59 research outputs found
Secure Fractal Image Coding
In recent work, various fractal image coding methods are reported, which
adopt the self-similarity of images to compress the size of images. However,
till now, no solutions for the security of fractal encoded images have been
provided. In this paper, a secure fractal image coding scheme is proposed and
evaluated, which encrypts some of the fractal parameters during fractal
encoding, and thus, produces the encrypted and encoded image. The encrypted
image can only be recovered by the correct key. To keep secure and efficient,
only the suitable parameters are selected and encrypted through in-vestigating
the properties of various fractal parameters, including parameter space,
parameter distribu-tion and parameter sensitivity. The encryption process does
not change the file format, keeps secure in perception, and costs little time
or computational resources. These properties make it suitable for secure image
encoding or transmission.Comment: 21 pages, 8 figures. To be submitte
On the Robustness of the Delay-Based Fingerprint Embedding Scheme
The delay-based fingerprint embedding was recently proposed to support more
users in secure media distribution scenario. In this embedding scheme, some
users are assigned the same fingerprint code with only different embedding
delay. The algorithm's robustness against collusion attacks is investigated.
However, its robustness against common desynchronization attacks, e.g.,
cropping and time shifting, is not considered. In this paper, desynchronization
attacks are used to break the delay-based fingerprint embedding algorithm. To
improve the robustness, two means are proposed to keep the embedded fingerprint
codes synchronized, i.e., adding a synchronization fingerprint and adopting the
relative delay to detect users. Analyses and experiments are given to show the
improvements.Comment: 9 pages,6 figure
One-way Hash Function Based on Neural Network
A hash function is constructed based on a three-layer neural network. The
three neuron-layers are used to realize data confusion, diffusion and
compression respectively, and the multi-block hash mode is presented to support
the plaintext with variable length. Theoretical analysis and experimental
results show that this hash function is one-way, with high key sensitivity and
plaintext sensitivity, and secure against birthday attacks or
meet-in-the-middle attacks. Additionally, the neural network's property makes
it practical to realize in a parallel way. These properties make it a suitable
choice for data signature or authentication.Comment: 7 pages,5 figures,submitte
Vision-based Robotic Grasping From Object Localization, Object Pose Estimation to Grasp Estimation for Parallel Grippers: A Review
This paper presents a comprehensive survey on vision-based robotic grasping.
We conclude three key tasks during vision-based robotic grasping, which are
object localization, object pose estimation and grasp estimation. In detail,
the object localization task contains object localization without
classification, object detection and object instance segmentation. This task
provides the regions of the target object in the input data. The object pose
estimation task mainly refers to estimating the 6D object pose and includes
correspondence-based methods, template-based methods and voting-based methods,
which affords the generation of grasp poses for known objects. The grasp
estimation task includes 2D planar grasp methods and 6DoF grasp methods, where
the former is constrained to grasp from one direction. These three tasks could
accomplish the robotic grasping with different combinations. Lots of object
pose estimation methods need not object localization, and they conduct object
localization and object pose estimation jointly. Lots of grasp estimation
methods need not object localization and object pose estimation, and they
conduct grasp estimation in an end-to-end manner. Both traditional methods and
latest deep learning-based methods based on the RGB-D image inputs are reviewed
elaborately in this survey. Related datasets and comparisons between
state-of-the-art methods are summarized as well. In addition, challenges about
vision-based robotic grasping and future directions in addressing these
challenges are also pointed out.Comment: This is a pre-print of an article published in Artificial
Intelligence Review. The final authenticated version is available online at:
https://doi.org/10.1007/s10462-020-09888-5. Related refs are summarized at:
https://github.com/GeorgeDu/vision-based-robotic-graspin
On the Performance of Joint Fingerprint Embedding and Decryption Scheme
Till now, few work has been done to analyze the performances of joint
fingerprint embedding and decryption schemes. In this paper, the security of
the joint fingerprint embedding and decryption scheme proposed by Kundur et al.
is analyzed and improved. The analyses include the security against
unauthorized customer, the security against authorized customer, the
relationship between security and robustness, the relationship between
secu-rity and imperceptibility and the perceptual security. Based these
analyses, some means are proposed to strengthen the system, such as multi-key
encryp-tion and DC coefficient encryption. The method can be used to analyze
other JFD schemes. It is expected to provide valuable information to design JFD
schemes.Comment: 10 pages,9 figures. To be submitte
Deep Learning Based Robot for Automatically Picking up Garbage on the Grass
This paper presents a novel garbage pickup robot which operates on the grass.
The robot is able to detect the garbage accurately and autonomously by using a
deep neural network for garbage recognition. In addition, with the ground
segmentation using a deep neural network, a novel navigation strategy is
proposed to guide the robot to move around. With the garbage recognition and
automatic navigation functions, the robot can clean garbage on the ground in
places like parks or schools efficiently and autonomously. Experimental results
show that the garbage recognition accuracy can reach as high as 95%, and even
without path planning, the navigation strategy can reach almost the same
cleaning efficiency with traditional methods. Thus, the proposed robot can
serve as a good assistance to relieve dustman's physical labor on garbage
cleaning tasks.Comment: 8 pages, 13 figures,TCE accepte
Synthetic Data Generation and Adaption for Object Detection in Smart Vending Machines
This paper presents an improved scheme for the generation and adaption of
synthetic images for the training of deep Convolutional Neural Networks(CNNs)
to perform the object detection task in smart vending machines. While
generating synthetic data has proved to be effective for complementing the
training data in supervised learning methods, challenges still exist for
generating virtual images which are similar to those of the complex real scenes
and minimizing redundant training data. To solve these problems, we consider
the simulation of cluttered objects placed in a virtual scene and the
wide-angle camera with distortions used to capture the whole scene in the data
generation process, and post-processed the generated images with a
elaborately-designed generative network to make them more similar to the real
images. Various experiments have been conducted to prove the efficiency of
using the generated virtual images to enhance the detection precision on
existing datasets with limited real training data and the generalization
ability of applying the trained network to datasets collected in new
environment.Comment: 9 pages, 9 figure
Smart Guiding Glasses for Visually Impaired People in Indoor Environment
To overcome the travelling difficulty for the visually impaired group, this
paper presents a novel ETA (Electronic Travel Aids)-smart guiding device in the
shape of a pair of eyeglasses for giving these people guidance efficiently and
safely. Different from existing works, a novel multi sensor fusion based
obstacle avoiding algorithm is proposed, which utilizes both the depth sensor
and ultrasonic sensor to solve the problems of detecting small obstacles, and
transparent obstacles, e.g. the French door. For totally blind people, three
kinds of auditory cues were developed to inform the direction where they can go
ahead. Whereas for weak sighted people, visual enhancement which leverages the
AR (Augment Reality) technique and integrates the traversable direction is
adopted. The prototype consisting of a pair of display glasses and several low
cost sensors is developed, and its efficiency and accuracy were tested by a
number of users. The experimental results show that the smart guiding glasses
can effectively improve the user's travelling experience in complicated indoor
environment. Thus it serves as a consumer device for helping the visually
impaired people to travel safely.Comment: 9 pages,15 figures, IEEE transaction on consumer electronics receive
Facial Pose Estimation by Deep Learning from Label Distributions
Facial pose estimation has gained a lot of attentions in many practical
applications, such as human-robot interaction, gaze estimation and driver
monitoring. Meanwhile, end-to-end deep learning-based facial pose estimation is
becoming more and more popular. However, facial pose estimation suffers from a
key challenge: the lack of sufficient training data for many poses, especially
for large poses. Inspired by the observation that the faces under close poses
look similar, we reformulate the facial pose estimation as a label distribution
learning problem, considering each face image as an example associated with a
Gaussian label distribution rather than a single label, and construct a
convolutional neural network which is trained with a multi-loss function on
AFLW dataset and 300W-LP dataset to predict the facial poses directly from
color image. Extensive experiments are conducted on several popular benchmarks,
including AFLW2000, BIWI, AFLW and AFW, where our approach shows a significant
advantage over other state-of-the-art methods.Comment: 9 pages,5 figures, Accepted by ICCV 2019 worksho
Security Analysis of A Chaos-based Image Encryption Algorithm
The security of Fridrich Image Encryption Algorithm against brute-force
attack, statistical attack, known-plaintext attack and select-plaintext attack
is analyzed by investigating the properties of the involved chaotic maps and
diffusion functions. Based on the given analyses, some means are proposed to
strengthen the overall performance of the focused cryptosystem.Comment: 16 pages,4 figure
- …