33,657 research outputs found
A two-way regularization method for MEG source reconstruction
The MEG inverse problem refers to the reconstruction of the neural activity
of the brain from magnetoencephalography (MEG) measurements. We propose a
two-way regularization (TWR) method to solve the MEG inverse problem under the
assumptions that only a small number of locations in space are responsible for
the measured signals (focality), and each source time course is smooth in time
(smoothness). The focality and smoothness of the reconstructed signals are
ensured respectively by imposing a sparsity-inducing penalty and a roughness
penalty in the data fitting criterion. A two-stage algorithm is developed for
fast computation, where a raw estimate of the source time course is obtained in
the first stage and then refined in the second stage by the two-way
regularization. The proposed method is shown to be effective on both synthetic
and real-world examples.Comment: Published in at http://dx.doi.org/10.1214/11-AOAS531 the Annals of
Applied Statistics (http://www.imstat.org/aoas/) by the Institute of
Mathematical Statistics (http://www.imstat.org
Security of a biometric identity-based encryption scheme
Biometric identity-based encryption (Bio-IBE) is a kind of fuzzy
identity-based encryption (fuzzy IBE) where a ciphertext encrypted under an
identity w' can be decrypted using a secret key corresponding to the identity w
which is close to w' as measured by some metric. Recently, Yang et al. proposed
a constant-size Bio-IBE scheme and proved that it is secure against adaptive
chosen-ciphertext attack (CCA2) in the random oracle model. Unfortunately, in
this paper, we will show that their Bio-IBE scheme is even not chosen-plaintext
secure. Specifically, user w using his secret key is able to decrypt any
ciphertext encrypted under an identity w' even though w is not close to w'.Comment: Journal version of the paper will be appearing in International
Journal of Network Securit
- …