The rapid development of cloud storage has caused a wave of research craze. To improve cloud user experience, a large number of schemes are proposed with various practical performances, like long-term correct ensurenc...
详细信息
As cloud storage is developing fast with time going by, the design of auditing protocols has caught a large number of researchers’ eyes. However, though most of the existing auditing protocols have considered batch a...
详细信息
Fingerprint authentication system is used to verify users' identification according to the characteristics of their ***,this system has some security and privacy *** example,some artificial fingerprints can trick ...
详细信息
Fingerprint authentication system is used to verify users' identification according to the characteristics of their ***,this system has some security and privacy *** example,some artificial fingerprints can trick the fingerprint authentication system and access information using real users' ***,a fingerprint liveness detection algorithm needs to be designed to prevent illegal users from accessing privacy *** this paper,a new software-based liveness detection approach using multi-scale local phase quantity(LPQ) and principal component analysis(PCA) is *** feature vectors of a fingerprint are constructed through multi-scale *** technology is also introduced to reduce the dimensionality of the feature vectors and gain more effective ***,a training model is gained using support vector machine classifier,and the liveness of a fingerprint is detected on the basis of the training *** results demonstrate that our proposed method can detect the liveness of users' fingerprints and achieve high recognition *** study also confirms that multi-resolution analysis is a useful method for texture feature extraction during fingerprint liveness detection.
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public *** paper concentrates on steganalysis against spatial least significant bit(LSB) matching,whi...
详细信息
Nowadays,many steganographic tools have been developed,and secret messages can be imperceptibly transmitted through public *** paper concentrates on steganalysis against spatial least significant bit(LSB) matching,which is the prototype of many advanced information hiding *** existing algorithms deal with steganalysis problems by using the dependencies between adjacent *** another aspect,this paper calculates the differences among pixel pairs and proves that the histogram of difference values will be smoothed by stego *** calculate the difference histogram characteristic function(DHCF) and deduce that the moment of DHCFs(DHCFM) will be diminished after stego bits are hidden in the ***,we compute the DHCFMs as the discriminative *** calibrate the features by decreasing the influence of image content on them and train support vector machine classifiers based on the calibrated *** results demonstrate that the DHCFMs calculated with nonadjacent pixels are helpful to detect stego messages hidden by LSB matching.
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribu...
详细信息
Attribute-based encryption(ABE) supports the fine-grained sharing of encrypted *** some common designs,attributes are managed by an attribute authority that is supposed to be fully *** concept implies that the attribute authority can access all encrypted data,which is known as the key escrow *** addition,because all access privileges are defined over a single attribute universe and attributes are shared among multiple data users,the revocation of users is inefficient for the existing ABE *** this paper,we propose a novel scheme that solves the key escrow problem and supports efficient user ***,an access controller is introduced into the existing scheme,and then,secret keys are generated corporately by the attribute authority and access ***,an efficient user revocation mechanism is achieved using a version key that supports forward and backward *** analysis proves that our scheme is secure and efficient in user authorization and revocation.
Currently, energy consumption for cloud data centers has attracted much attention from both industry and academia. Meanwhile, it is also important to satisfy the customers’ quality of service (QoS) for cloud service ...
Currently, energy consumption for cloud data centers has attracted much attention from both industry and academia. Meanwhile, it is also important to satisfy the customers’ quality of service (QoS) for cloud service providers. However, it is still a challenge to achieve energy savings based on QoS during task scheduling. In this paper, a QoS-based energy-aware task scheduling method, named QET, in cloud environment is proposed to address the above challenge. Technically, an energy consumption model based on QoS is proposed for heterogeneous cloud environment. And a corresponding task scheduling method is designed to minimize the energy consumption through QoS-aware PM selection. Comprehensive experimental analysis is conducted to evaluate the efficiency and effectiveness of our proposed method.
Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data con-fidentiality, inte...
详细信息
Cloud storage is now an important development trend in information technology. However, information security has become an important problem to impede it for commercial application, such as data con-fidentiality, integrity, and availability. In this paper, we revisit the two private PDP schemes. We show that the property of correctness cannot be achieved when active adversaries are involved in these auditing systems. More specifically, an active adversary can arbitrarily tamper the cloud data and produce a valid auditing. Moreover, the malicious CSS can put the auditing right to entrust to anyone and control the delegation key and lead to the failure of the subsequent validation work. Finally, we propose a solution using key agreement to resolve the weakness. Our scheme is high efficiency due to removing expensive bilinear computing. Moreover, the verifier is stateless and independent from cloud storage server, which is an important secure property in PDP schemes.
Compared with traditional cryptography, biometric cryptosystems provide more convenient and safe protection of keys. In this paper, an effective scheme for biometric cryptosystems based on the intersections of hyper-p...
详细信息
As one of the important issues of data classification, classification has attracted the attention of many researchers in the field of data mining. Different from clustering research issues, in classification research ...
详细信息
The layout design of satellite modules is considered to be NP-hard. It is not only a complex coupled system design problem but also a special multi-objective optimization problem. The greatest challenge in solving thi...
详细信息
The layout design of satellite modules is considered to be NP-hard. It is not only a complex coupled system design problem but also a special multi-objective optimization problem. The greatest challenge in solving this problem is that the function to be optimized is characterized by a multitude of local minima separated by high-energy barriers. The Wang-Landau(WL) sampling method, which is an improved Monte Carlo method, has been successfully applied to solve many optimization problems. In this paper we use the WL sampling method to optimize the layout of a satellite module. To accelerate the search for a global optimal layout, local search(LS) based on the gradient method is executed once the Monte-Carlo sweep produces a new layout. By combining the WL sampling algorithm, the LS method, and heuristic layout update strategies, a hybrid method called WL-LS is proposed to obtain a final layout scheme. Furthermore, to improve significantly the efficiency of the algorithm, we propose an accurate and fast computational method for the overlapping depth between two objects(such as two rectangular objects, two circular objects, or a rectangular object and a circular object) embedding each other. The rectangular objects are placed orthogonally. We test two instances using first 51 and then 53 objects. For both instances, the proposed WL-LS algorithm outperforms methods in the literature. Numerical results show that the WL-LS algorithm is an effective method for layout optimization of satellite modules.
暂无评论