Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Improved image denoising algorithm of Contourlet transform based on gray relational degree
ZENG Youwei YANG Huixian TANG FEI TAN Zhenghua HE Yali
Journal of Computer Applications    2013, 33 (04): 1103-1107.   DOI: 10.3724/SP.J.1087.2013.01103
Abstract729)      PDF (915KB)(550)       Save
In order to denoise image more effectively, an improved Contourlet transform denoising algorithm based on gray relational degree was proposed. On one hand, considering the gray relational degree and inter-scale from the high-frequency sub-band and low frequency sub-band by Contourlet transform, the Bayes threshold was improved; On the other hand, in order to achieve the purpose of adaptive denoising, the characteristics of Contourlet coefficients were used to improve the compromising threshold function. The experimental results show that the proposed algorithm can denoise image effectively, get higher PSNR and better visual quality, and has a good practicability.
Reference | Related Articles | Metrics
Efficient threshold signature scheme in standard model
SHI Xianzhi LIN Changlu ZHANG Shengyuan TANG Fei
Journal of Computer Applications    2013, 33 (01): 15-18.   DOI: 10.3724/SP.J.1087.2013.00015
Abstract923)      PDF (631KB)(612)       Save
To improve the computational efficiency in the threshold signature scheme, the authors proposed a new threshold signature scheme based on bilinear pairing via combining Gennaro's (GENNARO R, JAREAKI S, KRAWCZYK H, et al. Secure distributed key generation for discrete-log based cryptosystem. Journal of Cryptology, 2007, 20(1): 51-83) distributed secret key generation solution and Gu's (GU K, JIA W J, JIANG C L. Efficient and secure identity-based signature scheme. Journal of Software, 2011, 22(6): 1350-1360) signature scheme in the standard model. There was no trusted dealer for secret key share distribution and each party could verify the validity of some important information, which guaranteed the proposed scheme can avoid the malicious private key generator attack and public key share replacing attack. The comparison results with two previous threshold signature schemes show that the proposed scheme needs less pairing computation and raises the computational efficiency.
Reference | Related Articles | Metrics