The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Electronic thermometer is expected to be a best seller because it meets the market's need better, easier to use and less mercury pollution. Electronic thermometer based on Bluetooth Low Energy (BLE) is able to work for months only with a coin-cell battery. In this paper, the proposed monitoring system, comprised of a temperature acquisition module, a BLE module and smart phones, is able to acquire...
Recently, product perfect codes (PPC) steganographic method was proposed by H. Rifa-Pous and J. Rifa, which can achieve large embedding efficiency with less distortion. They divided the cover image into disjoint matrix blocks and apply F5 algorithm in each row and some columns. The proposed method in this paper improves the PPC embedding method. F5 algorithm was also utilized in each row, but to the...
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e., the dense-coding attack. It is shown that the eavesdropper Eve can totally...
Since current DCT-domain watermarking algorithm is poor self-adaptive, a new digital watermarking algorithm that combines encryption with adaptability is proposed. Before been embedding, it need to be Arnold transformed so that it can break the correlation of watermark's inter-related data, greatly increase the security of watermarking and reduce the errors may be caused in the watermark image transmission...
In order to adapt the open, dynamic network environment and user's various demands, dynamic self-adapted and reconfigurable component has become the key of software component reusing technology. Through analyzing the concerns of component, this paper proposes a reflective software component model-based on the principle of the separation of multidimensional concerns and establishing map to concerns...
Data aggregation is a fundamental building block in sensor networks for power-efficient data collecting, thereby it is important to protect it from attack. In this paper, we consider defending against attackers who intend to stealthily change the aggregation value and mislead the base station into accepting arbitrary false aggregation result. The main idea of our solution is independent aggregating...
Considering chaotic synchronization, the TCP protocol is usually adopted to transport encrypted data on networks at present. A block encryption algorithm is proposed to digital speech codes in this paper. The method uses the UDP protocol to cipher text. It partially solves the problem of decryption for receiver when some data packages are lost during transportation. It encrypts message with chaotic...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.