Learn More
Due to their features of ergodicity, sensitivity to initial conditions and sensitivity to control parameters, etc., chaotic maps have good potential for information encryption. In this paper, a block cipher based on the chaotic standard map is proposed, which is composed of three parts: a confusion process based on chaotic standard map, a diffusion(More)
To understand the biology and evolution of ruminants, the cattle genome was sequenced to about sevenfold coverage. The cattle genome contains a minimum of 22,000 genes, with a core set of 14,345 orthologs shared among seven mammalian species of which 1217 are absent or undetected in noneutherian (marsupial or monotreme) genomes. Cattle-specific evolutionary(More)
We report the sequencing at 131× coverage, de novo assembly and analyses of the genome of a female Tibetan wild boar. We also resequenced the whole genomes of 30 Tibetan wild boars from six major distributed locations and 18 geographically related pigs in China. We characterized genetic diversity, population structure and patterns of evolution. We searched(More)
Bovine whole genome linkage disequilibrium maps were constructed for eight breeds of cattle. These data provide fundamental information concerning bovine genome organization which will allow the design of studies to associate genetic variation with economically important traits and also provides background information concerning the extent of long range(More)
Even great efforts have been made for decades, the recognition of human activities is still an unmature technology that attracted plenty of people in computer vision. In this paper, a system framework is presented to recognize multiple kinds of activities from videos by an SVMmulti-class classifier with a binary tree architecture. The framework is composed(More)
Due to the widespread use of sophisticated imaging tools, digital image forgeries have already become a serious social problem. In this paper, we proposes an efficient and robust algorithm for detection of a specific category of digital image forgery known as region duplication forgery, which is done by copying a block of an image and pasting it on to some(More)
The security of Fridrich’s algorithm against brute-force attack, statistical attack, known-plaintext attack and selectplaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to strengthen the overall performance of the focused cryptosystem. PACS:(More)
Image encryption is a suitable method to protect image data. The encryption algorithms based on position confusion and pixel substitution change compression ratio greatly. In this paper, an image encryption algorithm combining with JPEG encoding is proposed. In luminance and chrominance plane, the DCT blocks are confused by pseudo-random SFCs (space filling(More)
Nucleosome assembly following DNA replication and gene transcription is important to maintain genome stability and epigenetic information. Newly synthesized histones H3-H4 first bind histone chaperone Asf1 and are then transferred to other chaperones for nucleosome assembly. However, it is unknown how H3-H4 is transferred from the Asf1-H3-H4 complex to(More)