Please wait a minute...

Current Issue

    25 April 2009, Volume 30 Issue 4
    Academic papers
    Shape description based on axis of least inertia and chain
    Zong-min LI,Tian-bo LU,Xin-yan SANG,Bao-shan QIN
    2009, 30(4):  1-5.  doi:1000-436X(2009)04-0001-05
    Asbtract ( 0 )   HTML ( 0)   PDF (946KB) ( 588 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The imaged could be seemed to the approximation of the polygons,so it was important to the image match that researched the polygon match method.It is based the combination of the axis of least inertia and the chain,this method was capable of preserving both contour as well as region information,and it utilized the degree of triangular membership which computed by the feature triangular to compute the similarity between the two objects.This method was invariant to image transformations,and robust to concave polygons.The experimental results show that this method’s performance and retrieval efficiency is well.

    Human skin region detection in Web video
    Jun-bo GUO,Dong-ming ZHANG,Yong-dong ZHANG,Jie XU,Wen-ying WANG
    2009, 30(4):  6-10.  doi:1000-436X(2009)04-0006-05
    Asbtract ( 0 )   HTML ( 0)   PDF (486KB) ( 376 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An improved detection algorithm was presented.Firstly,an improved skin color model,which adopted many preprocessing including optical offset,auto white balance,and auto gamma correction,was built to detect candidate skin pixels.Secondly,the image was filtered with erosion and dilation to exclude unconnected candidate pixels.Lastly,gray co-matrix was used to exclude those candidate human skin regions with complex texture.Experimental results show that this algorithm improves the skin region detection precision.

    Modeling the mobile communication service based on PI-calculus
    Hui KANG,Ying-ying ZENG,Zhi-yong LIU
    2009, 30(4):  11-16.  doi:1000-436X(2009)04-0011-06
    Asbtract ( 0 )   HTML ( 0)   PDF (805KB) ( 265 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the problem of not interworking the increment service provided by difference services providers in current mobile communication service,mobile communication process were defined as multiple independent Web services.The connection initialization,base station switching and mobile communication process were modeled by using PI-calculus.The PI-calculus expressions were encapsulated and combined.Modeling for PI-calculus can optimize the mobile communication service,and discover problems as soon as possible in the design stage to eliminate repeating business between difference service providers and to ensure their reusability and interoperability.

    Efficient anonymous password-based authenticated key exchange scheme
    Shi-chong TAN,Liao-jun PANG,Wan-li SU,Yu-min WANG
    2009, 30(4):  17-20.  doi:1000-436X(2009)04-0017-04
    Asbtract ( 0 )   HTML ( 1)   PDF (646KB) ( 138 )   Knowledge map   
    References | Related Articles | Metrics

    Password-based key exchange schemes was designed to provide entities communicating over a public network,and only sharing a (short) password with a session key (e.g.,the key was used for data confidentiality and/or integrity).There has been much interest in password-authenticated key exchange protocol which remains secure even when users choose passwords from a small space of possible passwords,such as a dictionary of English words.A password-based authenticated key exchange scheme was proposed.The analysis shows that the scheme is secure against dictionary attack under the computational Diffie-Hellman intractability assumption,and preserves user privacy and achieves unlinkability.Furthermore,since denial-of-service (DoS) attacks have become a common threat,DoS-resistantance is a design consideration and the scheme is proved to be secure against denial-of-service attacks.

    Identity based and key insulated cryptosystem
    Yuan ZHOU,Bao-shan QIN,Zhen-fu CAO
    2009, 30(4):  21-26.  doi:1000-436X(2009)04-0021-06
    Asbtract ( 0 )   HTML ( 0)   PDF (1238KB) ( 759 )   Knowledge map   
    References | Related Articles | Metrics

    The method of key insulation to identity-cryptosystems was applied,for solving the key exposure problem existing in the identity-based schemes were applied.After developing the formal secure model for identity-based and key insulated cryptosystems,a concrete scheme proved secure under this model was constructed.

    Asymmetric watermarking based on Contourlet transform and subspace projection
    Mi HE,Li-zh CHENG
    2009, 30(4):  27-34.  doi:1000-436X(2009)04-0027-08
    Asbtract ( 0 )   HTML ( 0)   PDF (1525KB) ( 36 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For the copyright protection of the digital image,a new asymmetric watermarking method of feature subspace projection based on Contourlet transform was presented.Embedding matrix (private key) and detecting matrix (public key) were constructed differently,where embedding matrix was kept secretly while detecting matrix was public.At the same time,the embedding matrix was independent on the host images.Robust subspace was obtained by Contourlet transformation.Using the embedding matrix,the arbitrary watermarking was embedded in the robust subspace.The detection function was constructed to detect whether an image had watermarking or not.The proposed method has good security,high detection probability and low false alarm probability.The stimulation shows that the proposed method is robust to many attacks.

    Constant modulus algorithm for blind equalization under impulsive noise environments
    Ying GUO,Tian-shuang QIU,Hong TANG,Yong-wan PARK
    2009, 30(4):  35-40.  doi:1000-436X(2009)04-0035-06
    Asbtract ( 0 )   HTML ( 0)   PDF (1058KB) ( 253 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The presence of α stable distributed ambient channel noise in wireless systems can degrade the performance of existing constamt modulus(CM) equalizers.The problem of blind equalization in noisy communication channels was investigated by addressing the negative effects of heavy-tailed noise to the original constant modulus algorithm based on a stochastic gradient descent (SGD-CMA).Two modified algorithms were proposed.The first is robust CM algorithm based on SGD (SGD-RCMA) and the second is robust CM based on recursive least square (RLS-RCMA) novel methods are robust under both Gaussian and α stable distributed ambient noise environments.And compared to SGD-RCMA method,the RLS-RCMA method has a significantly faster convergence rate and more powerful ISI impressing ability.

    Video steganalysis scheme based on inter-frame collusion
    Bin LIU,Fen-lin LIU,Chun-fang YANG
    2009, 30(4):  41-49.  doi:1000-436X(2009)04-0041-09
    Asbtract ( 0 )   HTML ( 0)   PDF (1429KB) ( 377 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An inter-frame collusion based video steganalysis scheme (ICS) was proposed by utilizing the temporal correlation among video frames to find out whether secret data was hidden in the frames or not.Motions existing in video sequence decreased the detection accuracy of steganalysis algorithms,which were taken into account in ICS steganalysis scheme by modeling motions and messages in video frame as a bimodal noise.Suspicious video frames were recognized by decision module employing GRNN classifier with features extracted by the inter-frame correlation strategy.Experimental results show the satisfying performance of the proposed scheme.

    Energy-efficient object tracking algorithm in wireless sensor networks
    Qian-qian REN,Jian-zhong LI,Jin-bao LI,Jing-hua ZHU
    2009, 30(4):  50-59.  doi:1000-436X(2009)04-0050-10
    Asbtract ( 0 )   HTML ( 0)   PDF (2067KB) ( 126 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    An energy efficient tracking algorithm (EETA) was proposed,which reduced energy consumption in sensor network by introducing an event-driven sleep scheduling mechanism.EETA gave tradeoffs between real time and energy efficiency by letting a maximum number of sensor nodes outside tracing area stay asleep,and reduced the computation complexity to O(N) by formulating the location predication of an object as a state estimation problem of sensor node,instead of building a complex model of its trajectory.Meanwhile,EETA located the object by using adaptive weighted centroid algorithm with complexity of O(N).The method was evaluated with a network of 64 sensor nodes,as well as an analytical probabilistic model.The results demonstrate the effectiveness of the method.

    Next generation network resource allocation method based on cooperative game and decision-making in advance
    Xiang RAO,Shun-yi ZHANG,Yan-fei SUN,Wen-tao DING
    2009, 30(4):  60-65.  doi:1000-436X(2009)04-0060-06
    Asbtract ( 0 )   HTML ( 0)   PDF (1020KB) ( 217 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    It’s an important way to guarantee QoS for the next generation network (NGN) with diverse services by allocating resources reasonably and optimizing the efficiency of whole network according to diverse service styles.A network resource allocating method based on co-operative game theory for NGN was proposed and analyzed,and it had a weakness which brought about overgreat system costing.In order to overcome this weakness,an idea about decision-making in advance was added,and an improved resource allocation algorithm was proposed,which could guarantee the efficiency of whole network best and reduce the system costing.Simulation results of this method show its validity.

    WGRe:a re-encryption anonymous tunnel
    Tian-bo LU,Bao-shan QIN,Yang LI,Li DING
    2009, 30(4):  66-73.  doi:1000-436X(2009)04-0066-08
    Asbtract ( 0 )   HTML ( 0)   PDF (1323KB) ( 128 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    The universal re-encryption scheme URE and its extension EURE were reviewed,discovering their vulnerabilities to Pfitzmann attack.Then a novel re-encryption scheme WGRe (WonGoo Re-encryption) was proposed.WGRe could ensure the correctness of the outputs from a node and protect against replay attack,which was hard in layered encryption systems.The experimental results show WGRe is practical and more efficient than URE and EURE schemes due to the fact that its ciphertext is only double the size of the corresponding plaintext,instead of four times as URE or EURE.

    LiteST:a lightweight secure time synchronization protocol for wireless sensor networks
    Xiang-lan YIN,Wang-dong QI
    2009, 30(4):  74-85.  doi:1000-436X(2009)04-0074-12
    Asbtract ( 0 )   HTML ( 1)   PDF (1714KB) ( 10 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A simple approach was put forward to check the integrity of broadcast messages.Integrating with oneway-hash chain to authenticate the sender of broadcast messages and a new redundant mechanism to deal with insider attacks,a lightweight secure time (LiteST) synchronization protocol was proposed.Analysis and simulations show LiteST can defeat external attacks and is resilient to compromised nodes and it achieves comparable security performance against TinySeRSync,the best secure time synchronization protocol up to date.Experiments with a network of 32 Mica2 motes show that LiteST achieves much the same time precision as FTSP,a time synchronization protocol without security features.The processing cost of LiteST is about one-fifth of TinySeRSync and the communication cost 1/(2m+2) of the latter,where m is the average neighbor count of nodes in the network.In addition,the storage requirement of LiteST is much lower than TinySeRSync in practical scenarios.

    Load balance multicast routing algorithms on overlay network
    Xiao-yu ZHANG,Guang-zhao ZHANG
    2009, 30(4):  86-92.  doi:1000-436X(2009)04-0086-07
    Asbtract ( 0 )   HTML ( 0)   PDF (1180KB) ( 431 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Overlay networks had been recently developed to support multicast framework.Specially,overlay architectures based on proxies and leased lines could provide applications with optimal performance in terms of bandwidth,reliability,delay guarantee,etc.A balanced multicast routing algorithm for these proxy-based overlay architectures was proposed to utilize the network resources efficiently while keeping the delay guarantee for each multicast session.First,the routing problem was modeled as a delay-constraint Steiner tree problem.Then,a balanced solution with the aid of precomputing was proposed.The precomputing performed once with high complexity.However,its outcome was used multiple times in the later low complexity tree forming algorithm.Hence,the overall complexity was lowered.Extensive simulations show that the multicast routing algorithm provides superior performance with respect to other heuristics.

    technical papers
    Self-defence model of SIP proxy server for against DoS attack
    Zhao-xin ZHANG,Yue-jin DU,Bin LI,Hong-li ZHANG
    2009, 30(4):  93-99.  doi:1000-436X(2009)04-0093-07
    Asbtract ( 0 )   HTML ( 0)   PDF (2045KB) ( 472 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Through deeply analyzing on the principle,mode,character of DoS,and the DoS attack faced by SIP network,combining with the idea of Client Puzzle,DFA,long-distance linkage,host linkagethe,the character of SIP network,and the principle of SIP proxy server,the defence model of SIP proxy server for DoS attack was put forward,and the testbed to test the ability of this model to resist DoS attack was designed.The experiment result proves that this model can effectively resist the DoS attack for SIP proxy server with millisecond delay of signal transfer,and improves the usablity of SIP network.

    New design method of space-frequency coding and fast detection algorithm
    Xin WANG,Ji-bo WEI,Ying LI
    2009, 30(4):  100-105.  doi:1000-436X(2009)04-0100-06
    Asbtract ( 0 )   HTML ( 0)   PDF (1391KB) ( 133 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    To analyze the performance of space-frequency codes,the Chernoff bound was used in the existing literatures,but it was too loose to conclude the diversity order and coding gain simultaneously.Therefore,a new view of the transmission of space-frequency codes was addressed,which transformed the transmission in frequency selective channels into flat fading channels.Based on this transformation,the performance analysis of space-time coding in flat fading channels was used to present an asymptotic analysis for the performance of space-frequency coding.Then,the design criterion of the full diversity-achieving space-frequency code was concluded and the coding gain was also optimized.The analysis was more universal and owned an intelligible comprehension.It integrated the existing analysis of the space-frequency codes.A fast detection algorithm for the code was also proposed.It exploited the trellis decoding method and had a reduced complexity compared with the ML detection.The simulation results confirm the validity of the design criterion.

    Improved method of compensating non-reciprocal interference in adaptive TDD MIMO-OFDM systems
    Duan-yang ZENG,Rong-fang SONG
    2009, 30(4):  106-112.  doi:1000-436X(2009)04-0106-07
    Asbtract ( 0 )   HTML ( 0)   PDF (1841KB) ( 153 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In a time division duplex (TDD) system,the channel state information could be easily obtained at the trans-mitter side without feedback due to channel reciprocity and it could be used to increase dramatically the spectral effi-ciency of a multi-input multi-output (MIMO) system.However,the interference structure between transmission directions did not necessarily correlate at all.In such a case,the downlink modulation/coding parameters based on the uplink meas-urements might lead to excessively high frame error rates (FER).Therefore,a simple closed-loop feedback method of in-terference adaptation was proposed,which made the transmit-side estimated interference be able to track the instantane-ous receive-side interference dynamically,and its performance in adaptive TDD MIMO-OFDM systems with HARQ was studied.Simulation results show that the tracking performance is well and the target FER requirement can be guaranteed.

    short essay
    Evaluation method for network invulnerability based on shortest route number
    Yu-ping RAO,Jing-yu LIN,De-ting HOU
    2009, 30(4):  113-117.  doi:1000-436X(2009)04-0113-05
    Asbtract ( 0 )   HTML ( 0)   PDF (1012KB) ( 632 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Fully connecting network has the best invulnerability,and also the shortest route numbers between nodes is important for network invulnerability.Therefore,by calculating shortest route numbers and comparing the topology difference between target network and fully-connecting network,a method based on the shortest route numbers was proposed for evaluating network invulnerability.Further more,a method to evaluate node importance was proposed with it.The more the efficient shortest routes between one node and others,the more important the node was.Also,a method for calculating shortest way numbers between nodes was put forward because it is the key to evaluate model that is to calculate shortest route numbers.

    Performance analytic model and method for CCF multi-channel mechanism
    Jun-rong YAN,Shun-yi ZHANG,Yan-fei SUN,Jun LI
    2009, 30(4):  118-124.  doi:1000-436X(2009)04-0118-07
    Asbtract ( 0 )   HTML ( 0)   PDF (2014KB) ( 94 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    According to the characteristics of common channel framework(CCF) multi-channel mechanism of 802.11s draft,a performance analytic model and method were proposed.Considering two states of assigning or no assigning common channel to transmit data existed in CCF,two performance analytic models based on common channel were proposed and throughput formulas were deduced,furthermore condition of state transition was presented.There were four parameters,such as data rate,payload,number of channels and number of stations,participating in the simulation of throughput.The simulation result shows that with increasing of data rate,increasing of number of stations and/or decreasing of payload,the number of channels needed decreases as state of assigning common channel transiting to state of no assigning common channel,and then the throughput of CCF reaches the maximum.

    Academic communication
    Target sampling based on routing behavior analysis in network topology measurement
    Yu ZHANG,Bin-xing FANG,Hong-li ZHANG
    2009, 30(4):  125-129.  doi:1000-436X(2009)04-0125-05
    Asbtract ( 0 )   HTML ( 0)   PDF (405KB) ( 211 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to investigate the insufficiency of target sampling in current network topology measurement practice and the distortion of measurement models,a sort of target sampling methods based on routing behavior analysis were presented,namely,the uniform random sampling as a benchmark method,the minimum cover sampling as an optimal method,the last-hop sampling for the path diversity,and the bisection sampling for the destination prefix diversity.Experiments based on real measurement data show that a half of topology information can be missed in the traditional ‘1 per/24’ random sampling,of which 10% of missed information is caused by the path diversity and the rest is caused by destination prefix diversity.The minimum cover sampling is robust to the routing dynamics and performs better than the uniform random sampling at the long-term practice.

    ID-based wireless authentication scheme with anonymity
    Hui ZHU,Hui LI,Wan-li SHU,Yu-min WANG
    2009, 30(4):  130-135.  doi:1000-436X(2009)04-0130-07
    Asbtract ( 0 )   HTML ( 0)   PDF (877KB) ( 413 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Considered the especial requirements of the authentication scheme among the roaming users and the visited networks,an ID-based wireless authentication scheme with anonymity was proposed by the bilinearity and non-degeneration of pairings.The security of authentication and anonymity was analyzed in detail.Especially,the anonymous security was analyzed by formal approach under the unauthenticated-links adversarial model.It is showed that the proposed scheme not only could achieve authentication securely but also has a secure anonymity,and could achieve the secure requirements of the wireless network.Moreover,the scheme is simple and efficient,and could be applied to the authentication in the wireless network.

    Data hiding method based on color table expansion technique
    Ru-chun FEI,Li-na WANG,Huan-guo ZHANG
    2009, 30(4):  137-140.  doi:1000-436X(2009)04-0137-04
    Asbtract ( 0 )   HTML ( 0)   PDF (437KB) ( 92 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on color table expansion technique for indexed images,a data hiding method was proposed,and the security and the hiding capacity were analyzed.The analysis results show that this method has very strong security and very high hiding capacity.Secret data can be hidden in an indexed cover image to generate a stego-image with the same visual effect as the cover image and resumed without distortion from the stego-image if the correct key is used.In addition,the statistical feature of the secret data is completely covered up by using random data,so the stego-image is statistically independent of the secret data.

Copyright Information
Authorized by: China Association for Science and Technology
Sponsored by: China Institute of Communications
Editor-in-Chief: Zhang Ping
Associate Editor-in-Chief:
Zhang Yanchuan, Ma Jianfeng, Yang Zhen, Shen Lianfeng, Tao Xiaofeng, Liu Hualu
Editorial Director: Wu Nada, Zhao Li
Address: F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Post: 100079
Tel: 010-53933889、53878169、
53859522、010-53878236
Email: xuebao@ptpress.com.cn
Email: txxb@bjxintong.com.cn
ISSN 1000-436X
CN 11-2102/TN
Visited
Total visitors:
Visitors of today:
Now online: