184 research outputs found
General Framework of Reversible Watermarking Based on Asymmetric Histogram Shifting of Prediction Error
This paper presents a general framework for the reversible watermarking based on asymmetric histogram shifting of prediction error, which is inspired by reversible watermarking of prediction error. Different from the conventional algorithms using single-prediction scheme to create symmetric histogram, the proposed method employs a multi-prediction scheme, which calculates multiple prediction values for the pixels. Then, the suitable value would be selected by two dual asymmetric selection functions to construct two asymmetric error histograms. Finally, the watermark is embedded in the two error histograms separately utilizing a complementary embedding strategy. The proposed framework provides a new perspective for the research of reversible watermarking, which brings about many benefits for the information security
Spatiotemporal Patterns Induced by Turing-Hopf Interaction and Symmetry on a Disk
Turing bifurcation and Hopf bifurcation are two important kinds of
transitions giving birth to inhomogeneous solutions, in spatial or temporal
ways. On a disk, these two bifurcations may lead to equivariant Turing-Hopf
bifurcations. In this paper, normal forms for three kinds of Turing-Hopf
bifurcations are given and the breathing, standing wave-like, and rotating
wave-like patterns are found in numerical examples
Experimental Realization of Asymmetric Phase-Covariant Quantum Cloning
While exact cloning of an unknown quantum state is prohibited by the
linearity of quantum mechanics, approximate cloning is possible and has been
used, e.g., to derive limits on the security of quantum communication
protocols. In the case of asymmetric cloning, the information from the input
state is distributed asymmetrically between the different output states. Here,
we consider asymmetric phase-covariant cloning, where the goal is to optimally
transfer the phase information from a single input qubit to different output
qubits. We construct an optimal quantum cloning machine for two qubits that
does not require ancilla qubits and implement it on an NMR quantum information
processor.Comment: 6 pages, 5 figure
Study on Leading Vehicle Detection at Night Based on Multisensor and Image Enhancement Method
Low visibility is one of the reasons for rear accident at night. In this paper, we propose a method to detect the leading vehicle based on multisensor to decrease rear accidents at night. Then, we use image enhancement algorithm to improve the human vision. First, by millimeter wave radar to get the world coordinate of the preceding vehicles and establish the transformation of the relationship between the world coordinate and image pixels coordinate, we can convert the world coordinates of the radar target to image coordinate in order to form the region of interesting image. And then, by using the image processing method, we can reduce interference from the outside environment. Depending on D-S evidence theory, we can achieve a general value of reliability to test vehicles of interest. The experimental results show that the method can effectively eliminate the influence of illumination condition at night, accurately detect leading vehicles, and determine their location and accurate positioning. In order to improve nighttime driving, the driver shortage vision, reduce rear-end accident. Enhancing nighttime color image by three algorithms, a comparative study and evaluation by three algorithms are presented. The evaluation demonstrates that results after image enhancement satisfy the human visual habits
The Application of Asymmetric Entangled States in Quantum Game
In the present letter, we propose a more general entangling operator to the
quantization of Cournot economic model, in which players can access to a
continuous set of strategies. By analyzing the relation between the von Neumann
entropy of the entangled state and the total profit of two players precisely,
we find that the total profit at the Nash equilibrium always achieves its
maximal value as long as the entropy tends to infinity. Moreover, since the
asymmetry is introduced in the entangled state, the quantum model shows some
kind of "encouraging" and "suppressing" effect in profit functions of different
players.Comment: 6 pages, 5 figure
An Architecture of Deterministic Quantum Central Processing Unit
We present an architecture of QCPU(Quantum Central Processing Unit), based on
the discrete quantum gate set, that can be programmed to approximate any
n-qubit computation in a deterministic fashion. It can be built efficiently to
implement computations with any required accuracy. QCPU makes it possible to
implement universal quantum computation with a fixed, general purpose hardware.
Thus the complexity of the quantum computation can be put into the software
rather than the hardware.Comment: 4 pages, 4 figures, 1 tabl
Improved Encrypted-Signals-Based Reversible Data Hiding Using Code Division Multiplexing and Value Expansion
Compared to the encrypted-image-based reversible data hiding (EIRDH) method, the encrypted-signals-based reversible data hiding (ESRDH) technique is a novel way to achieve a greater embedding rate and better quality of the decrypted signals. Motivated by ESRDH using signal energy transfer, we propose an improved ESRDH method using code division multiplexing and value expansion. At the beginning, each pixel of the original image is divided into several parts containing a little signal and multiple equal signals. Next, all signals are encrypted by Paillier encryption. And then a large number of secret bits are embedded into the encrypted signals using code division multiplexing and value expansion. Since the sum of elements in any spreading sequence is equal to 0, lossless quality of directly decrypted signals can be achieved using code division multiplexing on the encrypted equal signals. Although the visual quality is reduced, high-capacity data hiding can be accomplished by conducting value expansion on the encrypted little signal. The experimental results show that our method is better than other methods in terms of the embedding rate and average PSNR
- …