Journals
  Publication Years
  Keywords
Search within results Open Search
Please wait a minute...
For Selected: Toggle Thumbnails
Face recognition security system based on liveness detection and authentication
CHEN Fang, LIU Xiaorui, YANG Mingye
Journal of Computer Applications    2020, 40 (12): 3666-3672.   DOI: 10.11772/j.issn.1001-9081.2020040478
Abstract467)      PDF (1545KB)(489)       Save
Face recognition is widely applied in various practical conditions such as entrance guard due to its convenience and practicability. But it is vulnerable to various forms of spoofing attacks (such as photo attacks and video attacks). The liveness detection based on deep Convolution Neural Network (CNN) can solve the above problem but has disadvantages such as high calculation cost, unfriendly interaction mode and difficult deployment on embedded devices. Therefore, a real-time and lightweight security classification method of face recognition was proposed. The face liveness detection algorithm based on color and texture analysis was integrated with the face authentication algorithm, and a face recognition algorithm performing face liveness detection and face authentication in the situation of monocular camera without user cooperation was proposed. The proposed algorithm can support real-time face recognition and has higher liveness recognition rate and robustness. In order to validate the performance of the proposed algorithm, Chinese Academy of Sciences Institute of Automation-Face Anti-Spoofing Dataset (CASIA-FASD) and Replay-Attack dataset were utilized as the benchmark datasets of the experiment. The experimental results show that, in the liveness detection, the proposed algorithm has the Half Total Error Rate (HTER) of 9.7% and Equal Error Rate (EER) of 5.5% respectively, and has the time cost of 0.12 s to process a frame of image in the whole process. The above results verify the feasibility and effectiveness of the proposed algorithm.
Reference | Related Articles | Metrics
Diamond encoding steganography algorithm based on algebraic multigrid
YANG Ming, HUANG Ying
Journal of Computer Applications    2017, 37 (6): 1609-1615.   DOI: 10.11772/j.issn.1001-9081.2017.06.1609
Abstract461)      PDF (1121KB)(568)       Save
Concerning the problem of security for steganography algorithm, a Diamond Encoding (DE) steganography algorithm based on Algebraic MultiGrid (AMG) was proposed. Firstly, an image was divided into two parts of coarse grid and fine grid by the AMG method. Then, the confidential information was embedded into the two part pixels of coarse grid and fine grid by DE method. The change of pixels in coarse grid part has little influence on the whole image quality, while the change of pixels in fine grid part has the great effect on the whole image quality. And the k value of DE is associated with the capacity of information hiding closely, the pixels change greater with the k value increasing. Therefore, in the embedding process with DE, the k value of the coarse grid part is not less than that of the fine grid part. Finally, when the k value of DE was chosen to 1 and 2, three kinds of steganography scheme were proposed. The proposed algorithm was compared with Least Significant Bit (LSB) replacement, random LSB matching, DE algorithm and adaptive edge detection algorithm. The experimental results show that, the first-order Markov security metric of the proposed algorithm is superior to other contrasted steganalysis algorithms.
Reference | Related Articles | Metrics
Modeling and simulation for high-frequency IP wide-area network
JING Yuan HUANG Guorong YANG Ming QI Yunjun CHEN Shangguang
Journal of Computer Applications    2014, 34 (2): 333-337.  
Abstract321)      PDF (740KB)(448)       Save
〖JP2〗With different way of link established, the high frequency IP wide-area network shows a different topological feature during the network operation process. Modeling study and simulation analysis were made with a modified harmonious unifying hybrid preferential model on high frequency IP wide-area network. And the results were found that the degree distribution, shortest path and clustering coefficient would be impacted by the different node selection method for new connection. Mean-while, the average shortest path of the network would be affected by the different edge deletion method. What's more the topological characteristics of the network were determined by the proportion of different node selection method.〖JP〗
Related Articles | Metrics
Multi-objective evolutionary algorithm for grid job scheduling based on adaptive neighborhood
YANG Ming XUE Sheng-jun CHEN Liang LIU Yong-sheng
Journal of Computer Applications    2012, 32 (03): 599-602.   DOI: 10.3724/SP.J.1087.2012.00599
Abstract1085)      PDF (608KB)(722)       Save
A new adaptive neighborhood Multi-Objective Grid Task Scheduling Algorithm (ANMO-GTSA) was proposed in this paper for the multi-objective job scheduling collaborative optimization problem in grid computing. In the ANMO-GTSA, an adaptive neighborhood method was applied to find the non-inferior set of solutions and maintain the diversity of the multi-objective job scheduling population. The experimental results indicate that the algorithm proposed in this paper can not only balance the multi-objective job scheduling, but also improve the resource utilization and efficiency of task execution. Moreover, the proposed algorithm can achieve better performance on time-dimension and cost-dimension than the traditional Min-min and Max-min algorithms.
Reference | Related Articles | Metrics
Image segmentation algorithm based on incomplete K-means clustering and category optimization
YANG Ming-chuan Lǚ Xue-bin ZHOU Qun-biao
Journal of Computer Applications    2012, 32 (01): 248-251.   DOI: 10.3724/SP.J.1087.2012.00248
Abstract1215)      PDF (758KB)(748)       Save
To improve the clustering efficiency and image segmentation effect, the paper proposed an Incomplete K-means and Category Optimization (IKCO) method. First of all, the algorithm used simple approach to finish data subsampling and initial centers determining. Then, according to the clustering rules, the proposed algorithm finished image's segmentation. Finally, the algorithm used category optimization method to improve segmentation results. The experimental results show that, compared with the traditional K-means clustering method, the proposed algorithm has better segmentation efficiency, and the segmentation result has a higher consistency with human visual perception.
Reference | Related Articles | Metrics
Centroid-based distributed clustering scheme for wireless sensor networks
JIANG Shao-feng; YANG Ming-hua; SONG Han-tao; WU Zheng-yu; WANG Jie-min
Journal of Computer Applications   
Abstract2338)      PDF (1052KB)(1015)       Save
Based on LEACH, we proposed a novel clustering algorithm Centroidbased Distributed Clustering Scheme(CDCS) for Wireless Sensor Networks(WSNs). In CDCS, each sensor firstly decided whether it was local tentative clusterheads on its own at any given time with a certain probability popt. The tentative clusterhead computed the centroid of cluster based on information of sensors within cluster; and then dynamically adjusted the structure of cluster, so that the total energy dissipation within the cluster was minimized. Theoretical analysis and simulation results show that CDCS prolong the lifetime of a sensor network by 32%~38% over that of LEACH in different scenes while still maintaining the simplicity of LEACH.
Related Articles | Metrics
Research and implementation of software registration system based on asymmetric cryptography
ZHANG Yi-ting,YANG Ming
Journal of Computer Applications    2005, 25 (02): 399-402.   DOI: 10.3724/SP.J.1087.2005.0399
Abstract805)      PDF (174KB)(1550)       Save

Compelling registration/validation and the ability of anti-cracking are core problems in software copyright protection area. Traditional registration methods mainly depended on the strength and secrecy of validation algorithm, and thus had a low reliability. This paper proposed a new software registration and validation method adopting asymmetric cryptography technique and license file, and also gave the detailed design and implementation of PubCMCenter (Software Publish Control and Manage Center) system based on this method. In the system, the publisher preserves private key, while software users only have the public key that is needed to validate the license file and have no ability to generate the license. Furthermore, this system can also make modular authorization according to the user’s level. Compared with traditional techniques, this system is easier and safer to use.

Related Articles | Metrics
Algorithm of Bayesian network structural learning based on information theory
NIE Wen-guang, LIU Wei-yi, YANG Yun-tao, YANG Ming
Journal of Computer Applications    2005, 25 (01): 1-3.   DOI: 10.3724/SP.J.1087.2005.00001
Abstract1008)      PDF (186KB)(1002)       Save
Bayesian network is a forceful tool to practise inference of uncertainty. It combines graphic theories and probability ones, which can conveniently express and calculate the probability of interesting events and at the same time provide a compact, visual and effective graphic expression for the dependant relationship among the entities. On the basis of testing information independence theory, the test of CI(conditional independence) was carried out on all the joints in the Bayesian network to find out the conditionally dependant relations among them. Then an effective algorithm of Bayesian network structural learning was worked out, which only needed CI testing of O(N 2) times.
Reference | Related Articles | Metrics