INTELLIGENT NETWORK COMPUTING AUGMENTED BY CHAOTIC NEURAL NETWORKS, BLIND SOURCES SEPARATION AND DIGITAL WATERMARKS

Author:

SZU HAROLD1,HSU CHARLES1,HSU MING-KAI1,ZHOU JIANTAO2,BAO SHUDI2

Affiliation:

1. Digital Media RF Lab, Department of ECE, GWU, Washington DC, 20052, USA

2. Radio Engineering, Southeast University, Nanjing, Jiangsu, 210096, P. R. China

Abstract

A powerful engine of Information Acquisition (IA) that can automatically extract feature and discover knowledge from the real world environment is known as an Intelligent Information Acquisition, IIA. A typical class of such a system is called smart sensor web, e.g. a dynamical smart dust scattering over a field in a self-organization fashion, an electrical powerline serving the volume surveillance in the city public environment where the powerline plug output is the power source required for the operation of the sensors and the input to the powerline is the ecosystem-like communication sparse change signal without the address — a topic of previous paper in this journal. This is possible because IIA of SSW must satisfy 6 W knowing whom, where, when, how, why and what to do. In that sense it will also satisfy the new ad hoc Internet protocol which demands, besides security and authenticity, the privacy protection — a topic of this paper. Such an IIA can serve medical patients, bank customers, or any other Special Interest Groups (SIGs) who must communicate among themselves at the public channel but are not yet ready to share information with the public. Our design might ward off invasive search engine to protect the strict privacy which requires literally no involvement of any third party besides the sender and receiver. Thus, similar to classical postal system, we have adopted envelop wrapper, called digital watermark (DWM), to hide the address of SpatioTemporal Key (STK), so that we do not need to send the high-precision chaos initial value and Chaotic Neural Net (CNN) typing but only the binary "Address Initiation (AI)" listed inside a PC library routine shared by 2N members of SIGs (N>1). The address bits can be redundant in a distributed repetition in order to tolerate any channel noise, package loss, and JPEG-related image compression. Furthermore, the bits are hidden over almost infinitely long lexicographical text pixel sequence of video image frames as digital watermarks. For example, the simplest coded message is the output of "EXOR" operation between the computed STK and originally intended message. Especially, the self-inverse decoding enjoys the projection operator, a cycle two reduction EXOREXOR = I, that means the recovered message comes simply from an identical bits-parallel "EXOR" operation between received coded message and the receiver-on-site-derived STK. Our rigorous definition of privacy enjoys also reasonable security which can be measured in NSA exhausted search sense of a few days up to years of CPU time, and also the cost saving without relying on commercial security RSA codec.

Publisher

World Scientific Pub Co Pte Lt

Reference34 articles.

1. Chaotic neural networks

2. S. Chen, Map and Chaos (National Defence Industry Press, Beijing, 1992) pp. 112–115.

3. Presentation functions, fixed points, and a theory of scaling function dynamics

4. Analytical Solutions to Multivalued Maps

同舟云学术

1.学者识别学者识别

2.学术分析学术分析

3.人才评估人才评估

"同舟云学术"是以全球学者为主线,采集、加工和组织学术论文而形成的新型学术文献查询和分析系统,可以对全球学者进行文献检索和人才价值评估。用户可以通过关注某些学科领域的顶尖人物而持续追踪该领域的学科进展和研究前沿。经过近期的数据扩容,当前同舟云学术共收录了国内外主流学术期刊6万余种,收集的期刊论文及会议论文总量共计约1.5亿篇,并以每天添加12000余篇中外论文的速度递增。我们也可以为用户提供个性化、定制化的学者数据。欢迎来电咨询!咨询电话:010-8811{复制后删除}0370

www.globalauthorid.com

TOP

Copyright © 2019-2024 北京同舟云网络信息技术有限公司
京公网安备11010802033243号  京ICP备18003416号-3