multivariate gaussian model
Recently Published Documents


TOTAL DOCUMENTS

24
(FIVE YEARS 0)

H-INDEX

7
(FIVE YEARS 0)

2020 ◽  
Vol 30 (15) ◽  
pp. 2050223
Author(s):  
Yuling Luo ◽  
Shunsheng Zhang ◽  
Junxiu Liu ◽  
Lvchen Cao

The security of chaotic cryptographic system can be theoretically evaluated by using conventional statistical tests and numerical simulations, such as the character frequency test, entropy test, avalanche test and SP 800-22 tests. However, when the cryptographic algorithm operates on a cryptosystem, the leakage information such as power dissipation, electromagnetic emission and time-consuming can be used by attackers to analyze the secret keys, namely the Side Channel Analysis (SCA) attack. In this paper, a cryptanalysis method is proposed for evaluating the security of a chaotic block cryptographic system from a hardware perspective by utilizing the Template Attacks (TAs). Firstly, a chaotic block cryptographic system is described briefly and implemented based on an Atmel XMEGA microcontroller. Then the TA using a multivariate Gaussian model is introduced. In order to reduce computational complexity and improve the efficiency of TA, the Hamming weight is used in this work to model power consumption traces. The proposed TA method has the following advantages including (a) using the sum of difference to select points of interest of traces, (b) using a data processing method to minimize the influences on power information modeling from the redundant sampling points, and (c) all the traces are aligned precisely before establishing the templates. Experimental results show that the TA can be used to attack the chaotic cryptographic systems and is more efficient, i.e. [Formula: see text]32% less attack traces than correlation power analysis, when the templates are properly built.



2020 ◽  
Vol 31 (1-2) ◽  
Author(s):  
Francesco Verdoja ◽  
Marco Grangetto

Abstract Reed–Xiaoli detector (RXD) is recognized as the benchmark algorithm for image anomaly detection; however, it presents known limitations, namely the dependence over the image following a multivariate Gaussian model, the estimation and inversion of a high-dimensional covariance matrix, and the inability to effectively include spatial awareness in its evaluation. In this work, a novel graph-based solution to the image anomaly detection problem is proposed; leveraging the graph Fourier transform, we are able to overcome some of RXD’s limitations while reducing computational cost at the same time. Tests over both hyperspectral and medical images, using both synthetic and real anomalies, prove the proposed technique is able to obtain significant gains over performance by other algorithms in the state of the art.





Author(s):  
Guoyi Li ◽  
Javaid Ikram ◽  
Aditi Chattopadhyay ◽  
Rajesh Kumar Neerukatti ◽  
Kuang C. Liu


Molecules ◽  
2018 ◽  
Vol 24 (1) ◽  
pp. 104
Author(s):  
Patrice Koehl ◽  
Henri Orland ◽  
Marc Delarue

Residues in proteins that are in close spatial proximity are more prone to covariate as their interactions are likely to be preserved due to structural and evolutionary constraints. If we can detect and quantify such covariation, physical contacts may then be predicted in the structure of a protein solely from the sequences that decorate it. To carry out such predictions, and following the work of others, we have implemented a multivariate Gaussian model to analyze correlation in multiple sequence alignments. We have explored and tested several numerical encodings of amino acids within this model. We have shown that 1D encodings based on amino acid biochemical and biophysical properties, as well as higher dimensional encodings computed from the principal components of experimentally derived mutation/substitution matrices, do not perform as well as a simple twenty dimensional encoding with each amino acid represented with a vector of one along its own dimension and zero elsewhere. The optimum obtained from representations based on substitution matrices is reached by using 10 to 12 principal components; the corresponding performance is less than the performance obtained with the 20-dimensional binary encoding. We highlight also the importance of the prior when constructing the multivariate Gaussian model of a multiple sequence alignment.





Author(s):  
Abi Soliga ◽  
Godlin Jasil

Blind Image Quality Assessment (BIQA) methods are the most part feeling mindful. The BIQA method learns regression models from preparing images with human subjective scores to predict the perceptual nature of test images. The general quality of image and the nature of every image patches are measured by normal pooling. By coordinating the components of normal picture measurements got from different signs, we take a multivariate Gaussian model of picture patches from an accumulation of unblemished regular pictures. The proposed radial bias function neural network method is used to evaluate the quality of images and this method represents the structure of picture distortions with flexibility. 



Author(s):  
Abi Soliga ◽  
Godlin Jasil

Blind Image Quality Assessment (BIQA) methods are the most part feeling mindful. The BIQA method learns regression models from preparing images with human subjective scores to predict the perceptual nature of test images. The general quality of image and the nature of every image patches are measured by normal pooling. By coordinating the components of normal picture measurements got from different signs, we take a multivariate Gaussian model of picture patches from an accumulation of unblemished regular pictures. The proposed radial bias function neural network method is used to evaluate the quality of images and this method represents the structure of picture distortions with flexibility.



Sign in / Sign up

Export Citation Format

Share Document