Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgori...
详细信息
Images are the most important carrier of human information. Moreover, how to safely transmit digital imagesthrough public channels has become an urgent problem. In this paper, we propose a novel image encryptionalgorithm, called chaotic compressive sensing (CS) encryption (CCSE), which can not only improve the efficiencyof image transmission but also introduce the high security of the chaotic system. Specifically, the proposed CCSEcan fully leverage the advantages of the Chebyshev chaotic system and CS, enabling it to withstand various attacks,such as differential attacks, and exhibit robustness. First, we use a sparse trans-form to sparse the plaintext imageand then use theArnold transformto perturb the image pixels. After that,we elaborate aChebyshev Toeplitz chaoticsensing matrix for CCSE. By using this Toeplitz matrix, the perturbed image is compressed and sampled to reducethe transmission bandwidth and the amount of data. Finally, a bilateral diffusion operator and a chaotic encryptionoperator are used to perturb and expand the image pixels to change the pixel position and value of the compressedimage, and ultimately obtain an encrypted image. Experimental results show that our method can be resistant tovarious attacks, such as the statistical attack and noise attack, and can outperform its current competitors.
The increasing capability and widespread usage of large language models (LLMs) highlight the desirability of automatic detection of LLM-generated text. Zero-shot detectors, due to their training-free nature, have rece...
详细信息
Most current network devices have multiple network interfaces, and multipath transport protocols can utilize multiple network paths (e.g., WiFi and cellular) to improve the performance and reliability of network trans...
详细信息
In a new network architecture like NDN, designing an efficient name lookup method has always been a valuable challenge. The paper studies the name lookup technology based on the Bloom filter and BPNN neural network ma...
详细信息
Differential privacy, as a provable privacy protection framework, has been widely applied in recommendation systems. However, the integration of existing collaborative filtering algorithms with differential privacy ty...
详细信息
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in ***,numerous security ...
详细信息
Digital assets have boomed over the past few years with the emergence of Non-fungible Tokens(NFTs).To be specific,the total trading volume of digital assets reached an astounding$55.5 billion in ***,numerous security concerns have been raised by the rapid expansion of the NFT *** holders are exposed to a plethora of scams and traps,putting their digital assets at risk of being ***,academic research on NFT security is scarce,and the security issues have aroused rare *** this study,the NFT ecological process is comprehensively *** process falls into five different stages encompassing the entire lifecycle of ***,the security issues regarding the respective stage are elaborated and analyzed in depth.A matrix model is proposed as a novel contribution to the categorization of NFT security *** data are collected from social networks,the Ethereum blockchain,and NFT markets to substantiate our claims regarding the severity of security concerns in the NFT *** this comprehensive dataset,nine key NFT security issues are identified from the matrix model and then subjected to qualitative and quantitative *** study aims to shed light on the severity of NFT ecosystem security *** findings stress the need for increased attention and proactive measures to safeguard the NFT ecosystem.
Considering the privacy challenges of secure storage and controlled flow,there is an urgent need to realize a decentralized ecosystem of private blockchain for cyberspace.A collaboration dilemma arises when the partic...
详细信息
Considering the privacy challenges of secure storage and controlled flow,there is an urgent need to realize a decentralized ecosystem of private blockchain for cyberspace.A collaboration dilemma arises when the participants are self-interested and lack feedback of complete *** blockchains have similar faults,such as trustlessness,single-factor consensus,and heavily distributed ledger,preventing them from adapting to the heterogeneous and resource-constrained Internet of *** this paper,we develop the game-theoretic design of a two-sided rating with complete information feedback to stimulate collaborations for private *** design consists of an evolution strategy of the decision-making network and a computing power network for continuously verifiable *** formulate the optimum rating and resource scheduling problems as two-stage iterative games between participants and *** theoretically prove that the Stackelberg equilibrium exists and the group evolution is ***,we propose a multi-stage evolution consensus with feedback on a block-accounting workload for metadata *** continuously validate a block,the metadata of the optimum rating,privacy,and proofs are extracted to store on a lightweight ***,to increase resource utilization,surplus computing power is scheduled flexibly to enhance security by ***,the evaluation results show the validity and efficiency of our model,thereby solving the collaboration dilemma in the private blockchain.
With the continuous development of information technology, security issues from internal networks are becoming more and more important. Many anomaly detection algorithms are designed to identify anomalies, but these a...
详细信息
Device recognition is the primary step toward a secure IoT system. However, the existing equipment recognition technology often faces the problems of unobvious data characteristics and insufficient training samples, r...
详细信息
With the rapid development of the network, the proportion of encrypted traffic in the network is increasing, which brings great challenges to traffic classification. The traditional encrypted traffic classification al...
详细信息
暂无评论