期刊文献+
共找到11篇文章
< 1 >
每页显示 20 50 100
Image Encryption and Decryption Based on Chaotic Algorithm
1
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
2
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
A kaleidoscopic hydrogel canvas for information encoding, encryption, and decryption via chemical-induced phase separation
3
作者 Jun-Bo Hou Yue Zhao 《Science China Materials》 2025年第2期571-580,共10页
Constructing an information storage or communication system, where countless pieces of information canbe hidden like a canvas and revealed on demand throughspecific stimuli or decoding rules, is significant. In the pr... Constructing an information storage or communication system, where countless pieces of information canbe hidden like a canvas and revealed on demand throughspecific stimuli or decoding rules, is significant. In the presentstudy, we developed a hydrogel canvas that leverages noncovalentinteractions to induce phase separation in the polymer matrix, creating various “paintings”, including custommessages, using different chemical inks. Our strategy focuseson designing small molecule inks, with varying affinities withthe hydrogel and specific responsiveness to stimuli, to achievemultiple changes such as color shifts, fluorescence emission,and dynamic optical image evolution. This skips the typicaldesign approaches, such as incorporating responsive fluorophoresinto polymers for color emission through grafting orcopolymerization, and thus avoids the complex processes involved in modifying and synthesizing functional polymers,along with the uncertainties in material properties that theseprocesses bring. 展开更多
关键词 hydrogel canvas chemicals-induced phase separation multistage encryption and decryption self-erasing
原文传递
Research on the File Encryption and Programming based on Matrix Transformation
4
作者 Jiangtao Geng Qi Huang 《International Journal of Technology Management》 2013年第1期24-26,共3页
Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt f... Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software. 展开更多
关键词 linear transformation file encryption and decryption matrix vc source code
在线阅读 下载PDF
Energy-efficient and security-optimized AES hardware design for ubiquitous computing 被引量:2
5
作者 Chen Yicheng Zou Xuecheng Liu Zhenglin Han Yu Zheng Zhaoxia 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2008年第4期652-658,共7页
Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. H... Ubiquitous computing must incorporate a certain level of security. For the severely resource constrained applications, the energy-efficient and small size cryptography algorithm implementation is a critical problem. Hardware implementations of the advanced encryption standard (AES) for authentication and encryption are presented. An energy consumption variable is derived to evaluate low-power design strategies for battery-powered devices. It proves that compact AES architectures fail to optimize the AES hardware energy, whereas reducing invalid switching activities and implementing power-optimized sub-modules are the reasonable methods. Implementations of different substitution box (S-Boxes) structures are presented with 0.25μm 1.8 V CMOS (complementary metal oxide semiconductor) standard cell library. The comparisons and trade-offs among area, security, and power are explored. The experimental results show that Galois field composite S-Boxes have smaller size and highest security but consume considerably more power, whereas decoder-switch-encoder S-Boxes have the best power characteristics with disadvantages in terms of size and security. The combination of these two type S-Boxes instead of homogeneous S-Boxes in AES circuit will lead to optimal schemes. The technique of latch-dividing data path is analyzed, and the quantitative simulation results demonstrate that this approach diminishes the glitches effectively at a very low hardware cost. 展开更多
关键词 encryption and decryption power analysis model inhomogeneous S-Boxes ubiquitous computing advanced encryption standard.
在线阅读 下载PDF
Design of an E-Administration Platform and Its Cryptography-Based Security Model
6
作者 Ohwobeno Omohwo Iwasokun Gabriel Babatunde +1 位作者 Boyinbode Olutayo Kehinde Gabriel Junior Arome 《Journal of Computer and Communications》 2023年第4期166-189,共24页
E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to ... E-administration is performing administrative works via computer and its associated technologies such as the Internet. It is administrative efforts that center on the exchange of information and providing services to people and the business sector at high speed and low cost through computers and networks with the assurance of maintaining information security. It is based on the positive investment in information technology and communication in administrative practices. This paper presents the design of the e-administration platform that adopts the concept of cryptography for identity management. The architectural framework of the platform comprises subcomponents for service and forms identification, business process redesign, service architecture, amalgamation, and deployment. The cryptography model for securing the platform was designed based on the combination of authentication criteria presented in the Rijndael-Advanced Encryption Standard (AES), Lattice-based cryptography (LBC), and Secure Hash Algorithm (SHA512). It is required that a record be encrypted prior to its commitment to the database via a double encryption method. The AES algorithm-based encryption’s output will form the input to the LBC algorithm to obtain the final output. 展开更多
关键词 E-Administration CRYPTOGRAPHY Management System encryption and decryption
在线阅读 下载PDF
A secure identification system using coherent states 被引量:3
7
作者 何广强 曾贵华 《Chinese Physics B》 SCIE EI CAS CSCD 2006年第2期371-374,共4页
A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed i... A quantum identification system based on the transformation of polarization of a mesoscopic coherent state is proposed. Physically, an initial polarization state which carries the identity information is transformed into an arbitrary elliptical polarization state, To verify the identity of a communicator, a reverse procedure is performed by the receiver, For simply describing the transformation procedure, the analytical methods of Poincaré sphere and quaternion are adopted. Since quantum noise provides such a measurement uncertainty for the eavesdropping that the identity information cannot be retrieved from the elliptical polarization state, the proposed scheme is secure. 展开更多
关键词 quantum identification polarization encryption and decryption quantum noise Poincaré sphere
原文传递
Recovery of Image through Alamouti Channel with Incorporation of RSA Algorithm
8
作者 Aninda Majumder Mohammad Raihan Ruhin +1 位作者 Tahsina Hashem Md. Imdadul Islam 《Journal of Computer and Communications》 2016年第2期1-10,共10页
In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end nod... In many applications, it is necessary to transmit images at a remote station, where wired Internet service is not available. In this case, wireless local loop (WLL) can help in making wireless link between one end node of the internet and remote service center. In such link, the communication is heavily affected by large and small scale fading;hence the received signal experiences huge distortion in case of forward error correction. Otherwise, huge service delay arises due to frequent negative acknowledgements. To combat the situation, we can choose Alamouti channel of full rate and fully orthogonal space-time block code (OSTBC). Our aim is to transmit images through Alamouti channel and to observe the quality of the recovered image, in context of bit error rate (BER). We have also observed the impact of fading and additive white Gaussian noise (AWGN) on the image without application of error correction or detection technique of channel coding. To ensure security, we apply the RSA algorithm on each pixel prior transmitting and decrypt them at the receiving end, where we found no impairment from the algorithm. Finally, we observe that the relative performance of the system changes digital modulation schemes. 展开更多
关键词 Quotient and Remainder Matrix Alamouti Simulator Multiple-Input Single-Output (MISO) Image encryption and decryption BER and Discrete Wavelet Transform (DWT)
在线阅读 下载PDF
Block Level Data Integrity Assurance Using Matrix Dialing Method towards High Performance Data Security on Cloud Storage
9
作者 P. Premkumar D. Shanthi 《Circuits and Systems》 2016年第11期3626-3644,共19页
Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them ... Data outsourcing through cloud storage enables the users to share on-demand resources with cost effective IT services but several security issues arise like confidentiality, integrity and authentication. Each of them plays an important role in the successful achievement of the other. In cloud computing data integrity assurance is one of the major challenges because the user has no control over the security mechanism to protect the data. Data integrity insures that data received are the same as data stored. It is a result of data security but data integrity refers to validity and accuracy of data rather than protect the data. Data security refers to protection of data against unauthorized access, modification or corruption and it is necessary to ensure data integrity. This paper proposed a new approach using Matrix Dialing Method in block level to enhance the performance of both data integrity and data security without using Third Party Auditor (TPA). In this approach, the data are partitioned into number of blocks and each block converted into a square matrix. Determinant factor of each matrix is generated dynamically to ensure data integrity. This model also implements a combination of AES algorithm and SHA-1 algorithm for digital signature generation. Data coloring on digital signature is applied to ensure data security with better performance. The performance analysis using cloud simulator shows that the proposed scheme is highly efficient and secure as it overcomes the limitations of previous approaches of data security using encryption and decryption algorithms and data integrity assurance using TPA due to server computation time and accuracy. 展开更多
关键词 Cloud Computing Data Integrity Data Security SHA-1 Digital Signature AES encryption and decryption
在线阅读 下载PDF
Sound frequency sensitive triboelectric nanogenerator for multifunctional auditory perceptual system applications
10
作者 Si Yuan Zhou Wei Sheng Wang +4 位作者 Xin Huang Bei Chen Gong Jia Kang Di You Jie Huang Li Qiang Zhu 《Nano Research》 2025年第6期963-973,共11页
Hardware based neuromorphic sensory system has attracted great attention for cognitive interactive platform.Auditory perception system can capture and analyze various sound signals,helping us to detect dangerous surro... Hardware based neuromorphic sensory system has attracted great attention for cognitive interactive platform.Auditory perception system can capture and analyze various sound signals,helping us to detect dangerous surroundings and judge environmental conditions.Therefore,developing neuromorphic auditory system that can decode auditory spatiotemporal information would be interesting.Here,an artificial auditory perceptual system is proposed by integrating sound frequency sensitive triboelectric nanogenerators(SFS-TENGs)and oxide based ionotronic neuromorphic transistor.With perforated configuration,the SFS-TENG adopting polyetheretherketone membrane and polytetrafluoroethylene membrane as friction layers can convert sound wave signals into electrical signals,exhibiting a high sensitivity of~2.24 V/dB and good durability.The neuromorphic transistor can further process electrical signals generated by SFS-TENG.Thus,the system can mimic auditory perception,exhibiting a wide range of sound pressure and frequency recognition capabilities.Information encryption/decryption and Doppler frequency shift temporal information processing are demonstrated on the TENG based auditory system for the first time.The present auditory perceptual system demonstrates broad application prospects,providing new opportunities to create sophisticated,adaptable,and interactive systems. 展开更多
关键词 ionotronic neuromorphic transistor artificial auditory perceptual system Doppler frequency shift sound encryption and decryption function
原文传递
Exploration of innovative cryptographic application solutions under multimodal big data fusion
11
作者 Lin Yiheng Zhang Junfei +1 位作者 Wei Shan Fan Huimei 《Advances in Engineering Innovation》 2024年第5期30-35,共6页
With the rapid development of information technology,data has become the cornerstone of digitalization,networking,and intelligence,profoundly impacting various sectors including production,distribution,circulation,con... With the rapid development of information technology,data has become the cornerstone of digitalization,networking,and intelligence,profoundly impacting various sectors including production,distribution,circulation,consumption,and social service management.As the core resource of the digital economy and information society,the economic and social value of big data is increasingly prominent,yet it has also become a prime target for cyberattacks.In the face of a complex and ever-changing data environment and advanced cyber threats,traditional big data security technologies such as Hadoop and other mainstream technologies are proving inadequate in ensuring data security and compliance.Consequently,cryptography-based technologies such as fully encrypted execution environments and efficient data encryption and decryption have emerged as new directions for security protection in the field of big data.This paper delves into the latest advancements and challenges in this area by exploring the current state of big data security,the principles of endogenous security technologies,practical applications,and future prospects. 展开更多
关键词 big data endogenous security technologies CRYPTOGRAPHY fully encrypted execution environment efficient data encryption and decryption
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部