Based on wavelet coefficient dependency, a novel general image steganalysis technique for spatial domain steganography is proposed. First, the mutual information is exploited to analyze the change on the scale and ori...
详细信息
Based on wavelet coefficient dependency, a novel general image steganalysis technique for spatial domain steganography is proposed. First, the mutual information is exploited to analyze the change on the scale and orientation dependency between wavelet coefficients, which is caused by the embedding of a message, and the Markov model is applied to model the dependency between wavelet cofficients so as to extract intrascale and interscale transition probability matrices which are used as feature vectors. Then, a weighted feature fusion method is used to fuse these feature vectors and the fisher linear discriminant (FLD) is designed to classify them. The experiments on least significant bit (LSB), LSB matching and stochastic modulation (SM) steganography show that the method can detect stego images reliably and the detection accuracy of this method exceeds that of its closest competitors obviously under the same computer complexity.
Content filtering through keyword matching is widely adopted in network censoring, and proven to be successful. However, a technique to bypass this kind of censorship by decomposing Chinese characters appears recently...
详细信息
XSS (Cross-Site Scripting) is a major security threat for web applications. Due to lack of source code of web application, fuzz technique has become a popular approach to discover XSS in web application except Webmail...
详细信息
Feature selection is an effective data preprocessing step to reduce the dimension of feature space and save storage space. Binary particle swarm optimization (BPSO) has been applied successfully to solve feature selec...
详细信息
ISBN:
(纸本)9780982443859
Feature selection is an effective data preprocessing step to reduce the dimension of feature space and save storage space. Binary particle swarm optimization (BPSO) has been applied successfully to solve feature selection problem. But it was easy to fall into local optimal point. M2BPSO was an improved BPSO algorithm. The particles of M2BPSO were updated by using various evolutionary strategies according to the performance of them, in addition, the mutation was used to overcome premature. In this paper, we adopted M2BPSO to solve feature selection problem. To test the validity of the algorithm, we compared it with various versions of BPSO methods. Experimental results showed that M2BPSO could effectively solve the feature selection problem.
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to h...
详细信息
As biological systems exhibit adaptation, healing and robustness in the face of changing environmental behavior, this paradigm has actuated research dealing with the concept of self-healing systems, which attempt to heal themselves in the sense of recovering from malicious attacks and rectifying of system faults. The goal of self-healing systems is to provide survivable systems that require high dependability, robustness, adaptability, and availability. Such systems maintain one or more models, whether external or internal, at run time as a basis for identifying problems and resolving them. This article describes an architectural description language, called ADML, which is being developed as a new formal language and/or conceptual model for representing evolving software architectures. The ADML embraces dynamic change as a fundamental consideration, supports a broad class of adaptive changes at the architectural level, and offers a uniform way to represent and reason about both static and dynamic aspects of self-healing systems. Because the ADML is based on the Dynamic Description Logic DDL(SHON (D)), which can represent both dynamic semantics and static semantics under a unified logical framework, architectural ontology entailment for the ADML languages can be reduced to knowledge base satisfiability in DDL(SHON (D)), and dynamic description logic algorithms and implementations can be used to provide reasoning services for ADML. In this article, we present the syntax of ADML, explain its underlying semantics using the Dynamic Description Logic DDL(SHON (D)), and exemplify our approach by applying it to the domain of load balancing a wireless remote-access system;the preliminary results certify the potential of the approach.
Fast-flux service network (FFSN) is consisted of a large scale of computers which have two main functions. Firstly, by providing a pool of huge number of IP addresses, the controller of FFSN can choose the IPs to prov...
详细信息
Cognitive radio (CR) is a technology for identifying opportunities using the "spectrum holes" for communication by cognition. Consequently, we can increase spectrum resource utilization rate with CR. However...
详细信息
Cognitive radio (CR) is a technology for identifying opportunities using the "spectrum holes" for communication by cognition. Consequently, we can increase spectrum resource utilization rate with CR. However, it is cognition that causes an unprecedented challenge for cognitive radio networks, especially in security performance. Based on security problems existing in cognitive radios, we analyze Objective function attacks in detail. To counter this attack, we propose a multi-objective programming model, called MOP, which verifies all parameters tampered, so that attackers can not prevent CR from adapting to surroundings. Our simulation results indicate that the MOP model can defend Objective function attacks effectively. Thus, with the MOP model based on Particle swarm optimization (PSO), cognitive radio networks will obtain the optimum condition.
The recent IEEE 802.16j-2009 adds multi-hop relay capabilities to IEEE 802.16 systems, which aims to offer improved coverage and capacity over single-hop radio access systems. In this paper, we point out several secur...
详细信息
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum...
详细信息
Recently,a genuine five-qubit entangled state has been achieved by Brown et al.[***.A 38(2005)1119].Later it was indicated that this state can be used for quantum teleportation and quantum state *** we build a quantum secure direct communication protocol with this state,and prove that it is secure in ideal *** the protocol,the sender performs unitary transformations to encode a secret message on his/her particles and sends them to the *** receiver then performs projective determinate measurement to decode the secret message ***,this protocol utilizes superdense coding to achieve a high intrinsic efficiency and source capacity.
With periodic B-spline bases closed B-spline curves can be represented compactly. The transformation matrices of periodic B-spline bases provide a mathematical model for the conversion between different representation...
详细信息
暂无评论