Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
This paper proposes the Coefficients Shuffling in Defined Block (CSDB) JPEG image encryption algorithm, which encrypts the quantized DCT coefficients. CSDB algorithm mainly decomposes the DC coefficients and shuffles the decomposed DC coefficients and AC coefficients during all defined block. The experimental results demonstrate that the suggested JPEG image encryption algorithm can resist the knowing...
Cloud computing provides both opportunities to develop more services as well as significant risks for greater exposure to data privacy problem when users outsource sensitive data for sharing on cloud servers. Re-encryption scheme offers a solution to this issue, which allows the data owner to delegate most of the computation tasks to untrusted cloud servers providers without disclosing the underlying...
The fractal image coding is an effective method of data compression and its prospects are bright for the future. But due to the high computation order of complexity difficulty it faces, it can't be applied widespreadly until now. The author of this article proposes a fast coding algorithm that could reduce the complexity of fractal code computation order and the time. The experimental results indicated...
This paper conducted a preliminary study and exploration of dynamic watermarking scheme. Firstly, the paper introduces software watermarking technology and analyses the process of dynamic graph watermarking. Secondly, this paper proposes and realizes the IPPCT dynamic watermarking scheme based on Chinese remainder theorem, and details the stages of watermarking embedding, decomposition, encryption...
Compared with digital methods, image hiding methods by optical ways have many advantages such as high processing speed, high parallel, high encryption dimension etc al. A novel efficient image encryption and hiding method applied by double random phase encoding technique is discussed in this paper. First, the performance of existing optical image hiding systems is analyzed; then specific statistical...
The IOT is a huge and widely distributed the Internet that things connect things.It connects all the articles to the internet through information sensing devices. It is the second information wave after Computer, Internet and mobile communication network. With the rapid development of the Internet of Things, its security problems have become more concentrated. This paper addresses the security issues...
With the continuous development of China's industrialization, the industrial revolution with the core of informatization and intellectualization has become the current mainstream of development trends, demanding the construction of information security system to escort the industrial informatization. According to the license control, information security control, user's operation permission and other...
It is gradually becoming one of the hot research topics that the information encryption methods based on high-dimensional chaotic mappings are increasing in the performances such as encryption strength, security and encryption speed than low-dimensional chaotic mappings. On studying extensive reference, the author of this article put forward a DCT domain color image block encryption algorithm based...
In research of the copyright protection of digital text, according to the shortage of poor robustness and weakness of attack resistance for the existing text watermark, Chinese machine code and information gain strategy have been introduced into text zero-watermark scheme, which puts forward the text zero-watermark based on the Chinese Edit Distance, constructs the construction and detection process...
The author of this article makes studies and discussion on the image encryption of transforming domains. In the image encryption algorithm, the sine chaotic mapping scrambling is applied to the original image, and the scrambling matrix is generated by Logistic chaotic system. Fractional Fourier transform, respectively, is along the x-axis and y-axis that generates a function which is transformed random...
A new image encryption algorithm based on logistic map and hyper-chaos is proposed in this paper. The logistic chaotic sequences are modified to generate the chaotic key 1 which have a better randomness. A hyperchaos system is employed to produce the chaotic key 2. Encryption algorithm includes two rounds of image encryption based on double kinds of keys. The Ciphertext diffusion mechanism is produced...
Hui and Wang proposed a lightweight security encryption algorithm-LEA. And by increasing the bit selection logic traps, the S-box design is optimized. However, we show that there is something wrong in their design. Firstly, the initial key is too short. Secondly, the elements selection method of the LEA S-box is not as they claimed as more secure than the S-box of DES. On the contrary, because of...
With the wide application of cloud storage service, its security problem is apparent. The conspiracy resistance is a major problem. Aiming at this issue, we proposed a limited length of the ciphertext hidden control policies, which enhance the safety and at the same time improve efficiency. We establish cloud access control model, ABE encryption mode structure access control policies, and give the...
VPN technology is the use of the knowledge of cryptography in the open and public network to establish a virtual private network. IPSec VPN and SSL VPN are two kinds of VPN technology and products used in most cases currently. IPSec VPN operates at the network layer, SSL VPN works in secure sockets layer. SSL VPN uses a series of cryptographic techniques, including symmetric encryption, asymmetric...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.