Most remote systems require user authentication to access resources.Text-based passwords are still widely used as a standard method of user authentication.Although conventional text-based passwords are rather hard to ...Most remote systems require user authentication to access resources.Text-based passwords are still widely used as a standard method of user authentication.Although conventional text-based passwords are rather hard to remember,users often write their passwords down in order to compromise security.One of the most complex challenges users may face is posting sensitive data on external data centers that are accessible to others and do not be controlled directly by users.Graphical user authentication methods have recently been proposed to verify the user identity.However,the fundamental limitation of a graphi-cal password is that it must have a colorful and rich image to provide an adequate password space to maintain security,and when the user clicks and inputs a pass-word between two possible grids,the fault tolerance is adjusted to avoid this situation.This paper proposes an enhanced graphical authentication scheme,which comprises benefits over both recognition and recall-based graphical techniques besides image steganography.The combination of graphical authentication and steganography technologies reduces the amount of sensitive data shared between users and service providers and improves the security of user accounts.To evaluate the effectiveness of the proposed scheme,peak signal-to-noise ratio and mean squared error parameters have been used.展开更多
The code tracking loop is a key component for user positioning. The pseudorange information of Bei Dou B1 signals has been fused and changed for vector tracking, so a correlation output model for complex scenarios is ...The code tracking loop is a key component for user positioning. The pseudorange information of Bei Dou B1 signals has been fused and changed for vector tracking, so a correlation output model for complex scenarios is designed to prevent the propagation of error and valuate the signal performance. The relevant software and hardware factors that affect the output are analyzed.A single channel time-division multiplexing(TDM) method for multicorrelation data extraction is proposed. Statistical characteristics of the correlation output data for both vector and scalar structures are evaluated. Simulation results show that correlation outputs for both structures follow normal or Chi-squared distributions in normal conditions, and the Gamma distribution in harsh conditions. It is shown that a tracking model based on the multi-channel fusion hardly changes the probability distribution of the correlation output in the normal case, but it reduces the ranging error of the code loop, and hence the tracking ability of the code loop for weak signals is improved. Furthermore, vector tracking changes the pseudorange characteristics of channels anytime, and affects the mutual correlation outputs of the code loops in the abnormal case. This study provides a basis for the subsequent design of autonomous integrity algorithms for vector tracking.展开更多
In order to predict the extreme load of the mechanical components during the entire life,an automatic method based on the bootstrapping technology(BT)is proposed to determine the most suitable threshold.Based on all t...In order to predict the extreme load of the mechanical components during the entire life,an automatic method based on the bootstrapping technology(BT)is proposed to determine the most suitable threshold.Based on all the turning points of the load history and a series of thresholds estimated in advance,the generalized Pareto distribution is established to fit the exceedances.The corresponding distribution parameters are estimated with the maximum likelihood method.Then,BT is employed to calculate the mean squared error(MSE)of each estimated threshold based on the exceedances and the specific distribution parameters.Finally,the threshold with the smallest MSE will be the optimal one.Compared to the kurtosis method and the mean excess function method,the average deviation of the probability density function of exceedances determined by BT reduces by 38.52%and 29.25%,respectively.Moreover,the quantile-quantile plot of the exceedances determined by BT is closer to a straight line.The results suggest the improvement of the modeling flexibility and the determined threshold precision.If the exceedances are insufficient,BT will enlarge their amount by resampling to solve the instability problem of the original distribution parameters.展开更多
With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its u...With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.展开更多
基金The researcher would like to thank the Deanship of Scientific Research,Qassim University for funding the publication of this project.
文摘Most remote systems require user authentication to access resources.Text-based passwords are still widely used as a standard method of user authentication.Although conventional text-based passwords are rather hard to remember,users often write their passwords down in order to compromise security.One of the most complex challenges users may face is posting sensitive data on external data centers that are accessible to others and do not be controlled directly by users.Graphical user authentication methods have recently been proposed to verify the user identity.However,the fundamental limitation of a graphi-cal password is that it must have a colorful and rich image to provide an adequate password space to maintain security,and when the user clicks and inputs a pass-word between two possible grids,the fault tolerance is adjusted to avoid this situation.This paper proposes an enhanced graphical authentication scheme,which comprises benefits over both recognition and recall-based graphical techniques besides image steganography.The combination of graphical authentication and steganography technologies reduces the amount of sensitive data shared between users and service providers and improves the security of user accounts.To evaluate the effectiveness of the proposed scheme,peak signal-to-noise ratio and mean squared error parameters have been used.
基金supported by the National Natural Science Fundation of China(41474027)
文摘The code tracking loop is a key component for user positioning. The pseudorange information of Bei Dou B1 signals has been fused and changed for vector tracking, so a correlation output model for complex scenarios is designed to prevent the propagation of error and valuate the signal performance. The relevant software and hardware factors that affect the output are analyzed.A single channel time-division multiplexing(TDM) method for multicorrelation data extraction is proposed. Statistical characteristics of the correlation output data for both vector and scalar structures are evaluated. Simulation results show that correlation outputs for both structures follow normal or Chi-squared distributions in normal conditions, and the Gamma distribution in harsh conditions. It is shown that a tracking model based on the multi-channel fusion hardly changes the probability distribution of the correlation output in the normal case, but it reduces the ranging error of the code loop, and hence the tracking ability of the code loop for weak signals is improved. Furthermore, vector tracking changes the pseudorange characteristics of channels anytime, and affects the mutual correlation outputs of the code loops in the abnormal case. This study provides a basis for the subsequent design of autonomous integrity algorithms for vector tracking.
基金The National Science and Technology Pillar Program of China(No.2015BAF07B00)
文摘In order to predict the extreme load of the mechanical components during the entire life,an automatic method based on the bootstrapping technology(BT)is proposed to determine the most suitable threshold.Based on all the turning points of the load history and a series of thresholds estimated in advance,the generalized Pareto distribution is established to fit the exceedances.The corresponding distribution parameters are estimated with the maximum likelihood method.Then,BT is employed to calculate the mean squared error(MSE)of each estimated threshold based on the exceedances and the specific distribution parameters.Finally,the threshold with the smallest MSE will be the optimal one.Compared to the kurtosis method and the mean excess function method,the average deviation of the probability density function of exceedances determined by BT reduces by 38.52%and 29.25%,respectively.Moreover,the quantile-quantile plot of the exceedances determined by BT is closer to a straight line.The results suggest the improvement of the modeling flexibility and the determined threshold precision.If the exceedances are insufficient,BT will enlarge their amount by resampling to solve the instability problem of the original distribution parameters.
文摘With the development of digital information technologies,robust watermarking framework is taken into real consideration as a challenging issue in the area of image processing,due to the large applicabilities and its utilities in a number of academic and real environments.There are a wide range of solutions to provide image watermarking frameworks,while each one of them is attempted to address an efficient and applicable idea.In reality,the traditional techniques do not have sufficient merit to realize an accurate application.Due to the fact that the main idea behind the approach is organized based on contourlet representation,the only state-of-the-art materials that are investigated along with an integration of the aforementioned contourlet representation in line with watermarking framework are concentrated to be able to propose the novel and skilled technique.In a word,the main process of the proposed robust watermarking framework is organized to deal with both new embedding and de-embedding processes in the area of contourlet transform to generate watermarked image and the corresponding extracted logo image with high accuracy.In fact,the motivation of the approach is that the suggested complexity can be of novelty,which consists of the contourlet representation,the embedding and the corresponding de-embedding modules and the performance monitoring including an analysis of the watermarked image as well as the extracted logo image.There is also a scrambling module that is working in association with levels-directions decomposition in contourlet embedding mechanism,while a decision maker system is designed to deal with the appropriate number of sub-bands to be embedded in the presence of a series of simulated attacks.The required performance is tangibly considered through an integration of the peak signal-to-noise ratio and the structural similarity indices that are related to watermarked image.And the bit error rate and the normal correlation are considered that are related to the extracted logo analysis,as well.