2,115 research outputs found

    Efficient Video Authentication for H.264/AVC

    Get PDF
    This paper proposed a novel and efficient scheme to authenticate the H.264/AVC video. The scheme makes an accurate usage of the tree-structured motion compensation, motion estimation and Lagrangian optimization of the standard. Authentication information is embedded strictly based on the best mode decision strategy in the sense that if undergone any spatial and temporal attacks, the scheme can detect the tampering by the sensitive mode change. And the experimental results prove the effectiveness the algorithm against many transcoding and signal processing attacks. 1

    Robust Video Watermarking of H.264/AVC

    Full text link

    Systematic Review on Security and Privacy Requirements in Edge Computing: State of the Art and Future Research Opportunities

    Get PDF
    Edge computing is a promising paradigm that enhances the capabilities of cloud computing. In order to continue patronizing the computing services, it is essential to conserve a good atmosphere free from all kinds of security and privacy breaches. The security and privacy issues associated with the edge computing environment have narrowed the overall acceptance of the technology as a reliable paradigm. Many researchers have reviewed security and privacy issues in edge computing, but not all have fully investigated the security and privacy requirements. Security and privacy requirements are the objectives that indicate the capabilities as well as functions a system performs in eliminating certain security and privacy vulnerabilities. The paper aims to substantially review the security and privacy requirements of the edge computing and the various technological methods employed by the techniques used in curbing the threats, with the aim of helping future researchers in identifying research opportunities. This paper investigate the current studies and highlights the following: (1) the classification of security and privacy requirements in edge computing, (2) the state of the art techniques deployed in curbing the security and privacy threats, (3) the trends of technological methods employed by the techniques, (4) the metrics used for evaluating the performance of the techniques, (5) the taxonomy of attacks affecting the edge network, and the corresponding technological trend employed in mitigating the attacks, and, (6) research opportunities for future researchers in the area of edge computing security and privacy

    Digital Watermarking Authentication and Restoration for Chinese Calligraphy Images

    Get PDF
    In this paper, a semi-fragile watermarking method for authentication and automatic restoration of Chinese calligraphy images is proposed using the pinned sine transform (PST). The watermarking system can locate the content of image that has been tampered maliciously with high accuracy. In particular, the watermarking scheme is very sensitive to any texture alteration in the watermarked images, which is crucial for calligraphy image analysis. The tampered portions could be approximately restored. Results of simulation experiments are presented to demonstrate the effectiveness of the proposed method.</p

    Study of the Potts Model on the Honeycomb and Triangular Lattices: Low-Temperature Series and Partition Function Zeros

    Full text link
    We present and analyze low-temperature series and complex-temperature partition function zeros for the qq-state Potts model with q=4q=4 on the honeycomb lattice and q=3,4q=3,4 on the triangular lattice. A discussion is given as to how the locations of the singularities obtained from the series analysis correlate with the complex-temperature phase boundary. Extending our earlier work, we include a similar discussion for the Potts model with q=3q=3 on the honeycomb lattice and with q=3,4q=3,4 on the kagom\'e lattice.Comment: 33 pages, Latex, 9 encapsulated postscript figures, J. Phys. A, in pres
    corecore