31 research outputs found

    基于博弈的多目标弹药调度策略优化研究

    Get PDF
    针对作战部队弹药调度策略问题,综合考虑不同作战部队对弹药调度时间因素和安全因素需求程度的差异,通过博弈模型对多目标问题进行度量,进而结合遗传算法对弹药调度策略进行优化。仿真结果表明,本文构建的博弈模型能够更加合理地为不同环境下具有差异化需求的弹药调度策略进行优化。深圳市科技计划(JSGG20170414090428464)资助项目国家自然科学基金(61671394)资助项

    農業・食料の世界的枠組み形成と国際交渉にかかわる研究

    Get PDF
    2012年度農林中央金庫研究委託事業報告書 研究総括:早稲田大学社会科学総合学術院 弦間正彦 p285-323を欠く商品差別化の手段としての地理的表示制度の概要と課題 / 商品差別化の消費者行動に与える影響の計量分析手法の事例分析の概要と課題 / アジア太平洋地域における貿易とFTAネットワーク / 日本の農産物需要構造の推移と今後の見通し / 消費者が示す食品価値を定量化するための非仮説的選好検定手法 / EUの地理的表示を含む食品品質表示と消費者行動分析-表示規制は意味をもつか / 牛肉のトレーサビリティ、米の原産国・フードマイル表示を通じた商品差別化の表示の韓国の消費者行動への影響分析-韓米・韓中自由貿易協定のインプリケーション / 各国における地理的表示の概要と商標登録制度との関係 / 地理的表示の保護制度について-EUの地理的表示保護制度と我が国への制度の導入 / 日本の地理的表示制度 / 長野県原産地呼称管理制度 / 最高の品種を目指して-ジャスミン米の市場競争と保

    A study of secure image authentication schemes with tampering proof and remedy based on error correcting code

    No full text
    摘要 在現今,發展一個系統,防止非法竄改和複製是非常重要任務,數位浮水印也似乎是多數地方之解決辦法,至今數位浮水印已經公開眾多演算法,多半也只是用於版權保護,至於其他安全保護,如影像認證服務,數位浮水印仍然存在許多問題有待解決。 最近一些研究所提演算法,不只能夠偵測到竄改位置,也能夠盡可能恢復原來資訊,如Chan and Chang (2007)提倡一個基於錯誤更正碼之影像認證機制,嘗試解決以上問題,多數情形都有不錯表現,但是卻包含一個安全漏洞。 本論文提倡一個基於錯誤更正碼影像認證演算法,不只能夠偵測到竄改位置,也能夠回復原來資訊,達到接受品質,且避免了Chan and Chang安全漏洞,再者本論文進一步提倡改良式modified prediction,再提升影像認證演算法之回復品質。 關鍵字:影像認證,竄改偵測,竄改回復,漢明碼ABSTRACT In this context, it is important to develop systems for protection against duplication, copyright, and the authentication of content. Watermarking seems to be an alternative solution for intensifying the security of multimedia documents. Until now, the majority of publications in the field of watermarking mainly involve the copyrighting of still images. Other security services, such as image content authentication, are still peripheral, and many fundamental questions remain. Recently, there existed some schemes that not only tried to localize tampered areas but also tried to restore a rough approximation of the damaged areas. Chan and Chang (2007) proposed a new scheme by using the Hamming code. This effectively detected and eliminated burst bit errors and the recovered pixels in detailed areas and could actually gain very high clarity. In this thesis, the potential weakness of the Chan-Chang scheme will be analyzed and the experimental results will show that a security problem does exist. Therefore, in order to benefit from the excellent advantages of the Chan-Chang scheme, it is worthwhile to propose an improved scheme based on the Hamming code that will enhance security. The improved scheme not only overcomes the potential security weakness of the Chan-Chang scheme but also takes advantage of and enhances the property of the (7,4) Hamming code rule. Furthermore, the experimental results of adopting modified prediction are somewhat better than that of the original pixel prediction scheme of JPEG-LS. The experimental results show that the proposed scheme can withstand the noise-adding and tampering attacks. Moreover, performances of detecting and recovering are of high accuracy and of good quality. It is worthwhile to note that the ability of the lossless image remedy is analyzed under different tampered sizes and transmission errors. Keywords: Image authentication; Tampering proof; Tamper remedy; Hamming code.TABLE OF CONTENTS 誌謝辭 I 摘要 II Abstract III Table of Contents IV List of Figures VII List of Tables IX Chapter 1. Introduction 1 1.1. Motivation 1 1.2. Image authentication 2 1.3. Copyright watermarking 4 1.3.1. Classification of watermarking 4 1.3.2. Classification of imitations 6 1.3.3. Properties of copyright watermarking 6 1.4. Steganography 8 1.5. Error correcting codes 12 1.5.1. Linear codes 12 1.5.2. CRC codes 14 1.5.3. Weight distribution 15 1.5.4. Hamming Distance 15 1.5.5. Bit error rate (ε) 17 1.5.6. Probability of uncorrected error (Puc) 18 1.5.7. Probability of undetected error (Pud) 19 1.5.8. Well-designed code 20 1.6. Contribution 21 1.7. Organization of this thesis 22 Chapter 2. Previous work 23 2.1. Relative research 23 2.2. The Chan-Chang scheme 28 2.2.1. Embedding procedure of the Chan-Chang scheme 28 2.2.2. Detecting procedure of the Chan-Chang scheme 31 2.2.3. Recovering procedure of the Chan-Chang scheme 33 2.2.4. Security analysis of the Chan-Chang scheme 36 Chapter 3. The proposed scheme 41 3.1. Selection of error correcting codes 41 3.2. The proposed algorithm for image authentication 45 3.2.1. The embedding procedure 45 3.2.2. The detection procedure 47 3.2.3. The recovery procedure 49 3.3. Experimental results and discussions for image authentication 51 3.3.1. Noise-adding Attack 53 3.3.2. Tampering attack 54 3.3.3. Discussions 59 Chapter 4. The new Algorithm for Region of Interest (ROI) authentication 66 4.1. ROI authentication 66 4.2. The proposed algorithm for ROI authentication 67 4.2.1. The embedding procedure 70 4.2.2. The detecting procedure 73 4.2.3. The correcting procedure 74 4.3. Experimental results and discussions 75 4.3.1. Experimental results 75 4.3.2. Discussions 82 Chapter 5. Conclusions 85 APPENDIX A: The embedding algorithm of chapter 3 in matlab 87 APPENDIX B: The detecting and correcting algorithm of chapter 3 in matlab 89 References 98 INDEX 10

    A study of secure image authentication schemes with tampering proof and remedy based on error correcting code

    No full text
    摘要 在現今,發展一個系統,防止非法竄改和複製是非常重要任務,數位浮水印也似乎是多數地方之解決辦法,至今數位浮水印已經公開眾多演算法,多半也只是用於版權保護,至於其他安全保護,如影像認證服務,數位浮水印仍然存在許多問題有待解決。 最近一些研究所提演算法,不只能夠偵測到竄改位置,也能夠盡可能恢復原來資訊,如Chan and Chang (2007)提倡一個基於錯誤更正碼之影像認證機制,嘗試解決以上問題,多數情形都有不錯表現,但是卻包含一個安全漏洞。 本論文提倡一個基於錯誤更正碼影像認證演算法,不只能夠偵測到竄改位置,也能夠回復原來資訊,達到接受品質,且避免了Chan and Chang安全漏洞,再者本論文進一步提倡改良式modified prediction,再提升影像認證演算法之回復品質。 關鍵字:影像認證,竄改偵測,竄改回復,漢明碼ABSTRACT In this context, it is important to develop systems for protection against duplication, copyright, and the authentication of content. Watermarking seems to be an alternative solution for intensifying the security of multimedia documents. Until now, the majority of publications in the field of watermarking mainly involve the copyrighting of still images. Other security services, such as image content authentication, are still peripheral, and many fundamental questions remain. Recently, there existed some schemes that not only tried to localize tampered areas but also tried to restore a rough approximation of the damaged areas. Chan and Chang (2007) proposed a new scheme by using the Hamming code. This effectively detected and eliminated burst bit errors and the recovered pixels in detailed areas and could actually gain very high clarity. In this thesis, the potential weakness of the Chan-Chang scheme will be analyzed and the experimental results will show that a security problem does exist. Therefore, in order to benefit from the excellent advantages of the Chan-Chang scheme, it is worthwhile to propose an improved scheme based on the Hamming code that will enhance security. The improved scheme not only overcomes the potential security weakness of the Chan-Chang scheme but also takes advantage of and enhances the property of the (7,4) Hamming code rule. Furthermore, the experimental results of adopting modified prediction are somewhat better than that of the original pixel prediction scheme of JPEG-LS. The experimental results show that the proposed scheme can withstand the noise-adding and tampering attacks. Moreover, performances of detecting and recovering are of high accuracy and of good quality. It is worthwhile to note that the ability of the lossless image remedy is analyzed under different tampered sizes and transmission errors. Keywords: Image authentication; Tampering proof; Tamper remedy; Hamming code.TABLE OF CONTENTS 誌謝辭 I 摘要 II Abstract III Table of Contents IV List of Figures VII List of Tables IX Chapter 1. Introduction 1 1.1. Motivation 1 1.2. Image authentication 2 1.3. Copyright watermarking 4 1.3.1. Classification of watermarking 4 1.3.2. Classification of imitations 6 1.3.3. Properties of copyright watermarking 6 1.4. Steganography 8 1.5. Error correcting codes 12 1.5.1. Linear codes 12 1.5.2. CRC codes 14 1.5.3. Weight distribution 15 1.5.4. Hamming Distance 15 1.5.5. Bit error rate (ε) 17 1.5.6. Probability of uncorrected error (Puc) 18 1.5.7. Probability of undetected error (Pud) 19 1.5.8. Well-designed code 20 1.6. Contribution 21 1.7. Organization of this thesis 22 Chapter 2. Previous work 23 2.1. Relative research 23 2.2. The Chan-Chang scheme 28 2.2.1. Embedding procedure of the Chan-Chang scheme 28 2.2.2. Detecting procedure of the Chan-Chang scheme 31 2.2.3. Recovering procedure of the Chan-Chang scheme 33 2.2.4. Security analysis of the Chan-Chang scheme 36 Chapter 3. The proposed scheme 41 3.1. Selection of error correcting codes 41 3.2. The proposed algorithm for image authentication 45 3.2.1. The embedding procedure 45 3.2.2. The detection procedure 47 3.2.3. The recovery procedure 49 3.3. Experimental results and discussions for image authentication 51 3.3.1. Noise-adding Attack 53 3.3.2. Tampering attack 54 3.3.3. Discussions 59 Chapter 4. The new Algorithm for Region of Interest (ROI) authentication 66 4.1. ROI authentication 66 4.2. The proposed algorithm for ROI authentication 67 4.2.1. The embedding procedure 70 4.2.2. The detecting procedure 73 4.2.3. The correcting procedure 74 4.3. Experimental results and discussions 75 4.3.1. Experimental results 75 4.3.2. Discussions 82 Chapter 5. Conclusions 85 APPENDIX A: The embedding algorithm of chapter 3 in matlab 87 APPENDIX B: The detecting and correcting algorithm of chapter 3 in matlab 89 References 98 INDEX 10

    Image Watermarking Based on Block Mean Value Quantization

    No full text
    [[abstract]]基於區塊平均值量化的影像浮水印技術 摘要 自從網際網路風行以來,資訊流通快速,多媒體的著作財產權,逐漸受到嚴厲的考驗,版權保護將是未來首要的課題。本論文將以數位浮水印的技術來保護影像的版權,主要應用的技術如下所示: 1 混沌擾亂技術: 此為數位浮水印的前置演算法,為了資訊安全和不可視的要求,數位浮水印必須先行轉換成類似亂碼雜訊,再嵌入數位影像;然而取出必須利用交付版權所有者保留的密鑰,才能還原成真正的數位浮水印。所以即使有心和有能力的人,花費相當昂貴的時間和金錢後,得到的也只是無意義的資訊。 2 錯誤更正碼 此為數位浮水印的加強演算法,這裡使用了[7、4]漢明碼,數位浮水印嵌入前先行編碼和取出後再行解碼,本法可以簡單有效地加強數位浮水印的強韌性。 3 區塊平均值量化 此為數位浮水印的嵌入和取出處理演算法,本法利用JPEG對於平均值刻意保護的特性,以及noise的零平均值特性。所以在惡意的攻擊,都能有不錯的強韌性。而且本技術使用了空間領域和不需要原圖還原的方式,大量節省了儲存原圖的記憶空間。 為了證明本法的可行性,也利用了JPEG壓縮和noise干擾來進行攻擊。包括多種不同的JPEG壓縮倍率,和加法性雜訊、反轉性雜訊、乘法性雜訊三種不同主要的雜訊。最後自行開發人機介面視窗程式,方便使用者操作。而且和數位浮水印優異的上市產品進行各項比較,以證明本法的實用性和有效性。[[abstract]]Image Watermarking Based on Block Mean Value Quantization Student: Ren-Der Lin Advisor: Dr Chien-Cheng Tseng Department of Computer and Communication Engineering National Kaohsiung First University of Science and Technology Abstract The information interchange is very fast since internet is invented The illegal copy of the electronic multimedia become easier so the copyright protection is important research topic now This thesis presents a novel method for inserting binary watermark into image for protection The details of the method are given as follows: 1 Toral Automorphism It is a preprocessing algorithm of our digital watermarking scheme For the purposes of security and invisibility the binary watermark must be converted into noise like image and then insert into digital image The extracted watermark must have a private key of the copyright owner to restore the noise like image 2 Error Correcting Code This is an enhanced algorithm for the robustness of our watermarking scheme We use [7、4]Hamming code here 3 Block DC Value Quantization This is a embedding and extracting algorithm of our watermarking scheme this method uses two major image processing characteristics One is the DC Value invariant characteristic for JPEG compression the other is the zero mean characteristic of noise This algorithm performs in the space domain and watermark can be extracted without requiring the original image In order to show the effectiveness we also apply the compression of JPEG and interference of noise to attack the watermarking scheme In the JPEG attack we compare the performance for various JPEG compression ratios In the noise interference attack we use three major noises that are Gaussian-white noise salt & pepper noise and speckle noise Finally we develop the graphic user interference (GUI) window program for our scheme and compare it with the market product to demonstrate the effectiveness of our metho

    快速热处理多孔硅的蓝光发射

    No full text

    白光LED现状和问题

    No full text
    白光LED是21世纪引人瞩目的绿色光源,具有广阔的市场与潜在照明应用前景。该文就白光LED混色基本原理、光学性能、知识产权战略及发展中瓶颈、亟待解决的新设计、新技术工艺问题作了简要评述,以期能引起各方面重视,把握机遇、推动我国白光LED固体新光源健康发展

    制备溶液pH对CuO—ZnO/Al2O3催化剂前体物相及其CO水汽变换反应活性的影响

    No full text
    用X射线衍射、微分热重分析、程序升温还原、N2吸附、N2O滴定及常压微反活性评价技术考察了制备溶液pH对CuO—ZnO/Al2O3催化剂前体物相、催化剂物性参数及CO水汽变换反应活性的影响。实验结果表明,催化剂前体中主要存在3种物相:Cu2CO3(OH)2、(Cu,Zn)2CO3(OH)2和(Cu,Zn)6Al2(OH)16CO3·4H2O。随着pH的升高,Cu2CO3(OH)2和(Cu,Zn)2CO3(OH)2的含量先增加后减少,而(Cu,zn)6Al2(OH)16CO3·4H2O的含量则随着pH的升高单调上升。焙烧后的试样中形成的CuO—ZnO固溶体越多,CO水汽变换反应活性越高。实验结果表明.CO水汽变换反应是一个结构敏感型反应

    金纳米粒子膜的电化学合成及SERS活性分析

    Get PDF
    Surface-enhanced Raman scattering(SERS)-active gold nanoparticles(AuNPs) films were prepared with a one-step electrochemical method. The orthogonal design was used to investigate the experimental conditions influencing the morphologies and the SERS activity of the AuNPs. A condition was found to obtain the optimal SERS activity. The SEM study reveals that the AuNPs films were composed of closely packed AuNPs. The Finite Difference Time Domain(FDTD) simulation result indicates that the coupling between particles plays an important role in the enhancement SERS of AuNPs

    生物质流化床富氧-水蒸气气化制备合成气研究

    No full text
    使用不同含水率的木粉为原料,以180-270 kg/h的进料速度在内径0.5 m、高9 m的常压流化床气化炉上进行了富氧-水蒸气气化制备合成气实验。考察了当量比、水蒸气配比、二次风以及原料含水率对气化温度、燃气组分、低位热值、气体产率、气化效率和碳转化率等参数的影响。结果显示:当量比为0.25-0.27之间,水蒸气配比0.4时,H2含量最高可达28.7%,H2/CO为0.94,燃气热值9.9 MJ/m^3,气化效率大于75%,碳转化率大于97%;提高二次风比率可明显降低焦油含量,在总当量比0.29、二次风比率25%时焦油含量为49 mg/m^3;原料水分增加,气体质量下降,含水率以不超过20%为宜
    corecore