|
Performance study of selective encryption in comparison to full encryption for still visual images
Osama A. Khashan, Abdullah M. Zin, Elankovan A. Sundararajan
Front. Inform. Technol. Electron. Eng., 2014, 15(6): 435-444.
https://doi.org/10.1631/jzus.C1300262
Securing digital images is becoming an important concern in today’s information security due to the extensive use of secure images that are either transmitted over a network or stored on disks. Image encryption is the most effective way to fulfil confidentiality and protect the privacy of images. Nevertheless, owing to the large size and complex structure of digital images, the computational overhead and processing time needed to carry out full image encryption prove to be limiting factors that inhibit it of being used more heavily in real time. To solve this problem, many recent studies use the selective encryption approach to encrypt significant parts of images with a hope to reduce the encryption overhead. However, it is necessary to realistically evaluate its performance compared to full encryption. In this paper, we study the performance and efficiency of image segmentation methods used in the selective encryption approach, such as edges and face detection methods, in determining the most important parts of visual images. Experiments were performed to analyse the computational results obtained by selective image encryption compared to full image encryption using symmetric encryption algorithms. Experiment results have proven that the selective encryption approach based on edge and face detection can significantly reduce the time of encrypting still visual images as compared to full encryption. Thus, this approach can be considered a good alternative in the implementation of real-time applications that require adequate security levels.
|
|
A new maximum-likelihood phase estimation method for X-ray pulsar signals
Hua Zhang, Lu-ping Xu, Yang-he Shen, Rong Jiao, Jing-rong Sun
Front. Inform. Technol. Electron. Eng., 2014, 15(6): 458-469.
https://doi.org/10.1631/jzus.C1300347
X-ray pulsar navigation (XPNAV) is an attractive method for autonomous navigation of deep space in the future. Currently, techniques for estimating the phase of X-ray pulsar radiation involve the maximization of the general non-convex object functions based on the average profile from the epoch folding method. This results in the suppression of useful information and highly complex computation. In this paper, a new maximum likelihood (ML) phase estimation method that directly utilizes the measured time of arrivals (TOAs) is presented. The X-ray pulsar radiation will be treated as a cyclo-stationary process and the TOAs of the photons in a period will be redefined as a new process, whose probability distribution function is the normalized standard profile of the pulsar. We demonstrate that the new process is equivalent to the generally used Poisson model. Then, the phase estimation problem is recast as a cyclic shift parameter estimation under the ML estimation, and we also put forward a parallel ML estimation method to improve the ML solution. Numerical simulation results show that the estimator described here presents a higher precision and reduces the computational complexity compared with currently used estimators.
|
|
Reliable beacon transmission based MAC protocol for LR-WPANs over WLAN interferences
Ji-Hoon Park, Byung-Seo Kim
Front. Inform. Technol. Electron. Eng., 2014, 15(6): 470-481.
https://doi.org/10.1631/jzus.C1300269
The use of IEEE 802.15.4 standard based application systems has been rapidly increasing, for example, in medical services, sensor networks, public safety systems, and home automation systems. However, issues arise from the fact that IEEE 802.15.4 standard based low rate wireless personal area networks (LR-WPANs) use the same frequency bands as wireless local area networks (WLANs), and they interfere with each other. Based on past research on this issue, the interference has a more serious impact on LR-WPANs’ performance than on WLANs’ performance. In this paper we propose a method to improve LR-WPANs’ performance while coexisting with WLANs, which is called the reliable beacon transmission based medium access control (MAC) protocol. Since the reliability of a beacon frame is important, in this method, only the beacon frame is transmitted in interference-free channels, and the data packets are transmitted in interfered channels instead of abandoning the channels altogether. This method increases the reliability of beacon frames as well as overall channel utilizations. The effectiveness of the proposed method was evaluated through extensive simulations, and this paper proves that this method improves the performance of IEEE 802.15.4 based wireless sensor networks (WSNs) over WLANs’ interferences.
|
|
Residual intensity modulation in resonator fiber optic gyros with sinusoidal wave phase modulation
Di-qing Ying, Qiang Li, Hui-lian Ma, Zhong-he Jin
Front. Inform. Technol. Electron. Eng., 2014, 15(6): 482-488.
https://doi.org/10.1631/jzus.C1400036
We present how residual intensity modulation (RIM) affects the performance of a resonator fiber optic gyro (R-FOG) through a sinusoidal wave phase modulation technique. The expression for the R-FOG system’s demodulation curve under RIM is obtained. Through numerical simulation with different RIM coefficients and modulation frequencies, we find that a zero deviation is induced by the RIM effect on the demodulation curve, and this zero deviation varies with the RIM coefficient and modulation frequency. The expression for the system error due to this zero deviation is derived. Simulation results show that the RIM-induced error varies with the RIM coefficient and modulation frequency. There also exists optimum values for the RIM coefficient and modulation frequency to totally eliminate the RIM-induced error, and the error increases as the RIM coefficient or modulation frequency deviates from its optimum value; however, in practical situations, these two parameters would not be exactly fixed but fluctuate from their respective optimum values, and a large system error is induced even if there exists a very small deviation of these two critical parameters from their optimum values. Simulation results indicate that the RIM-induced error should be considered when designing and evaluating an R-FOG system.
|
7 articles
|