The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In this paper, the self-certified proxy signature scheme, which is proposed by Youan Xiao independently, is analyzed and the scheme turns out to be insecure. Concretely, there are two flaws in their scheme: Firstly, in the digital signing power delegation phase, the proxy secret key is generated without the use of the secret key of the proxy signer. Then, the proxy signer can disavow the signature...
The researches on Human Visual System (HVS) lead to more comprehension in the visual perceptibility of human eyes and make dramatic contribution in image quality assessment. However, few perceptual hashing algorithms take the visual perceptibility into account. In this paper, we propose a new visual threshold adjustable perceptual hashing method under the guidance of Watson's visual model. This method...
Although image robust hashing has drawn many attentions as a promising image authentication technique, the tamper detection and localization of robust hash algorithm has not been explored thoroughly. The most important difficulty is the conflict that the hash value is supposed to be robust to common content-preserving manipulations (CPM), such as lossy compression, but sensitive to malicious tamper...
Mobile Ad hoc Network (MANET for short) is a new type of wireless network. It is a self-configurable and autonomous network which consists of several independent nodes, and is different from the traditional wireless network because its characteristic of non-central administration. Those nodes participate with each other to share the network responsibilities. (t, n) threshold secret-shared cryptosystems,...
A novel image perceptual hashing method is proposed on the intermediate hashing stage. It first uses the iterative geometric techniques to get main geometric features. Then, by the observation that the distances of feature points are invariant in the polar coordinate under arbitrary rotation, a novel processing method is proposed to arrange the two-dimensional distribution to a one-dimensional feature...
Image searching and authentication have become strong requirements in the digital world. Image perceptual hashing has been proposed to meet them. In this paper, a rotation resilient image hashing algorithm is presented. In the algorithm, the position information of original image is extracted to adjust the rotation. Then the features of the image are extracted by contourlet transform. The key-dependence...
Perceptual hashing as a new technique for the multimedia content security have been widely discussed.However, the robustness requirement of perceptual hashing brings big challenges to its security. In this paper, we propose a secure enhancement scheme for image perceptual hashing based on error correction coding. By employing error correcting code, images with similar perceptual contents can be mapped...
In unattended wireless sensor networks, data are stored locally and retrieved on demand. To efficiently transmit the collectorpsilas retrieval results, data are aggregated along being forwarded. The data confidentiality and integrity should be protected at the intermediate nodes. End-to-end encryption or hop-by-hop encryption based schemes are not efficient. Straightforward homomorphic encryption...
Remote desktop access is commonly used to remotely access a host in enterprise networks; however it also brings in security problems in supervision and auditing. In this paper, a novel proxy-based security audit system is designed and implemented in order to ensure security supervising and auditing remote desktop access. Our system effectively monitors all the accessing sessions of RDP, VNC, and X-window,...
In highly mobile large-scale vehicular ad-hoc networks, routing protocols must be fast and efficient in terms of low routing discovery delay and communication overhead to support the applications such as car talk. Such requirement becomes more difficult to achieve when inducing security enhancement to tackle the authentication of routing messages. In this paper, we propose a lightweight (fast) secure...
Considered the especial requirements to protect the identity of the user who join a networks conference, a secure and anonymous conference authentication scheme was proposed which is based on 0/1 knapsack problem. The security of authentication and anonymity was analyzed in detail. It is showed that the proposed scheme could not only achieve authentication securely but also has a secure anonymity,...
A novel image perceptual hashing algorithm is proposed on the intermediate hashing stage. It first uses an iterative geometric technique to extract significant geometry preserving feature points. Then, the fuzzy distance matching method is proposed based on the observation that the distances of feature points are invariant in the polar coordinate under arbitrary rotation. It is verified that the proposed...
A mobile ad hoc network (MANET) is a collection of mobile nodes that forms a provisional network dynamically without the aid of any predetermined infrastructure. In particular, the route security is more important. In order to solve the problem several route discovery protocols have been proposed such as ARAN and SRP ect. But those protocols suffer from two problems: (1) difficult in operation, (2)...
In unattended wireless sensor networks (WSNs), data is stored locally or at designated nodes upon sensing, and users can access it on demand. This paradigm can improve energy efficiency by making use of the upcoming cheap and large flash memory, as well as system robustness. Nevertheless, the security and dependability of distributed storage are critical for the applicability of such WSNs. In this...
An arbitrarily rotated image should not be recognized as a different one, but the conventional image perceptual hashing algorithms can only deal with this partially. Different to watermarking, image perceptual hashing does not need to embed information into the image content, this make it possible that perceptual hashing can treat the synchronization problem in a new manner. In this paper, three cyclic...
HVS (human visual system) has been widely used to evaluate image quality over the past three decades, which provided a good simulation on the image cognitive processing of human vision system. As a newly developing technology, perceptual hashing need to take the perception information into account during the feature extraction stage, and then code them into a short digest. In this paper, we present...
Organizations and people have been looking for a secure data storage method for years, but with the rapidly progressed data recovering and analyzing technology, itpsilas seemed to be futureless. Noticed that conventional ways of disk encryption or hiding always expose many clues that could be utilized by adversaries to recover the data. This paper suggests a new method of disguising which would deduce...
Traditionally, the proposed perceptual hashing algorithms are mainly focused on the feature extraction and coding stages. But they only concerned parts of perception information, and take a certain type of features to obtain codes, which makes them to be biased on resisting some varieties of attacks. On the other hand, HVS (Human Visual System) as one of best methods simulating the image cognitive...
Kernel-mode security enhancement technologies are widely used to improve the efficiency of data processing and the security of data and operating systems in recent years. However, the security modules have been implemented without consolidated standards, in kernel-mode which make them hard to be compared, selected and reused. In this paper, a kernel-mode security module evaluation framework (KSEF)...
Numerous perceptual hashing algorithms have been developed for identification and verification of multimedia objects in recent years. Various application schemes have been adopted to provide the ability of forensic tracking against the illegal use or distribution of multimedia content. Developers and choice-maker are looking for a benchmark tool to compare and evaluate their ongoing algorithms or...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.