An audio digital signature algorithm based on Principal Component Analysis (PCA) was presented. Wavelet packet decomposition was implemented to audio files, all the terminal coefficients of the wavelet packet decompos...
详细信息
ISBN:
(纸本)9780769537443
An audio digital signature algorithm based on Principal Component Analysis (PCA) was presented. Wavelet packet decomposition was implemented to audio files, all the terminal coefficients of the wavelet packet decomposing tree were used as the data matrix. The matrix was chaotically encrypted, and then it was Principal Component Analysis that to get the eigenvector. Quantized eigenvector matrix was used as the signature, and the signature was embedded into the primal audio data by using watermarking system, and at the same time ICA technology was introduced to locate the audio tamper. The experiment results confirm that the signature is sensitive to the change of the audio data and can locate the tamper.
Ring signature has prominent superiorities in group managing and system efficiency compared with other group cryptosystem, such as group signature. Combining HCC (Hyper-elliptic Curves Cryptosystem) and ring signature...
详细信息
Ring signature has prominent superiorities in group managing and system efficiency compared with other group cryptosystem, such as group signature. Combining HCC (Hyper-elliptic Curves Cryptosystem) and ring signature, we presented an improved ring signature scheme. The scheme avoids the operation of adding or deleting group members when the signer group has to be changed, and thus further simplify the protocol in signer group managing. The one-way trapdoor function of the scheme is based on HCDLP (Hyper-elliptic Curve Discrete Logarithm Problem), and the algorithms take great advantage of the superiority of HCC, such as high efficiency, short key length and etc. The proposed ring signature scheme can achieve the same security with less storing space, smaller communication band-width and less overheads of the system and thus proves to be applicable to such circumstances as with restricted computation ability and integrated space, circumstances with limited bandwidth yet requiring for high-speed operation.
Combining bionic evolution and e-cash (electronic cash), we present an improved e-cash scheme based on bionic evolution algorithm. In the scheme, the private key for e-cash generating and identity tracing is generated...
详细信息
Combining bionic evolution and e-cash (electronic cash), we present an improved e-cash scheme based on bionic evolution algorithm. In the scheme, the private key for e-cash generating and identity tracing is generated with evolutionary algorithm by a successive optimizing process. The adaptive optimizing of secret parameters with bionic evolution avoids the randomness and indefinite security problem in private key selection, and thus prevents generalized e-cash forgery and coalition attack by dishonest users and other outer adversaries. The optimizing algorithm can also be applied to other essential parameters, such as the private keys of TTP (Trustable Third Party) and e-cash users to further improve the security of e-cash. Besides, the optimizing algorithm can be executed in advance without any influence to the efficiency of e-cash scheme. This designing strategy not only reinforces the security and stability of e-cash scheme but also greatly improves the efficiency of software and hardware application.
Event log is the important starting point of any process analysis technique. Existent business process analysis techniques are applied mainly to manual or simulated logs, considering mainly information about control p...
详细信息
Traditional public-key cryptosystems suffer from a relatively low encryption/decryption speed, which hampers their applications in resource-constrained environments. A fast public-key cryptosystem is proposed to remed...
详细信息
Traditional public-key cryptosystems suffer from a relatively low encryption/decryption speed, which hampers their applications in resource-constrained environments. A fast public-key cryptosystem is proposed to remedy this drawback. The new algorithm uses Chinese remainder theorem to hide the trapdoor information. The encryption of the system only carries out several modular multiplication operations, and the decryption only needs a modular multiplication and a low-dimensional matrixvector multiplication, which makes the speed of the encryption and the decryption of the scheme very *** security of the system is based on two difficult number-theoretic problems. The attacker has to solve the integer factorization problem and the simultaneous Diophantine approximation problem simultaneously to recover the secret key from the public key. The proposed cryptosystem is also shown to be secure against lattice attack. The analysis shows that the encryption algorithm is a secure, fast and efficient public-key cryptosystem.
In the paper, a new universal image steganalysis system based on wavelet packet decomposition (WPD) and empirical transition matrix in wavelet domain is proposed. First, it decomposes the test image using two-leve...
详细信息
In the paper, a new universal image steganalysis system based on wavelet packet decomposition (WPD) and empirical transition matrix in wavelet domain is proposed. First, it decomposes the test image using two-level Haar WPD. The statistical analysis is made both for the test image and their wavelet packet subbands. Second, it exploits the interscale and intrascale dependencies between wavelet coefficients. Markov empirical transition matrices are used to capture these dependencies. Fisher linear discriminator (FLD) is applied as classifier to distinguish between cover images and stego images. The experimental results have demonstrated that the proposed scheme has outperformed the existing steganalyzers in attacking a wide range of steganographic schemes include SSIS (Spread spectrum image steganography), Hide4PGP, Jsteg, F5, OutGuess.
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one tha...
详细信息
In 1998, Blaze, Bleumer, and Strauss proposed a kind of cryptographic primitive called proxy re-encryption. In proxy re-encryption, a proxy can transform a ciphertext computed under Alice's public key into one that can be opened under Bob's decryption key. They predicated that proxy re-encryption and re-signature will play an important role in our life. In 2007, Matsuo proposed the concept of four types of re-encryption schemes: CBE to IBE(type 1), IBE to IBE(type 2), IBE to CBE (type 3), CBE to CBE (type 4 ). Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group. One feature of proxy re-encryption schemes proposed by Matsuo is that they are all based on BB1 identity based *** ask question like this: can we construct proxy re-encryption schemes based on BB2 identity based encryption? We give affirmative answer to this question. We construct an IBE to IBE proxy re-encryption scheme based on BB2 with the help of PKG and prove its security in the standard model.
The concept of proxy re-cryptography comes from the work of Blaze, Bleumer, and Strauss in 1998. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without ...
详细信息
ISBN:
(纸本)9781424451012
The concept of proxy re-cryptography comes from the work of Blaze, Bleumer, and Strauss in 1998. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without relying on trusted parties. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE to CBE, IBE to CBE, CBE to IBE and IBE to IBE. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working group. One feature of their schemes is that they are all based on BB1 identity based encryption. We reconsider the problem of constructing proxy re-encryption based on SK identity based encryption. Surprisingly, if we consider the help of PKG, then it is easy to construct proxy re-encryption based on SK identity based encryption. Interestingly , our proxy re-encryption scheme even can achieve CCA2 secure, which makes it is unique.
EMD steganographic method by exploiting modification direction in the host images to send secret messages was proposed by Zhang et al. Comparing with other steganographic algorithms, its highlight is high embedding ef...
详细信息
Real-time network simulation refers to simulating computernetworks in real time so that the virtual network can interact with real implementations of network protocols, network services, and distributed applications....
详细信息
暂无评论