In the methods of image thresholding segmentation, such methods based on two-dimensional (2D) histogram and optimal objective functions are important. However, when they are used for infrared image segmentation, the...In the methods of image thresholding segmentation, such methods based on two-dimensional (2D) histogram and optimal objective functions are important. However, when they are used for infrared image segmentation, they are weak in suppressing background noises and worse in segmenting targets with non-uniform gray level. The concept of 2D histogram shape modification is proposed, which is realized by target information prior restraint after enhancing target information using plateau histogram equalization. The formula of 2D minimum Renyi entropy is deduced for image segmentation, then the shape-modified 2D histogram is combined wfth four optimal objective functions (i.e., maximum between-class variance, maximum entropy, maximum correlation and minimum Renyi entropy) respectively for the appli- cation of infrared image segmentation. Simultaneously, F-measure is introduced to evaluate the segmentation effects objectively. The experimental results show that F-measure is an effective evaluation index for image segmentation since its value is fully consistent with the subjective evaluation, and after 2D histogram shape modification, the methods of optimal objective functions can overcome their original forms' deficiency and their segmentation effects are more or less improvements, where the best one is the maximum entropy method based on 2D histogram shape modification.展开更多
The main objective of multiuser orthogonal frequency division multiple access(MU-OFDM) is to maximize the total system capacity in wireless communication systems. Thus, the problem in MU-OFDM system is the adaptive al...The main objective of multiuser orthogonal frequency division multiple access(MU-OFDM) is to maximize the total system capacity in wireless communication systems. Thus, the problem in MU-OFDM system is the adaptive allocation of the resources(subcarriers, bits and power) to different users subject to several restrictions to maximize the total system capacity. In this work, a proposed subcarrier allocation algorithm was presented to assign the subcarriers with highest channel gain to the users. After the subcarrier allocation, subcarrier gain-based power allocation(SGPA) was employed for power and bit loading. The simulation results show that the proposed subcarrier-power allocation scheme can achieve high total system capacity and good fairness in allocating the resources to the users with slightly high computational complexity compared to the existing subcarrier allocation algorithms.展开更多
The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a...The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a way that it is invisible to human eyes. The cover object can be image, text, audio,or video. This paper proposes a secure steganography algorithm that hides a bitstream of the secret text into the least significant bits(LSBs) of the approximation coefficients of the integer wavelet transform(IWT) of grayscale images as well as each component of color images to form stego-images. The embedding and extracting phases of the proposed steganography algorithms are performed using the MATLAB software. Invisibility, payload capacity, and security in terms of peak signal to noise ratio(PSNR) and robustness are the key challenges to steganography. The statistical distortion between the cover images and the stego-images is measured by using the mean square error(MSE) and the PSNR, while the degree of closeness between them is evaluated using the normalized cross correlation(NCC). The experimental results show that, the proposed algorithms can hide the secret text with a large payload capacity with a high level of security and a higher invisibility. Furthermore, the proposed technique is computationally efficient and better results for both PSNR and NCC are achieved compared with the previous algorithms.展开更多
A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomizat...A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks.展开更多
Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very sca...Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very scarce resource as the radio spectrum. A new scheme was proposed which extends the concepts of resource sharing and reservations for wideband code division multiple access (WCDMA) systems with a unique feature of soft capacity. Voice and data traffic were considered. The traffic is further classified into handoff and new requests. The reservation thresholds were dynamically adjusted according to the traffic pattern and mobility prediction in order to achieve the maximum channel utilization, while guaranteeing different QoS constraints. The performance of proposed scheme was evaluated using Markov models. New call blocking probability, handoff call dropping probability, and channel utilization were used as benchmarks for the proposed scheme.展开更多
A new approach for peak-to-average power ratio (PAPR) reduction in orthogonal frequency division multiplexing (OFDM) systems was proposed.This approach is based on assigning powers to the different subcarriers of OFDM...A new approach for peak-to-average power ratio (PAPR) reduction in orthogonal frequency division multiplexing (OFDM) systems was proposed.This approach is based on assigning powers to the different subcarriers of OFDM using an unequal power distribution strategy.In addition,a reduced complexity selective mapping (RC-SLM) scheme was proposed.The proposed scheme is based on partitioning the frequency domain symbol sequence into several sub-blocks,and then each sub-block is multiplied by different phase sequences whose length is shorter than that used in the conventional SLM scheme.Then,a kind of low complexity conversions is used to replace the IFFT blocks.The performance of the proposed RC-SLM scheme along with the new approach was studied with computer simulation.The obtained results show that the proposed RC-SLM scheme is able to achieve the lowest computational complexity when compared with other low complexity schemes proposed in the literature while at the same time improves the PAPR reduction performance by about 0.3 dB.展开更多
基金supported by the China Postdoctoral Science Foundation(20100471451)the Science and Technology Foundation of State Key Laboratory of Underwater Measurement&Control Technology(9140C2603051003)
文摘In the methods of image thresholding segmentation, such methods based on two-dimensional (2D) histogram and optimal objective functions are important. However, when they are used for infrared image segmentation, they are weak in suppressing background noises and worse in segmenting targets with non-uniform gray level. The concept of 2D histogram shape modification is proposed, which is realized by target information prior restraint after enhancing target information using plateau histogram equalization. The formula of 2D minimum Renyi entropy is deduced for image segmentation, then the shape-modified 2D histogram is combined wfth four optimal objective functions (i.e., maximum between-class variance, maximum entropy, maximum correlation and minimum Renyi entropy) respectively for the appli- cation of infrared image segmentation. Simultaneously, F-measure is introduced to evaluate the segmentation effects objectively. The experimental results show that F-measure is an effective evaluation index for image segmentation since its value is fully consistent with the subjective evaluation, and after 2D histogram shape modification, the methods of optimal objective functions can overcome their original forms' deficiency and their segmentation effects are more or less improvements, where the best one is the maximum entropy method based on 2D histogram shape modification.
文摘The main objective of multiuser orthogonal frequency division multiple access(MU-OFDM) is to maximize the total system capacity in wireless communication systems. Thus, the problem in MU-OFDM system is the adaptive allocation of the resources(subcarriers, bits and power) to different users subject to several restrictions to maximize the total system capacity. In this work, a proposed subcarrier allocation algorithm was presented to assign the subcarriers with highest channel gain to the users. After the subcarrier allocation, subcarrier gain-based power allocation(SGPA) was employed for power and bit loading. The simulation results show that the proposed subcarrier-power allocation scheme can achieve high total system capacity and good fairness in allocating the resources to the users with slightly high computational complexity compared to the existing subcarrier allocation algorithms.
文摘The rapid development of data communication in modern era demands secure exchange of information. Steganography is an established method for hiding secret data from an unauthorized access into a cover object in such a way that it is invisible to human eyes. The cover object can be image, text, audio,or video. This paper proposes a secure steganography algorithm that hides a bitstream of the secret text into the least significant bits(LSBs) of the approximation coefficients of the integer wavelet transform(IWT) of grayscale images as well as each component of color images to form stego-images. The embedding and extracting phases of the proposed steganography algorithms are performed using the MATLAB software. Invisibility, payload capacity, and security in terms of peak signal to noise ratio(PSNR) and robustness are the key challenges to steganography. The statistical distortion between the cover images and the stego-images is measured by using the mean square error(MSE) and the PSNR, while the degree of closeness between them is evaluated using the normalized cross correlation(NCC). The experimental results show that, the proposed algorithms can hide the secret text with a large payload capacity with a high level of security and a higher invisibility. Furthermore, the proposed technique is computationally efficient and better results for both PSNR and NCC are achieved compared with the previous algorithms.
文摘A new chaotic image encryption scheme based on permutation and substitution in the Fourier domain is presented.Fractional Fourier Transform(FRFT)is used before the encryption scheme to get a large degree of randomization.The permutation is achieved by Baker map and the substitution by a key-related-to-plain-image algorithm based on the modified Logistic map.Modification of the Logistic map is developed to increase the space of the encryption key,and hence increase the security.The key of the encryption algorithm dependents on the plain image,and thus,the cipher image is sensitive to both the initial key and the plain image to resist known-plaintext and chosen plaintext attacks.The key space is large and hence the algorithm can effectively resist brute-force attacks.The proposed scheme is examined using different performance evaluation metrics and the results prove that the proposed scheme is highly secure,and it can effectively resist different attacks.
文摘Call admission control (CAC) and resource reservation (RR) for mobile communication are two important factors that guarantee system efficiency and quality of service (QoS) required for different services in a very scarce resource as the radio spectrum. A new scheme was proposed which extends the concepts of resource sharing and reservations for wideband code division multiple access (WCDMA) systems with a unique feature of soft capacity. Voice and data traffic were considered. The traffic is further classified into handoff and new requests. The reservation thresholds were dynamically adjusted according to the traffic pattern and mobility prediction in order to achieve the maximum channel utilization, while guaranteeing different QoS constraints. The performance of proposed scheme was evaluated using Markov models. New call blocking probability, handoff call dropping probability, and channel utilization were used as benchmarks for the proposed scheme.
文摘A new approach for peak-to-average power ratio (PAPR) reduction in orthogonal frequency division multiplexing (OFDM) systems was proposed.This approach is based on assigning powers to the different subcarriers of OFDM using an unequal power distribution strategy.In addition,a reduced complexity selective mapping (RC-SLM) scheme was proposed.The proposed scheme is based on partitioning the frequency domain symbol sequence into several sub-blocks,and then each sub-block is multiplied by different phase sequences whose length is shorter than that used in the conventional SLM scheme.Then,a kind of low complexity conversions is used to replace the IFFT blocks.The performance of the proposed RC-SLM scheme along with the new approach was studied with computer simulation.The obtained results show that the proposed RC-SLM scheme is able to achieve the lowest computational complexity when compared with other low complexity schemes proposed in the literature while at the same time improves the PAPR reduction performance by about 0.3 dB.