With technological progress, how to efficiently process and retrieve large amounts of multi-modal multimedia data has become a challenge. Although multi-modal hash algorithms have been applied in this field, their per...
详细信息
With technological progress, how to efficiently process and retrieve large amounts of multi-modal multimedia data has become a challenge. Although multi-modal hash algorithms have been applied in this field, their performance potential has not been fully realized. To fully leverage the performance of the model, a supervised discrete multi-modal hash algorithm has been proposed to improve the efficiency of multi-modal retrieval. The adaptive online multi-modal hash algorithm is used to dynamically adapt to changes in query samples. The topological semantic multi-modal hash algorithm is applied to further improve the retrieval performance of multi-modal hashes. According to the results, in the MIR Flickr dataset, the Mean Average Precision (MAP) reaches 0.8048, 0.8155, and 0.8185 at 32-bit, 64-bit, and 128-bit, respectively. Fusion Graph Convolutional multi-modal hashing (FGCMH) exhibits the bestin different datasets. From this, the designed method has high processing power in handling large-scale and high-dimensional multimedia data.
Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel hash en...
详细信息
Information on isotopic composition and geometric structure is necessary for identifying a true warhead. Nevertheless, such classified information should be protected physically or electronically. With a novel hash encryption algorithm, this paper presents a Monte Carlo-based design of a neutron activation analysis verification module. The verification module employs a thermal neutron source, a non-uniform mask (physically encrypting information about isotopic composition and geometric structure), a gamma detector array, and a hash encryption algorithm (for electronic encryption). In the physical field, a non-uniform mask is designed to distort the characteristic gamma rays emitted by the inspected item. Furthermore, as part of the hash algorithm, a key is introduced to encrypt the data and improve the system resolution through electronic design. In order to quantify the difference between items, Hamming distance is used, which allows data encryption and analysis simultaneously. Simulated inspections of simple objects are used to quantify system performance. It is demonstrated that the method retains superior resolution even with 1% noise level. And the performances of antistatistical attack and anti-brute force cracking are evaluated and found to be very excellent. The verification method lays a solid foundation for nuclear disarmament verification in the upcoming era.
In order to improve the ability of searching and identifying information in natural resources data, this paper puts forward a method of searching information in natural resources data based on hash algorithm. Through ...
详细信息
In order to improve the ability of searching and identifying information in natural resources data, this paper puts forward a method of searching information in natural resources data based on hash algorithm. Through the data center technology, the problems of information source positioning, data directory organization, data semantic definition and expression, and data entity relationship construction in natural resource data center are solved. Combined with the distribution of resource data stream, the information structure reorganization and data encryption in natural resource data center are realized by using hash algorithm, and the parameters of information quality control model in natural resource data center are established. Through natural resource data governance and semantic reconstruction, the characteristics detection and redundancy arrangement of information data in natural resource data center are realized by standardizing data collection rules, and they are stored in the intermediate database. Through data governance rules, the information in the natural resources data is structured and managed, and stored in the publishing library. Through all kinds of data processing tools, all kinds of data are processed, cleaned and reconstructed, and through hash algorithm and data aggregation processing, information detection in natural resources data is realized. The simulation results show that the precision rate of natural resource data retrieval by this method is high.
The lengths of input vectors corresponding to different circuits are often quite different, which makes it difficult to standardize them. This paper proposes a characteristic standardization method for circuit input v...
详细信息
The lengths of input vectors corresponding to different circuits are often quite different, which makes it difficult to standardize them. This paper proposes a characteristic standardization method for circuit input vectors based on hash algorithm. First, the collision rates of different hash algorithms are analyzed, and four representative hash algorithms are selected to process the input vectors. Then, based on the given dataset, their performance is analyzed from collision rate, stability and distribution characteristics, and the best performing RShash algorithm is selected for further research. Next, we deal with the input vectors using RShash mapping and partitioning strategy, respectively, and then apply processed input vectors to the deep autoencoder network to perform experiments. The experimental results show that the characteristic standardization method for circuit input vectors based on RShash algorithm has better performance.
In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean fun...
详细信息
In this study, we propose a novel keyed hash algorithm based on a Boolean function and chaotic attractor. The hash algorithm called BentSign is based on two Signature attractors and XOR function and a bent Boolean function. The provided theoretical and experimental results confirm that the novel scheme can generate output hashes with a good level of security, collision resistance, and protection against most common attacks.
hash functions are vital tasks in many applications such as digital fingerprinting, Internet communications, bank transactions and so forth. RACE Integrity Primitives Evaluation Message Digest-160 (RIPEMD-160) is one ...
详细信息
Block chain technology and satellite integration to achieve wide-area security transactions has become a hot topic in the field of information security. It will face two major problems: the real-time transmission of l...
详细信息
Block chain technology and satellite integration to achieve wide-area security transactions has become a hot topic in the field of information security. It will face two major problems: the real-time transmission of large-span digital currency and the credibility of digital currency transmission under complex interference. In order to solve the above problems, this paper proposes a multi-constrained optimization-based hashing algorithm for long-span digital currency transactions. By analyzing satellite communication means and one-way hashing operation, the relationship between time delays under long-span digital currency transmission is obtained. By optimizing the hashing operation of constraints, the algorithm is improved to a larger extent. The adaptive ability of bit error rate(BER) and the construction of digital token based on multi-constraint enhanced hash algorithm provide a reliable authentication benchmark for digital currency transactions, design a large-span digital currency transaction process, and effectively suppress the information leakage caused by interference in the transmission process. The simulation results show that the performance of the proposed algorithm is greatly improved in security and complexity.
In today Scenario various organizations, business are dependent on Cloud Computing. This paper focus on security issues in cloud computing. People Stores their confidential data on cloud storage and Cloud Service is a...
详细信息
ISBN:
(纸本)9781728106465
In today Scenario various organizations, business are dependent on Cloud Computing. This paper focus on security issues in cloud computing. People Stores their confidential data on cloud storage and Cloud Service is an Open Service on internet which allows everyone to use Cloud Storage. In this regard security on Cloud is first necessity. This paper aim is to compute matrix multiplication result over malicious cloud. The aim of proposed approach is that we can build a new hash algorithm which can provide a hash value. In proposed approach, we can multiply hash value with matrices for multiplication, result of matrix multiplication with hash value will send to client side. On client side result will be verify after Re transformation, if its correct it will be accepted, otherwise will be aborted.
In order to study the application of improved image hashing algorithm in image tampering detection,based on compressed sensing and ring segmentation,a new image hashing technique is *** image hash algorithm based on c...
详细信息
In order to study the application of improved image hashing algorithm in image tampering detection,based on compressed sensing and ring segmentation,a new image hashing technique is *** image hash algorithm based on compressed sensing and ring segmentation is ***,the algorithm preprocesses the input ***,the ring segment is used to extract the set of pixels in each ring *** aggregate data are separately performed compressed sensing ***,the hash value is constructed by calculating the inner product of the measurement vector and the random *** results show that the algorithm has good perceived robustness,uniqueness and ***,the ROC curve is used to analyze the classification *** comparison of ROC curves shows that the performance of the proposed algorithm is better than FM-CS,GF-LVQ and RT-DCT.
SM3 is a hash function standard defined by China. Unlike SHA-1 and SHA-2, it is hard for SM3 to speed up the throughput because it has more complicated compression function than other hash algorithm. In this paper, we...
详细信息
SM3 is a hash function standard defined by China. Unlike SHA-1 and SHA-2, it is hard for SM3 to speed up the throughput because it has more complicated compression function than other hash algorithm. In this paper, we propose a 4-round-in-1 structure to reduce the number of rounds, and a logical simplifying to move 3 adders and 3 XOR gates from critical path to the non-critical path. Based in SMIC 65 nm CMOS technology, the throughput of SM3 can achieve 6.54 Gbps which is higher than that of the reported designs.
暂无评论