This paper analyzes Gu’s scheme and proposes a conspiracy attack on it. Using the conspiracy attack, any t (t is threshold value) or more LAs (license authorities) may woke together to reconstruct the secret polynomial of the license and derive the secure share keys of other LAs in P2P networks. They can also impersonate some other LAs to generate a valid partial license and break the protected mechanism of digital content in P2P network. A digital content protected scheme is presented for P2P networks based on Gu’s scheme. The new scheme can achieve all the properties in Gu’s scheme, and withstand the conspiracy attack in Gu’s scheme.
This paper suggests and proves two properties of circle’s Freeman chain code, the four odd numbers of eight-direction chain code are equal and also even number, the Freeman cycle chain code and its symmetric cycle chain code is the same. The new circle recognition algorithm based on Freeman chain is proposed, which only needs two parameters: the dissimilarity of eight-direction chain code, and the similarity of Freeman chain and its symmetric chain. Experiment results show that the method can recognize accurately the circles with high efficiency.
Motion estimation and motion compensation plays a key part in electronic image stabilization system. In order to improve performance of motion estimation and to reduce the burden of computer for real time application, this paper presents a new global motion estimation algorithm called step global motion estimation based on macro block algorithm (SGMEMB). It also develops the motion estimation and motion compensation skeleton, which is used in electronic image stabilization system, on which the stable image sequence by using a new two step motion compensation algorithm (TSMC) is obteined. The simulation results show that the method applied to electronic image stabilization system is efficient and feasible.