• Title/Summary/Keyword: Information matrix

Search Result 3,461, Processing Time 0.03 seconds

A Study on the Accuracy of the Maximum Likelihood Estimator of the Generalized Logistic Distribution According to Information Matrix (Information Matrix에 따른 Generalized Logistic 분포의 최우도 추정량 정확도에 관한 연구)

  • Shin, Hong-Joon;Jung, Young-Hun;Heo, Jun-Haeng
    • Journal of Korea Water Resources Association
    • /
    • v.42 no.4
    • /
    • pp.331-341
    • /
    • 2009
  • In this study, we compared the observed information matrix with the Fisher information matrix to estimate the uncertainty of maximum likelihood estimators of the generalized logistic (GL) distribution. The previous literatures recommended the use of the observed information matrix because this is convenient since this matrix is determined as the part of the parameter estimation procedure and there is little difference in accuracy between the observed information matrix and the Fisher information matrix for large sample size. The observed information matrix has been applied for the generalized logistic distribution based on the previous study without verification. For this purpose, a simulation experiment was performed to verify which matrix gave the better accuracy for the GL model. The simulation results showed that the variance-covariance of the ML parameters for the GL distribution came up with similar results to those of previous literature, but it is preferable to use of the Fisher information matrix to estimate the uncertainty of quantile of ML estimators.

PROMISE: A QR Code PROjection Matrix Based Framework for Information Hiding Using Image SEgmentation

  • Yixiang Fang;Kai Tu;Kai Wu;Yi Peng;Yunqing Shi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.471-485
    • /
    • 2023
  • As data sharing increases explosively, such information encoded in QR code is completely public as private messages are not securely protected. This paper proposes a new 'PROMISE' framework for hiding information based on the QR code projection matrix by using image segmentation without modifying the essential QR code characteristics. Projection matrix mapping, matrix scrambling, fusion image segmentation and steganography with SEL(secret embedding logic) are part of the PROMISE framework. The QR code could be mapped to determine the segmentation site of the fusion image as a binary information matrix. To further protect the site information, matrix scrambling could be adopted after the mapping phase. Image segmentation is then performed on the fusion image and the SEL module is applied to embed the secret message into the fusion image. Matrix transformation and SEL parameters should be uploaded to the server as the secret key for authorized users to decode the private message. And it was possible to further obtain the private message hidden by the framework we proposed. Experimental findings show that when compared to some traditional information hiding methods, better anti-detection performance, greater secret key space and lower complexity could be obtained in our work.

Speed-up of the Matrix Computation on the Ridge Regression

  • Lee, Woochan;Kim, Moonseong;Park, Jaeyoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3482-3497
    • /
    • 2021
  • Artificial intelligence has emerged as the core of the 4th industrial revolution, and large amounts of data processing, such as big data technology and rapid data analysis, are inevitable. The most fundamental and universal data interpretation technique is an analysis of information through regression, which is also the basis of machine learning. Ridge regression is a technique of regression that decreases sensitivity to unique or outlier information. The time-consuming calculation portion of the matrix computation, however, basically includes the introduction of an inverse matrix. As the size of the matrix expands, the matrix solution method becomes a major challenge. In this paper, a new algorithm is introduced to enhance the speed of ridge regression estimator calculation through series expansion and computation recycle without adopting an inverse matrix in the calculation process or other factorization methods. In addition, the performances of the proposed algorithm and the existing algorithm were compared according to the matrix size. Overall, excellent speed-up of the proposed algorithm with good accuracy was demonstrated.

An Accurate Method to Estimate Traffic Matrices from Link Loads for QoS Provision

  • Wang, Xingwei;Jiang, Dingde;Xu, Zhengzheng;Chen, Zhenhua
    • Journal of Communications and Networks
    • /
    • v.12 no.6
    • /
    • pp.624-631
    • /
    • 2010
  • Effective traffic matrix estimation is the basis of efficient traffic engineering, and therefore, quality of service provision support in IP networks. In this study, traffic matrix estimation is investigated in IP networks and an Elman neural network-based traffic matrix inference (ENNTMI) method is proposed. In ENNTMI, the conventional Elman neural network is modified to capture the spatio-temporal correlations and the time-varying property, and certain side information is introduced to help estimate traffic matrix in a network accurately. The regular parameter is further introduced into the optimal equation. Thus, the highly ill-posed nature of traffic matrix estimation is overcome effectively and efficiently.

Using Arduino -based LED Matrix Smart phone notification system (아두이노 기반의 LED Matrix를 이용한 스마트 폰 알림 시스템)

  • Hong, Jeongpyo;Kim, Dongju;Choi, Changho;Moon, Mikyeong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.107-108
    • /
    • 2015
  • 본 논문에서는 조용히 해야 할 공간에서 사용할 수 있는 LED Matrix를 이용한 스마트 폰 알림 시스템에 대해 기술 하고자 한다. 스마트 폰 알림 시스템은 스마트 폰과 LED Matrix와 블루투스로 연결된 상태에서 평상시에는 날씨 패턴이나 온도패턴 등 LED Matrix에 표시되고, 스마트 폰에 전화가 왔을 시 LED Matrix가 전화패턴으로 바뀌면서 알려주게 되고 문자가 왔을 때 또한 문자패턴이 표시된다. 만약 전화나 문자 온 것을 인지 못 했을 시 왼쪽 위 끝에 LED로 부재중 표시가 된다. 또한, 실시간 패턴 그리기로 패턴을 사용자가 직접 만들 수도 있다.

  • PDF

Adaptive data hiding scheme based on magic matrix of flexible dimension

  • Wu, Hua;Horng, Ji-Hwei;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3348-3364
    • /
    • 2021
  • Magic matrix-based data hiding schemes are applied to transmit secret information through open communication channels safely. With the development of various magic matrices, some higher dimensional magic matrices are proposed for improving the security level. However, with the limitation of computing resource and the requirement of real time processing, these higher dimensional magic matrix-based methods are not advantageous. Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with less computing resource. Furthermore, an adaptive mechanism is proposed to reduce the embedding distortion. Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. Experimental results confirm that the proposed scheme hides data with high security and a better visual quality.

Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

  • Tang, Zhenjun;Wang, Shuozhong;Zhang, Xinpeng;Wei, Weimin;Su, Shengjun
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.18-26
    • /
    • 2008
  • The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

  • PDF

Secure Outsourced Computation of Multiple Matrix Multiplication Based on Fully Homomorphic Encryption

  • Wang, Shufang;Huang, Hai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5616-5630
    • /
    • 2019
  • Fully homomorphic encryption allows a third-party to perform arbitrary computation over encrypted data and is especially suitable for secure outsourced computation. This paper investigates secure outsourced computation of multiple matrix multiplication based on fully homomorphic encryption. Our work significantly improves the latest Mishra et al.'s work. We improve Mishra et al.'s matrix encoding method by introducing a column-order matrix encoding method which requires smaller parameter. This enables us to develop a binary multiplication method for multiple matrix multiplication, which multiplies pairwise two adjacent matrices in the tree structure instead of Mishra et al.'s sequential matrix multiplication from left to right. The binary multiplication method results in a logarithmic-depth circuit, thus is much more efficient than the sequential matrix multiplication method with linear-depth circuit. Experimental results show that for the product of ten 32×32 (64×64) square matrices our method takes only several thousand seconds while Mishra et al.'s method will take about tens of thousands of years which is astonishingly impractical. In addition, we further generalize our result from square matrix to non-square matrix. Experimental results show that the binary multiplication method and the classical dynamic programming method have a similar performance for ten non-square matrices multiplication.

A Random Matrix Theory approach to correlation matrix in Korea Stock Market (확률행렬이론을 이용한 한국주식시장의 상관행렬 분석)

  • Kim, Geon-Woo;Lee, Sung-Chul
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.4
    • /
    • pp.727-733
    • /
    • 2011
  • To understand the stock market structure it is very important to extract meaningful information by analyzing the correlation matrix between stock returns. Recently there has been many studies on the correlation matrix using the Random Matrix Theory. In this paper we adopt this random matrix methodology to a single-factor model and we obtain meaningful information on the correlation matrix. In particular we observe the analysis of the correlation matrix using the single-factor model explains the real market data and as a result we confirm the usefulness of the single-factor model.

A Cholesky Decomposition of the Inverse of Covariance Matrix

  • Park, Jong-Tae;Kang, Chul
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.4
    • /
    • pp.1007-1012
    • /
    • 2003
  • A recursive procedure for finding the Cholesky root of the inverse of sample covariance matrix, leading to a direct solution for the inverse of a positive definite matrix, is developed using the likelihood equation for the maximum likelihood estimation of the Cholesky root under normality assumptions. An example of the Hilbert matrix is considered for an illustration of the procedure.

  • PDF