19 research outputs found
Using Capacitance Sensor to Extract Characteristic Signals of Dozing from Skin Surface
Skin is the largest organ of the human body and a physiological structure that is directly exposed to the environment. From a theoretical perspective, numerous physiological and psychological signals use the skin as a medium for input and output with the outside world. Therefore, the skin is considered an optimal signal interception point when developing noninvasive, direct, and rapid signal exploration devices. To date, skin signal interceptions are predominantly performed by measuring skin impedance. However, this method is prone to interference such as sweat secretion, salt accumulation on the skin, and muscle contractions, which may result in a substantial amount of interference and erroneous results. The present study proposes novel and effective methods for skin signal interception, such as using a nested probe as a sensor to measure capacitance to be further processed as physiological and psychological signals. The experimental results indicate that the capacitance curve for the transition between wakefulness and dozing exhibits significant changes. This change in the curve can be analyzed by computer programs to clearly and rapidly determine whether the subject has entered the initial phases of sleep
A Steganographic Method by Pixel-Value Differencing and Exploiting Modification Direction
[[abstract]]In this paper, we shall propose a new image steganographic scheme for embedding secret
messages into a gray-valued cover image and capable of producing a secret-embedded image
that is totally indistinguishable from the original image by the human eye. In addition, the
proposed scheme avoids the falling-off-boundary problem by using the Pixel-Value Differencing
(PVD) and the Exploiting Modification Direction (EMD). A cover image is partitioned into
non-overlapping blocks of four consecutive pixels. First, we derive two pieces of difference
value from four consecutive pixels by utilizing the PVD. The hiding capacity of the four consecutive
pixels depends on the two pieces of difference value. In other words, the smoother area
is, the less secret data can be hidden; on the contrary, the more edges an area has, the more secret
data can be embedded, and then secret data embedded by using the PVD. In order to provide
high payload capacity, the remainder of two average values of the four consecutive pixels can be
computed, and the two average values are capable of embedding secret data by using the EMD.
The embedded secret message can be extracted from the resulting stego-image without referencing
the original cover image. Moreover, a pseudo-random mechanism may be used to achieve
secrecy protection. The experimental results show that the proposed scheme is capable of providing
a great payload capacity, and the image quality of the embedded image is better than
PVD for a gray-level image
Password Authentication Schemes: Current Status and Key Issues
[[abstract]]Password authentication is one of the simplest and the
most convenient authentication mechanisms to deal with
secret data over insecure networks. It is more fre-
quently required in areas such as computer networks,
wireless networks, remote login systems, operation sys-
tems, and database management systems. In this paper,
we shall present the result of our survey through all cur-
rently available password-authentication-related schemes
and get them classified in terms of several crucial criteria.
To be critical, most of the existing schemes are vulnera-
ble to various attacks and fail to serve all the purposes an
ideal password authentication scheme should. In order to
see how different password authentication schemes com-
pare in different situations, we define all possible attacks
and goals that an ideal password authentication scheme
should withstand and achieve. We should hope that the
attacks and goals we offer here can also help future re-
searchers develop better schemes
Improved non-repudiable threshold proxy signature scheme with known signers
Abstract. In 2001, Hsu et al. proposed a non-repudiable threshold proxy signature with known signers. In their scheme, the proxy group cannot deny having signed the proxy signature if they did. However, Hsu et al.'s scheme is vulnerable to some attacks. A malicious original signer or malicious proxy signer can impersonate some other proxy signers to generate proxy signatures. In this article, we shall present our cryptanalysis of the Hsu et al.'s scheme. After that, we shall propose a new threshold proxy signature that can overcome the weaknesses
A novel authenticatable color visual secret sharing scheme using non-expanded meaningful shares
In this paper, a novel visual secret sharing scheme is presented to hide a secret image into two meaningful cover images which are called share images with no pixel expansion. Simultaneously, the proposed scheme embeds an extra confidential image in these two share images. People who gather the two share images can obtain the secret image by stacking them without any complex computation. After one of the share images is shifted for certain unit, people can get the extra confidential image by their visual system to check the validity of the revealed secret image. Except for sharing binary secret image, the proposed scheme can also be applied to color visual secret sharing scheme to hide color secret image into two meaningful color halftone images without any pixel expansion, and people can derive the extra confidential image for authentication by shifting one of the share images