• Title/Summary/Keyword: Key Change

Search Result 1,917, Processing Time 0.042 seconds

Video Segmentation and Key frame Extraction using Multi-resolution Analysis and Statistical Characteristic

  • Cho, Wan-Hyun;Park, Soon-Young;Park, Jong-Hyun
    • Communications for Statistical Applications and Methods
    • /
    • v.10 no.2
    • /
    • pp.457-469
    • /
    • 2003
  • In this paper, we have proposed the efficient algorithm that can segment the video scene change using a various statistical characteristics obtained from by applying the wavelet transformation for each frames. Our method firstly extracts the histogram features from low frequency subband of wavelet-transformed image and then uses these features to detect the abrupt scene change. Second, it extracts the edge information from applying the mesh method to the high frequency subband of transformed image. We quantify the extracted edge information as the values of variance characteristic of each pixel and use these values to detect the gradual scene change. And we have also proposed an algorithm how extract the proper key frame from segmented video scene. Experiment results show that the proposed method is both very efficient algorithm in segmenting video frames and also is to become the appropriate key frame extraction method.

Secure Group Communication with Dynamic Membership Change in Ad Hoc Networks

  • Kim, Hee-Youl
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1668-1683
    • /
    • 2011
  • The importance of secure communication between only legitimate group members in ad hoc networks has been growing in recent years. Due to the ad hoc nature the scalability on dynamic membership change is a major concern. However, the previous models require at least O(log n) communication cost for key update per each membership change, which imposes a heavy burden on the devices. In this paper we present a scalable model that supports communication-efficient membership change in ad hoc networks by exclusionary keys and RSA functions. The multicast cost for key update is extremely low, that is O(1) , and one-to-one communications occur mostly in neighboring devices.

Dynamic Key Lifetime Change Protocol for Performance Improvement of Virtual Private Networks using IPSec (IPSec을 적용한 가상사설망의 성능개선을 위한 동적 키 재생성 주기 변경 프로토콜)

  • 한종훈;이정우;박성한
    • Proceedings of the IEEK Conference
    • /
    • 2003.11c
    • /
    • pp.125-128
    • /
    • 2003
  • In this paper, we propose a dynamic key lifetime change protocol for performance enhancement of virtual private networks using IPSec. The proposed protocol changes the key lifetime according to the number of secure tunnels. The proposed protocol is implemented with Linux 2.4.18 and FreeS/WAN 1.99. The system employing our proposed protocol performs better than the original version in terms of network performance and security.

  • PDF

Implementation of Group Key Management Protocol for Multicasting Information Security (멀티캐스팅 정보보안을 위한 그룹키 관리 프로토콜 구현)

  • Hong Jong-Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.3
    • /
    • pp.177-182
    • /
    • 2004
  • The existing group key management architectures applied to a small scale routing protocols may have many overheads with key distribution. Therefore this paper proposes a group key management protocol in PIM-SM multicast group communication. This method divide multicast groups with RP, and subgroup key managers are established in each RP and can be transmitted groups keys. And this does not have needs of the data translation and the new key distribution for path change. This does not have needs of the data translation and the new key distribution for path change, so the data transmission time can be reduced.

  • PDF

Improved Password Change Protocol Using One-way Function (일방향 함수를 이용한 개선된 패스월드 변경 프로토콜)

  • Jeon Il-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.121-127
    • /
    • 2006
  • Recently, Chang et at.$^[9]$ proposed a new password-based key agreement protocol and a password change protocol to improve the efficiency in the password-based authenticated key agreement protocol proposed by Yeh et at.$^[8]$. However, Wang et al.$^[10]$ showed that their protected password change protocol is not secure under the denial of service attack and the dictionary attack This paper proposes an improved password change protocol to solve this problems in the Chang et al's protocol. In the proposed protocol, the format of communication messages is modified not to have any clue for the guessing of the password and verifying of the guessed password. The proposed protocol supports the advantages in the previous password-based protocols and solves the problems in them effectively.

Damage detection of shear buildings using frequency-change-ratio and model updating algorithm

  • Liang, Yabin;Feng, Qian;Li, Heng;Jiang, Jian
    • Smart Structures and Systems
    • /
    • v.23 no.2
    • /
    • pp.107-122
    • /
    • 2019
  • As one of the most important parameters in structural health monitoring, structural frequency has many advantages, such as convenient to be measured, high precision, and insensitive to noise. In addition, frequency-change-ratio based method had been validated to have the ability to identify the damage occurrence and location. However, building a precise enough finite elemental model (FEM) for the test structure is still a huge challenge for this frequency-change-ratio based damage detection technique. In order to overcome this disadvantage and extend the application for frequencies in structural health monitoring area, a novel method was developed in this paper by combining the cross-model cross-mode (CMCM) model updating algorithm with the frequency-change-ratio based method. At first, assuming the physical parameters, including the element mass and stiffness, of the test structure had been known with a certain value, then an initial to-be-updated model with these assumed parameters was constructed according to the typical mass and stiffness distribution characteristic of shear buildings. After that, this to-be-updated model was updated using CMCM algorithm by combining with the measured frequencies of the actual structure when no damage was introduced. Thus, this updated model was regarded as a representation of the FEM model of actual structure, because their modal information were almost the same. Finally, based on this updated model, the frequency-change-ratio based method can be further proceed to realize the damage detection and localization. In order to verify the effectiveness of the developed method, a four-level shear building was numerically simulated and two actual shear structures, including a three-level shear model and an eight-story frame, were experimentally test in laboratory, and all the test results demonstrate that the developed method can identify the structural damage occurrence and location effectively, even only very limited modal frequencies of the test structure were provided.

Theoretical study on electrical behavior of carbon chain inserted single-walled carbon nanotubes compared with Pt doped one

  • Cui, Hao;Zhang, Xiaoxing;Xiao, Hanyan;Tang, Ju
    • Carbon letters
    • /
    • v.25
    • /
    • pp.55-59
    • /
    • 2018
  • Carbon chain inserted carbon nanotubes (CNTs) have been experimentally proven having undergone pronounced property change in terms of electrical conductivity compared with pure CNTs. This paper simulates the geometry of carbon chain inserted CNTs and analyzes the mechanism for conductivity change after insertion of carbon chain. The geometric simulation of Pt doped CNT was also implemented for comparison with the inserted one. The results indicate that both modification by Pt atom on the surface of CNT and addition of carbon chain in the channel of the tube are effective methods for transforming the electrical properties of the CNT, leading to the redistribution of electron and thereby causing the conductivity change in obtained configurations. All the calculations were obtained based on density functional theory method.

Adaptive Queue Management Based On the Change Trend of Queue Size

  • Tang, Liangrui;Tan, Yaomu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1345-1362
    • /
    • 2019
  • Most active queue management algorithms manage network congestion based on the size of the queue but ignore the network environment which makes queue size change. It seriously affects the response speed of the algorithm. In this paper, a new AQM algorithm named CT-AQM (Change Trend-Adaptive Queue Management) is proposed. CT-AQM predicts the change trend of queue size in the soon future based on the change rate of queue size and the network environment, and optimizes its dropping function. Simulation results indicate that CT-AQM scheme has a significant improvement in loss-rate and throughput.

Fall Detection Based on Human Skeleton Keypoints Using GRU

  • Kang, Yoon-Kyu;Kang, Hee-Yong;Weon, Dal-Soo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.83-92
    • /
    • 2020
  • A recent study to determine the fall is focused on analyzing fall motions using a recurrent neural network (RNN), and uses a deep learning approach to get good results for detecting human poses in 2D from a mono color image. In this paper, we investigated the improved detection method to estimate the position of the head and shoulder key points and the acceleration of position change using the skeletal key points information extracted using PoseNet from the image obtained from the 2D RGB low-cost camera, and to increase the accuracy of the fall judgment. In particular, we propose a fall detection method based on the characteristics of post-fall posture in the fall motion analysis method and on the velocity of human body skeleton key points change as well as the ratio change of body bounding box's width and height. The public data set was used to extract human skeletal features and to train deep learning, GRU, and as a result of an experiment to find a feature extraction method that can achieve high classification accuracy, the proposed method showed a 99.8% success rate in detecting falls more effectively than the conventional primitive skeletal data use method.

Quality Adaptation of Intra-only Coded Video Transmission over Wireless Networks

  • Shu Tang;Yuanhong Deng;Peng Yang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.817-829
    • /
    • 2023
  • Variable wireless channel is a big challenge for real-time video applications, and the rate adaptation of realtime video streaming becomes a hot topic. Intra-video coding is important for high-quality video communication and industrial video applications. In this paper, we proposed a novel adaptive scheme for real-time video transmission with intra-only coding over a wireless network. The key idea of this scheme is to estimate the instantaneous remaining capacity of the network to adjust the quality of the next several video frames, which not only can keep low queuing delay and ensure video quality, but also can respond to bandwidth changes quickly. We compare our scheme with three different schemes in the video transmission system. The experimental results show that our scheme has higher bandwidth utilization and faster bandwidth change response, while maintaining low queuing delay.