By Topic

2011 IEEE International Conference on Anti-Counterfeiting, Security and Identification

Date 24-26 June 2011

Filter Results

Displaying Results 1 - 25 of 56
  • A new P2P Campus Cloud framework

    Publication Year: 2011, Page(s):1 - 4
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (107 KB) | HTML iconHTML

    With the rapid development of information and communication technology, there is a growing interest in harnessing the inexpensive educational resources in universities, and raising the utilization rate of those resources. In this paper, we provide a new method by integrating P2P networks into the Campus Cloud environment. The new framework, in which resources are recorded in resource group in acco... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • P2P file search system based on RealPeer

    Publication Year: 2011, Page(s):5 - 8
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (149 KB) | HTML iconHTML

    In P2P network, the search function of file resources is one of the important reasons for its rapid development. It brings users convenience and is faced with many safety problems as well. This paper presents a P2P file search system based on the RealPeer framework and a P2P system performance test platform is simulated. Using the CL-PKC security authentication mechanism and LDAP, the search syste... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An individual oriented service support model for Campus Cloud

    Publication Year: 2011, Page(s):9 - 12
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (123 KB) | HTML iconHTML

    The number of resources in universities has been growing explosively during the past few years. However, the rate of utilization for these resources is very low. In this case, resource sharing in service computing system is invaluable for users, however, the current service computing system couldn't provide personalized service for users. In this paper, we propose an individual oriented service su... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A fast GPU-based implementation for MD5 hash reverse

    Publication Year: 2011, Page(s):13 - 16
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    Thanks to the development of hardware technology, the Graphics Processing Unit (GPU), as a highly parallel programmable processor, has been applied to more and more advanced mainstream computing systems. In this paper, some optimizations for Message-Digest algorithm 5(MD5) hash reverse were presented, which have been implemented on a GPU parallel architecture called CUDA. The performance of our so... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Anti-theft tracking system for automobiles (AutoGSM)

    Publication Year: 2011, Page(s):17 - 19
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (58 KB) | HTML iconHTML

    Technology achieves success only when it meets every stratum of people. Apart from the various GPS tracking devices this paper introduces a first of its kind vehicle tracking system that works only using GSM technology, which would be the cheapest source of vehicle tracking anti-theft system. It is a small kit that consists of a GSM module and several other components. The system can be switched O... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The mechanism to control file-pollution based on hybrid trust-model in P2P network

    Publication Year: 2011, Page(s):20 - 24
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (104 KB) | HTML iconHTML

    File-pollution, which results in all kinds of malicious and unavailable files, such as Trojan, Sirius, into the network, is a common phenomenon. However, it decreases availability of files in network, threatens security of peers, badly hinders the development of P2P file-sharing network. Nowadays, research on file-pollution still focus on mathematical mode and observation of file-pollution on main... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind separability for single-channel mixtures in satellite channels

    Publication Year: 2011, Page(s):25 - 29
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (122 KB) | HTML iconHTML

    Aimed at single channel mixing signals with the same modulating parameters, separability problem for single channel blind source separation (SCBSS) in satellite flat fading channels is treated in this paper. Firstly, on the basis of single channel mixing model, multi-input single-output (MISO) model of the problem is transformed into multi-input multi-output (MIMO) model using fractionally spaced ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • An identity-based group-oriented threshold encryption scheme

    Publication Year: 2011, Page(s):30 - 33
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (117 KB) | HTML iconHTML

    In many broadcast systems, it is useful to send messages to some (not all) members of the whole group. And the ciphertext can only be decrypted with the participation of a certain number of receivers. In this paper, we construct an efficient identity-based group-oriented threshold encryption scheme. The sender can encrypt a single message for a dynamic k-member group which can be a subset of the n... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Evolution of privacy-preserving data publishing

    Publication Year: 2011, Page(s):34 - 37
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (76 KB) | HTML iconHTML

    To achieve privacy protection better in data publishing, data must be sanitized before release. Research on protecting individual privacy and data confidentiality has received contributions from many fields. In order to grasp the development of privacy preserving data publishing, we discussed the evolution of this theme, focused on privacy mechanism, data utility and its metrics. The privacy mecha... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • AES finalists implementation for GPU and multi-core CPU based on OpenCL

    Publication Year: 2011, Page(s):38 - 42
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (222 KB) | HTML iconHTML

    Benefit from the OpenCL (Open Computing Language), applications can be easily transplanted among different GPUs, multi-core CPUs, and other processors. In this paper, we present implementation of AES finalists (Rijndael, Serpent, Twofish) in XTS mode, based on OpenCL. Benchmark testing is performed on 4 mainstream GPUs and multi-core CPUs. The results are also compared with implementations based o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Co-occurrence matrix features for fingerprint verification

    Publication Year: 2011, Page(s):43 - 46
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (138 KB) | HTML iconHTML

    In this paper, an enhanced image-based fingerprint verification algorithm is presented that improves matching accuracy by overcoming the shortcomings of previous methods due to poor image quality. It reduces multi-spectral noise by enhancing a fingerprint image to accurately and reliably determine a reference point and then extracts a 129 X 129 block, making the reference point its center. From th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of embedded fingerprint identification system based on DSP

    Publication Year: 2011, Page(s):47 - 50
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (90 KB) | HTML iconHTML

    The system proposed by paper, which uses Micro Control Unit (MCU), fixed-point Digital Signal Processor (DSP) and FPS200 fingerprint sensor, is an embedded system. Paper introduces the system's principle, circuit design and algorithm flow. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The multi-QR codes extraction method in illegible image based on contour tracing

    Publication Year: 2011, Page(s):51 - 56
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (272 KB) | HTML iconHTML

    In this paper, a multi-QR codes extraction method in illegible images is proposed. This method utilizes the contour tracing and corner detection technique for identification of key corner points, and then locates the potential code region by the finder pattern. The timing patterns are used to confirm a real code region. Moreover, image pre-processing procedures are merged in order to reduce the ti... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A new DWT & multi-strategy watermark embedding algorithm

    Publication Year: 2011, Page(s):57 - 60
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (248 KB) | HTML iconHTML

    A novel blind digital image watermarking algorithm based on multi strategy is put forward in this paper. The watermark is embedded in multi-resolution wavelet transform domain of the original image. Based on spread spectrum techniques, the algorithm is composed of new technique to improve robustness, imperceptibility and security. In this technique, we interlace several copies of watermark in diff... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Formation of checkerboard patterns in one-dimensional computational verb cellular networks

    Publication Year: 2011, Page(s):61 - 64
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (202 KB) | HTML iconHTML

    Computational verb cellular network (CVCN) is a new kind of cellular computational platform where the local rules are computational verb rules. In this paper, the mechanism of forming checkerboard patterns in one-dimensional CVCN (1D CVCN) is studied mathematically. Three conditions of generating checkerboard patterns are proved mathematically based on the decomposition of global evolving patterns... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Frontal face generation from profile face image

    Publication Year: 2011, Page(s):65 - 68
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (155 KB) | HTML iconHTML

    This paper presents an efficient method to generate the frontal face image from the given profile face image. It uses principal component analysis (PCA) in conjunction with linear object class (LOC) method. The proposed method is tested on CMU PIE face database and it is found to be significant improvement over the well known linear object class method. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational verb color image interpolation

    Publication Year: 2011, Page(s):69 - 72
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (419 KB) | HTML iconHTML

    In computational verb(CV) image processing, the evolving function of a spatial verb denotes the changes of gray-values along spatial coordinates. The spatial configurations and the changes of the brightness function as two kinds of the evolving functions of spatial verbs. In our previous work, gray level profiles and contour shapes were used to construct edge models for describing edges of image, ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Motion vector and mode selection based fragile video watermarking algorithm

    Publication Year: 2011, Page(s):73 - 76
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (95 KB) | HTML iconHTML

    According to H.264 video encoding standard, a fragile video watermark algorithm based on motion vector and mode selection is proposed. By selecting the motion vector with small splitting and minimizing the Laragian function in motion search to embed the fragile watermark into the motion vector that have the best rate distortion capability. Experimental results show that the proposed algorithm can ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Computational verb similarity between verbs with distortions of time

    Publication Year: 2011, Page(s):77 - 80
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (88 KB) | HTML iconHTML

    Computational verb similarities(CVS) play critical roles in researches and applications of computational verb theory. In the existing literature, CVS was mainly calculated between two computational verbs, of which the life spans are the same. In this paper, by taking advantages of different data processing algorithms, the methods of calculating the CVS between computational verbs of which the life... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Composite spiral antenna with π snowflake fractal PBG structure designed for modern RFID system

    Publication Year: 2011, Page(s):81 - 84
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (434 KB) | HTML iconHTML

    Utilizing the advantages of planar equiangular spiral antennas and Archimedean spiral antennas, a composite spiral antenna structure were designed and simulated. Due to the in-phase reflection and photon localization characteristic of PBG structure, the antenna radiation performance could be improved and the bandwidth be broaden. Considering engineering processes, the influences of the substrate's... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Low power design of RFID tags

    Publication Year: 2011, Page(s):85 - 88
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (119 KB) | HTML iconHTML

    Low-power design is essential for passive RFID tags to achieve expected level of sensitivity. Considering the mechanism of the passive tags powered, a low peak power is also important. This paper is focused on optimization on peak power. A tag IC is also presented. The IC, which is compatible with the EPC C1G2 RFID protocol, was designed and fabricated successfully by using a 0.18μm process... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Design of low power low noise amplifier for portable electrocardiogram recording system applications

    Publication Year: 2011, Page(s):89 - 92
    Cited by:  Papers (2)
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (163 KB) | HTML iconHTML

    Electrocardiogram (ECG) signals have the characteristics of low amplitude and low frequency. A low-power, low-noise and low voltage amplifier is required for long term ECG signals monitoring. Chopping technique is an efficient approach to decrease the 1/f noise of CMOS amplifiers, but conventional chopper amplifier consumes large power because it required a wide-band amplifier exceed chopping freq... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Capacity comparison of UWB system based on combined Cosinusoid Gaussian pulse

    Publication Year: 2011, Page(s):93 - 96
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (101 KB) | HTML iconHTML

    This paper studies the channel capacity with respect to Cosinusoid Gaussian serial pulses of MPPM-TH-UWB communication systems under additive white Gaussian noise (AWGN) channel. It mainly makes comparison between optimum combined cosinusoid gaussian pulse and 2nd devative Gaussian pulse conforming to the FCC regulations. The simulation results demonstrate that the capacity is influenced by varian... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • 3D image skeleton algorithms

    Publication Year: 2011, Page(s):97 - 100
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (109 KB) | HTML iconHTML

    Skeletons are “compact” representations of the original objects, which are useful for many visualization tasks including medical imaging, computer graphics, computer-aided design. We introduce the basic concepts and properties of 3D skeletonization in this paper. Then we present the techniques of 3D skeletonization, especially in thinning. We also discuss the problems confronted in t... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • PSO-based fuzzy image mobile robot systems design

    Publication Year: 2011, Page(s):101 - 105
    Request permission for commercial reuse | Click to expandAbstract | PDF file iconPDF (139 KB) | HTML iconHTML

    The novel particle swarm optimization (PSO) learning algorithm is applied to automatically generate the fuzzy systems with the image processing technology in achieving the adaptability of the embedded mobile robot. The omni-directional image mathematical model for the mobile robot system is established to represent the indoor environment. The embedded fuzzy control rules are automatically extracte... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.