stabilization of chemical activity, and reduction in waste volume. During the incineration of medical waste, dioxin is generated owing to the high chlorine content. Based on previous research, a conventional fluidized bed combustor with a minimum retrofit to dispose of medical waste without residual dioxins is presented in this study. Coal or pyrite was added to inhibit dioxin formation in the combustion chamber. Fly ash and activated carbon which had adsorbed dioxin were pelletized with adhesive material, and the pelletized fly ash was then recycled to the incinerator for burning. The pelletized fly ash with adhesive material was finally discharged as bottom ash. Bottom ash constitutes the net output of the entire incineration system. and its dioxin content can be neglected. An incineration system that does not produce dioxin residue was achieved; however, a better formula for the pelletized fly ash is still required.

Title page (short abstract)

  1. The emission of dioxin from medical waste incinerators can’t be eliminated by disabling PVC as a raw material of medical devices.

  2. Based on the knowledge shown in the previous literature, an integrated fluidized bed incineration system without dioxin residual installed in a large hospital is proposed in this study.

  3. There are many ways to reduce dioxin formation during the incineration process; however, conventional methods can’t eliminate the existence of dioxin in fly ash.

  4. Pelletized fly ash recycled to the incinerator for re-burning and discharged in the form of bottom ash which is considered dioxin free.

  相似文献   

13.
HACCP体系是对食品生产、加工、储存、运输以及销售整个过程中各种危害控制点进行分析和控制,从而保证食品达到安全水平,它以预防食品安全为基础的食品安全保证体系,是一个系统的、连续的食品安全危害预防和控制方法.HACCP体系的核心是用来保护食品在从田间到餐桌的整个过程中,免受可能发生的生物、化学、物理因素的危害,尽可能把发生食品安全的风险消灭在生产加工过程之中,区别于单纯靠事后检验来保证食品质量安全的传统做法.  相似文献   

14.
Friel GJ  Kemp AJ  Lake TK  Sinclair BD 《Applied optics》2000,39(24):4333-4337
We demonstrate 250 mW of single-frequency 532-nm output from a simple intracavity-doubled Nd:YVO(4) laser, pumped with 1.2 W from a fiber-coupled diode laser. The laser can be frequency chirped smoothly over ~17 GHz while maintaining a single-frequency green output of greater than 200 mW. A short Fabry-Perot cavity is used, and single-frequency operation is enforced by means of a birefringent filter that utilizes the birefringence of both the KTP doubling crystal and the Nd:YVO(4) laser crystal with polarization-dependent loss from a glass Brewster plate combined with polarization-dependent gain from the laser crystal.  相似文献   

15.
The Packaging Information System is a basic module concerned with the creation of the expert system Risk-Engineering. The structure of this expert system was briefly described in Copenhagen at the IAPRI'92 symposium. It provides information about transport, handling and warehousing needs. The databank of this information system has the following components
  • —general regulations
  • —specific packaging data
  • —specific goods data
  • —goods and packaging testing methods
and is used to solve demanding problems, allowing the planner to concentrate on other important assignments. In combination with other modules of the expert system Risk-Engineering, it has at its disposal a range of experience and knowledge of various specialist resources.  相似文献   

16.
地理信息系统的发展与发展中的地理信息系统   总被引:2,自引:0,他引:2  
针对目前对地理信息系统(GIS)的发展缺乏系统、规律性研究的问题,分析了地理信息系统产生和发展的社会前景、技术背景和学科背景;探讨了随着计算机通信网络技术的发展而引起的GIS体系结构和软件开发模式的变化,认为开放式GIS思想和组件式GIS更适合网络(网格)环境下数据服务和功能的服务分布式特点;提出GIS将向以网络服务(Web service)和网格服务(Grid service)为主要形式的开放式GIS方向发展,论述了基于网络服务的地理信息共享与数据互操作的基本架构及其特点,指出Grid service为实现信息资源共享和协同解决问题提供了新的机遇和技术途径,强调Web service和Grid service的核心都是服务,两者既相互联系又有区别.  相似文献   

17.
18.
Châteauneuf M  Kirk AG 《Applied optics》2004,43(13):2689-2694
We introduce a new six-degrees-of-freedom alignment technique that enables the precise alignment of two optical device planes. The method combines linear diffraction gratings and cylindrical Fresnel lenses that allow the diagnosis of misalignment in each degree of freedom independently. The technique was used to align two 20 mm x 20 mm fused-silica substrates separated by 17 mm. The worst-case alignment precision was found to be better than +/- 5 microm laterally, +/- 20 microm longitudinally, +/- 0.036 degrees rotationally, and +/- 0.007degrees in tilt.  相似文献   

19.
20.
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号