The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher...The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.展开更多
With the increasing awareness of privacy protection and the improvement of relevant laws,federal learning has gradually become a new choice for cross-agency and cross-device machine learning.In order to solve the prob...With the increasing awareness of privacy protection and the improvement of relevant laws,federal learning has gradually become a new choice for cross-agency and cross-device machine learning.In order to solve the problems of privacy leakage,high computational overhead and high traffic in some federated learning schemes,this paper proposes amultiplicative double privacymask algorithm which is convenient for homomorphic addition aggregation.The combination of homomorphic encryption and secret sharing ensures that the server cannot compromise user privacy from the private gradient uploaded by the participants.At the same time,the proposed TQRR(Top-Q-Random-R)gradient selection algorithm is used to filter the gradient of encryption and upload efficiently,which reduces the computing overhead of 51.78%and the traffic of 64.87%on the premise of ensuring the accuracy of themodel,whichmakes the framework of privacy protection federated learning lighter to adapt to more miniaturized federated learning terminals.展开更多
With the rapid development of information technology,the electronifi-cation of medical records has gradually become a trend.In China,the population base is huge and the supporting medical institutions are numerous,so ...With the rapid development of information technology,the electronifi-cation of medical records has gradually become a trend.In China,the population base is huge and the supporting medical institutions are numerous,so this reality drives the conversion of paper medical records to electronic medical records.Electronic medical records are the basis for establishing a smart hospital and an important guarantee for achieving medical intelligence,and the massive amount of electronic medical record data is also an important data set for conducting research in the medical field.However,electronic medical records contain a large amount of private patient information,which must be desensitized before they are used as open resources.Therefore,to solve the above problems,data masking for Chinese electronic medical records with named entity recognition is proposed in this paper.Firstly,the text is vectorized to satisfy the required format of the model input.Secondly,since the input sentences may have a long or short length and the relationship between sentences in context is not negligible.To this end,a neural network model for named entity recognition based on bidirectional long short-term memory(BiLSTM)with conditional random fields(CRF)is constructed.Finally,the data masking operation is performed based on the named entity recog-nition results,mainly using regular expression filtering encryption and principal component analysis(PCA)word vector compression and replacement.In addi-tion,comparison experiments with the hidden markov model(HMM)model,LSTM-CRF model,and BiLSTM model are conducted in this paper.The experi-mental results show that the method used in this paper achieves 92.72%Accuracy,92.30%Recall,and 92.51%F1_score,which has higher accuracy compared with other models.展开更多
Speech perception is essential for daily communication.Background noise or concurrent talkers,on the other hand,can make it challenging for listeners to track the target speech(i.e.,cocktail party problem).The present...Speech perception is essential for daily communication.Background noise or concurrent talkers,on the other hand,can make it challenging for listeners to track the target speech(i.e.,cocktail party problem).The present study reviews and compares existing findings on speech perception and unmasking in cocktail party listening environments in English and Mandarin Chinese.The review starts with an introduction section followed by related concepts of auditory masking.The next two sections review factors that release speech perception from masking in English and Mandarin Chinese,respectively.The last section presents an overall summary of the findings with comparisons between the two languages.Future research directions with respect to the difference in literature on the reviewed topic between the two languages are also discussed.展开更多
The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authen...The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack.展开更多
In order to improve the design results for the reconfigurable frequency response masking FRM filters an improved design method based on second-order cone programming SOCP is proposed.Unlike traditional methods that se...In order to improve the design results for the reconfigurable frequency response masking FRM filters an improved design method based on second-order cone programming SOCP is proposed.Unlike traditional methods that separately design the proposed method takes all the desired designing modes into consideration when designing all the subfilters. First an initial solution is obtained by separately designing the subfilters and then the initial solution is updated by iteratively solving a SOCP problem. The proposed method is evaluated on a design example and simulation results demonstrate that jointly designing all the subfilters can obtain significantly lower minimax approximation errors compared to the conventional design method.展开更多
The aim of the study was to taste mask ciprofloxacin(CP)by using ion-exchange resins(IERs)followed by sustain release of CP by forming interpenetrating polymer network(IPN).IERs based on the copolymerization of acryli...The aim of the study was to taste mask ciprofloxacin(CP)by using ion-exchange resins(IERs)followed by sustain release of CP by forming interpenetrating polymer network(IPN).IERs based on the copolymerization of acrylic acid with different cross linking agents were synthesised.Drug-resin complexes(DRCs)with three different ratios of drug to IERs(1:1,1:2,1:4)were prepared&evaluated for taste masking by following in vivo and in vitro methods.Human volunteers graded ADC 1:4,acrylic acid-divinyl benzene(ADC-3)resin as tasteless.Characterization studies such as FTIR,SEM,DSC,P-XRD differentiated ADC 1:4,from physical mixture(PM 1:4)and confirmed the formation of complex.In vitro drug release of ADC 1:4 showed complete release of CP within 60 min at simulated gastric fluid(SGF)i.e.pH 1.2.IPN beads were prepared with ADC 1:4 by using sodium alginate(AL)and sodium alginate-chitosan(AL-CS)for sustain release of CP at SGF pH and followed by simulated intestinal fluid(SIF i.e.pH 7.4).FTIR spectra confirmed the formation of IPN beads.The release of CP was sustain at SGF pH(<20%)whereas in SIF media it was more(>75%).The kinetic model of IPN beads showed the release of CP was non-Fickian diffusion type.展开更多
This paper presents a deep neural network(DNN)-based speech enhancement algorithm based on the soft audible noise masking for the single-channel wind noise reduction. To reduce the low-frequency residual noise, the ps...This paper presents a deep neural network(DNN)-based speech enhancement algorithm based on the soft audible noise masking for the single-channel wind noise reduction. To reduce the low-frequency residual noise, the psychoacoustic model is adopted to calculate the masking threshold from the estimated clean speech spectrum. The gain for noise suppression is obtained based on soft audible noise masking by comparing the estimated wind noise spectrum with the masking threshold. To deal with the abruptly time-varying noisy signals, two separate DNN models are utilized to estimate the spectra of clean speech and wind noise components. Experimental results on the subjective and objective quality tests show that the proposed algorithm achieves the better performance compared with the conventional DNN-based wind noise reduction method.展开更多
In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption per...In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption performance of the receiver can be improved when the message wavelength is greater than that of the chaotic carrier. When the wavelength offset is set to 0.12 nm, high-speed secure optical communication with a message of 2.5 Gbits/s is achieved.展开更多
The objective of this study was to carry out taste masking of ofloxacin(Ofl) by ion exchange resins(IERs)followed by sustained release of Ofl by forming interpenetrating polymer network(IPN) beads. Drug-resin complexe...The objective of this study was to carry out taste masking of ofloxacin(Ofl) by ion exchange resins(IERs)followed by sustained release of Ofl by forming interpenetrating polymer network(IPN) beads. Drug-resin complexes(DRCs) with three different ratios of Ofl to IERs(1:1, 1:2, 1:4) were prepared by batch method and investigated for in vivo and in vitro taste masking. DRC of methacrylic acid-divinyl benzene(MD) resin and Ofl prepared at a ratio of 1:4 was used to form IPN beads. IPN beads of MD 1:4 were prepared by following the ionic cross-linking method using sodium carboxymethyl xanthan gum(SCMXG) and SCMXG-sodium carboxymethyl cellulose(SCMXG-SCMC). IPN beads were characterized with FT-IR and further studied on sustained release of Ofl at different pH. In vivo taste masking carried out by human volunteers showed that MD 1:4 significantly reduced the bitterness of Ofl. Characterization studies such as FT-IR, DSC, P-XRD and taste masking showed that complex formation took place between drug and resin. In vitro study at gastric pH showed complete release of drug from MD 1:4 within 30 min whereas IPN beads took 5 h at gastric pH and 10 h at salivary pH for the complete release of drug. As the crosslinking increased the release kinetics changed into non-Fickian diffusion to zero-order release mechanism. MD 1:4 showed better performance for the taste masking of Ofl and IPNs beads prepared from it were found useful for the sustained release of Ofl at both the pH, indicating a versatile drug delivery system.展开更多
In this paper,we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation(QIM) scheme. Instead of a fixed quantization step-size,we apply a step-size adapted...In this paper,we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation(QIM) scheme. Instead of a fixed quantization step-size,we apply a step-size adapted to image content in each 8×8 block to make a balance of robust extraction and transparent embedding.The modified step-size is determined by contrast masking thresholds of Watson’s perceptual model.From a normalized crossed-correlation value between the original watermark and the detected watermark,we could observe that our method is robust to attacks of additive white Gaussian noise(AWGN),Salt and Pepper noise and Joint Photographic Experts Group(JPEG) compression than the original QIM.By taking into account the contrast insensitivity and visible thresholds of human visual system,the suggested improvement achieves a maximum embedding strength and an appropriate quantization step-size which is consistent with local values of a host signal.展开更多
In this paper, during the masking process the encrypted message is convolved and embedded into a Qi hyper-chaotic system characterizing a high disorder degree. The masking scheme was tested using both Qi hyper-chaos a...In this paper, during the masking process the encrypted message is convolved and embedded into a Qi hyper-chaotic system characterizing a high disorder degree. The masking scheme was tested using both Qi hyper-chaos and Lorenz chaos and indicated that Qi hyper-chaos based masking can resist attacks of the filtering and power spectrum analysis, while the Lorenz based scheme fails for high amplitude data. To unmask the message at the receiving end, two methods are proposed. In the first method, a model-free synchronizer, i.e. a multivariable higher-order differential feedback controller between the transmitter and receiver is employed to de-convolve the message embedded in the receiving signal. In the second method, no synchronization is required since the message is de-convolved using the information of the estimated derivative.展开更多
In this paper, a new numerical simulation approach is proposed for the study of open-loop frequency response of a chaotic masking system. Using Chua's circuit and the Lorenz system as illustrative examples, we have s...In this paper, a new numerical simulation approach is proposed for the study of open-loop frequency response of a chaotic masking system. Using Chua's circuit and the Lorenz system as illustrative examples, we have shown that one can employ chaos synchronization to separate the feedback network from a chaotic masking system, and then use numerical simulation to obtain the open-loop synchronization response, the phase response, and the amplitude response of a chaotic masking system. Based on the analysis of the frequency response, we have also proved that changing the amplitude of the exciting (input) signal within normal working domain does not influence the frequency response of the chaotic masking system. The new numerical simulation method developed in this paper can be extended to consider the open-loop frequency response of other systems described by differential or difference equations.展开更多
In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov expon...In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks.展开更多
A single-channel speech enhancement method of noisy speech signals at very low signal-to-noise ratios is presented, which is based on masking properties of the human auditory system and power spectral density estimati...A single-channel speech enhancement method of noisy speech signals at very low signal-to-noise ratios is presented, which is based on masking properties of the human auditory system and power spectral density estimation of non stationary noise. It allows for an automatic adaptation in time and frequency of the parametric enhancement system, and finds the best tradeoff among the amount of noise reduction, the speech distortion, and the level of musical residual noise based on a criterion correlated with perception and SNR. This leads to a significant reduction of the unnatural structure of the residual noise. The results with several noise types show that the enhanced speech is more pleasant to a human listener.展开更多
Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe,...Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe, is masked by a preceding tone, the masker. Forward masking is展开更多
A watermarking scheme designed for remote sensing images needs to meet the same demand of both invisibility as for ordinary digital images. Due to specific perceptual characteristics of Synthetic Aperture Radar(SAR) i...A watermarking scheme designed for remote sensing images needs to meet the same demand of both invisibility as for ordinary digital images. Due to specific perceptual characteristics of Synthetic Aperture Radar(SAR) images, the watermarking algorithms with consideration of Human Vision System(HVS) modeling from optical images give poor performance when applied on SAR images. This paper examines a variety of factors affecting the noise sensitivity, and further proposes a refined pixel-wise masking approach for watermarking on SAR images. The proposed approach is applied on logarithmic transformed SAR images, and has increased the acceptable watermark embedding strength by about 6 dB to 10 dB while achieving the same levels of watermarked image visual quality. Experimental results show that this approach enhanced the perceptual invisibility of watermarking based on wavelet decomposition.展开更多
Traditional noise reduction techniques have the drawback of generating an annoying musical noise. A new scheme for speech enhancement in high noise environment is developed by considering human auditory system masking...Traditional noise reduction techniques have the drawback of generating an annoying musical noise. A new scheme for speech enhancement in high noise environment is developed by considering human auditory system masking characteristics. The new scheme considers the masking threshold of both noisy speech and the denoised one, to detect musical noise components. To make them inaudible, they are set under the noise masking threshold. The improved signal is subjected to extensive subjective and objective tests. It is ob-served that the musical noise is appreciably reduced even at very low signal to noise ratios.展开更多
To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in...To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite systems.The concept of quantum masking was developed along with a new quantum impossibility theorem,the quantum no-masking theorem.The question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states,the number of masking participants,and error correction codes.Others have studied the relationships between maskable quantum states,the deterministic and probabilistic masking of quantum states,and the problem of probabilistic masking.Quantum masking techniques have been shown to outperform previous strategies in quantum bit commitment,quantum multi-party secret sharing,and so on.展开更多
基金the Hunan Provincial Natrual Science Foundation of China(2022JJ30103)“the 14th Five-Year”Key Disciplines and Application Oriented Special Disciplines of Hunan Province(Xiangjiaotong[2022]351)the Science and Technology Innovation Program of Hunan Province(2016TP1020).
文摘The Inner Product Masking(IPM)scheme has been shown to provide higher theoretical security guarantees than the BooleanMasking(BM).This scheme aims to increase the algebraic complexity of the coding to achieve a higher level of security.Some previous work unfolds when certain(adversarial and implementation)conditions are met,and we seek to complement these investigations by understanding what happens when these conditions deviate from their expected behaviour.In this paper,we investigate the security characteristics of IPM under different conditions.In adversarial condition,the security properties of first-order IPMs obtained through parametric characterization are preserved in the face of univariate and bivariate attacks.In implementation condition,we construct two new polynomial leakage functions to observe the nonlinear leakage of the IPM and connect the security order amplification to the nonlinear function.We observe that the security of IPMis affected by the degree and the linear component in the leakage function.In addition,the comparison experiments from the coefficients,signal-to-noise ratio(SNR)and the public parameter show that the security properties of the IPM are highly implementation-dependent.
基金supported by the National Natural Science Foundation of China(Grant Nos.62172436,62102452)the National Key Research and Development Program of China(2023YFB3106100,2021YFB3100100)the Natural Science Foundation of Shaanxi Province(2023-JC-YB-584).
文摘With the increasing awareness of privacy protection and the improvement of relevant laws,federal learning has gradually become a new choice for cross-agency and cross-device machine learning.In order to solve the problems of privacy leakage,high computational overhead and high traffic in some federated learning schemes,this paper proposes amultiplicative double privacymask algorithm which is convenient for homomorphic addition aggregation.The combination of homomorphic encryption and secret sharing ensures that the server cannot compromise user privacy from the private gradient uploaded by the participants.At the same time,the proposed TQRR(Top-Q-Random-R)gradient selection algorithm is used to filter the gradient of encryption and upload efficiently,which reduces the computing overhead of 51.78%and the traffic of 64.87%on the premise of ensuring the accuracy of themodel,whichmakes the framework of privacy protection federated learning lighter to adapt to more miniaturized federated learning terminals.
基金This research was supported by the National Natural Science Foundation of China under Grant(No.42050102)the Postgraduate Education Reform Project of Jiangsu Province under Grant(No.SJCX22_0343)Also,this research was supported by Dou Wanchun Expert Workstation of Yunnan Province(No.202205AF150013).
文摘With the rapid development of information technology,the electronifi-cation of medical records has gradually become a trend.In China,the population base is huge and the supporting medical institutions are numerous,so this reality drives the conversion of paper medical records to electronic medical records.Electronic medical records are the basis for establishing a smart hospital and an important guarantee for achieving medical intelligence,and the massive amount of electronic medical record data is also an important data set for conducting research in the medical field.However,electronic medical records contain a large amount of private patient information,which must be desensitized before they are used as open resources.Therefore,to solve the above problems,data masking for Chinese electronic medical records with named entity recognition is proposed in this paper.Firstly,the text is vectorized to satisfy the required format of the model input.Secondly,since the input sentences may have a long or short length and the relationship between sentences in context is not negligible.To this end,a neural network model for named entity recognition based on bidirectional long short-term memory(BiLSTM)with conditional random fields(CRF)is constructed.Finally,the data masking operation is performed based on the named entity recog-nition results,mainly using regular expression filtering encryption and principal component analysis(PCA)word vector compression and replacement.In addi-tion,comparison experiments with the hidden markov model(HMM)model,LSTM-CRF model,and BiLSTM model are conducted in this paper.The experi-mental results show that the method used in this paper achieves 92.72%Accuracy,92.30%Recall,and 92.51%F1_score,which has higher accuracy compared with other models.
文摘Speech perception is essential for daily communication.Background noise or concurrent talkers,on the other hand,can make it challenging for listeners to track the target speech(i.e.,cocktail party problem).The present study reviews and compares existing findings on speech perception and unmasking in cocktail party listening environments in English and Mandarin Chinese.The review starts with an introduction section followed by related concepts of auditory masking.The next two sections review factors that release speech perception from masking in English and Mandarin Chinese,respectively.The last section presents an overall summary of the findings with comparisons between the two languages.Future research directions with respect to the difference in literature on the reviewed topic between the two languages are also discussed.
基金supported by the National Major Program "Core of Electronic Devices,High-End General Chips,and Basis of Software Products" of the Ministry of Industry and Information Technology of China (Nos.2014ZX01032205,2014ZX01032401001-Z05)the National Natural Science Foundation of China(No.61402252) "12th Five-Year Plan" The National Development Foundation for Cryptological Research(No. MMJJ201401009)
文摘The Chinese hash algorithm SM3 is verified to be secure enough,but improper hardware implementation may lead to leakage.A masking scheme for SM3 algorithm is proposed to ensure the security of SM3 based Message Authentication Code(MAC).Our scheme was implemented in hardware,which utilizes hardware oriented secure conversion techniques between boolean and arithmetic masking.Security evaluation based on SAKURA-G FPGA board has been done with 2000 power traces from 2000 random plaintexts with random plaintext masks and random key masks.It has been verified that the masked SM3 hardware implementation shows no intermediate value leakage as expected.Our masked SM3 hardware can resist first-order correlation power attack(CPA) and collision correlation attack.
基金The National Natural Science Foundation of China(No.61231002,61273266,61375028)the Ph.D.Programs Foundation of Ministry of Education of China(No.20110092130004)
文摘In order to improve the design results for the reconfigurable frequency response masking FRM filters an improved design method based on second-order cone programming SOCP is proposed.Unlike traditional methods that separately design the proposed method takes all the desired designing modes into consideration when designing all the subfilters. First an initial solution is obtained by separately designing the subfilters and then the initial solution is updated by iteratively solving a SOCP problem. The proposed method is evaluated on a design example and simulation results demonstrate that jointly designing all the subfilters can obtain significantly lower minimax approximation errors compared to the conventional design method.
文摘The aim of the study was to taste mask ciprofloxacin(CP)by using ion-exchange resins(IERs)followed by sustain release of CP by forming interpenetrating polymer network(IPN).IERs based on the copolymerization of acrylic acid with different cross linking agents were synthesised.Drug-resin complexes(DRCs)with three different ratios of drug to IERs(1:1,1:2,1:4)were prepared&evaluated for taste masking by following in vivo and in vitro methods.Human volunteers graded ADC 1:4,acrylic acid-divinyl benzene(ADC-3)resin as tasteless.Characterization studies such as FTIR,SEM,DSC,P-XRD differentiated ADC 1:4,from physical mixture(PM 1:4)and confirmed the formation of complex.In vitro drug release of ADC 1:4 showed complete release of CP within 60 min at simulated gastric fluid(SGF)i.e.pH 1.2.IPN beads were prepared with ADC 1:4 by using sodium alginate(AL)and sodium alginate-chitosan(AL-CS)for sustain release of CP at SGF pH and followed by simulated intestinal fluid(SIF i.e.pH 7.4).FTIR spectra confirmed the formation of IPN beads.The release of CP was sustain at SGF pH(<20%)whereas in SIF media it was more(>75%).The kinetic model of IPN beads showed the release of CP was non-Fickian diffusion type.
基金partially supported by the National Natural Science Foundation of China (Nos.11590772, 11590770)the Pre-research Project for Equipment of General Information System (No.JZX2017-0994/Y306)
文摘This paper presents a deep neural network(DNN)-based speech enhancement algorithm based on the soft audible noise masking for the single-channel wind noise reduction. To reduce the low-frequency residual noise, the psychoacoustic model is adopted to calculate the masking threshold from the estimated clean speech spectrum. The gain for noise suppression is obtained based on soft audible noise masking by comparing the estimated wind noise spectrum with the masking threshold. To deal with the abruptly time-varying noisy signals, two separate DNN models are utilized to estimate the spectra of clean speech and wind noise components. Experimental results on the subjective and objective quality tests show that the proposed algorithm achieves the better performance compared with the conventional DNN-based wind noise reduction method.
文摘In this paper, the wavelength mismatch between the message and the chaotic carrier in the chaotic optical communication with chaos-masking has been experimentally investigated. The results show that the decryption performance of the receiver can be improved when the message wavelength is greater than that of the chaotic carrier. When the wavelength offset is set to 0.12 nm, high-speed secure optical communication with a message of 2.5 Gbits/s is achieved.
基金Council of Scientific and Industrial Research (CSIR), New Delhi, India, for providing Senior Research FellowshipCentralized Analytical Facility of CSIRCSMCRI for analytical support
文摘The objective of this study was to carry out taste masking of ofloxacin(Ofl) by ion exchange resins(IERs)followed by sustained release of Ofl by forming interpenetrating polymer network(IPN) beads. Drug-resin complexes(DRCs) with three different ratios of Ofl to IERs(1:1, 1:2, 1:4) were prepared by batch method and investigated for in vivo and in vitro taste masking. DRC of methacrylic acid-divinyl benzene(MD) resin and Ofl prepared at a ratio of 1:4 was used to form IPN beads. IPN beads of MD 1:4 were prepared by following the ionic cross-linking method using sodium carboxymethyl xanthan gum(SCMXG) and SCMXG-sodium carboxymethyl cellulose(SCMXG-SCMC). IPN beads were characterized with FT-IR and further studied on sustained release of Ofl at different pH. In vivo taste masking carried out by human volunteers showed that MD 1:4 significantly reduced the bitterness of Ofl. Characterization studies such as FT-IR, DSC, P-XRD and taste masking showed that complex formation took place between drug and resin. In vitro study at gastric pH showed complete release of drug from MD 1:4 within 30 min whereas IPN beads took 5 h at gastric pH and 10 h at salivary pH for the complete release of drug. As the crosslinking increased the release kinetics changed into non-Fickian diffusion to zero-order release mechanism. MD 1:4 showed better performance for the taste masking of Ofl and IPNs beads prepared from it were found useful for the sustained release of Ofl at both the pH, indicating a versatile drug delivery system.
基金supports of China NNSF(Grant No.60472063. 60325310)GDNSF/GDCNLF(04020074/ CN200402)
文摘In this paper,we suggest an adaptive watermarking method to improve both transparence and robustness of quantization index modulation(QIM) scheme. Instead of a fixed quantization step-size,we apply a step-size adapted to image content in each 8×8 block to make a balance of robust extraction and transparent embedding.The modified step-size is determined by contrast masking thresholds of Watson’s perceptual model.From a normalized crossed-correlation value between the original watermark and the detected watermark,we could observe that our method is robust to attacks of additive white Gaussian noise(AWGN),Salt and Pepper noise and Joint Photographic Experts Group(JPEG) compression than the original QIM.By taking into account the contrast insensitivity and visible thresholds of human visual system,the suggested improvement achieves a maximum embedding strength and an appropriate quantization step-size which is consistent with local values of a host signal.
基金Project supported by the Incentive Funding National Research Foundation of South Africa(Grant No.70722)the Eskom Tertiary Education Support Programme of South Africa
文摘In this paper, during the masking process the encrypted message is convolved and embedded into a Qi hyper-chaotic system characterizing a high disorder degree. The masking scheme was tested using both Qi hyper-chaos and Lorenz chaos and indicated that Qi hyper-chaos based masking can resist attacks of the filtering and power spectrum analysis, while the Lorenz based scheme fails for high amplitude data. To unmask the message at the receiving end, two methods are proposed. In the first method, a model-free synchronizer, i.e. a multivariable higher-order differential feedback controller between the transmitter and receiver is employed to de-convolve the message embedded in the receiving signal. In the second method, no synchronization is required since the message is de-convolved using the information of the estimated derivative.
文摘In this paper, a new numerical simulation approach is proposed for the study of open-loop frequency response of a chaotic masking system. Using Chua's circuit and the Lorenz system as illustrative examples, we have shown that one can employ chaos synchronization to separate the feedback network from a chaotic masking system, and then use numerical simulation to obtain the open-loop synchronization response, the phase response, and the amplitude response of a chaotic masking system. Based on the analysis of the frequency response, we have also proved that changing the amplitude of the exciting (input) signal within normal working domain does not influence the frequency response of the chaotic masking system. The new numerical simulation method developed in this paper can be extended to consider the open-loop frequency response of other systems described by differential or difference equations.
基金This work was supported by the National Natural Science Foundation of China(61203004)the Natural Science Foundation of Heilongjiang Province(F201220)the Heilongjiang Provincial Natural Science Foundation of Joint Guidance Project(LH2020F022).
文摘In this paper,we first propose a memristive chaotic system and implement it by circuit simulation.The chaotic dynamics and various attractors are analysed by using phase portrait,bifurcation diagram,and Lyapunov exponents.In particular,the system has robust chaos in a wide parameter range and the initial value space,which is favourable to the security communication application.Consequently,we further explore its application in image encryption and present a new scheme.Before image processing,the external key is protected by the Grain-128a algorithm and the initial values of the memristive system are updated with the plain image.We not only perform random pixel extraction and masking with the chaotic cipher,but also use them as control parameters for Brownian motion to obtain the permutation matrix.In addition,multiplication on the finite field GF(2^(8))is added to further enhance the cryptography.Finally,the simulation results verify that the proposed image encryption scheme has better performance and higher security,which can effectively resist various attacks.
文摘A single-channel speech enhancement method of noisy speech signals at very low signal-to-noise ratios is presented, which is based on masking properties of the human auditory system and power spectral density estimation of non stationary noise. It allows for an automatic adaptation in time and frequency of the parametric enhancement system, and finds the best tradeoff among the amount of noise reduction, the speech distortion, and the level of musical residual noise based on a criterion correlated with perception and SNR. This leads to a significant reduction of the unnatural structure of the residual noise. The results with several noise types show that the enhanced speech is more pleasant to a human listener.
文摘Forward Masking Temporal audiotory resolution is the ability of the auditory system to resolve auditory signals in the time domain. Forward masking is a means of studying temporal resolution where one tone, the probe, is masked by a preceding tone, the masker. Forward masking is
文摘A watermarking scheme designed for remote sensing images needs to meet the same demand of both invisibility as for ordinary digital images. Due to specific perceptual characteristics of Synthetic Aperture Radar(SAR) images, the watermarking algorithms with consideration of Human Vision System(HVS) modeling from optical images give poor performance when applied on SAR images. This paper examines a variety of factors affecting the noise sensitivity, and further proposes a refined pixel-wise masking approach for watermarking on SAR images. The proposed approach is applied on logarithmic transformed SAR images, and has increased the acceptable watermark embedding strength by about 6 dB to 10 dB while achieving the same levels of watermarked image visual quality. Experimental results show that this approach enhanced the perceptual invisibility of watermarking based on wavelet decomposition.
文摘Traditional noise reduction techniques have the drawback of generating an annoying musical noise. A new scheme for speech enhancement in high noise environment is developed by considering human auditory system masking characteristics. The new scheme considers the masking threshold of both noisy speech and the denoised one, to detect musical noise components. To make them inaudible, they are set under the noise masking threshold. The improved signal is subjected to extensive subjective and objective tests. It is ob-served that the musical noise is appreciably reduced even at very low signal to noise ratios.
基金This work was supported by the innovation and entrepreneurship training program of Nanjing University of Information Science&Technology(No.202010300212).
文摘To solve the problem of hiding quantum information in simplified subsystems,Modi et al.[1]introduced the concept of quantum masking.Quantum masking is the encoding of quantum information by composite quantum states in such a way that the quantum information is hidden to the subsystem and spreads to the correlation of the composite systems.The concept of quantum masking was developed along with a new quantum impossibility theorem,the quantum no-masking theorem.The question of whether a quantum state can be masked has been studied by many people from the perspective of the types of quantum states,the number of masking participants,and error correction codes.Others have studied the relationships between maskable quantum states,the deterministic and probabilistic masking of quantum states,and the problem of probabilistic masking.Quantum masking techniques have been shown to outperform previous strategies in quantum bit commitment,quantum multi-party secret sharing,and so on.