基于遍歷矩陣和時(shí)序的信息安全及其在農(nóng)產(chǎn)品RFID的防偽和篡改檢測的應(yīng)用 版權(quán)信息
- ISBN:9787513045100
- 條形碼:9787513045100 ; 978-7-5130-4510-0
- 裝幀:一般膠版紙
- 冊數(shù):暫無
- 重量:暫無
- 所屬分類:>
基于遍歷矩陣和時(shí)序的信息安全及其在農(nóng)產(chǎn)品RFID的防偽和篡改檢測的應(yīng)用 本書特色
本書提出了另一種基于量子密碼的加密方案,基于改進(jìn)水印和SVD的圖像水印方案,以及基于時(shí)態(tài)序列的圖像加密和圖像水印方案。對于信息安全,以及判別一系列對象是否受到保護(hù),并能夠監(jiān)視被保護(hù)數(shù)據(jù)的傳播、真?zhèn)舞b別以及非法拷貝控制等提出了較為創(chuàng)新的看法。
基于遍歷矩陣和時(shí)序的信息安全及其在農(nóng)產(chǎn)品RFID的防偽和篡改檢測的應(yīng)用 內(nèi)容簡介
《基于遍歷矩陣和時(shí)序的信息安全及其在農(nóng)產(chǎn)品RFID的防偽和篡改檢測的應(yīng)用(英文版)》著重提出構(gòu)建多元二次多項(xiàng)式方程組并提出了一種基于該方程組的密碼系統(tǒng)、一種基于遍歷矩陣和混合密鑰的圖像加密/認(rèn)證方案,經(jīng)過統(tǒng)計(jì)分析和基于敏感度的實(shí)驗(yàn)結(jié)果表明,相比現(xiàn)有的基于混沌的圖像加密系統(tǒng),該方案為圖像加密傳輸提供了更安全的方式。然而,可見的加密圖像很容易引起懷疑。因此,提出了一種基于改進(jìn)遺傳水印-SVM和遍歷矩陣混合的圖像水印方案。相比其他的水印算法,該算法對于JPEG壓縮、中值濾波、直方圖均衡化、裁剪、高斯噪聲等圖像攻擊下表現(xiàn)出顯著的透明性和魯棒性,因此用于身份識別和版權(quán)保護(hù)是有效的。
基于遍歷矩陣和時(shí)序的信息安全及其在農(nóng)產(chǎn)品RFID的防偽和篡改檢測的應(yīng)用 目錄
Section 1.1 Motivations: Security Based on Temporal Order
Section 1.1.1 Formal Characterization of Time-series
Section 1.1.2 BMQE System
Section 1.1.3 Temporal Ordered Image Cryptography
Section 1.1.4 Temporal Ordered Image Hiding
Section 1.2 Objectives: Information Security Using Temporal
Theory
Section 1.3 Outlines of the Main Contributions
Section 1.4 Book Structure
CHAPTER 2 LITERATURE REVIEW
Section 2.1 Temporal Basis
Section 2.1.1 Point-based Systems
Section 2.1.2 Interval-based Systems
Section 7.1.3 A point & Interval-based Theory
Section 2.1.4 Notion of Time-series
Section 2.2 Ergodic Matrix
Section 2.2.1 Finite Fields
Section 2.2.2 Definitions and Related Theorems of the EM
Section 2.2.3 Security Analysis of a Question Based on EM
Section 2.3 Cryptography
Section 2.3.1 History of Cryptography and Cryptanalysis
Section 2.3.2 Symmetric Cryptography vs. Asymmetric
Cryptography
Section 2.3.3 Multivariate Quadratic Polynomials
Section 2.4 Information Hiding
Section 2.4.1 History of Information Hiding
Section 2.4.2 Steganography vs. Watermarking
Section 2.4.3 Data Hiding Technologies in Images
Section 2.5 Conclusions
CHAPTER 3 BMQE SYSTEM
Section 3.1 Important Characteristics of EM for BMQE System
Section 3.2 BMQE Based on Ergodic Matrix
Section 3.2.1 BMQE Problem
Section 3.2.2 BMQE is NP-Complete
Section 3.3 Cryptanalysis of BMQE
Section 3.3.1 Methods Used in Solving MQ-problems
Section 3.3.2 Fixing Variables
Section 3.3.3 Relinearization
Section 3.4 Conclusions
CHAPTER 4 IMAGE CRYPTOGRAPHY
Section 4.1 Review of Image Cryptography
Section 4.1.1 Characteristics of Image Cryptography
Section 4.1.2 Image Cryptography Algorithms
Section 4.2 Hybrid-key Based Image Cryptography
Section 4.2.1 Encryption/Decryption and Authentication Process
Section 4.2.2 Image Confusion
Section 4.2.3 Image Diffusion
Section 4.3 Security Analysis
Section 4.3.1 Key Space Analysis
Section 4.3.2 Statistical Analysis
Section 4.3.3 Sensitivity-based Attack
Section 4.4 Performance Evaluation
Section 4.5 Conclusions
CHAPTER 5 IMAGE HIDING
Section 5.1 Related Results
Section 5.1.1 GA-based Watermarking
Section 5.1.2 SVM-based Watermarking
Section 5.2 Design Idea
Section 5.2.1 Motivation
Section 5.2.2 Embedding Strength with SVM
Section 5.2.3 Embedding Position with Optimized GA
Section 5.3 Algorithm SOGA: Watermarking Based on SVM and
Optimized-GA
Section 5.3.1 Communication Procedure
Section 5.3.2 Embedding Procedure
Section 5.3.3 Extracting Procedure
Section 5.4 Experimental Results
Section 5.4.1 Evaluation Criterion in System Performance
Section 5. d. 2 Results by Different Iteration Numbers
Section 5.4.3 Robustness Against Various Attacks
Section 5.5 Conclusion
CHAPTER 6 TEMPORAL APPLICATIONS
Section 6.1 Formal Characterization of Time-series
Section 6.1.1 Why Choosing Temporal
Section 6.1.2 Formalize the Characterization of Time-series
Section 6.2 Temporal-based Image Cryptosystem
Section 6.2.1 Eneryption-deeryption Process Using Temporal
Logic
Section 6.2.2 Expand the Key Size
Section 6.2.3 Adjust the Images
Section 6.2.4 Security Analysis
Section 6.3 Temporal-based Image Hiding
Section 6.3.1 Static Multiple Digital Watermarking with Temporal
Logic
Section 6.3.2 Dynamic Multiple Digital Watermarking Considering
Temporal Logic
Section 6.4 Conclusions
CHAPTER 7 APPLICATIONS IN RFID FOR
AGRICULTURAL PRODUCTS
Section 7.1 Development of RFID Anti-counterfeit Technology
Section 7.2 An Anti.counterfeiting Scheme for Agricultural
RFID
Section 7.3 BMQE for RFID Anti.Counterfeiting
Section 7.3.1 Key Generation
Section 7.3.2 Encryption Procedure
Section 7.3.3 Decryption Procedure
Section 7.4 SOGA for RFID Tampering Detection
Section 7.5 Conclusions
CHAPTER 8 CONCLUSIONS AND FUTURE WORK
Section 8.1 Conclusions
Section 8.2 Future Work Discussion
Reference
基于遍歷矩陣和時(shí)序的信息安全及其在農(nóng)產(chǎn)品RFID的防偽和篡改檢測的應(yīng)用 作者簡介
周曉誼,現(xiàn)為海南大學(xué)信息科學(xué)與技術(shù)學(xué)院副教授。碩士就讀期間,跟隨吉林大學(xué)計(jì)算機(jī)學(xué)院趙永哲教授研究密碼學(xué)。后于英國格林尼治大學(xué)(UNIVERSITY OF GREENWICH)師從DR.JIXINMA教授和DR.MILTOSPETRIDIS教授攻讀博士學(xué)位,課題方向?yàn)樾畔踩c人工智能。至今主持或參與項(xiàng)目10余項(xiàng),在圖像處理、信息安全等領(lǐng)域的國際會議和國內(nèi)外期刊發(fā)表學(xué)術(shù)論文20余篇,其中EI收錄近10篇。
- >
中國歷史的瞬間
- >
名家?guī)阕x魯迅:朝花夕拾
- >
苦雨齋序跋文-周作人自編集
- >
小考拉的故事-套裝共3冊
- >
大紅狗在馬戲團(tuán)-大紅狗克里弗-助人
- >
山海經(jīng)
- >
月亮與六便士
- >
有舍有得是人生