The critical asset data of the Space Tracking Telemetry and Command (TT&C) System plays an important role in fulfilling space missions. According to analyze the current storing methods and disaster recovery requir...
详细信息
Metaheuristic algorithms have been applied widely for real-world problems in many fields, e.g., engineering, financial, healthcare. Bats algorithm (BA) is a recent metaheuristic algorithm with considering as a robust ...
详细信息
In dyadic interaction, predicting the listener’s facial reactions is challenging as different reactions could be appropriate in response to the same speaker’s behaviour. Previous approaches predominantly treated thi...
详细信息
RGBT tracking receives a surge of interest in the computer vision community, but this research field lacks a large-scale and high-diversity benchmark dataset, which is essential for both the training of deep RGBT trac...
详细信息
LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID tags and smart cards. It has been found that it is possible to retriev...
详细信息
LED algorithm is a new lightweight encryption algorithm proposed in CHES 2011, which is used for IOT to protect the communication security of RFID tags and smart cards. It has been found that it is possible to retrieve secret key of algorithm by appropriate analysis of the devices' s power consumption,and the differential power analysis is the most powerful attack. This paper proposed a method of differential power analysis on LED algorithm. Combined with hardware circuit, it designed and implemented differential power analysis of the LED encryption system. The experimental results show that method which is proposed in this paper was cracked the 64 bits key of LED. Thus,without protection, the cipher LED would be difficult to resist differential power analysis. and according this, We provide a general analysis method of differential power analysis on other lightweight cryptographic algorithms.
With the developing of the social economy,the amount of currency circulation has increased and become more frequent,but the customer gathering is often occurred in the many bank's *** this paper,with some framewor...
详细信息
With the developing of the social economy,the amount of currency circulation has increased and become more frequent,but the customer gathering is often occurred in the many bank's *** this paper,with some framework technology,Spring Boot and MyBatis,a WeChat public platform software is developed for customers who are available to book branch business,such as branch service reservation,bank business reservation,reservation information inquiry and so *** with WeChat public number and small program,the software offers humanized service and simple ***,it can meet the needs of users who can choose a reasonable time to go to the ideal branch to handle their business quickly,which not only saves users' time,but also improves the efficiency of the bank's system.
In this paper,we discuss the area and speed balance optimization of Khudra lightweight block *** are three major ***,because the whole structure of the Khudra block cipher and its F-function are based on a Feistel str...
详细信息
In this paper,we discuss the area and speed balance optimization of Khudra lightweight block *** are three major ***,because the whole structure of the Khudra block cipher and its F-function are based on a Feistel structure,we make the main module directly call the Ffunction in the hardware optimization ***,through the clock control,the plaintext can be XORed with the key and the round constant under certain *** the same time,the 3 rounds of the F-function are merged into one module,whose F-function module contains the F-function of the left and right branches of the ***,three rounds of operations can be completed with only one S-box,which can effectively reduce the number of registers and the number of iterations to increase the encryption and decryption ***,because of the particularity of key expansion in Khudra,we separately calculated the round key and stored its results in the register,which can effectively save the time of key expansion.
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduli...
详细信息
Network threats caused by system vulnerabilities is increasing gradually, the distributed vulnerability scanning system can scan large-scale and complex networks and report the vulnerability information. Task scheduling is one of the core components in a distributed system. In this paper, we use dynamic optimization algorithms to improve the task scheduling efficiency of distributed vulnerability scanning system, we propose a PSO-based task scheduling scheme and improves the search ability of particles by adjusting algorithm parameters. We compared the time consume when using existing‘Resource Aware Scheduling algorithm'(RASA) with the basic particle swarm optimization(PSO) algorithm and the improved particle swarm optimization(IPSO) algorithm. Our results show that IPSO has better performance than other scheduling methods.
information hiding-based visual secret sharing(IH-VSS) uses the information hiding techniques to embed secret data into *** the IH-VSS scheme,hidden images are divided into n shadows under the guidance and constraints...
详细信息
information hiding-based visual secret sharing(IH-VSS) uses the information hiding techniques to embed secret data into *** the IH-VSS scheme,hidden images are divided into n shadows under the guidance and constraints of some predetermined methods,and only a certain number or all of the credible shadows work together to recover hidden *** on(2,2)-threshold IH-VSS scheme,this paper proposes an optimized IH-VSS scheme,it can randomly locate the hidden position of the secret *** set a random number and use it as the initial hiding position,then combined with the length of the secret data,assigns the address,and completes the hiding of the secret *** experimental results show that,under the same embedding capacity,the peak signal-to-noise ratio(PSNR) of the optimized scheme is higher than other similar schemes,which is high to 55.41 ***,the difference between the two shadows is very small.
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding ***, digital image steganography has become a hot research direction in the field of...
详细信息
Digital image has the characteristics of high redundancy and convenient processing, which is the ideal carrier of information hiding ***, digital image steganography has become a hot research direction in the field of information security. In order to ensure the concealment, reliability and security of image steganographic information, an image adaptive steganographic algorithm combining chaotic encryption and minimum distortion function is designed. The algorithm generates random keys, encrypt the secret information using Logistic and ChebyShev mapping, and then embeds the key and the encrypted secret information into the carrier image using the HILL steganographic algorithm. The algorithm stores the embedded key and the decryption key separately, so the attacker cannot get the correct secret information even if he gets the embedded key, which improves the security of the key. Experiments show that the pixel change rate of the algorithm is 6.76%, the peak signal-to-noise ratio is 59.51 db, and it has a very good anti-steganographic analysis ability.
暂无评论