For steganalysis of F5-like steganography with two types of widely used joint distribution statistical features: co-occurrence matrix and Markov transition probability matrix, a feature selection and fusion method bas...
详细信息
Double-layered STC (syndrome trellis code) is the most popular method for minimizing the distortion of ± 1 steganography. However, it is a probabilistic algorithm which may fail in the embedding process on some g...
详细信息
Double-layered STC (syndrome trellis code) is the most popular method for minimizing the distortion of ± 1 steganography. However, it is a probabilistic algorithm which may fail in the embedding process on some given profiles. Another characteristic of double-layered STC is the high computational complexity. Starting from these two points, we propose a dynamic distortion model defined in a pixel chain in this paper. The dynamic distortion model is working on a principle that the SLSB (second least significant bit) of current pixel is used to control the LSB (least significant bit) of the next pixel. So the distortion of some pixels may be adjusted to zero by this means. We apply STC to fit the dynamic distortion model and get a novel method for ± 1 steganography. Comparing with the double-layered STC, the experiment result shows that the proposed method has comparable ability for minimizing distortion with significantly improved embedding speed. And this novel method avoids failure in the embedding process. Considering the advantages together, the method is more suitable for steganography systems and software in practical environment.
At present,the research on reverse analysis of encrypting and decrypting process pays more attention to cryptographic algorithms *** is no mature theory or tools for the entire process analysis of encryption and *** o...
详细信息
At present,the research on reverse analysis of encrypting and decrypting process pays more attention to cryptographic algorithms *** is no mature theory or tools for the entire process analysis of encryption and *** order to solve the problem efficiently,this paper discusses encryption and decryption process dependency graphs,summarizes the existing research results about the cryptographic algorithms recognition technology,and explores a way to research the process analysis of encryption and decryption based on process dependency ***,the result on an example reveals the entire process analysis of encryption and decryption.
Instrumentation is an important mechanism to collect run-time information of applications for further analysis like bottleneck analysis, hotspot analysis and even bug detection and revision. Currently there are lots o...
详细信息
Aiming at the function disable Energy-saving hardware Trojan detection application requirements, has resarech the Energy-saving hardware Trojan generation principle and the trigger mechanism deeply, gives the function...
详细信息
There are two main approaches to achieve selective opening chosen-cipher text security (SO-CCA security): lossy encryption (including all-but-many lossy trapdoor functions) and sender-equivocable encryption. The secon...
详细信息
A binary program is a set of binary data and operations on the data. In binary translation, operations on the source machine will be transplanted to the target machine. Also, the data which the operations depend on sh...
详细信息
ISBN:
(纸本)9781479927623
A binary program is a set of binary data and operations on the data. In binary translation, operations on the source machine will be transplanted to the target machine. Also, the data which the operations depend on should be migrated to the target machine, so as to ensure the complete consistency of the data accessed by the transplanted target codes and the data accessed by the source codes. Firstly, the method is presented in this paper to convert the access to the data on the source machine to the access to the corresponding data on the target machine for the user-defined procedure, and to ensure the correctness of the accessed data on the target machine in the meanwhile. Then, for the binary translation from x64 architecture to RISC architecture, the data recovery method based on semantic mapping and balanced stack frame is proposed. Also, problems in data recovery for the user-defined procedure are solved by the proposed method.
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack d...
详细信息
ISBN:
(纸本)9781467352512
Due to the problem of semantic lost when extracting birthmark with k-gram algorithm, the operand stack dependence based static software birthmark is proposed in this paper. Before the birthmark extraction, the stack dependence bytecode fragments are got through analysis the stack dependence relation of stack behaviors in Java program. The birthmark is comprised of the stack dependence bytecode fragments and their occurrence frequencies in program. The experimental results show that the proposed birthmark has good credibility and robustness, and the performance is improved.
At present, the research on security of computer system and searching for malicious codes pays more attention to cryptographic algorithms recognition technology. However, the existing theories or tools in the field of...
详细信息
At present, the research on security of computer system and searching for malicious codes pays more attention to cryptographic algorithms recognition technology. However, the existing theories or tools in the field of cryptographic algorithms recognition are not mature. In order to improve the accuracy of cryptographic algorithms recognizing, this paper discusses encryption and decryption functions characteristic information database and proposes a recognition model to recognize cryptographic algorithms from binary files. The accuracy assessment indicates the model is effective and feasible.
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some appli...
详细信息
Nowadays SIMD extensions became ubiquitous for computational platform, being widely used in signal processing, multimedia, and scientific applications. However, compilers still have difficult in vectorizing some applications, such as computations on non-contiguous and especially interleaved data, and loop nest for which inner loops that carry all the dependencies and external loops with strided memory accesses. In order to solve these problems, we adopt Isomorphic statements Grouping (ISG) after extending group following UD and DU chains, which group isomorphic computation statements that perform the same operation. And correspondingly, we generate vector permutation instructions according to the target ISA SIMD instructions at the SIMD code generation phase. This approach has been implemented in a compiler based on Open64 which translate C source program to C source program with SIMD intrinsic functions. Experiments with this compiler show that ISG Super Level Parallelism(ISG-SLP) can be used to compile a number of real-world kernels, achieving up to 3.11 speedup.
暂无评论