摘要:
Embodiments of the invention disclose a system and a method for transforming a biometric of a user to a binary feature vector suitable for user authentication, comprising steps of: partitioning the biometric into a set of regions, wherein each region is a contiguous region confining a part of the biometric; determining, for each region, biometric parameters; applying, to each region, binary logical conditions to produce at least one bit of the binary feature vector, wherein the applying is performed by a processer; and outputting the binary feature vector.
摘要:
Embodiments of the invention disclose a system and a method for transforming a biometric of a user to a binary feature vector suitable for user authentication, comprising steps of: partitioning the biometric into a set of regions, wherein each region is a contiguous region confining a part of the biometric; determining, for each region, biometric parameters; applying, to each region, binary logical conditions to produce at least one bit of the binary feature vector, wherein the applying is performed by a processer; and outputting the binary feature vector.
摘要:
A method embeds a message into a document containing a set of glyphs. Individual glyphs in the document, groups of glyphs in the document, or the entire document are represented using a distance field that includes distance values from the shapes of interest. Each symbol of the message is represented as modifications of a subset of the distance values in the distance field. This subset of the distance values in the distance field is modified according to modification to produce a modified glyph in a modified document, wherein the symbol in the message is embedded in the modified glyph.
摘要:
An encoded signal is decoded based on statistical dependencies between the encoded signal and the side information. A statistical reliability of each transform block of the side information is determined as a function of absolute values of transform coefficients of a transform block. The transform blocks of the side information are grouped into a set of groups based on the statistical reliability of each transform block. The decoding is performed using a statistical dependency between a transform block of the encoded signal and a group including a corresponding transform block of the side information.
摘要:
A system and a method for determining a result of applying a function to signals is disclosed. The function is a polynomial function including monomials, in which the first signal in a first power forming a first part of the monomial and the second signal in a second power forming a second part of the monomial, wherein the first part of the monomial encrypted with a key is a first encrypted signal, and the second part of the monomial encrypted with the key is a second encrypted signal, comprising the steps of transmitting a first input signal encrypted with a second public key to the second processor, wherein the first input signal includes the first encrypted signal, transmitting a second input signal encrypted with a first public key to the first processor, wherein the second input signal includes a product of the first encrypted signal and the second encrypted signal.
摘要:
A method embeds a message into a document containing a set of glyphs. Individual glyphs in the document, groups of glyphs in the document, or the entire document are represented using a distance field that includes distance values from the shapes of interest. Each symbol of the message is represented as modifications of a subset of the distance values in the distance field. This subset of the distance values in the distance field is modified according to modification to produce a modified glyph in a modified document, wherein the symbol in the message is embedded in the modified glyph.
摘要:
A method decodes a picture in a form of a bit-stream. The picture is encoded and represented by vectors of coefficients. Each coefficient is in a quantized form. A specific coefficient is selected in each vector based on a scan order of the vector. Then, a set of modes is inferred based on characteristics of the specific coefficient. Subsequently, the bit-stream is decoded according to the set of modes.
摘要:
A method for verifying a similarity between a first signal and a second signal is described. The first and the second signals are encrypted homomorphically using a key. First, we acquire a set of error patterns determined by a similarity constraint. Then, each error pattern is homomorphically encrypted using the key and presented to a verifier in the setup phase. The verifier declares the first signal similar to the second signal, if any error pattern in the set of error patterns satisfies a homomorphic relationship between the first encrypted signal and the second encrypted signal.
摘要:
A method for encoding a source image, wherein the source image includes a set of bitplanes of pixels, is disclosed. For each bitplane in a most to least significant order, the method include obtaining a list of significant pixels (LSP), a list of insignificant pixels (LIP), and a list of insignificant sets (LIS) according to a hierarchical ordering of the source image pixels; synchronizing the LSP, LIP and LIS of the source image with the LSP, LIP and LIS of a key image; constructing a temporary list of insignificant sets (TLIS) for the source image; and applying syndrome encoding to the LSP, LIP, and TLIS of the source image to obtain syndromes corresponding to magnitudes and signs of pixels in the source image, wherein the steps are performed in a processor.
摘要:
A method for verifying a similarity between a first signal and a second signal is described. The first and the second signals are encrypted homomorphically using a key. First, we acquire a set of error patterns determined by a similarity constraint. Then, each error pattern is homomorphically encrypted using the key and presented to a verifier in the setup phase. The verifier declares the first signal similar to the second signal, if any error pattern in the set of error patterns satisfies a homomorphic relationship between the first encrypted signal and the second encrypted signal.