Cai Anni
Peking University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Cai Anni.
international symposium on computer science and computational technology | 2008
Feng Quan; Su Fei; Cai Anni; Zhao Feifei
Cancelable biometrics may be a good approach to address the security and privacy concerns on biometric authentication. It uses some parameterized transforms to convert an original biometric template into a new version for authentication. The security of cancelable biometrics lies on noninvertibility of the transformed template, that is, the transforms should be noninvertible so that the original template can not be recovered. One way to achieve the noninvertibilty is through the use of many-to-one transforms. The idea of Ratha¿s scheme of generating fingerprint templates just depends on this. However, it is revealed in this paper that the form of the transforms and the parameters chosen in his implementation weaken the many-to-one property. This results in the possible recovery of original minutiae from one transformed template.
asia pacific conference on communications | 1999
Shi Kewei; Fu Xitian; Cai Anni; Sun Jing-ao
This paper presents a novel technique to automatically detect the human face in videophone images with YCrCb format. By using the Cr-Cb histogram to eliminate the background, and applying region growing in the remaining areas, we can, with the aid of the proposed criteria, accurately detect the face from a complex background.
international conferences on info tech and info net | 2001
Li Qingguo; Sun Songlin; Cai Anni; Sun Jing-ao
In this paper, we discuss the relationship between the blocking probability and the configuration of storage hierarchy in a VOD server using the proposed queueing model. With this model, the optimal configuration of the storage systems can be obtained.. It will be of benefit to the design of massive multimedia on demand systems.
ieee international workshop on vlsi design and video technology | 2005
Du Yao-gang; Cai Anni
Transcoding is now widely used in many multimedia applications. This paper proposes a low-complexity rate-distortion optimal transcoding algorithm from MPEG-2 to MPEG-I in DCT-domain where spatial resolution reduction is involved. We jointly optimize transcoding parameters to select independently a across type, reused motion vector and quantization parameter for each individual MB in a frame by exploiting correlations between the input and output video and making use of try-and-error search method. The experimental results show that our method achieves improvement of average 1.4 dB peak signal-to-noise ratio (PNSR) over TM5 slightly increase in computational complexity.
asia pacific conference on communications | 1999
Sufei-Sun Jing'ao; Cai Anni
In this paper, directional fractal dimensions are computed for a special class of images with lines and curves. Then the texture variation coefficient is defined and a simple algorithm for detecting singularity fields of an image is proposed. Experiments show that 92% singularity fields are correctly recognized by the proposed algorithm, and this will greatly help with content-based retrieval of texture images from a large database.
information assurance and security | 2009
Feng Quan; Su Fei; Cai Anni
Biometrics is the only factor that is directly linked with the distinguishing characteristic of an individual and has been widely applied to identity authentication, biometrics-based key management system may be expected to be a powerful competitor in the future. A popular technique of such a system is the fuzzy vault scheme. In this paper, a new scheme is proposed, which referred to as encrypted fuzzy vault scheme. The fingerprint-based implementation also is presented. In locking phase, a secret key is encrypted by the key derived from a set of random data. Then these data are encoded on the fingerprint minutiae. At last, the minutiae are encrypted by the private list. By these ways, the construction of the encoding polynomial is decoupled from the size of the secret key and less storage is required, but the higher level of security is achieved.
2008 Fourth Workshop on Network Coding, Theory and Applications | 2008
Si Jingjing; Zhuang Bojin; Cai Anni
Journal of Image and Graphics | 2005
Du Yao-gang; Cai Anni; Sun Jing-ao
Archive | 2015
Xie Xiaohui; Zeng Xiao; Liu Yingfei; Zou Yanming; Wang Kongqiao; Zhao Zhicheng; Cai Anni
Zhongguo Youdian Gaoxiao Xuebao(Yingwenban) | 2016
Shao Jie; Zhao Zhicheng; Su Fei; Cai Anni