Aiming at the shortage of data transmission security and efficiency in wireless distributed transient pressure testing system, a new distributed information source joint compression and encryption scheme is proposed i...
详细信息
Aiming at the shortage of data transmission security and efficiency in wireless distributed transient pressure testing system, a new distributed information source joint compression and encryption scheme is proposed in this paper by combining wavelet transform, semi-tensor product compressed sensing and hash chain. Firstly, the signals are decomposed into different components by wavelet transform. Then, the measurement matrix of semi-tensor product compressed sensing is updated with the hash chain related to plaintext, and its used to compress and encrypt the different wavelet components. Finally, the measurement results of the previous steps are scrambled by hash sequences for further encryption. In this paper, simulation test is carried out by using the shockwave signal measured in practice. The simulation results show that the scheme has good reconstruction accuracy and security. When the compression rate reaches 0.25, the scheme can reduce the storage space and the computing resources required by the measurement matrix to 1/32 and 1/8 of traditional distributed compressed sensing. The proposed scheme is a flexible and efficient joint compression and encryption framework, which can flexibly adjust the measurement number of different types of components to ensure important information is effectively measured, balance reconstruction quality, compression rate and system resource consumption.
This paper presents a comprehensive security analysis on an improved chaos -based image encryption algorithm. The initial algorithm, proposed by Li et al., involves permutation related to the sum of plaintext pixel va...
详细信息
This paper presents a comprehensive security analysis on an improved chaos -based image encryption algorithm. The initial algorithm, proposed by Li et al., involves permutation related to the sum of plaintext pixel values and diffusion associated with 9 specific pixel values in the permuted image. However, a thorough analysis conducted by Liu et al. reveals two major flaws in it: firstly, the 9 specific pixel values are not involved in the diffusion process;secondly, the permutation method exhibits significant vulnerabilities. In response to these shortcomings, Liu et al. proposed targeted improvements on it, which include incorporating a permutation step for the 9 specific pixels and enhancing the original permutation method. In this study, we analyze the improved algorithm and discover that it still possesses security vulnerabilities, rendering it susceptible to chosen-plaintext attack. By constructing three categories of special plaintexts, one can decipher the equivalent permutation and diffusion. Theoretical analysis and experimental results provide strong evidence for the effectiveness of our analysis in this paper.
暂无评论