Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic ...
详细信息
ISBN:
(纸本)9781424458561
Using the characteristics of the chaotic system, such as ergodicity, sensitivity to initial condition, system parameters and random like behavior, this paper proposes a new image encryption algorithm based on chaotic sequences and wavelet transform. This algorithm controls the initial parameters of two onedimensional chaotic sequences through keys, generates the chaotic sequence, diffuses the image, and then does wavelet decomposition to the diffused image, finally, scrambles the image using two-dimensional hyper-chaotic sequences. The experimental results show that this algorithm has a good encryption effect and a high security.
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the website, the security of...
详细信息
ISBN:
(纸本)9781424429097
As the aggregation of information, database system is the core part of computer information system. The security of the database system is of great importance, as the important resource of the website, the security of its account is even more a focus of network security. According to the encrypt and encryption algorithm characteristics of database, to protect the security of database account, method can be used through setting unique value and implementing double hash encryption during encrypting.
Considering the inefficiency of using traditional RSA algorithm in SSL protocol at E-Business area, a new E-commerce security scheme which the ECC is embed into SSL Protocol has been put forward, and the test has been...
详细信息
ISBN:
(纸本)9781424452729
Considering the inefficiency of using traditional RSA algorithm in SSL protocol at E-Business area, a new E-commerce security scheme which the ECC is embed into SSL Protocol has been put forward, and the test has been carried out based on the OpenSSL source codes. The result of the test indicates that the security and efficiency of E-Business can be improved by adopting the new schemes.
Image encryption algorithm based on chaotic system has been increasingly, but the disadvantages of small key space, weak security in low dimensional chaotic cryptosystems, simple chaotic system, and inconvenient for h...
详细信息
ISBN:
(纸本)9781424448876
Image encryption algorithm based on chaotic system has been increasingly, but the disadvantages of small key space, weak security in low dimensional chaotic cryptosystems, simple chaotic system, and inconvenient for hardware implementation are obvious. This paper presents a new image encryption algorithm based on chaos with PWL memristor in Chua’s circuit. This encryption algorithm includes two main operations of image scrambling and pixel replacement. Simulations show that the key space is large, and the attacker can not decrypt an encrypted image without the correct key. The encryption algorithm has high-level security.
This paper describes wireless communications study for IC-Card Reader Antenna and IC-Card technology. IC-Card is plastic card with embedded micro circuit. It is embedded induction coil and condenser. IC-Card is a pass...
详细信息
ISBN:
(纸本)9783800731527
This paper describes wireless communications study for IC-Card Reader Antenna and IC-Card technology. IC-Card is plastic card with embedded micro circuit. It is embedded induction coil and condenser. IC-Card is a passive device and the most successful RFID technology. Japan's IC-Card (Felica: Contactless IC-Card) was began to develop by Sony in 1988 and has been produced successfully from 1996. In this paper, we focus on study and analysis for IC-Card Reader Antenna and IC-Card technology by wireless communications. In particular, we focus on study of cryptographic algorithm (DES, RSA). It is a core technology of IC-Card Reader Antenna and IC-Card technology. In this study, we discuss efficient wireless communications methods and cryptographic algorithm between IC-Card Reader Antenna and IC-Card.
Digital Rights Management (DRM) systems try to protect copyrights and digital contents by limiting access by users to contents. They provide facilities for electronic publishers to distribute their precious contents t...
详细信息
ISBN:
(纸本)9781424414895
Digital Rights Management (DRM) systems try to protect copyrights and digital contents by limiting access by users to contents. They provide facilities for electronic publishers to distribute their precious contents to prevent any illegal distribution and usage. Existing DRM systems fall short in protecting data ownerships in its life cycle (creation, distribution and updates), providing DRM systems for current software and systems, data/license distribution and hassles for users. This paper proposes a new system for management of digital rights. It supports the enforcement of a wide range of limitations on accessing protected files and advanced digital right management system to protect ownerships while new files are created from protected files. The main novelty of the proposed DRM system lies in using a self local license management system instead of license/content distribution servers, so that users are able to access protected contents offline. This system also enables us to implement DRM systems for current software and data types without need to make any changes in their codes and structures. An implementation based on this system has been developed for and applied to Adobe Acrobat Reader (as the sample target software) and PDF files (as the sample data type). Our evaluations demonstrated that, unlike current DRM architectures and implementations, SLDRM satisfies owner rights as well as user rights by license server independency, data output authorization, data lifecycle protection, machine dependency, virtual machine detection, ability to apply DRM without changes in target software codes and data type/structures.
Signcryption has clear advantage over traditional sign-then-encrypt schemes. However, the computational overhead for signcryption is still too heavy when it is applied to resource-constraint systems. In this paper, we...
详细信息
ISBN:
(纸本)9780769534718
Signcryption has clear advantage over traditional sign-then-encrypt schemes. However, the computational overhead for signcryption is still too heavy when it is applied to resource-constraint systems. In this paper, we propose a generic construction of the identity-based online/offline signcryption, where most of computations are carried out when the associated message is still unavailable and the online part of our scheme does not require any exponent computations and therefore is very efficient. Our scheme is generic and identity-based, in the sense it is independent of the selection of signature and encryption algorithms. Our scheme possesses the properties of ciphertext indistinguishability (IND-gCCA2) and existentially unforgeability (UF-CMA).
The primary requirements of a successful Wireless Sensor Network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash funct...
详细信息
ISBN:
(纸本)9788022728560
The primary requirements of a successful Wireless Sensor Network security architecture are confidentiality, integrity and authentication. Most of these security objectives can be addressed using appropriate hash functions and cryptography schemes. By applying these mechanisms, the energy consumption increases, shortening the sensor node lifetime. On the other hand, the selection of a highly secure encryption algorithm might lead to unacceptable computational time, taking into account the constrained processor power of the sensor nodes. This paper presents an overview of the results published in the literature regarding time and energy consumption overhead of hashing and encryption mechanisms in Wireless Sensor Networks. The evaluation of these results helps on the selection of the appropriate algorithms, depending on the application.
In this paper, we propose a new image watermark algorithm of information hiding scheme based on chaotic encryption. Chaotic sequence is regarded as a noise-like spread sequence, and the secret signal to be transmitted...
详细信息
ISBN:
(纸本)9783540748267
In this paper, we propose a new image watermark algorithm of information hiding scheme based on chaotic encryption. Chaotic sequence is regarded as a noise-like spread sequence, and the secret signal to be transmitted is modulated and hidden in the carrier image as white noise to implement secure communication. The encryption principle of new algorithm is firstly presented in this paper, and the merits of new scheme are quantitatively analyzed by defining integrality and imperceptibility of image information. The results of computer simulation are described in the end.
We have devised one now kind of 160 bits symmetric encryption algorithms, basing on a kernel encryption function called S. By incising 160 bits data block into eight pieces, S function produces one brand-new 160 bits ...
详细信息
ISBN:
(纸本)9789889867140
We have devised one now kind of 160 bits symmetric encryption algorithms, basing on a kernel encryption function called S. By incising 160 bits data block into eight pieces, S function produces one brand-new 160 bits ciphertext after continuous Iteration, encryption, and combination. From computer results, we have found that: without increasing the time complexity, the new algorithm improves the security better comparing with DES and IDEA algorithms.
暂无评论