Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography...
详细信息
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presente...
详细信息
ISBN:
(纸本)9781479954599
With the development of network, web forensics is becoming more and more important due to the rampant cybercrime. In this paper, a forensics method of web browsing behavior based on association rule mining is presented. The method aims at providing the necessary data support to build the behavior pattern library for investigation. The records of the user's browsing history are collected to be analyzed. The obtained original data are pretreated to transactional data which are suitable for association rule mining. Frequent browsing time and frequent web browsing sequences are obtained from the transactional data by Apriori algorithm. The mining results are helpful for identification and recognition of anonymous or suspicious web browsing behavior patterns.
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a ...
详细信息
ISBN:
(纸本)9781479957286
The data availability in large-scale cloud storage has been increasing by means of data *** provide cost-effective availability, minimize the response time of applications and make load balancing for cloud storage, a new replica placement policy with bidding thought is *** policy combines the own characteristics of replica and factors of bidding mode(e.g, bidding time, bidding standard, bidding price etc.) and starts replica bidding activity when the file data availability cannot meet the given *** placement is based on capacity and accessing probability of data *** experimental results show that our policy has a better performance in both load balance and response time comparing to the static replica policy and CDRM scheme.
With the increasing popularization of low-cost smart mobile devices, which have the capability of short-range wireless communication, opportunistic networks aimed to meet different requirements start to put into pract...
详细信息
ISBN:
(纸本)9781479979820
With the increasing popularization of low-cost smart mobile devices, which have the capability of short-range wireless communication, opportunistic networks aimed to meet different requirements start to put into practice. However, because of the mobility of nodes, links in opportunistic networks is intermittent and dynamic, which results in the problems of long delay time and low success rate of delivery. And these problems limit the further development of opportunistic networks. To solve these problems, this paper proposes a solution framework based on prediction, explores potential methods that are applicable to opportunistic networks and compares their performance and suitable application model.
The paper is mainly used to provide the equivalence of two algorithms of independent component analysis (ICA) based on the information bottleneck (IB). In the viewpoint of information theory, we attempt to explain the...
For hardware Trojan detection process is difficult to effectively extract the exact equivalent logic function of the target chip logic function is proposed based on contradictory truth table equivalent extraction sche...
详细信息
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first pa...
详细信息
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden *** the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary *** secret message hiding/unhiding process is linked with the QSDC process only by unitary *** accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this *** performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good ***,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service *** improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which e...
详细信息
By analyzing the basic properties of unitary transformations used in a quantum secure direct communication (QSDC) protocol, we show the main idea why a covert channel can be established within any QSDC channel which employs unitary transformations to encode information. On the basis of the fact that the unitary transformations used in a QSDC protocol are secret and independent, a novel quantum covert channel protocol is proposed to transfer secret messages with unconditional security. The performance, including the imperceptibility, capacity and security of the proposed protocol are analyzed in detail.
Image saliency detection, which is aiming at locating meaningful objects in image and extracting the corresponding saliency map, has been attracting considerable attention. Most of existing saliency detection algorith...
详细信息
ISBN:
(纸本)9781479970063
Image saliency detection, which is aiming at locating meaningful objects in image and extracting the corresponding saliency map, has been attracting considerable attention. Most of existing saliency detection algorithms are dealing with uncompressed images, while numerous images are distributed and stored in JPEG format over Internet. Thus, this paper proposes a novel image saliency detection method dealing with JPEG images, which directly extracts 3 image low-level features (intensity, texture and color) from JPEG DCT blocks and then evaluates image saliency by calculating the shortest path from each internal point to the background. We compare our method with some state-of-the-art methods on the publicly available dataset MSRA-1000. Experimental results show that our method exhibits better performance in terms of all four evaluations than some state-of-the-art methods in our experiments. The final saliency maps indicate that our method can also produce satisfied saliency maps directly in compressed domain.
Finding justifications plays an important role in the development and maintenance of ontologies. It helps users or developers to understand the entailments by presenting the minimal subsets of the ontology which are r...
详细信息
暂无评论