The search functionality is under construction.

Author Search Result

[Author] Rui XU(10hit)

1-10hit
  • On the Security against Nonadaptive Chosen Ciphertext Attack and Key-Dependent Message Attack

    Jinyong CHANG  Rui XUE  

     
    LETTER-Cryptography and Information Security

      Vol:
    E97-A No:11
      Page(s):
    2267-2271

    In this letter, we formally present the definition of KDM-CCA1 security in public key setting, which falls in between the existing KDM-CPA and KDM-CCA2 security. We also prove that if a public key encryption scheme is CCA1 secure and has the properties of secret-key multiplication (or addition) homomorphism, and conditioned plaintext-restorability, then it is KDM-CCA1 secure w.r.t. two ensembles of functions that had been used in [15],[17], respectively. For concrete scheme, we show that the (tailored) Damgård's Elgamal scheme achieves this KDM-CCA1 security based on different assumptions.

  • The KDM-CCA Security of the Kurosawa-Desmedt Scheme

    Jinyong CHANG  Rui XUE  Anling ZHANG  

     
    LETTER-Cryptography and Information Security

      Vol:
    E98-A No:4
      Page(s):
    1032-1037

    In this letter, we prove that the Kurosawa-Desmedt (KD) scheme [10], which belongs to the hybrid framework, is KDM-CCA secure w.r.t. an ensemble proposed by Qin et al. in [12] under the decisional Diffie-Hellman assumption. Since our proof does not rely on the random oracle model, we partially answer the question presented by Davies and Stam in [7], where they hope to achieve the KDM-CCA security for hybrid encryption scheme in the standard model (i.e. not random oracle model). Moreover, our result may also make sense in practice since KD-scheme is (almost) the most efficient CCA secure scheme.

  • Capacity Maximization for Short-Range Millimeter-Wave Line-of-Sight TIMO Channels

    Haiming WANG  Rui XU  Mingkai TANG  Wei HONG  

     
    PAPER-Information Theory

      Vol:
    E98-A No:5
      Page(s):
    1085-1094

    The capacity maximization of line-of-sight (LoS) two-input and multiple-output (TIMO) channels in indoor environments is investigated in this paper. The 3×2 TIMO channel is mainly studied. First, the capacity fluctuation number (CFN) which reflects the variation of channel capacity is proposed. Then, the expression of the average capacity against the CFN is derived. The CFN is used as a criterion for optimization of the capacity by changing inter-element spacings of transmit and receive antenna arrays. Next, the capacity sensitivity of the 3×2 TIMO channel to the orientation and the frequency variation is studied and compared with those of 2×2 and 4×2 TIMO channels. A small capacity sensitivity of the 3×2 TIMO channel is achieved and verified by both simulation and measurement results. Furthermore, the CFN can also be used as a criterion for optimization of average capacity and the proposed optimization method is validated through numerical results.

  • Note on Some Recent Cheater Identifiable Secret Sharing Schemes

    Rui XU  Kirill MOROZOV  Tsuyoshi TAKAGI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E98-A No:8
      Page(s):
    1814-1819

    Harn and Lin proposed an algorithm to detect and identify cheaters in Shamir's secret sharing scheme in the journal Designs, Codes and Cryptography, 2009. In particular, their algorithm for cheater identification is inefficient. We point out that some of their conditions for cheater detection and identification essentially follow from those on error detection/correction of Reed-Solomon codes, which have efficient decoding algorithms, while some other presented conditions turn out to be incorrect. The extended and improved version of the above mentioned scheme was recently presented at the conference International Computer Symposium 2012 (and the journal version appeared in the journal IET Information Security). The new scheme, which is ideal (i.e. the share size is equal to that of the secret), attempts to identify cheaters from minimal number of shares (i.e. the threshold of them). We show that the proposed cheater identification is impossible using the arguments from coding theory.

  • Combining 3D Convolutional Neural Networks with Transfer Learning by Supervised Pre-Training for Facial Micro-Expression Recognition

    Ruicong ZHI  Hairui XU  Ming WAN  Tingting LI  

     
    PAPER-Pattern Recognition

      Pubricized:
    2019/01/29
      Vol:
    E102-D No:5
      Page(s):
    1054-1064

    Facial micro-expression is momentary and subtle facial reactions, and it is still challenging to automatically recognize facial micro-expression with high accuracy in practical applications. Extracting spatiotemporal features from facial image sequences is essential for facial micro-expression recognition. In this paper, we employed 3D Convolutional Neural Networks (3D-CNNs) for self-learning feature extraction to represent facial micro-expression effectively, since the 3D-CNNs could well extract the spatiotemporal features from facial image sequences. Moreover, transfer learning was utilized to deal with the problem of insufficient samples in the facial micro-expression database. We primarily pre-trained the 3D-CNNs on normal facial expression database Oulu-CASIA by supervised learning, then the pre-trained model was effectively transferred to the target domain, which was the facial micro-expression recognition task. The proposed method was evaluated on two available facial micro-expression datasets, i.e. CASME II and SMIC-HS. We obtained the overall accuracy of 97.6% on CASME II, and 97.4% on SMIC, which were 3.4% and 1.6% higher than the 3D-CNNs model without transfer learning, respectively. And the experimental results demonstrated that our method achieved superior performance compared to state-of-the-art methods.

  • Simulation Research on Low Frequency Magnetic Radiation Emission of Shipboard Equipment

    Yang XIAO  Zhongyuan ZHOU  Changping TANG  Jinjing REN  Mingjie SHENG  Zhengrui XU  

     
    PAPER-Electromagnetic Theory

      Pubricized:
    2022/07/27
      Vol:
    E106-C No:2
      Page(s):
    41-49

    This paper first introduces the structure of a shipboard equipment control cabinet and the preliminary design of electromagnetic shielding, then introduces the principle of low-frequency magnetic field shielding, and uses silicon steel sheet to shield the low-frequency magnetic field of shipboard equipment control equipment. Based on ANSYS Maxwell simulation software, the low-frequency magnetic field radiation emission of the equipment's conducted harmonic peak frequency point is simulated. Finally, according to MIL-STD-461G test standard, the low-frequency magnetic field radiation emission test is carried out, which meets the limit requirements of the standard. The low-frequency magnetic field shielding technology has practical value. The low-frequency magnetic field radiation emission simulation based on ANSYS Maxwell proposed in this paper is a useful attempt for the quantitative simulation of radiation emission.

  • A Bag-of-Features Approach to Classify Six Types of Pulmonary Textures on High-Resolution Computed Tomography Open Access

    Rui XU  Yasushi HIRANO  Rie TACHIBANA  Shoji KIDO  

     
    PAPER-Computer-Aided Diagnosis

      Vol:
    E96-D No:4
      Page(s):
    845-855

    Computer-aided diagnosis (CAD) systems on diffuse lung diseases (DLD) were required to facilitate radiologists to read high-resolution computed tomography (HRCT) scans. An important task on developing such CAD systems was to make computers automatically recognize typical pulmonary textures of DLD on HRCT. In this work, we proposed a bag-of-features based method for the classification of six kinds of DLD patterns which were consolidation (CON), ground-glass opacity (GGO), honeycombing (HCM), emphysema (EMP), nodular (NOD) and normal tissue (NOR). In order to successfully apply the bag-of-features based method on this task, we focused to design suitable local features and the classifier. Considering that the pulmonary textures were featured by not only CT values but also shapes, we proposed a set of statistical measures based local features calculated from both CT values and eigen-values of Hessian matrices. Additionally, we designed a support vector machine (SVM) classifier by optimizing parameters related to both kernels and the soft-margin penalty constant. We collected 117 HRCT scans from 117 subjects for experiments. Three experienced radiologists were asked to review the data and their agreed-regions where typical textures existed were used to generate 3009 3D volume-of-interest (VOIs) with the size of 323232. These VOIs were separated into two sets. One set was used for training and tuning parameters, and the other set was used for evaluation. The overall recognition accuracy for the proposed method was 93.18%. The precisions/sensitivities for each texture were 96.67%/95.08% (CON), 92.55%/94.02% (GGO), 97.67%/99.21% (HCM), 94.74%/93.99% (EMP), 81.48%/86.03%(NOD) and 94.33%/90.74% (NOR). Additionally, experimental results showed that the proposed method performed better than four kinds of baseline methods, including two state-of-the-art methods on classification of DLD textures.

  • Classification of Pneumoconiosis on HRCT Images for Computer-Aided Diagnosis Open Access

    Wei ZHAO  Rui XU  Yasushi HIRANO  Rie TACHIBANA  Shoji KIDO  Narufumi SUGANUMA  

     
    PAPER-Computer-Aided Diagnosis

      Vol:
    E96-D No:4
      Page(s):
    836-844

    This paper describes a computer-aided diagnosis (CAD) method to classify pneumoconiosis on HRCT images. In Japan, the pneumoconiosis is divided into 4 types according to the density of nodules: Type 1 (no nodules), Type 2 (few small nodules), Type 3-a (numerous small nodules) and Type 3-b (numerous small nodules and presence of large nodules). Because most pneumoconiotic nodules are small-sized and irregular-shape, only few nodules can be detected by conventional nodule extraction methods, which would affect the classification of pneumoconiosis. To improve the performance of nodule extraction, we proposed a filter based on analysis the eigenvalues of Hessian matrix. The classification of pneumoconiosis is performed in the following steps: Firstly the large-sized nodules were extracted and cases of type 3-b were recognized. Secondly, for the rest cases, the small nodules were detected and false positives were eliminated. Thirdly we adopted a bag-of-features-based method to generate input vectors for a support vector machine (SVM) classifier. Finally cases of type 1,2 and 3-a were classified. The proposed method was evaluated on 175 HRCT scans of 112 subjects. The average accuracy of classification is 90.6%. Experimental result shows that our method would be helpful to classify pneumoconiosis on HRCT.

  • Secret Sharing with Cheaters Using Multi-Receiver Authentication

    Rui XU  Kirill MOROZOV  Tsuyoshi TAKAGI  

     
    PAPER

      Vol:
    E100-A No:1
      Page(s):
    115-125

    We introduce two cheater identifiable secret sharing (CISS) schemes with efficient reconstruction, tolerating t

  • Parzen-Window Based Normalized Mutual Information for Medical Image Registration

    Rui XU  Yen-Wei CHEN  Song-Yuan TANG  Shigehiro MORIKAWA  Yoshimasa KURUMI  

     
    PAPER-Biological Engineering

      Vol:
    E91-D No:1
      Page(s):
    132-144

    Image Registration can be seen as an optimization problem to find a cost function and then use an optimization method to get its minimum. Normalized mutual information is a widely-used robust method to design a cost function in medical image registration. Its calculation is based on the joint histogram of the fixed and transformed moving images. Usually, only a discrete joint histogram is considered in the calculation of normalized mutual information. The discrete joint histogram does not allow the cost function to be explicitly differentiated, so it can only use non-gradient based optimization methods, such as Powell's method, to seek the minimum. In this paper, a parzen-window based method is proposed to estimate the continuous joint histogram in order to make it possible to derive the close form solution for the derivative of the cost function. With this help, we successfully apply the gradient-based optimization method in registration. We also design a new kernel for the parzen-window based method. Our designed kernel is a second order polynomial kernel with the width of two. Because of good theoretical characteristics, this kernel works better than other kernels, such as a cubic B-spline kernel and a first order B-spline kernel, which are widely used in the parzen-window based estimation. Both rigid and non-rigid registration experiments are done to show improved behavior of our designed kernel. Additionally, the proposed method is successfully applied to a clinical CT-MR non-rigid registration which is able to assist a magnetic resonance (MR) guided microwave thermocoagulation of liver tumors.