For power and rate constraints problem that exists in mobile sign language video communication,this paper proposes a Power-rate-distortion(P-R-D) model. It chooses the quantization step size as the model parameter by the experiments on the software platform JM8. 6 of H. 264 video coding,then defines three energy states according to the remaining amount of battery energy of mobile devices. With quantization step size as the model parameter,it establishes the power consumption model, coding rate model and distortion model under the three different energy levels. Experimental results show that the established P-R-D model for sign language video coding can accurately reflect the relationship among power consumption. The maximum prediction error of power consumption model and coding rate model respectively are -1. 179 5% and -7. 926 8% .
In order to provide larger capacity of the hidden secret messages and maintain a good visual quality of stegoimage, a novel image steganography based on visual perception and Diamond Encoding(DE) is proposed. According to the Human Visual System(HVS),human eyes have different sensitivity on high gray areas,middle gray areas and low gray areas,texture areas and smooth areas. The different amounts of secret messages are embedded in the different areas of cover images. Especially,the modified DE is used to minimize the change of the image pixel value. Experimental results show that the proposed method can effectively improve the embedding capacity than HVS-OPAP algorithm by 4. 09% , while stego-image has better imperceptibility,PSNR average of 1. 5 dB,and RS steganalysis methods can not detect whether the secret information is embedded,so it has a better security.
The average scheduling strategy based on task numbers in fault-tolerant has shortcoming such as processing span and Quality of Service(QoS). Aiming at this problem,this paper proposes a grid scheduling algorithm based on priority,and then puts forward the design scheme of the hierarchical cluster system. The algorithm introduces the task in the process of task scheduling,task execution time remaining concept value density,cost budget and span,to make up for the task scheduling in the treatment of two span and QoS. Experimental results show that the algorithm has better effect in the completion rate,value realization rate,treatment rate compared with the original mechanism of scheduling strategy and Max-Min algorithm. The original mechanism is improved by using this algorithm. It can effectively improve the efficiency of system task execution,and the availability of system.
As a new generation video coding standard,HEVC has more compression efficiency than the existing video coding H. 264 standard,but it has higher complexity. Aiming at this problem,after brief analysis of the intra prediction algorithm,a fast algorithm based on Rate-distortion (RD) cost of intra prediction block dividing and the intra-frame prediction mode selection fast algorithm is proposed to reduce the HEVC intra-frame prediction complexity. This algorithm takes full use of the advantages of rate distortion cost and the probability of the prediction mode is selected in the candidate pattern quick descending law. Experimental results show that complexity reduction from HM10. 0 is over 59% and stable for various sequences,which makes the proposed algorithm suitable for real-time applications. The corresponding bit rate increase is lower than 1. 34% .
Attribute revocation is crucial to the practical use of Attribute-based Encryption(ABE). Most of the existing revocable ABE schemes under the indirect revocation model suffer in terms of delaying in revocation or updating keys and ciphertexts. To address this,this paper proposes a proxy-based immediate attribute revocation Key Policy(KP) attributebased encryption under the indirect model without issuing new keys or re-encrypting existing ciphertexts. It achieves attribute revocation by introducing a proxy in the decryption process and reduces the burden for the key authority. The proxy is semi-trusted which revokes user access privileges and cannot decrypt ciphertexts. Analysis results show that the scheme supports fine-grained access control policies and achieves three kinds of revocation including system attribute revocation,user revocation and user attribute revocation.