• Title/Summary/Keyword: Binary matrix

Search Result 200, Processing Time 0.021 seconds

Binary Sequence Family for Chaotic Compressed Sensing

  • Lu, Cunbo;Chen, Wengu;Xu, Haibo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.9
    • /
    • pp.4645-4664
    • /
    • 2019
  • It is significant to construct deterministic measurement matrices with easy hardware implementation, good sensing performance and good cryptographic property for practical compressed sensing (CS) applications. In this paper, a deterministic construction method of bipolar chaotic measurement matrices is presented based on binary sequence family (BSF) and Chebyshev chaotic sequence. The column vectors of these matrices are the sequences of BSF, where 1 is substituted with -1 and 0 is with 1. The proposed matrices, which exploit the pseudo-randomness of Chebyshev sequence, are sensitive to the initial state. The performance of proposed matrices is analyzed from the perspective of coherence. Theoretical analysis and simulation experiments show that the proposed matrices have limited influence on the recovery accuracy in different initial states and they outperform their Gaussian and Bernoulli counterparts in recovery accuracy. The proposed matrices can make the hardware implement easy by means of linear feedback shift register (LFSR) structures and numeric converter, which is conducive to practical CS.

Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

  • Tang, Zhenjun;Wang, Shuozhong;Zhang, Xinpeng;Wei, Weimin;Su, Shengjun
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.18-26
    • /
    • 2008
  • The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

  • PDF

PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

  • Yixiang Fang;Kai Tu;Kai Wu;Yi Peng;Yunqing Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.471-485
    • /
    • 2023
  • As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the private message. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.

SPANNING COLUMN RANKS OF NON-BINARY BOOLEAN MATRICES AND THEIR PRESERVERS

  • Kang, Kyung-Tae;Song, Seok-Zun
    • Journal of the Korean Mathematical Society
    • /
    • v.56 no.2
    • /
    • pp.507-521
    • /
    • 2019
  • For any $m{\times}n$ nonbinary Boolean matrix A, its spanning column rank is the minimum number of the columns of A that spans its column space. We have a characterization of spanning column rank-1 nonbinary Boolean matrices. We investigate the linear operators that preserve the spanning column ranks of matrices over the nonbinary Boolean algebra. That is, for a linear operator T on $m{\times}n$ nonbinary Boolean matrices, it preserves all spanning column ranks if and only if there exist an invertible nonbinary Boolean matrix P of order m and a permutation matrix Q of order n such that T(A) = PAQ for all $m{\times}n$ nonbinary Boolean matrix A. We also obtain other characterizations of the (spanning) column rank preserver.

Design and Performance Analysis of Nonbinary LDPC Codes With Low Error-Floors (오류 마루 현상이 완화된 비이진 LDPC 부호의 설계 및 성능 분석 연구)

  • Ahn, Seok-Ki;Lim, Seung-Chan;Yang, Youngoh;Yang, Kyeongcheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.10
    • /
    • pp.852-857
    • /
    • 2013
  • In this paper we propose a design algorithm for nonbinary LDPC (low-density parity-check) codes with low error-floors. The proposed algorithm determines the nonbinary values of the nonzero entries in the parity-check matrix in order to maximize the binary minimum distance of the designed nonbinary LDPC codes. We verify the performance of the designed nonbinary LDPC codes in the error-floor region by Monte Carlo simulation and importance sampling over BPSK (binary phase-shift keying) modulation.

RowAMD Distance: A Novel 2DPCA-Based Distance Computation with Texture-Based Technique for Face Recognition

  • Al-Arashi, Waled Hussein;Shing, Chai Wuh;Suandi, Shahrel Azmin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5474-5490
    • /
    • 2017
  • Although two-dimensional principal component analysis (2DPCA) has been shown to be successful in face recognition system, it is still very sensitive to illumination variations. To reduce the effect of these variations, texture-based techniques are used due to their robustness to these variations. In this paper, we explore several texture-based techniques and determine the most appropriate one to be used with 2DPCA-based techniques for face recognition. We also propose a new distance metric computation in 2DPCA called Row Assembled Matrix Distance (RowAMD). Experiments on Yale Face Database, Extended Yale Face Database B, AR Database and LFW Database reveal that the proposed RowAMD distance computation method outperforms other conventional distance metrics when Local Line Binary Pattern (LLBP) and Multi-scale Block Local Binary Pattern (MB-LBP) are used for face authentication and face identification, respectively. In addition to this, the results also demonstrate the robustness of the proposed RowAMD with several texture-based techniques.

INTEGER MATRICES WITH PRESCRIBED PERMANENT AND ITS APPLICATIONS

  • SEOL, HAN-GUK
    • Honam Mathematical Journal
    • /
    • v.28 no.4
    • /
    • pp.521-531
    • /
    • 2006
  • In this paper, we construct a procedure of Maple programming for (0, 1)-matrix with a prescribed permanent, $1,2,...,2^{n-1}$. An application of such construction is given, and we obtain the some results of (0, 1)-matrices with the permanent less than or equal to n! by replacing elements 0's by 1's.

  • PDF

Tire Tread Pattern Classification Using Fuzzy Clustering Algorithm (퍼지 클러스터링 알고리즘을 이용한 타이어 접지면 패턴의 분류)

  • 강윤관;정순원;배상욱;김진헌;박귀태
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.5 no.2
    • /
    • pp.44-57
    • /
    • 1995
  • In this paper GFI (Generalized Fuzzy Isodata) and FI (Fuzzy Isodata) algorithms are studied and applied to the tire tread pattern classification problem. GFI algorithm which repeatedly grouping the partitioned cluster depending on the fuzzy partition matrix is general form of GI algorithm. In the constructing the binary tree using GFI algorithm cluster validity, namely, whether partitioned cluster is feasible or not is checked and construction of the binary tree is obtained by FDH clustering algorithm. These algorithms show the good performance in selecting the prototypes of each patterns and classifying patterns. Directions of edge in the preprocessed image of tire tread pattern are selected as features of pattern. These features are thought to have useful information which well represents the characteristics of patterns.

  • PDF

Effect of the Microstructrure of Rapidly Solidified Al-Pb-Cu-Mg on the Wear ProPerty (급속응고된 Al-Pb-Cu-Mg 합금의 마모특성에 미치는 미세조직의 영향)

  • 김홍물
    • Journal of Powder Materials
    • /
    • v.7 no.1
    • /
    • pp.12-18
    • /
    • 2000
  • Effects of the microstrucrure of rapidy solidified Al-Pb-Cu-Mg alloys on the wear investigated. In order to overcome the miscility gap between Al and pb under equilibrium conditions, both in the solid and the liquid states, the alloy were rapidy solidifies to produce them in a segregation-free condition. Although the Pb particles showed relatively fine dispersion in the Al matrix in all the alloys by this process. the Al-16Pb alloy was found to have the most favorable microstructure with discretre with discrete Pb particles of abount 0.5 ${\mu}$m in size. With the addition of Cu and Cu-Mg to Al-16Pb, cellular structures were newly formed; not seen in the binary Al-Pb alloy. Wear properties of the Al-Pb binary alloys measured as a function of the sliding speen, sliding distance, and applied load showed that the Al-16Pb alloy has the best wear resistance, as expected from the fine microstructural features in this alloy. The were resistance of the alloy containing Cu-and Cu-Mg was higher than that of the Al-16Pvb alloy, due to matrix strengthening by precipitation hardeing. The wear mechanism was identified by examining the traces and wear debris.

  • PDF