158 research outputs found

    One-shot ultraspectral imaging with reconfigurable metasurfaces

    Full text link
    One-shot spectral imaging that can obtain spectral information from thousands of different points in space at one time has always been difficult to achieve. Its realization makes it possible to get spatial real-time dynamic spectral information, which is extremely important for both fundamental scientific research and various practical applications. In this study, a one-shot ultraspectral imaging device fitting thousands of micro-spectrometers (6336 pixels) on a chip no larger than 0.5 cm2^2, is proposed and demonstrated. Exotic light modulation is achieved by using a unique reconfigurable metasurface supercell with 158400 metasurface units, which enables 6336 micro-spectrometers with dynamic image-adaptive performances to simultaneously guarantee the density of spectral pixels and the quality of spectral reconstruction. Additionally, by constructing a new algorithm based on compressive sensing, the snapshot device can reconstruct ultraspectral imaging information (Δλ\Delta\lambda/λ\lambda~0.001) covering a broad (300-nm-wide) visible spectrum with an ultra-high center-wavelength accuracy of 0.04-nm standard deviation and spectral resolution of 0.8 nm. This scheme of reconfigurable metasurfaces makes the device can be directly extended to almost any commercial camera with different spectral bands to seamlessly switch the information between image and spectral image, and will open up a new space for the application of spectral analysis combining with image recognition and intellisense

    A salient edges detection algorithm of multi-sensor images and its rapid calculation based on PFCM kernel clustering

    Get PDF
    AbstractMulti-sensor image matching based on salient edges has broad prospect in applications, but it is difficult to extract salient edges of real multi-sensor images with noises fast and accurately by using common algorithms. According to the analysis of the features of salient edges, a novel salient edges detection algorithm and its rapid calculation are proposed based on possibility fuzzy C-means (PFCM) kernel clustering using two-dimensional vectors composed of the values of gray and texture. PFCM clustering can overcome the shortcomings that fuzzy C-means (FCM) clustering is sensitive to noises and possibility C-means (PCM) clustering tends to find identical clusters. On this basis, a method is proposed to improve real-time performance by compressing data sets based on the idea of data reduction in the field of mathematical analysis. In addition, the idea that kernel-space is linearly separable is used to enhance robustness further. Experimental results show that this method extracts salient edges for real multi-sensor images with noises more accurately than the algorithm based on force fields and the FCM algorithm; and the proposed method is on average about 56 times faster than the PFCM algorithm in real time and has better robustness

    Bool Network: An Open, Distributed, Secure Cross-chain Notary Platform

    Get PDF
    With the advancement of blockchain technology, hundreds of cryptocurrencies have been deployed. The bloom of heterogeneous blockchain platforms brings a new emerging problem: typically, various blockchains are isolated systems, how to securely identify and/or transfer digital properties across blockchains? There are three main kinds of cross-chain approaches: sidechains/relays, notaries, and hashed time-lock contracts. Among them, notary-based cross-chain solutions have the best compatibility and user-friendliness, but they are typically centralized. To resolve this issue, we present Bool Network -- an open, distributed, secure cross-chain notary platform powered by MPC-based distributed key management over evolving hidden committees. More specifically, to protect the identities of the committee members, we propose a Ring verifiable random function (Ring VRF) protocol, where the real public key of a VRF instance can be hidden among a ring, which may be of independent interest to other cryptographic protocols. Furthermore, all the key management procedures are executed in the TEE, such as Intel SGX, to ensure the privacy and integrity of partial key components. A prototype of the proposed Bool Network is implemented in Rust language, using Polkadot Substrate

    Similar operation template attack on RSA-CRT as a case study

    Get PDF
    A template attack, the most powerful side-channel attack methods, usually first builds the leakage profiles from a controlled profiling device, and then uses these profiles to recover the secret of the target device. It is based on the fact that the profiling device shares similar leakage characteristics with the target device. In this study, we focus on the similar operations in a single device and propose a new variant of the template attack, called the similar operation template attack (SOTA). SOTA builds the models on public variables (e.g., input/output) and recovers the values of the secret variables that leak similar to the public variables. SOTA’s advantage is that it can avoid the requirement of an additional profiling device. In this study, the proposed SOTA method is applied to a straightforward RSA-CRT implementation. Because the leakage is (almost) the same in similar operations, we reduce the security of RSA-CRT to a hidden multiplier problem (HMP) over GF(q), which can be solved byte-wise using our proposed heuristic algorithm. The effectiveness of our proposed method is verified as an entire prime recovery procedure in a practical leakage scenario
    • …
    corecore