电子与信息学报
   
  
   Home  |  About Journal  |  Ethics Statement  |  Editorial Board  |  Instruction  |  Subscriptions  |  Contacts Us  |  Message  |  Chinese
电子与信息学报
OFFICE ONLINE
 ·Author Center
 ·Peer Review
 ·Editor Work
 ·Office Work
 ·Editor-in-chief
 
JOURNAL
 ·Forthcoming Articles
 ·Current Issue
 ·Next Issue
 ·Archive
 ·Advanced Search
 ·Archive By Volume
 ·Archive By Subject
 ·Email Alert
 ·
 
Hot Paper
 ·Top Cited
 ·TOP Read Articles
 ·TOP Download Articles
 
Quick Search  
  Advanced Search
2012 Vol.34 No.8, Published: 19 August 2012
Articles |
 
 
Articles
Select  |    Cite this article 
Shao Yu, Sun Fu-Chun, Liu Ying
A No-reference Image Quality Assessment Method Using Local Structure Tensor
2012 Vol. 34 (8): 1779-1785 [Abstract] ( 2182 ) [PDF 375KB] ( 1932 )    DOI: 10.3724/SP.J.1146.2012.00042

A new image quality metric is proposed, it can be used to predict the no-reference image quality. Based on the Singular Value Decomposition (SVD) of the local structure tensor of the image, the noise and blur level is measured using the characteristic of singular value. The performance of the method is evaluated with a publicly available database of images and their quality score. The results show that the proposed no-reference method for the quality prediction of noise and blur images has a comparable performance to the leading metrics available in literature, and also that the method is easier to implement.

Select  |    Cite this article 
Zhou Wu-Jie, Yu Mei, Jiang Gang-Yi, Peng Zong-Ju, Shao Feng
Reduced-reference Quality Assessment Model of Stereoscopic Image Based on Visual Perception and Zero-watermark
2012 Vol. 34 (8): 1786-1792 [Abstract] ( 1939 ) [PDF 375KB] ( 1040 )    DOI: 10.3724/SP.J.1146.2011.01135

Through analyzing the image structure direction characteristics and the stereoscopic perception of human visual system, and combining semi-fragile digital watermarking and Support Vector Regression (SVR), a reduced-reference stereoscopic image quality assessment model based on visual perception and zero-watermark is proposed. In this model, the view zero-watermark is constructed by judging the relation of the horizontal and vertical wavelet coefficients, which can reflect the image structure information. Meanwhile, the disparity zero-watermark that reflects the stereoscopic perception quality is constructed by using the disparity between the left and right views. And then the relativity of two watermark-recovering rates (watermark-recovering rates of the view and disparity zero-watermarks) and subjective quality scores can be learned by the training procedure of SVR. Finally, stereoscopic image quality is predicted by trained SVR. Experimental results show that the proposed reduced-reference model is in accordance with human visual characteristics, and consistent with the result of subjective evaluation value preferably.

Select  |    Cite this article 
Guo Li-Li, Zhou Bin, Sun Zhi-Guo, Liu Xiang-Pu
Correlation of Symmetric Raised Cosine Keying Signals
2012 Vol. 34 (8): 1793-1799 [Abstract] ( 1701 ) [PDF 292KB] ( 736 )    DOI: 10.3724/SP.J.1146.2011.01361

Symmetric Raised Cosine Keying (SRCK) modulation is a new binary digital modulation method. The information is sent by the different polar of the frequency change waveform. For continuous phase and smoothing frequency change, the SRCK signals have characteristics about high energy concentration, high bandwidth efficiency and good resistance to amplitude fading. In order to analyze the communication performance of the SRCK modulated signals, the correlation of the SRCK modulated sample waveforms is deduced, and an analytic formula with the Bessel function is obtained. The main factors of effecting the correlation value changes are analyzed. Orthogonal symmetric raised cosine keying modulation method is proposed, and the characteristics of the signals are analyzed. An efficient modulation communication system is provided for next generation wireless communication.

Select  |    Cite this article 
Pan Jian, Li Yu-Shan, Gao Song
A Fast Implementation for Passivity Enforcement of Hybrid Macromodels
2012 Vol. 34 (8): 1800-1805 [Abstract] ( 1667 ) [PDF 311KB] ( 751 )    DOI: 10.3724/SP.J.1146.2011.01296

The hybrid macromodels of high-speed digital systems fitted by the Modal Vector Fitting (MVF) approach have the advantages of accurate fitness and easy to be simulated with equivalent circuits, but the initial-built models may violate the system passivity in partial-band. To solve this problem, a method of passivity enforcement of hybrid macromodels based on modal components is presented. Firstly, it proposes a new formulation for the objective function, wherein the eigenpairs of the macromodel are included. The relative accuracy of the model is controlled with weighting by the eigenpairs in the process of the parameter perturbation. Then the relevant passivity constrain function is also discussed and united with the above objective function. According to the analysis of the equations set, it is essentially that the passivity compensation is equivalent to the solution of a least-square-based optimization problem, which is able to be solved using the analysis method. This proposed method can effectively enforce the passivity of hybrid macromodel and be satisfactory with arbitrary terminal conditions. Compared with the reported methods such as Residue Perturbation (RP) and Modal Perbation (MP), experimental results demonstrate that the presented method has a certain advantage on the model accuracy or computational efficiency.

Select  |    Cite this article 
Chen Song, Huang Kai-Zhi, Ji Jiang
A Fast Sequential Acquisition Method Based on Frequency Sampling
2012 Vol. 34 (8): 1806-1812 [Abstract] ( 1675 ) [PDF 389KB] ( 830 )    DOI: 10.3724/SP.J.1146.2011.01383

To solve sequential acquisition problems with long pseudo-noise code, such as large computation cost and poor capture performance in the environment of few received sequences, a fast sequential acquisition method based on frequency sampling is proposed. Firstly, the general sequential acquisition model based on frequency subset is designed according to the sequential relationship between frequency and time domain. And then the frequency subsets are composed by sampling the complete frequency set of entire local sequences. The optimal subsets are used to do cyclic correlation operation with received sequences to accomplish capture at the end. In the perspective of time domain, frequency sampling is equal to sequences folding, and some phase weighting factors are imported simultaneously, which can improve the probability distribution of nonpeak values. Therefore, the acquisition computation cost is reduced in higher degree and the background noise is compressed at the same time. The simulation results show that frequency sampling method can reduce computation cost by 27 times, and its average capture success rate is probably 50% larger than XFAST, when the period of local sequences is 217.

Select  |    Cite this article 
Han Xue-Bing, Zhang Hao
Research of Sparse Recovery Algorithm Based on Model Noise
2012 Vol. 34 (8): 1813-1818 [Abstract] ( 1989 ) [PDF 369KB] ( 1102 )    DOI: 10.3724/SP.J.1146.2011.01234

For sparse recovery of underdetermined linear systems where noise perturbations exist in both the measurements and sensing matrix, based on FOCal Underdetermined System Solver (FOCUSS) algorithm, an improved algorithm, named Synchronous Descending (SD) –FOCUSS, is proposed. The objective function of system model is deduced through a Maximum A Posteriori (MAP) estimation; then approximate optimum sparse-solution can be found while optimizing objective function using iterative relaxation algorithm. Another breakthrough of SD-FOCUSS is that the new algorithm can be applied to Multiple Measurement Vector (MMV) models. The convergence of SD-FOCUSS algorithm can be established with mathematical proof. The simulation results illustrate advantages of the new algorithm on accuracy and stability compared with other algorithms.

Select  |    Cite this article 
Tong Ming, Zhang Wei, Zhang Jian-Long, Chen Tao
A Video Watermarking Framework Resistant to Super Strong Cropping Attacks Based on NMF with Sparseness Constraints on Parts of the Basis Matrix
2012 Vol. 34 (8): 1819-1826 [Abstract] ( 1954 ) [PDF 396KB] ( 959 )    DOI: 10.3724/SP.J.1146.2011.01117

Firstly, the Non-negative Matrix Factorization with Sparseness Constraints on Parts of the Basis Matrix (NMFSCPBM) method is proposed in this paper. Secondly, the encrypted watermark is embedded into the big coefficients of the basis matrix by NMFSCPBM. At the same time, the watermark embedding strength is adaptively adjusted by the video motion characteristics extracted by NMFSCPBM. Finally, when detecting the watermark, as long as the residual video contains the numbers of least remaining sub-blocks, the complete basis matrix can be completely recovered, and then the complete watermark can be extracted. The experimental results show that the performance of resisting the strong cropping attacks of this paper is improved greatly compared with other similar methods.

Select  |    Cite this article 
Hu Ke-Li, Gu Yu-Zhang, Wang Ying-Guan, Zou Fang-Yuan, Jin Feng
Full-automatic Tracking Algorithm for Multi-object Based on Watershed Segmentation and Scale-invariant Feature Points
2012 Vol. 34 (8): 1827-1832 [Abstract] ( 1963 ) [PDF 366KB] ( 932 )    DOI: 10.3724/SP.J.1146.2011.01323

For the issue of multi-object robust tracking, a type of watershed segmentation and Scale-Invariant Feature Transform (SIFT) feature points based full-automatic tracking algorithm is presented. To avoid flat area while do watershed segmentation on the image, a regular gradient image is added to the source image. After the Gaussian blurred process is done on the added image in float field, field minimal points are selected as object feature points as well as seed points to do watershed segmentation. Moving object is detected through short time points trajectories derived from watershed region mapping relationship between current and backward image. SIFT feature pool is built and updated based on object occlusion occurred or not and watershed segmentation. With the help of watershed region mapping and feature matching with the SIFT feature pool, object is robustly tracked. Actual tests show that the algorithm can track multi-object well and with a better performance of mutual occlusion robustness.

Select  |    Cite this article 
Fan Chong-Yi, Huang Xiao-Tao
The Imaging of SAR Based on OFDM Waveforms Signal with the Compensation of Coding Term
2012 Vol. 34 (8): 1833-1839 [Abstract] ( 1780 ) [PDF 447KB] ( 845 )    DOI: 10.3724/SP.J.1146.2011.01256

The potential application of OFDM waveforms in SAR is considered in this paper, especially for the SAR imaging based on OFDM waveforms. The OFDM waveforms destroy the flat spectrum from the conventional Linear Frequency Modulation (LFM) waveform, which bring difficulties to high resolution imaging. This paper first analyzes the characteristics of OFDM waveforms in detail, derives its two-dimensional spectral, then proposes a novel algorithm for the high resolution imaging based on OFDM waveforms. This algorithm is based on the compensation of coding term. It manages Range Cell Migration Correction (RCMC), suppresses the sidelobe from coding, and improves the imaging performance greatly. The simulation results prove the validity of this algorithm. 

Select  |    Cite this article 
Xiong Tao, Zhou Song, Xing Meng-Dao
New 2-D Spectrum of BiSAR from the Instantaneous Doppler Frequency and a Showcase for Image Algorithm
2012 Vol. 34 (8): 1840-1846 [Abstract] ( 1508 ) [PDF 300KB] ( 662 )    DOI: 10.3724/SP.J.1146.2011.01044

A novel method to obtain the formulations of the return signals in the two dimensional (2–D) frequency domain for translational variant Bistatic Synthetic Aperture Radar (BiSAR) is proposed. In this study, the instantaneous Doppler frequency is used and two individual azimuth frequencies are introduced, so that the 2–D spectrum can be derived by these two azimuth frequencies. Using the imaging geometry of the general bistatic SAR, the expressions of the two azimuth frequencies can be obtained, as well as the 2–D spectrum. Then, the range Doppler algorithm based on the two 2–D spectrums is developed to process the spotlight general BiSAR data. Finally, the proposed algorithms are applied to the simulated data and the results confirm not only the accuracy of the derived 2–D spectrums for general BiSAR but also the effectiveness of the proposed algorithm.

Select  |    Cite this article 
Hu Jie-Min, Zhan Rong-Hui, Niu Wei, Ou Jian-Ping
A Novel Imaging Method for Precession Targets with Rotational Symmetry Based on Back Projection Transform
2012 Vol. 34 (8): 1847-1852 [Abstract] ( 1477 ) [PDF 339KB] ( 769 )    DOI: 10.3724/SP.J.1146.2011.01425

The imaging method of the mid-course missile is one  of the key techniques of the missile defense system. Cause of the special precession character of the ballistic missile warhead, the small rotation angle assumption is not  satisfied, which leads to blurring of the image obtained by Range Doppler (RD) algorithm. To solve this problem, a novel wideband imaging method for precession targets with  rotational symmetry is proposed in this paper. Using
Back Projection Transform (BPT), the echoes of the target in the range-time domain are transformed to reconstruct the scattering centers position in the para meter domain by means of coherent accumulation. The algorithm is verified by the experiment results of the anechoic chamber data, which demonstrates that the algorithm is more efficient than the Generalized Radon Transform (GRT) method.

Select  |    Cite this article 
Duan Jia, Zhang Lei, Sheng Jia-Lian, Xing Meng-Dao
Parameters Decouple and Estimation of Independent Attributed Scattering Centers
2012 Vol. 34 (8): 1853-1859 [Abstract] ( 1862 ) [PDF 340KB] ( 874 )    DOI: 10.3724/SP.J.1146.2011.01302

Modified and developed from the original Geometrical Theory of Diffraction (GTD) model, attributed scattering center model takes the advantages of both frequency and angle dependent properties for the model parameters, providing much richer information of the target. However, it also brings such problem as parameter dimension increasing. Research on the independent scattering centers a novel algorithm of parameter estimation is proposed, where the linking parameter dimension could be reduced effectively and the parameters could be estimated in precision. In the scheme, the object function is constructed to seek parameters and they can be estimated by solving the optimization. In this method, precision initial values of the parameters are not required. Thus the computational complexity is reduced. Numeric simulation results confirm the validation of the proposed algorithm.

Select  |    Cite this article 
Qin Xian-Xiang, Gao Gui, Zhou Shi-Lin, Zou Huan-Xin
Method on Parameters Estimation of Generalized Gamma Distribution Based on Scale-Independent-Shape-Estimation (SISE) Equation
2012 Vol. 34 (8): 1860-1865 [Abstract] ( 1933 ) [PDF 332KB] ( 983 )    DOI: 10.3724/SP.J.1146.2011.01260

The Generalized Gamma Distribution  is one of the most important distributions for modeling of Synthetic Aperture Radar (SAR) images, of which the main limiting factor for application is the parameters estimation. In this paper, a new parameters estimation foris proposed. At first, the weakness of Method-of-Log-Cumulants (MoLC) for is analyzed. Moreover, the estimation expression for based on Scale-Independent-Shape-Estimation (SISE) equation is derived, and the concrete solving method is presented too. Finally, the Monte Carlo simulation results demonstrate that the proposed method is more stable and effective than MoLC.

Select  |    Cite this article 
Wu Zhao-Ping, Fu Wei-Bo, Su Tao, Zheng Ji-Bin
High Speed Radar Target Detection Based on Fast Radon-Fourier Transform
2012 Vol. 34 (8): 1866-1871 [Abstract] ( 1952 ) [PDF 338KB] ( 1324 )    DOI: 10.3724/SP.J.1146.2011.01180

Radon-Fourier Transform (RFT) is a kind of method which integrates radar target energy by integrating the target track in range-slow time domain according to the target motion parameters. Considering the two issues of high computation cost of RFT and the energy lose caused by quantization error without interpolation, a fast RFT method based on Chirp-Z Transform (CZT) is proposed, which implements in frequency domain, and combines its implement process and CZT algorithm together to solve the above issues successfully. In addition, the method can also eliminate the loss of match filtering by compensating the Doppler frequency of target without increasing the computation cost. The experiment results show that the integration performance of this method can almost achieve the optimal one under ideal condition.

Select  |    Cite this article 
Wang Wei-Wei, Liao Gui-Sheng, Zhu Sheng-Qi, Xu Jing-Wei
A Ground Moving Target Indication Method Based on Compressive Sensing
2012 Vol. 34 (8): 1872-1878 [Abstract] ( 2081 ) [PDF 321KB] ( 1096 )    DOI: 10.3724/SP.J.1146.2011.01285

For conventional Space-Time Adaptive Processing (STAP), sufficient Independent and Identically Distributed (IID) samples are hard to obtain by the clutter within heterogeneity. To mitigate this problem, a Compressive Sensing (CS) based Ground Moving Target Indication (GMTI) method is proposed. In the method, firstly the space-time data of the interested range bin are transformed to two-dimensional frequency fields to accumulate the signal energy and the corresponding redundant dictionary is constructed; Then several primary clutter spectrum peaks are extracted by Bayesian compressive sensing technique to estimate the clutter ridge; Finally, the weighted l1 minimization optimization model is constructed to realize the ground moving target indication. Simulation results and theory analysis demonstrate that the proposed method attains good resolution meanwhile it takes on excellent performance in low SNR.

Select  |    Cite this article 
Yu Bin-Bin, Liu Chang, Wang Yan-Fei
A Fast Echo Signal Simulating Algorithm for Sliding Spotlight Mode FMCW-SAR
2012 Vol. 34 (8): 1879-1884 [Abstract] ( 1437 ) [PDF 291KB] ( 797 )    DOI: 10.3724/SP.J.1146.2011.01211

For Frequency Modulated Continuous Wave Synthetic Aperture Radar (FMCW-SAR) at sliding spotlight mode, only time domain algorithm is available. That is because an azimuth window function suitable for each point target echo in the scene can not be obtained, which yields numerous operation. A novel fast echo simulating algorithm in range-Doppler domain is presented to solve the problem. Under some approximations, the algorithm successfully forms the azimuth window function by adding an azimuth linear frequency modulated signal and the phase information of the echo is obtained in range-doppler domain, which increases greatly the calculation speed while the simulating accuracy remains relatively high. The more the point targets are, the better performance in speed compared to the time-domain algorithm is achieved. S他和rmesfully                                                                                                                     SSsssimulations verify the effectiveness of the presented algorithm.

Select  |    Cite this article 
Wang Peng-Yu, Song Qian, Zhou Zhi-Min
A Physics-based Landmine Detection Approach with Compressive Sensing
2012 Vol. 34 (8): 1885-1892 [Abstract] ( 1465 ) [PDF 413KB] ( 846 )    DOI: 10.3724/SP.J.1146.2011.01239

The Compressed Sensing (CS) technique is an effective approach for sparse imaging and extraction of scattering structure of targets, which can be applied to target discrimination and recognition. Based on the experimental data from the Forward Looking Virtual Aperture Radar (FLVAR) system, the scattering structures of landmines can be acquired by CS sparse imaging algorithm. Then the sparse scattering structures are parameterized to form the features exploited by classifiers later. In this paper, a novel approach to target discrimination is proposed, which transforms the scattering of landmines to geometrical features, which have strong relationship with its physical characteristics. This new approach not only broadens the methodology for landmine discrimination, but also explores a new way of applying sparse scattering structures to target discrimination.

Select  |    Cite this article 
Wang Hong-Guang, Wu Zhen-Sen, Zhu Qing-Lin
Influence Analysis of Atmospheric Refraction on Low-angle Radar Tracking Errors
2012 Vol. 34 (8): 1893-1896 [Abstract] ( 1610 ) [PDF 212KB] ( 986 )    DOI: 10.3724/SP.J.1146.2011.01186

In this paper, based on the principle theory of angle tracking and the deterministic propagation modeling, a method of predicting the errors in the measured elevation angle is presented, which adopt the effective earth's radius to represent the atmospheric refraction effects. The errors of elevation angle are simulated in different refraction environments. The results of the study prove that the change of atmospheric refraction can affect the errors of elevation angle notablely associated with the multipath effects, indicating the atmospheric refraction is a key factor to be considered in low-angle tracking.

Select  |    Cite this article 
Chen Xiao-Long, Huang Yong, Guan Jian, He You
Study on the Fractional Power Spectrum of the Improved 1-D Time-varying Sea Surface Model
2012 Vol. 34 (8): 1897-1904 [Abstract] ( 1527 ) [PDF 331KB] ( 7637 )    DOI: 10.3724/SP.J.1146.2011.01197

To investigate the problem of classical two-scale sea surface model, which can not effectively analyze the non-Bragg scattering at high sea state and low grazing angle, a more practical scattering model for one-dimension (1-D) time-varying sea surface is adopted, in which a chirp parameter is employed to describe the changes of Doppler frequency. Then, the angular scattering characteristic of the improved model is investigated based on the mean scattered power. Next, the Fractional Power Spectrum (FPS) of the improved model is analyzed, which shows that the FPS of the scattered field is found to be distributed as sum of impulse signals and the peaks are relative to the frequency parameters of the improved model. Finally, X-band real sea data is used for verification and the influences of incident wavelength and transform angle on the FPS are discussed. The results prove that the improved model is suitable for the analysis and extraction of the frequency changes and Doppler shift for the time-varying sea surface.

Select  |    Cite this article 
Zhao Chun-Hui, Zhang Yi, Wang Yu-Lei
Relevant Vector Machine Classification of Hyperspectral Image Based on Wavelet Kernel Principal Component Analysis
2012 Vol. 34 (8): 1905-1910 [Abstract] ( 1885 ) [PDF 296KB] ( 929 )    DOI: 10.3724/SP.J.1146.2011.01282

Hyperspectral image classification by the Relevance Vector Machine (RVM) is a relatively new hyperspectral image classification method, however this method exists some shortcomings such as when the sample data is large and high dimension, the training time will be quit long and the classification accuracy is not so good. To solve these problems, this paper proposes a RVM classification method based on the new Kernel Principal Component Analysis (KPCA). This method uses the kernel function into the PCA and replaced the traditional kernel function with the wavelet kernel function. By using the feature of multiresolution analysis, the new method improves the nonlinear mapping capability of KPCA and the experiment completes the RVM hyperspectral image classification based on the wavelet kernel function PCA, And then the different effects of the hyperspectral image classification between the traditional PCA and the wavelet kernel PCA are analyzed and compared. The results show that by using the WKPCA method, the Euclidean distance of AVIRIS hyperspectral image data between the different categories and the same categories is lower 20% and the variance has been sharp rised. The classification accuracy, by using the RVM, improves the 3%~5%.

Select  |    Cite this article 
Li Lei, Han Wen-Bao, Wang Zheng
The Research of Parameters Selection on the Model of Time-memory-data Trade-off Attack to A5/1
2012 Vol. 34 (8): 1911-1916 [Abstract] ( 1533 ) [PDF 224KB] ( 616 )    DOI: 10.3724/SP.J.1146.2011.01217

GSM is the most popular world-wide standard for mobile communication system. GSM uses A5/1 algorithms to protect the users’ information. It is very important to research the attack of A5/1. In this paper, by analyzing the property of the state space’ reduction, a model of Time-memory-data trade-off attack to A5/1 algorithms is described, that model based on variable distinguished point and thin rainbow tables. The formulas are derived and the parameters are determined. By using FPGA and parameters determining, the attack success rate exceeds 99% in 1 second on average that improve the practicability of the attack. Based on this model, the method to determine the parameters has reference value to other platform and constraints.

Select  |    Cite this article 
Li Kai, Huang Xiao-Ying, Teng Ji-Hong, Li Zhen-Hua
A Quantum Secure Direct Communication Scheme Based on Einstein-Podolsky-Rosen (EPR) Sequence
2012 Vol. 34 (8): 1917-1922 [Abstract] ( 1562 ) [PDF 224KB] ( 1047 )    DOI: 10.3724/SP.J.1146.2011.01155

To improve the security of quantum secure direct communication protocols and reduce their cost, this paper presents a new means after analyzing the process of the eavesdropping detection, and offers a quantum secure direct communication scheme and a quantum secret sharing protocol to argue for it. Players employ the travel particles carrying secret messages to detect eavesdropping, and leak noting about secret messages. Investigation shows that players can make the quantum cryptography protocol not only with qubit efficiency of 100% but also secure in case of none checking particles made for eavesdropping detection only.

Select  |    Cite this article 
Zhou Jian-Qin, Liu Jun
On the 3 error Sequence Distribution of 2n-periodic Binary Sequences
2012 Vol. 34 (8): 1923-1927 [Abstract] ( 1406 ) [PDF 201KB] ( 678 )    DOI: 10.3724/SP.J.1146.2011.01315

The linear complexity and the k-error linear complexity of a sequence are used as important measures of keystream strength. By studying linear complexity of binary sequences with period 2n, it is proposed that the computation of k-error linear complexity can be converted to finding error sequences with minimal Hamming weight. In order to study sequence randomness, the k-error sequences distribution that corresponds with the k-error linear complexity of sequence is discussed. Based on Games-Chan algorithm, for k=3, the counting functions on the k-error sequences of  2n-periodic binary sequences with linear complexity 2n- are derived and the effectiveness is proved with computer programming.

Select  |    Cite this article 
Liu Jing, Tang Guang-Ming
Active Steganalysis Based on Pixels Classification in the Image
2012 Vol. 34 (8): 1928-1933 [Abstract] ( 1455 ) [PDF 246KB] ( 848 )    DOI: 10.3724/SP.J.1146.2011.01422

The research on steganalysis has mainly focused on hidden information detection, and there are few methods about active steganalysis. From the view of hidden information detection, the pixels are classified into different kinds. Based on the analysis of the effects on the frequencies of different kinds of pixels by message embedding and Least Significant Bit (LSB) plane flipping, an active steganalysis approach is proposed to recover the stego key of LSB replacement steganography in spatial domain of images. This method has remarkable physical significance and can be implemented conveniently. Experimental results show that this method can recover the stego key successfully in certain range of embedding ratio.

Select  |    Cite this article 
Liu Gang, Li Qian-Mu, Zhang Hong
Reliability Vector Orthogonal Projection Decomposition Method of Network Security Risk Assessment
2012 Vol. 34 (8): 1934-1938 [Abstract] ( 1648 ) [PDF 229KB] ( 753 )    DOI: 10.3724/SP.J.1146.2011.01387

Most traditional security risk assessment methods have the shortcomings of subjectivity and one-sidedness. Considering the risk analysis demand of vulnerabilities and attacks of network nodes, this paper proposes the concept of vulnerability reliability and attack reliability, and designs a reliability vector orthogonal projection decomposition method of network security risk assessment. First, this method associates vulnerability information which attacks relying on with vulnerability information of the node itself, and quantifies the security risk analysis from the node to the whole network, with the own weight of each node in the network. Second, in order to exclude the own uncertainties of vulnerability scanning tools and the unity of the data source, this method fuses several test results of scan tool, and constitutes the data source when calculating the vulnerability reliability. Finally, based on the idea of Euclidean space vector projection, the method puts forward an algorithm of reliability vector projection decomposition. The result of the experiment of the network security risk evaluation procedure is given to verify the proposed evaluate method.

Select  |    Cite this article 
Zhao Jia-Jie, Peng Jian-Hua, Huang Kai-Zhi, Ji Jiang
A Multi-user MIMO System Encryption Algorithm Based on Artificial Noise
2012 Vol. 34 (8): 1939-1943 [Abstract] ( 1554 ) [PDF 268KB] ( 817 )    DOI: 10.3724/SP.J.1146.2011.01068

The existing physical layer encryption algorithm, which is based on artificial noise, could affect legitimate receivers negatively when the number of users is no less than sending antennas in the multiuser MIMO system. In order to improve the multiuser MIMO system security under this scenario, this paper proposes a new multiuser MIMO system physical layer encryption algorithm based on joint channel state matrix. Firstly, multiple users are processed together, thus a multiuser joint channel state matrix is established. After Singular Value Decomposition (SVD) of the joint channel state matrix, the minimum singular value is obtained and can be utilized for pre-coding, so as to eliminate the interference of artificial noise to legitimate receivers. Further, the paper also presented an approach to optimize the power allocation. The simulation results show that the proposed algorithm can increase the secrecy capacity by  0.1 bit/(s?Hz) averagely, and improve the multiuser MIMO system security.

Select  |    Cite this article 
Wang Ling, Peng Qi-Cong, Peng Qi-Hang
Reward Based Multichannel Step-queuing Access Scheme in Cognitive Radio
2012 Vol. 34 (8): 1944-1949 [Abstract] ( 1714 ) [PDF 261KB] ( 827 )    DOI: 10.3724/SP.J.1146.2011.01244

This paper investigates continued-time two-dimensional birth-and-death process with priority in cognitive radio system. To simplify analysis, one-dimensional queuing model without priority is derived to equalize the complicated process. And a step-queuing scheme based on channel reward in multichannel scene is proposed, whose block probability and force termination probability performance determined by the Queuing-Structure Coefficient (QSC). Analytical results and simulation confirm the equivalent queuing model without priority valid. Also some diverse access scheme are compared in performance, step-queuing scheme presents a lower block probability and an adaptive force termination probability.

Select  |    Cite this article 
Hu Ying, Huang Yong-Ming, Yu Fei, Yang Lv-Xi
Energy-efficient Optimization Based User Schedule and Resource Allocation Algorithm
2012 Vol. 34 (8): 1950-1955 [Abstract] ( 2152 ) [PDF 274KB] ( 1265 )    DOI: 10.3724/SP.J.1146.2012.00011

An algorithm is proposed for energy-efficient user scheduling and resource allocation scheme in multi- user OFDMA mobile communication downlink system. A mathematical formulation of optimization issue is provided with the objective of maximizing system energy-efficient under QoS constraint. The proposed method can use system diversity to implement user selection and rate allocation with perfect Channel State Information (CSI) at the base station, it also enhanced the usage of energy effectively. Simulation results demonstrate that the performance of proposed algorithm is close to the optimum, it also has low complexity.

Select  |    Cite this article 
Wang Bin, Fu Mao-Bao, Wang Wen-Nai
An Occupying Proportional Fair Scheduling Based on OFDMA for Wireless Resource Allocation
2012 Vol. 34 (8): 1956-1961 [Abstract] ( 1736 ) [PDF 225KB] ( 752 )    DOI: 10.3724/SP.J.1146.2011.01378

In order to improve the system throughput when the wireless resource are shared by real and no-real services, a new type proportional fairness scheme for real time services occupying no-real time services is proposed, which first carries out union proportional fair scheduling, and then followes the procedure of real-time service occupying no-real-time service. The packet scheduling not only can guarantee the resource allocation of real time services, but also acquire better multi-user diversity gain. Theoretical analysis and simulation show that the suggested scheme can effectively improve the system throughput and spectrum efficiency in comparison with the existing approaches.

Select  |    Cite this article 
Zhou Zhi-Heng, Zhou Liang
Efficient Loss Recovery Based on Network Coding in Multicast Networks
2012 Vol. 34 (8): 1962-1967 [Abstract] ( 1380 ) [PDF 302KB] ( 773 )    DOI: 10.3724/SP.J.1146.2011.01233

Network coding is a promising technique for reliable multicast in wireless networks. In this paper, the characteristics of network coding opportunities are analyzed in multicast networks. The effect of the network coded packets, which can not be decoded, on the performance of network coding is studied. Based on these analyses, a Network Coding Loss Recovery (NCLR) scheme is proposed. NCLR allows receivers to store the packets, which they can not decode, and report the reception status to the sender. According to the feedback, NCLR prioritizes the packets that can contribute more to the overall transmission performance. Moreover in NCLR, not only original packets, but also encoded packets are scheduled and coded together to fully exploit coding opportunities. Simulation results show that NCLR improves significantly the multicast performance in terms of the number of retransmissions and recovery latency compared with existing schemes.

Select  |    Cite this article 
Zhu Yong-Xu, Wu Bin, Zhou Yu-Mei, Cai Jing-Jing, Xia Kai-Feng
A Distributed Systolic Array Processing Algorithm for QR-decomposition in MIMO-OFDM System
2012 Vol. 34 (8): 1968-1973 [Abstract] ( 1925 ) [PDF 305KB] ( 1355 )    DOI: 10.3724/SP.J.1146.2011.00768

To reduce the delay of Quadrature tRiangle (QR)-decomposition in the multi-carrier systems, a Distributed Systolic Array Processing (DSAP) algorithm for MIMO-OFDM system is proposed. The algorithm includes two processing mechanism: the first is the interleaved pre-processing, which groups and interleaves the row vectors of different channel matrix, and then the matrix elements are sent into the systolic array in columns according to the delay increasing pattern; the other is the signal processing of the distributed systolic array, which uses the CORDIC computation in the boundary and internal cells of systolic array and the synchronization operation, can distribute the QR-decomposition of different sub-carriers into the different stages of the pipelining operation of CORDIC in systolic array. Compared to Serial Systolic Array Processing (SSAP) algorithm, the clock periods can be put to great use in the DSAP algorithm, the delay is reduced by ninety-two percent with the same complexity, and it reduces the delay of subsequent data processing effectively.

Select  |    Cite this article 
He Shi-Wen, Huang Yong-Ming, Yang Lv-Xi
A Coordinated Multiple Point Joint Transmission Beamforming Algorithm Based on Duality Theory
2012 Vol. 34 (8): 1974-1979 [Abstract] ( 1701 ) [PDF 281KB] ( 823 )    DOI: 10.3724/SP.J.1146.2012.00010

A duality relation between the downlink max-min Signal-to-Interference-Noise Ratio (SINR) optimization issue and the virtual uplink min-max SINR optimization issue is revealed by using the Lagrange duality theory for coordinated multiple point joint transmission multiple input single output interference downlink system subject to per-base station power constraints. Based on the duality relation and subgradient theory, a two layer alternating iterative optimization beamforming method is proposed to solve the virtual uplink min-max SINR optimization issue. And the convergence of the proposed algorithm is proven. The complexity of the proposed method is analyzed by using real floating-point operation theory. Numerical simulation verifies the validity of the proposed method.

Select  |    Cite this article 
Ma Tian-Ming, Shi Yu-Song, Li Feng-Rong, Wang Ying-Guan
A Low Complexity Adaptive Scheme for Channel Estimation
2012 Vol. 34 (8): 1980-1985 [Abstract] ( 1683 ) [PDF 279KB] ( 827 )    DOI: 10.3724/SP.J.1146.2011.01153

To solve the problem of limited convergence in Least Square (LS) estimation method, an improved scheme is proposed. At first, the scheme uses the idea of matrix diagonalization to improve the Minimum Mean Square Error (MMSE) estimation method, making it to reduce greatly the complexity while maintain the estimate convergence. Then, a new scheme is proposed according to the adaptive theory, the estimate scheme can select the corresponding algorithm to estimate adaptively according to the state of current channel, which shows its high flexibility. The simulation result shows that using this scheme can further improve the Bit Error Rate (BER) and Mean Square Error (MSE) with low computational complexity, which is promising for practical applications.

Select  |    Cite this article 
Qi Xiao-Ke, Li Yu, Huang Hai-Ning
Construction of Reversible QC-LDPC Codes and Its Performance in Underwater Acoustic Communication System
2012 Vol. 34 (8): 1986-1992 [Abstract] ( 1913 ) [PDF 303KB] ( 740 )    DOI: 10.3724/SP.J.1146.2011.01373

A construction scheme of reversible Quasi Cyclic-Low Density Parity Check (QC-LDPC) codes is proposed by setting rationally zero matrices. This solves the problems of singular check matrix and high encoding complexity in conventional QC-LDPC codes. With circulant matrix corresponding to polynomial in finite fields, the scheme exploits the extended version of Euclid's algorithm to conquer the problem of QC-LDPC construction rate lager than design rate. Moreover, in the encoding process, first dividing the check matrix into blocks, and then the extended version of Euclid's algorithm is used to invert a circulant matrix, it results in dynamic complexity decrease. EXtrinsic Information Transfer (EXIT) chart implies the convergence of decoder. More simulations illustrate that the performance of the proposed construction structure is better than random LDPC when the code length is short, which is suitable for UnderWater Acoustic Communication (UWAC). Finally, applying QC-LDPC to Zero Padding-Orthogonal Frequency Division Multiplexing (ZP-OFDM) for evaluating the performance in UWAC, extended simulation shows that the reversible QC-LDPC codes can dynamically improve the system robustness.

Select  |    Cite this article 
Su Xin, Zhang Da-Fang, Luo Zhang-Qi, Zeng Bin, Li Wen-Wei
Botnet Detecting Method Based on Clustering Flow Attributes of Command and Control Communication Channel
2012 Vol. 34 (8): 1993-1999 [Abstract] ( 1841 ) [PDF 261KB] ( 1300 )    DOI: 10.3724/SP.J.1146.2011.01098

Botnet is a novel attack strategy evolved from traditional malware forms; It provides the attackers stealthy, flexible and efficient one to many Command and Control (C&C) mechanisms, which can be used to order an army of zombies to achieve the goals including information theft, launching Distributed Denial of Service (DDoS), and sending spam. This paper proposed a botnet detecting method which independent of botnet C&C protocol and structure, and not analysis payload of packets. At first this method use pre-filter rules to filter flow which have irrelevant with botnet; Second, the flow attributes are analyzed; Third, two-steps clustering algorithm which based on X-means clustering is used to analyze and cluster flow attributes of C&C channel, and the botnet detection is implemented. The experiment shows that this method can differentiate traffic of botnet and normal network with high accuracy, low false positive, achieve the goal that detects botnet under real network environment.

Select  |    Cite this article 
Hong Zhen, Yu Li, Zhang Gui-Jun, Chen You-Rong
Topology Construction Based on Minimum Connected Dominating Set for Wireless Sensor Networks
2012 Vol. 34 (8): 2000-2006 [Abstract] ( 1540 ) [PDF 323KB] ( 1216 )    DOI: 10.3724/SP.J.1146.2011.01029

Topology construction based on virtual backbone communication is an effective way to shut down redundant nodes and save energy of whole network. In this paper, an issue of finding optimal virtual backbone through fully connected network is abstracted and converted into Minimum Connected Dominating Set (MCDS) issue while a new mathematical modeling approach which is called (NMIP)-MCDS based on Mixed Integer Programming is proposed. Furthermore, with the help of analyzing MCDS solution, the product of token distribution number and energy consumption from nodes are built as the goal of optimization function. Simultaneously, the optimal MCDS is constructed via manner of token distribution and network energy load balancing. Finally, simulation results show the effectiveness of NMIP-MCDS. It could be further applied to practical general WSNs.

Select  |    Cite this article 
Xiang Qun-Liang, Zhang Pei-Yong, Ouyang-Dong-Sheng, Feng Chen-Hui
Multiple Frequency Slots Based Physical Unclonable Functions
2012 Vol. 34 (8): 2007-2012 [Abstract] ( 1451 ) [PDF 250KB] ( 1541 )    DOI: 10.3724/SP.J.1146.2011.01249

Physical Unclonable Functions (PUF) is a new method for the safety of Integrated Circuit (IC) products. Nowadays, the Ring Oscillator (RO) based puf is under the shadow of being attacked because of RO's constant frequency. A new construct(Multiple Frequency Slots based PUF,MFS-PUF) is proposed to solve this problem. All the ROs are configurable, each RO's frequency changes from one to another after generating one response bit. In each frequency, ROs differ from each other because of the uncontrollable difference in manufacture and there exists a frequency slot. In the whole system, many frequency slots exist and the transfer between them are unpredictable, this makes us get more Challenge-Response Pairs (CRPs for short), what's more, the system is more unpredictable. Compared with the traditional RO based PUF, it is more difficult for the attacker to model this system. This architecture not only ensures the uniqueness, but also increases the safety of itself.

Select  |    Cite this article 
Hui Hui, Li Wei-Qin, Wu Ya-Li
Outage Performance of Opportunistic Relaying Systems with Limited Feedback
2012 Vol. 34 (8): 2013-2017 [Abstract] ( 1819 ) [PDF 260KB] ( 811 )    DOI: 10.3724/SP.J.1146.2012.00024

In this paper, the outage performance and diversity gain of amplify-and-forward opportunistic relaying systems under the constraint of limited feedback are studied. With limited feedback, the quantization error of Channel State Information (CSI) will impact the distinguishing of the best relay and worsen the system performance. Considering this issue, the outage performance is studied and its approximate analytical expression is derived for opportunistic relaying systems with limited feedback. Further, the following two propositions are analyzed and proved: with limited feedback, no matter how many potential relays in cooperation, the diversity order can and only can be 2; with the increasing accuracy of feedback, the outage probability approaches to that of the ideal opportunistic relaying systems. Simulation results verify the analytical expression of the outage probability and the proposed propositions, which provide a theoretical support for the design of relaying protocols under the constraint of limited feedback.

Select  |    Cite this article 
Ruan Xiu-Kai, Jiang Xiao, Li Chang
A Novel Method of Bussgang-type Blind Equalization in High-order QAM Systems
2012 Vol. 34 (8): 2018-2022 [Abstract] ( 1862 ) [PDF 317KB] ( 768 )    DOI: 10.3724/SP.J.1146.2011.01403

A novel multi-modulus method of Bussgang-type blind equalization algorithm in higher-order Quadrature Amplitude Modulation (QAM) systems is proposed. To reduce the steady-state error effectively, an instantaneous switch-mode hybrid algorithm whose associative cost function is formulated by the novel cost function and the Constellation Matched Error (CME) is proposed, and a criterion of circular mode switching decision is designed. Finally, 256-QAM signal is used to simulate, all of these results verify the proposed blind equalization algorithm can achieve good performance in high-order QAM systems.

Select  |    Cite this article 
Lai Ying-Xin, Tan Yong-Ming
Design and Analysis of a 60 GHz Narrowband Band-pass Filter Based on Defected Coaxial Bragg Waveguide
2012 Vol. 34 (8): 2023-2027 [Abstract] ( 1380 ) [PDF 266KB] ( 713 )    DOI: 10.3724/SP.J.1146.2012.00319

Based on the pass-band characters of defected coaxial Bragg waveguides, a novel topology of narrow-band, band-pass millimeter-wave filter at 60 GHz is designed and analyzed by making use of the multi-wave interaction formulation as well as software Ansoft HFSS. It is found that, if a defected Bragg filter with a large transverse dimensional size operates at high frequency, the spurious coupling between the operating mode and the competing modes will spoil the pass-band structure; but fortunately, this negative effect can be suppressed by applying Hamming-window-function distribution to the ripples amplitude of the filter. Results show the filter has a narrow fractional bandwidth less than 0.1% with a low insertion loss below 1.5 dB and large dimensional size, which favors to select the specified narrow-band signal in high power applications.

Select  |    Cite this article 
Xu Li, Yang Zhong-Hai, Li Jian-Qing, Li Bin
Three-dimensional Finite-element Analysis of Conductivity and Dielectric Attenuation in Arbitrary Slow-wave Structure of Traveling-wave Tubes
2012 Vol. 34 (8): 2028-2032 [Abstract] ( 1406 ) [PDF 242KB] ( 682 )    DOI: 10.3724/SP.J.1146.2011.01332

This paper presents a novel 3-D finite-element analysis method for arbitrary lossy Slow-Wave Structure (SWS) of the traveling-wave tube. In this analysis method, a new Frequency-Specified Eigenmode Analysis (FSEA) for SWSs is proposed and utilized. Unlike the traditional phase-advance-specified eigenmode analysis for SWSs which has to solve a nonlinear Generalized Eigenvalue Problem (GEP), the new FSEA approach only needs solving a linear GEP and is capable of obtaining the attenuation constant more accurately and directly without any post-processing when simulating the lossy SWSs.

电子与信息学报
Author Center
Online Submission
Author Instruction
FAQ
Template
Copyright Agreement
MSN:je-jeit@hotmail.com
Links
More>>  
     京ICP备05002787号

© 2010 JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY
Institute of Electronics, Chinese Academy of Sciences, P.O.Box 2702, Beijing 100190
Tel: +86-10-58887066 Fax: +86-10- 58887539,Email: jeit@mail.ie.ac.cn

Supported by:Beijing Magtech