Crowdsourcing is emerging as a powerful paradigm that utilizes the distributed devices to sense, collect, and upload data to satisfy the requirements of the users. Currently, with the popularity of edge computing, edg...
详细信息
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and aro...
详细信息
Information hiding tends to hide secret information in image area where is rich texture or high frequency,so as to transmit secret information to the recipient without affecting the visual quality of the image and arousing *** take advantage of the complexity of the object texture and consider that under certain circumstances,the object texture is more complex than the background of the image,so the foreground object is more suitable for steganography than the *** the basis of instance segmentation,such as Mask R-CNN,the proposed method hides secret information into each object's region by using the masks of instance segmentation,thus realizing the information hiding of the foreground object without *** method not only makes it more efficient for the receiver to extract information,but also proves to be more secure and robust by experiments.
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. [Quantum Inf. Process. 13, 2391(2014)]. However, Zhu et al. pointed out that there are some security f...
详细信息
Existing federated unlearning methods to eliminate the negative impact of malicious clients on the global model are influenced by unreasonable assumptions (e.g., an auxiliary dataset) or fail to balance model performa...
详细信息
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivatio...
详细信息
With the rapid development of quantum theory and technology in recent years,especially the emergence of some quantum cloud computing platforms,more and more researchers are not satisfied with the theoretical derivation and simulation verification of quantum computation(especially quantum algorithms),experimental verification on real quantum devices has become a new *** this paper,three representative quantum algorithms,namely Deutsch-Jozsa,Grover,and Shor algorithms,are briefly depicted,and then their implementation circuits are presented,*** program these circuits on python with QISKit to connect the remote real quantum devices(i.e.,ibmqx4,ibmqx5)on IBM Q to verify these *** experimental results not only show the feasibility of these algorithms,but also serve to evaluate the functionality of these devices.
The complex systems with edge computing require a huge amount of multi-feature data to extract appropriate insights for their decision-making, so it is important to find a feasible feature selection method to improve ...
详细信息
With the advent of the information age in contemporary society, images are everywhere, no matter in military use or in daily life. Therefore, as a medium for people to obtain information, images have become more and m...
详细信息
Privacy-preserving computational geometry is the research area on the intersection of the domains of secure multi-party computation (SMC) and computational geometry. As an important field, the privacy-preserving geome...
详细信息
The traditional bag-of-visual-words (BOW) model quantifies the local features to the visual words to achieve efficient content-based image retrieval. However, since it causes considerable quantisation error and ignore...
详细信息
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing ...
详细信息
As the power Internet of Things(IoT)enters the security construction stage,the massive use of perception layer devices urgently requires an identity authentication scheme that considers both security and *** existing public key infrastructure(PKI)-based security authentication scheme is currently difficult to apply in many terminals in *** key distribution and management costs are high,which hinders the development of power IoT security *** Public Key(CPK)technology uses a small number of seeds to generate unlimited public *** is very suitable for identity authentication in the power Internet of *** this paper,we propose a novel identity authentication scheme for power *** scheme combines the physical unclonable function(PUF)with improved CPK technology to achieve mutual identity authentication between power IoT terminals and *** proposed scheme does not require third-party authentication and improves the security of identity authentication for power ***,the scheme reduces the resource consumption of power IoT *** improved CPK algorithm solves the key collision problem,and the third party only needs to save the private key and the public key *** results show that the amount of storage resources occupied in our scheme is *** proposed scheme is more suitable for the power IoT.
暂无评论