Search For:

Displaying 1-12 out of 12 total
Double Compression Detection Based on Markov Model of the First Digits of DCT Coefficients
Found in: Image and Graphics, International Conference on
By Lisha Dong,Xiangwei Kong,Bo Wang,Xin'gang You
Issue Date:August 2011
pp. 234-237
Double compression usually occurs after the image has gone through some kinds of tampering, so double compression detection is a basic mean to assess the authenticity of a given image. In this paper, we propose to model the distribution of the mode based f...
 
A Clustering-Based Location Privacy Protection Scheme for Pervasive Computing
Found in: IEEE-ACM International Conference on Green Computing and Communications and International Conference on Cyber, Physical and Social Computing
By Lin Yao, Chi Lin, Xiangwei Kong, Feng Xia, Guowei Wu
Issue Date:December 2010
pp. 719-726
In pervasive computing environments, Location-Based Services (LBSs) are becoming increasingly important due to continuous advances in mobile networks and positioning technologies. Nevertheless, the wide deployment of LBSs can jeopardize the location privac...
 
SIFT-Based Image Retrieval Combining the Distance Measure of Global Image and Sub-Image
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Bin Li, Xiangwei Kong, Zhe Wang, Haiyan Fu
Issue Date:September 2009
pp. 706-709
This paper presents a similarity match method based on global image and local sub-image using the SIFT features of digital images, and applies our algorithm to Content-Based Image Retrieval. In order to make the SIFT-based image retrieval results better, t...
 
Source Camera Identification Forensics Based on Wavelet Features
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Bo Wang, Yiping Guo, Xiangwei Kong, Fanjie Meng
Issue Date:September 2009
pp. 702-705
Source camera identification forensics aims at determining and authenticating the original sources of digital images to support forensics and get the trace of digital images. This paper introduces a new wavelet features based passive forensic method for th...
 
Visual Search Based on Contour Salient
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Haiyan Fu, Xiangwei Kong, Shijie Jia, Yanqing Guo
Issue Date:September 2009
pp. 694-697
Online shopping is becoming more and more popular for a number of reasons; prices are often lower online, you don’t have to queue up in busy shops and you can buy almost any product imaginable with just a few clicks of your mouse. But the general problems ...
 
Detecting Image Tampering Using Feature Fusion
Found in: Availability, Reliability and Security, International Conference on
By Pin Zhang, Xiangwei Kong
Issue Date:March 2009
pp. 335-340
Along with the development of sophisticated image processing software, it is getting easier forging a digital image but harder to detect it. It is already a problem for us to distinguish tampered photos from authentic ones. In this paper, we propose an app...
 
Unsupervised Support Vector Machines with Perturbations
Found in: Intelligent Information Technology Applications, 2007 Workshop on
By Xiangwei Kong, Kun Zhao, Naiyang Deng
Issue Date:December 2008
pp. 147-151
Support Vector Machines (SVMs) have been dominant learning techniques for almost ten years, and mostly applied to supervised learning problems. Recently nice results are obtained by two-class unsupervised and semi-supervised classification algorithms where...
 
Information Security Game Analysis with Penalty Parameter
Found in: Electronic Commerce and Security, International Symposium
By Wei Sun, Xiangwei Kong, Dequan He, Xingang You
Issue Date:August 2008
pp. 453-456
This paper analyzes information security in the E-commerce based on game theory, and this game analysis method is applied to information security for the first time. We set up the information security game model of the defender and the attacker, make the e...
 
Information Security Problem Research Based on Game Theory
Found in: Electronic Commerce and Security, International Symposium
By Wei Sun, Xiangwei Kong, Dequan He, Xingang You
Issue Date:August 2008
pp. 554-557
The purpose of this paper is to resolve information security problem in the mobile electronic commerce industry chain. We analyze information security based on Evolutionary Game Theory. In this paper, we set up the information security game model with pena...
 
Effects on Statistical Features for Image by Quantization
Found in: Intelligent Information Hiding and Multimedia Signal Processing, International Conference on
By Yanqing Guo, Weiwei Quan, Yanwu Zhu, Xingang You, Xiangwei Kong
Issue Date:December 2006
pp. 631-634
The changes of statistical features can be used to detect the existence of secret messages in images. In this paper, it is indicated that statistical distribution of the whole AC coefficients, such as Generalized Gaussian, Laplacian, Cauchy, etc. can be gr...
 
Information Security Investment Game with Penalty Parameter
Found in: Innovative Computing ,Information and Control, International Conference on
By Wei Sun, Xiangwei Kong, Dequan He, Xingang You
Issue Date:June 2008
pp. 559
The purpose of this paper is to analyze the strategy to promote the information security investment based on game theory. We use game theory to make the analysis and put forward the fruitful strategy suggestions for the defender organization to invest in i...
 
Biometrics-based identifiers for digital identity management
Found in: Proceedings of the 9th Symposium on Identity and Trust on the Internet (IDTRUST '10)
By Abhilasha Bhargav-Spantzel, Anna Squicciarini, Elisa Bertino, Weike Zhang, Xiangwei Kong
Issue Date:April 2010
pp. 84-96
We present algorithms to reliably generate biometric identifiers from a user's biometric image which in turn is used for identity verification possibly in conjunction with cryptographic keys. The biometric identifier generation algorithms employ image hash...
     
 1