首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 565 毫秒
1.
As carrier-screen images, we have developed checkered-pattern carrier-screen images, which can be physically decoded by superimposing a checkered pattern. We also proposed a decoding method by image sampling with an ordinary compact digital camera. To obtain a better decoding result, each carrier-screen image should be output at a low resolution. However, secret information can be detected when you observe the image carefully. Thus, a hiding process is an important technique. In this paper, we propose an advanced hiding method by embedding the carrier-screen image into another significant image to generate a camouflaged halftone image. The proposed embedding method can be performed through a simple sequential process of blending and halftoning.  相似文献   

2.
A traditional successive cancellation (SC) decoding algorithm produces error propagation in the decoding process. In order to improve the SC decoding performance, it is important to solve the error propagation. In this paper, we propose a new algorithm combining reinforcement learning and SC flip (SCF) decoding of polar codes, which is called a Q-learning-assisted SCF (QLSCF) decoding algorithm. The proposed QLSCF decoding algorithm uses reinforcement learning technology to select candidate bits for the SC flipping decoding. We establish a reinforcement learning model for selecting candidate bits, and the agent selects candidate bits to decode the information sequence. In our scheme, the decoding delay caused by the metric ordering can be removed during the decoding process. Simulation results demonstrate that the decoding delay of the proposed algorithm is reduced compared with the SCF decoding algorithm, based on critical set without loss of performance.  相似文献   

3.
We present a 3D video-encoding technique called Holovideo that is capable of encoding high-resolution 3D videos into standard 2D videos, and then decoding the 2D videos back into 3D rapidly without significant loss of quality. Due to the nature of the algorithm, 2D video compression such as JPEG encoding with QuickTime Run Length Encoding (QTRLE) can be applied with little quality loss, resulting in an effective way to store 3D video at very small file sizes. We found that under a compression ratio of 134:1, Holovideo to OBJ file format, the 3D geometry quality drops at a negligible level. Several sets of 3D videos were captured using a structured light scanner, compressed using the Holovideo codec, and then uncompressed and displayed to demonstrate the effectiveness of the codec. With the use of OpenGL Shaders (GLSL), the 3D video codec can encode and decode in realtime. We demonstrated that for a video size of 512×512, the decoding speed is 28 frames per second (FPS) with a laptop computer using an embedded NVIDIA GeForce 9400 m graphics processing unit (GPU). Encoding can be done with this same setup at 18 FPS, making this technology suitable for applications such as interactive 3D video games and 3D video conferencing.  相似文献   

4.
We have investigated the quantum state transfer in randomly coupled spin chains. By using local memories storing the information and dividing the process into transfer and decoding, conclusive transfer is spontaneously achieved with just one single spin chain. Especially, we can decode information from memories without adding extra spin chain. Compared with Time-reversed protocol, the average decoding time is much less in our scheme.  相似文献   

5.
Temporal information provided by cochlear implants enables successful speech perception in quiet, but limited spectral information precludes comparable success in voice perception. Talker identification and speech decoding by young hearing children (5-7 yr), older hearing children (10-12 yr), and hearing adults were examined by means of vocoder simulations of cochlear implant processing. In Experiment 1, listeners heard vocoder simulations of sentences from a man, woman, and girl and were required to identify the talker from a closed set. Younger children identified talkers more poorly than older listeners, but all age groups showed similar benefit from increased spectral information. In Experiment 2, children and adults provided verbatim repetition of vocoded sentences from the same talkers. The youngest children had more difficulty than older listeners, but all age groups showed comparable benefit from increasing spectral resolution. At comparable levels of spectral degradation, performance on the open-set task of speech decoding was considerably more accurate than on the closed-set task of talker identification. Hearing children's ability to identify talkers and decode speech from spectrally degraded material sheds light on the difficulty of these domains for child implant users.  相似文献   

6.
We generalize the unitary-operation-based deterministic secure quantum communication (UODSQC) model (protocol) to describe the conventional deterministic secure quantum communication (DSQC) protocols in which unitary operations are usually utilized for encoding or decoding message. However, it is found that unitary operation for message encoding or decoding is not required and can be replaced with classical operation in DSQC. So the classical-operation-based deterministic secure quantum communication (CODSQC) model (protocol) is put forward. Then the rigorous mathematical analysis to explain the reason why classical operations can replace unitary operations to encode or decode secret deterministic message is given. Although unitary operations are still possibly needed in the whole communication of CODSQC model (protocol), those used for message encoding or decoding are omitted and replaced with classical operations in CODSQC model (protocol). As a result, the CODSQC model (protocol) is simpler and even more robust than the UODSQC one.  相似文献   

7.
8.
一种基于自相关的激光脉冲编码信号解码方法   总被引:1,自引:0,他引:1  
激光脉冲编码是半主动激光制导武器采用的一种抗干扰措施,为满足半主动激光制导武器光电对抗的需要,以激光信号的脉冲到达时间(TOA)为参数,依据激光脉冲编码信号的时间相关性,提出了一种通过首先对由脉冲到达时间组成的脉冲到达时间序列作自相关处理,计算出信号的重复周期,然后再在一个信号周期内,通过确定脉冲重复间隔的时间值、个数和位序来鉴别信号码型,从而实现信号解码的方法。阐述了该解码方法的原理及实现。原理实验和数字仿真实验证明,对于当前半主动激光制导武器采用的大多数激光脉冲编码信号,采用该解码方法,一般在4个信号周期时间内就能实现解码。  相似文献   

9.
With the development of technology and the rise of the meta-universe concept, the brain-computer interface (BCI) has become a hotspot in the research field, and the BCI based on motor imagery (MI) EEG has been widely concerned. However, in the process of MI-EEG decoding, the performance of the decoding model needs to be improved. At present, most MI-EEG decoding methods based on deep learning cannot make full use of the temporal and frequency features of EEG data, which leads to a low accuracy of MI-EEG decoding. To address this issue, this paper proposes a two-branch convolutional neural network (TBTF-CNN) that can simultaneously learn the temporal and frequency features of EEG data. The structure of EEG data is reconstructed to simplify the spatio-temporal convolution process of CNN, and continuous wavelet transform is used to express the time-frequency features of EEG data. TBTF-CNN fuses the features learned from the two branches and then inputs them into the classifier to decode the MI-EEG. The experimental results on the BCI competition IV 2b dataset show that the proposed model achieves an average classification accuracy of 81.3% and a kappa value of 0.63. Compared with other methods, TBTF-CNN achieves a better performance in MI-EEG decoding. The proposed method can make full use of the temporal and frequency features of EEG data and can improve the decoding accuracy of MI-EEG.  相似文献   

10.
惯性约束聚变实验中编码成像的反投影解码   总被引:3,自引:0,他引:3       下载免费PDF全文
 描述了惯性约束聚变实验中编码成像原理及解码方法。以环孔显微镜为例,对ICF实验中编码成像的解码进行数字研究。采用反投影算法进行数值解码,并编制数值解码程序,对两个实例进行模拟计算。模拟结果表明该算法的图像解码复原精度高 ,效果好。  相似文献   

11.
Underwater acoustic (UWA) communication based on an acoustic vector sensor is studied. The method of joint weighted sound pressure and velocity processing is used in phase modulation high-speed UWA communication system combined with coherent demodulation and adaptive equalization algorithm to demodulate and decode. Whereas the sound intensity could be used instead of pressure for frequency decoding in frequency modulation UWA communication system. The results of theory analysis, simulation calculations and lake trials have shown that either in phase modulation or in frequency modulation UWA communication system, the processing gain can be evidently increased, so that the BER (bit error rate) can be effectively reduced and the telemetry distance can be enlarged by using the acoustic vector sensor.  相似文献   

12.
In this paper, we investigate the joint design of channel and network coding in bi-directional relaying systems and propose a combined low complexity physical network coding and LDPC decoding scheme. For the same LDPC codes employed at both source nodes, we show that the relay can decode the network coded codewords from the superimposed signal received from the BPSK-modulated multiple-access channel. Simulation results show that this novel joint physical network coding and LDPC decoding method outperforms the existing MMSE network coding and LDPC decoding method over the AWGN and complex MAC channel.  相似文献   

13.
Unlike conventional optical holography which requires coherent radiation, zone plate coded holography (ZPCH) offers the possibility of encoding 3D information of an incoherent radiation source. But ZPCH with its coherent optical reconstruction (COR) is unsuitable to be used in the visible regime. However, proposed digital ZPCH scheme for visible regime uses digital decoding instead of COR and overcomes this limitation. This paper discusses the issues of visible regime ZPCH and presents experimental results of applying the modified scheme to encode and successfully decode a visible source, for the first time, to our knowledge. In addition to imaging of incoherent radiation sources, visible regime incoherent holography may find use in constructing holograms of live cells or objects, like retina, where coherent illumination can be detrimental.  相似文献   

14.
The design and fabrication of chirped Moiré fiber Bragg gratings (CMGs) are presented, which can be used in either (1) transmission as passband filters for providing wavelength selectivity in wavelength-division-multiplexed (WDM) systems or (2) reflection as encoding/decoding elements to decompose short broadband pulses in both wavelength and time in order to implement an optical code-division multiple-access (OCDMA) system. In transmission, the fabricated CMGs have single or multiple flattened passbands (< 0.5 dB ripple) and exhibit > 12 dB isolation and near constant in-band group delay. It is shown that these filters do not produce any measurable dispersion-induced power penalties when used to provide wavelength selectivity in 2.5 Gbit/s systems. It is also demonstrated how CMGs can be used in reflection to encode/decode short pulses from a wavelength-tunable mode-locked Er-doped fiber laser.  相似文献   

15.
A time-domain encoding method (temporal method) for space-variant parallel logic operations, which can execute different operations in parallel, is proposed. The temporal method is based on temporal encoding of two input patterns, temporal gating of the coded pattern, and decoding by temporal addition of the gated patterns. The first feature of the proposed method is that parallel logic operations can be performed without complex pattern transformations. The second feature is that the logical output can be directly fed to succeeding systems without specific decoding. Therefore, the logic operation system can be constructed using conventional optics and existing spatial light modulators. In order to confirm these features, an optoelectronic experimental system is constructed and space-variant parallel logic operations are performed.  相似文献   

16.
This paper proposes a new type of encoding methods to encrypt hidden (covert) information in host images. The encrypted information can be plot, fax, word, or network data, and it must be encoded with binary codes. All the pixels in an encoded (overt) image modulated from a host image are classified into three groups. The first group of pixels is called identification codes, used to judge whether the overt image is encoded by a method proposed in this paper or not. The second group of pixels is called type codes, used to judge the encoding type. The third group of pixels is called information codes, used to decode the encoded information. Applying the proposed encoding methods is quite convenient, and host images are not needed for decoding. Decoding covert information from overt images is rather difficult for un-authorized persons, whereas it is very easy for designers or authorized persons. Therefore, the proposed methods are very useful.  相似文献   

17.
A novel optical architecture based on the random iteration algorithm to decode iterated function system (IFS) codes is presented. The optical part of this system performs the affine transformations of IFS. The code values in the affine transformations of IFS are first translated into the modulation voltages of the electro-optic modulators (EOMS), with a specific probability. Then, the multiplication and addition operations can easily be performed. With the O/E and A/D converters, the light intensity is converted into an electrical signal to address a specific pixel at the display device. A fractal image is then progressively decoded pixel by pixel and superimposed on the display device. The computer simulation and some experimental results for the proposed architecture are provided for verification. The decoding speed is fast, the image quality is high, and the resolution of the generated fractals depends on the resolution of the display device itself.  相似文献   

18.
Magnetic tapes used for credit cards and for identification and access control cards are migrating to extremely high coercivites (3000–4000 Oe) in order to avoid accidental erasure and demagnetization problems. These new media employ longitudinally oriented assemblies of Ba-ferrite platelet-shaped particles. Under certain conditions cards made with such media exhibit asymmetries in the forward/reverse waveforms which can cause decoding errors, particularly when read with a commercial swipe reader using integration decode electronic. We found that a systematic tilt of the easy axes of the particles away from the longitudinal direction can cause forward/reverse read waveform asymmetry. Furthermore, large waveform distortions can result from the perpendicular magnetization component in poorly oriented media.  相似文献   

19.
Ricardo Arizaga  Roberto Torroba   《Optik》2002,113(8):333-336
We implement a validation technique, based on polarization encoding using the classical digital speckle pattern correlation. A validation mark is generated, which can be magnetically affixed or by means of a chip attached to a primary document. Besides, a decoding key is also generated in the same setup to be sent to the client. In our method, security is twofold by the speckle and polarization characteristics of the procedure. Both encoding and decoding keys are stored digitally. The validation can be achieved by a subtraction operation between both keys performed with conventional software. No additional experimental setups are required in the decoding step. Experimental results are presented to illustrate the method.  相似文献   

20.
With the emergence of wireless networks, cooperation for secrecy is recognized as an attractive way to establish secure communications. Departing from cryptographic techniques, secrecy can be provided by exploiting the wireless channel characteristics; that is, some error-correcting codes besides reliability have been shown to achieve information-theoretic security. In this paper, we propose a polar-coding-based technique for the primitive relay wiretap channel and show that this technique is suitable to provide information-theoretic security. Specifically, we integrate at the relay an additional functionality, which allows it to smartly decide whether it will cooperate or not based on the decoding detector result. In the case of cooperation, the relay operates in a decode-and-forward mode and assists the communication by transmitting a complementary message to the destination in order to correctly decode the initial source’s message. Otherwise, the communication is completed with direct transmission from source to the destination. Finally, we first prove that the proposed encoding scheme achieves weak secrecy, then, in order to overcome the obstacle of misaligned bits, we implement a double-chaining construction, which achieves strong secrecy.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号