Authentication email has already been sent, please check your email box: and activate it as soon as possible.
You can login to My Profile and manage your email alerts.
If you haven’t received the email, please:
|
|
There are 4 papers published in subject: > since this site started. |
Results per page: |
Select Subject |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
1. Detection of image operation chains by residual-based hybrid features | |||
HU Lipin,YANG Gaobo | |||
Information Science and System Science 06 May 2020 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:Most existing image forensics approaches can effectively reveal image forgery by single image manipulation. However, two or more image manipulations, which are referred to be image operation chains, are usually involved in actual image tampering. In this paper, an image forensics approach is proposed to identify an image operation chain, which is possibly made up of three typical image manipulations including image sharping, scaling and median filtering. Since different image manipulations leave their distinct fingerprints, there also exist specific traces formed by interaction or superposition of different fingerprints left by multiple image manipulations in a specific order. Inspired by the rich image steganalytic features, we attempt to identify image operation chain by combining residue-based features in spatial domain and DCT domain. Experimental results show that the proposed approach achieves good detection result, which effectively discriminate multiple operation chains among different combinations of sharpening, scaling and median filtering. Moreover, the proposed method has good robustness against JPEG compression. | |||
TO cite this article:HU Lipin,YANG Gaobo. Detection of image operation chains by residual-based hybrid features[OL].[ 6 May 2020] http://en.paper.edu.cn/en_releasepaper/content/4751889 |
2. Load distribution and topological properties in urban road networks with metric spaces | |||
ZHENG Jianfeng | |||
Information Science and System Science 14 March 2015 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:By considering the length and "width" of the road in urban transportation systems, this paper empirically investigates the topological structure properties for three realistic urban road networks in the United States, where road segments and junctions are represented by links and nodes, respectively. Links and nodes are embedded in metric spaces and the small-world effect is discussed in regular networks with metric spaces. The "width" of a road can be alternatively described by its capacity. Distributions of degree, capacity and length for these three realistic urban road networks are mainly analyzed. Finally, load distribution in these urban road networks is also explored. | |||
TO cite this article:ZHENG Jianfeng. Load distribution and topological properties in urban road networks with metric spaces[OL].[14 March 2015] http://en.paper.edu.cn/en_releasepaper/content/4633114 |
3. Dynamics Analysis in a Delayed Two-Species Competition Model with Harvest Effort and Nonlinear Intraspecific Regulation | |||
LIU Chao, WANG Xiao-Min, Yue Wen-Quan | |||
Information Science and System Science 08 May 2014 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:In this paper, a mathematical model is established to investigate interaction and coexistence mechanism of two-species competition ecosystem with nonlinear intraspecific regulation. The combined dynamic effects of maturation delay and harvest effort on population dynamics are discussed. Conditions for existence of three nonnegative boundary equilibria and a unique interior equilibrium are investigated. Positivity and boundedness of solutions are analytically studied. By analyzing associated characteristic equation, local stability of the proposed model around nonnegative boundary equilibrium and interior equilibrium is discussed, respectively. Furthermore, global stability of the nonnegative boundary equilibrium is investigated based on an iterative technique. By constructing an appropriate Lyapunov functional, global stability of the unique interior equilibrium is also discussed. Numerical simulations are carried out to show consistency with theoretical analysis. | |||
TO cite this article:LIU Chao, WANG Xiao-Min, Yue Wen-Quan. Dynamics Analysis in a Delayed Two-Species Competition Model with Harvest Effort and Nonlinear Intraspecific Regulation[OL].[ 8 May 2014] http://en.paper.edu.cn/en_releasepaper/content/4594689 |
4. SMA: State Machine based Anti-spoofing | |||
LIU Bingyang,BI Jun | |||
Information Science and System Science 30 January 2013 | |||
Show/Hide Abstract | Cite this paper︱Full-text: PDF (0 B) | |||
Abstract:IP spoofing makes many Internet security threats hard to prevent. This paper proposes SMA, a state machine based anti-spoofing method for AS-level IP source address prefix validation. In SMA, each ordered pair of ASes is associated with a secret state machine. The AS edge routers use the state machine to generate and verify the signatures periodically and automatically. The signatures are tagged into the outgoing packets at the source AS edge router, and verified by the edge router at the destination AS. The state machine can transit very fast, so that the signatures change very fast to prevent signature-replay attacks. Compared with SPM, this system is more secure and more practical. We designed the protocol based on IPv6, and implemented a prototype. Our experiment results based on the prototype show that this system can filter 99.99% of spoofing packets. And the computation overhead is less than 14%. SMA is more than a system, but a theoretical model with high flexibility. It can take either fast pseudo random number generator or secure hash function as its signature generation algorithm. So SMA can be applied in many end-to-end verification situations. | |||
TO cite this article:LIU Bingyang,BI Jun. SMA: State Machine based Anti-spoofing[OL].[30 January 2013] http://en.paper.edu.cn/en_releasepaper/content/4514654 |
Select/Unselect all | For Selected Papers |
Saved Papers
Please enter a name for this paper to be shown in your personalized Saved Papers list
|
Results per page: |
About Sciencepaper Online | Privacy Policy | Terms & Conditions | Contact Us
© 2003-2012 Sciencepaper Online. unless otherwise stated