Xuanjing Shen

Learn More
Sensor node localization is the basis for the entire wireless sensor networks. Because of restricted energy of the sensor nodes, the location error, costs of communication and computation should be considered in localization algorithms. DV-Hop localization algorithm is a typical positioning algorithm that has nothing to do with distance. In the isotropic(More)
To solve the problem of the false matching and low robustness in detecting copy-move forgeries, a new method was proposed in this study. It involves the following steps: first, establish a Gaussian scale space; second, extract the orientated FAST key points and the ORB features in each scale space; thirdly, revert the coordinates of the orientated FAST key(More)
—As for the problem that ElGamal digital signature scheme's security is constantly being challenged and increasingly becomes increasingly serious, an improved ElGamal digital signature algorithm is proposed. As the original ElGamal algorithm has its own security disadvantages that only one random number is used, in order to improve its security, the scheme(More)
—In this work, a robust thresholding algorithm framework based on reconstruction and dimensionality reduction of the three-dimensional (3-D) histogram is proposed with the consideration of the poor anti-noise performance in existing 3-D histogram-based segmentation methods due to the obviously wrong region division. Firstly, our method reconstructs the 3-D(More)
In this work, a histogram-based colour image fuzzy clustering algorithm is proposed for addressing the problem of low efficiency due to computational complexity and poor clustering performance. Firstly, the presented scheme constructs the red, green and blue (short for RGB) component histograms of a given colour image, each of which is pre-processed to(More)
—Application of digital signature technology becomes more extensive, but many exposed digital signature algorithms have increasingly revealed some shortcomings and deficiencies. Aiming directly at the frequently used digital signature technologies, which are weak to Substitution Attack and Homeostasis Attack, the authors perform the hash transformation on(More)