Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Cai Anni is active.

Publication


Featured researches published by Cai Anni.


international symposium on computer science and computational technology | 2008

Cracking Cancelable Fingerprint Template of Ratha

Feng Quan; Su Fei; Cai Anni; Zhao Feifei

Cancelable biometrics may be a good approach to address the security and privacy concerns on biometric authentication. It uses some parameterized transforms to convert an original biometric template into a new version for authentication. The security of cancelable biometrics lies on noninvertibility of the transformed template, that is, the transforms should be noninvertible so that the original template can not be recovered. One way to achieve the noninvertibilty is through the use of many-to-one transforms. The idea of Ratha¿s scheme of generating fingerprint templates just depends on this. However, it is revealed in this paper that the form of the transforms and the parameters chosen in his implementation weaken the many-to-one property. This results in the possible recovery of original minutiae from one transformed template.


asia pacific conference on communications | 1999

Automatic face segmentation in YCrCb images

Shi Kewei; Fu Xitian; Cai Anni; Sun Jing-ao

This paper presents a novel technique to automatically detect the human face in videophone images with YCrCb format. By using the Cr-Cb histogram to eliminate the background, and applying region growing in the remaining areas, we can, with the aid of the proposed criteria, accurately detect the face from a complex background.


international conferences on info tech and info net | 2001

Hierarchical storage design using queueing model in VOD system

Li Qingguo; Sun Songlin; Cai Anni; Sun Jing-ao

In this paper, we discuss the relationship between the blocking probability and the configuration of storage hierarchy in a VOD server using the proposed queueing model. With this model, the optimal configuration of the storage systems can be obtained.. It will be of benefit to the design of massive multimedia on demand systems.


ieee international workshop on vlsi design and video technology | 2005

Low-complexity rate-distortion optimal transcoding from MPEG-2 to MPEG-1 in DCT-domain

Du Yao-gang; Cai Anni

Transcoding is now widely used in many multimedia applications. This paper proposes a low-complexity rate-distortion optimal transcoding algorithm from MPEG-2 to MPEG-I in DCT-domain where spatial resolution reduction is involved. We jointly optimize transcoding parameters to select independently a across type, reused motion vector and quantization parameter for each individual MB in a frame by exploiting correlations between the input and output video and making use of try-and-error search method. The experimental results show that our method achieves improvement of average 1.4 dB peak signal-to-noise ratio (PNSR) over TM5 slightly increase in computational complexity.


asia pacific conference on communications | 1999

Fractal based texture analysis for retrieval of image data

Sufei-Sun Jing'ao; Cai Anni

In this paper, directional fractal dimensions are computed for a special class of images with lines and curves. Then the texture variation coefficient is defined and a simple algorithm for detecting singularity fields of an image is proposed. Experiments show that 92% singularity fields are correctly recognized by the proposed algorithm, and this will greatly help with content-based retrieval of texture images from a large database.


information assurance and security | 2009

Encrypted Fuzzy Vault Based on Fingerprint

Feng Quan; Su Fei; Cai Anni

Biometrics is the only factor that is directly linked with the distinguishing characteristic of an individual and has been widely applied to identity authentication, biometrics-based key management system may be expected to be a powerful competitor in the future. A popular technique of such a system is the fuzzy vault scheme. In this paper, a new scheme is proposed, which referred to as encrypted fuzzy vault scheme. The fingerprint-based implementation also is presented. In locking phase, a secret key is encrypted by the key derived from a set of random data. Then these data are encoded on the fingerprint minutiae. At last, the minutiae are encrypted by the private list. By these ways, the construction of the encoding polynomial is decoupled from the size of the secret key and less storage is required, but the higher level of security is achieved.


2008 Fourth Workshop on Network Coding, Theory and Applications | 2008

Optimal Layered Multicast Using Network Coding

Si Jingjing; Zhuang Bojin; Cai Anni


Journal of Image and Graphics | 2005

An Efficient Method for DCT-domain Image Downsampling

Du Yao-gang; Cai Anni; Sun Jing-ao


Archive | 2015

LIMITED CONTEXT-BASED IDENTIFICATION OF KEY FRAME OF VIDEO SEQUENCE

Xie Xiaohui; Zeng Xiao; Liu Yingfei; Zou Yanming; Wang Kongqiao; Zhao Zhicheng; Cai Anni


Zhongguo Youdian Gaoxiao Xuebao(Yingwenban) | 2016

深神経回路網のための漸進的フレームワーク:線形から非線形へ【Powered by NICT】

Shao Jie; Zhao Zhicheng; Su Fei; Cai Anni

Collaboration


Dive into the Cai Anni's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Zhao Zhicheng

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Shao Jie

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge