期刊文献+
共找到1,077篇文章
< 1 2 54 >
每页显示 20 50 100
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
1
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
Femtosecond laser subtractive/additive-integrated biomimetic manufacturing for visible/infrared encryption and stimuli-responsive infrared decryption
2
作者 Ruijie Liu Dongshi Zhang Zhuguo Li 《International Journal of Extreme Manufacturing》 2025年第4期387-404,共18页
Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,... Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension. 展开更多
关键词 femtosecond laser biomimetic manufacturing black particle aggregates subtractive/additive-integrated manufacturing intrinsic visible-infrared encryption stimuli responsive decrypted IR display
在线阅读 下载PDF
Encryption and Decryption of Color Images through Random Disruption of Rows and Columns
3
作者 ZENG Jianhua ZHAN Yanlin YANG Jianrong 《Journal of Donghua University(English Edition)》 EI CAS 2020年第3期245-255,共11页
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o... In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value. 展开更多
关键词 color image encryption decryption single channel RGB component image disrupting
在线阅读 下载PDF
Image Encryption and Decryption Based on Chaotic Algorithm
4
作者 Yue Hu Ruyue Tian 《Journal of Applied Mathematics and Physics》 2020年第9期1814-1825,共12页
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform... This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology. 展开更多
关键词 Chaos Algorithm Image encryption and decryption Two-Stage Logistic Mapping M Sequence
在线阅读 下载PDF
基于改进SM4和Elgamal的民航数据链混合加密算法研究
5
作者 宋林峄 毛建华 王平 《现代电子技术》 北大核心 2025年第23期111-117,共7页
针对民用飞机数据链通信中单一模式的加密算法难以满足安全需求,普遍存在频率分析攻击和加密模型处理能力下降等问题,文中提出一种基于ECB⁃CBC混合加密模式的SM4加密算法(AT⁃HCSL)。该算法结合ECB和CBC模式,以增强通信数据的隐藏性和安... 针对民用飞机数据链通信中单一模式的加密算法难以满足安全需求,普遍存在频率分析攻击和加密模型处理能力下降等问题,文中提出一种基于ECB⁃CBC混合加密模式的SM4加密算法(AT⁃HCSL)。该算法结合ECB和CBC模式,以增强通信数据的隐藏性和安全性,并将其与Elgamal算法相结合,利用Elgamal的同态特性进一步提高安全性并减少计算开销。实验结果证明,改进后的算法扩散性提高了175%~181.9%,混淆性提高了94%~110%,混合加密算法在开销时间上减少了7.59%。结果表明,文中提出的混合加密算法显著提升了民航数据链的安全性和处理效率,可有效进行加密数据链通信,保障空地通信的安全。 展开更多
关键词 SM4 混合加密模式 elgamal 民航数据链 ECB模式 CBC模式 对称加密 非对称加密
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
6
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
基于ElGamal变体同态的安全两方计算协议设计 被引量:6
7
作者 陈志伟 张卷美 李子臣 《通信学报》 EI CSCD 北大核心 2015年第2期204-211,共8页
本文分析了El Gamal的同态特性,针对协议设计需要,设计了El Gamal变体加密方案,使其满足加法同态和常数乘法同态。在半诚实模型下,基于这个变体提出了过私有点直线方程同态计算协议,并分析了协议的正确性、安全性、计算和通信复杂性,同... 本文分析了El Gamal的同态特性,针对协议设计需要,设计了El Gamal变体加密方案,使其满足加法同态和常数乘法同态。在半诚实模型下,基于这个变体提出了过私有点直线方程同态计算协议,并分析了协议的正确性、安全性、计算和通信复杂性,同时将该协议的应用范围扩展到安全两方线段求交协议等。与解决同类几何问题的协议相比,未采用基于不经意传输和百万富翁协议设计思路,而是基于同态加密体制提出了一种安全两方计算协议,提高了该类协议的执行效率,降低了通信负担。 展开更多
关键词 安全两方计算 同态加密 elgamal加密体制 私有点计算
在线阅读 下载PDF
一种实现数据库同态计算的ELGamal重加密算法 被引量:20
8
作者 黎琳 张芳 张闻宇 《北京交通大学学报》 CAS CSCD 北大核心 2021年第2期127-134,共8页
数据库加密技术旨在解决数据库隐私数据泄露问题.现有的关于加密数据库的研究应用未实现或仅部分实现密文数据的同态计算功能,使得SQL查询语句在加密数据库中无法高效执行甚至失效.提出一种实现数据库同态计算的ELGamal重加密算法,该算... 数据库加密技术旨在解决数据库隐私数据泄露问题.现有的关于加密数据库的研究应用未实现或仅部分实现密文数据的同态计算功能,使得SQL查询语句在加密数据库中无法高效执行甚至失效.提出一种实现数据库同态计算的ELGamal重加密算法,该算法基于ELGamal乘法同态密码体制和数据库外层加密方式,通过将SQL查询语句中算术表达式重写为具有同态计算的重加密表达式,实现数据库基于密文进行同态计算的目标.本文提出的ELGamal重加密算法在DDH问题是困难的假设下可以抵抗选择明文攻击. 展开更多
关键词 信息安全 elgamal重加密算法 重加密策略 同态计算 数据库外层加密方式
在线阅读 下载PDF
可公开验证的ElGamal/RSA加密 被引量:2
9
作者 伍前红 王继林 +1 位作者 袁素春 王育民 《电子与信息学报》 EI CSCD 北大核心 2005年第4期608-611,共4页
可公开验证加密允许任何实体验证加密的消息和先前承诺的秘密一样,但不会泄漏明文的任何信息。这在 公平交换、防欺骗的秘密分享和安全多方计算中有重要应用。该文分别给出可公开验证的ElGamal加密和RSA加 密方案。其中前者是Stalder方... 可公开验证加密允许任何实体验证加密的消息和先前承诺的秘密一样,但不会泄漏明文的任何信息。这在 公平交换、防欺骗的秘密分享和安全多方计算中有重要应用。该文分别给出可公开验证的ElGamal加密和RSA加 密方案。其中前者是Stalder方案的改进,改进后的方案是语义安全的而Stalder方案达不到语义安全性。同时将该 方案推广到了多个接受者的情形,最后给出了高效的可公开验证RSA加密方案。 展开更多
关键词 可公开验证加密 零知识证明 bit承诺 RSA体制 ElGarnal体制
在线阅读 下载PDF
基于ElGamal的联邦学习医疗数据隐私保护方案 被引量:1
10
作者 赖成喆 张蕊芝 《西安邮电大学学报》 2024年第6期57-64,共8页
针对联邦学习中各医疗机构间数据孤岛、模型参数隐私泄露和恶意服务器篡改等安全问题,提出一种基于ElGamal的联邦学习医疗数据隐私保护方案。利用带有模型参数权重的联邦平均算法,提升联邦学习数据集训练的公平性,加快模型收敛速度。同... 针对联邦学习中各医疗机构间数据孤岛、模型参数隐私泄露和恶意服务器篡改等安全问题,提出一种基于ElGamal的联邦学习医疗数据隐私保护方案。利用带有模型参数权重的联邦平均算法,提升联邦学习数据集训练的公平性,加快模型收敛速度。同时加入验证机制确保服务器返回的全局模型的正确性,并使用多密钥、双服务器改善密钥泄露问题以及恶意医疗机构与服务器间的共谋问题。分析结果表明,所提方案更安全,模型准确率更高。 展开更多
关键词 联邦学习 隐私保护 联邦平均算法 elgamal加密 可验证性
在线阅读 下载PDF
A Recursive Method to Encryption-Decryption-Based Distributed Set-Membership Filtering for Time-Varying Saturated Systems Over Sensor Networks
11
作者 Jun Hu Jiaxing Li +2 位作者 Chaoqing Jia Xiaojian Yi Hongjian Liu 《IEEE/CAA Journal of Automatica Sinica》 2025年第5期1047-1049,共3页
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt... Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided. 展开更多
关键词 time varying saturated systems signal transmission processspecificallya encryption decryption mechanism sensor networks recursive method distributed set membership filtering
在线阅读 下载PDF
基于椭圆曲线ElGamal代理加密机制的MANET组密钥分发方案 被引量:3
12
作者 肖自金 周海 吴丽珍 《计算机应用与软件》 CSCD 北大核心 2013年第3期139-144,共6页
针对MANET网络中大规模安全组通信系统的特点,提出一种新的分散式组通信密钥分发方案。该方案基于轻量级的椭圆曲线ElGamal代理加密机制,克服了以往基于代理的密钥管理方案中存在的中间节点知道传输密文的缺点,能够为组通信密钥的分发... 针对MANET网络中大规模安全组通信系统的特点,提出一种新的分散式组通信密钥分发方案。该方案基于轻量级的椭圆曲线ElGamal代理加密机制,克服了以往基于代理的密钥管理方案中存在的中间节点知道传输密文的缺点,能够为组通信密钥的分发和更新提供全程私密性保护,解决了第三方节点的可信任问题。安全性与性能分析表明,该方案具有良好的可扩展性和可靠性;能够满足前向安全性和后向安全性;与Chiu等其它方案相比,该方案执行效率比较高,能够有效地节省计算资源和通信带宽,非常适合于MANET网络。 展开更多
关键词 安全组通信 密钥管理 MANET elgamal代理加密 椭圆曲线
在线阅读 下载PDF
Digital image encryption with chaotic map lattices 被引量:8
13
作者 孙福艳 吕宗旺 《Chinese Physics B》 SCIE EI CAS CSCD 2011年第4期132-138,共7页
This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels o... This paper proposes a secure approach for encryption and decryption of digital images with chaotic map lattices. In the proposed encryption process, eight different types of operations are used to encrypt the pixels of an image and one of them will be used for particular pixels decided by the outcome of the chaotic map lattices. To make the cipher more robust against any attacks, the secret key is modified after encrypting each block of sixteen pixels of the image. The experimental results and security analysis show that the proposed image encryption scheme achieves high security and efficiency. 展开更多
关键词 image encryption image decryption chaotic map lattice CRYPTOGRAPHY spatiotemporal chaotic system
原文传递
基于Paillier和ElGamal算法的双层同态密码系统 被引量:2
14
作者 王东 李春平 肖亚光 《科技创新与应用》 2022年第18期22-25,共4页
当今各种各样的网上服务和线上服务为人们提供诸多的便利,诸如电子政务、网上银行、电子投票等线上系统也早已为人们广泛使用。今年来频发的网络安全事件警示着我们网络通信的安全风险不断增多,确保安全的网络通信的各种努力尤为必要。... 当今各种各样的网上服务和线上服务为人们提供诸多的便利,诸如电子政务、网上银行、电子投票等线上系统也早已为人们广泛使用。今年来频发的网络安全事件警示着我们网络通信的安全风险不断增多,确保安全的网络通信的各种努力尤为必要。但是,当前主流的加密放在执行加解密操作时,由于原文的明文被暴露而造成信息泄露的发生。针对这一情况,设计一种在不知道原始明文的情况下对用户加密数据进行操作的加密方法很有必要。文章介绍的双层加密方法在非对称加密之后采用Paillier和ElGamal算法的双层密码系统。文章提出的安全加密方法经实验证明能够取得较好的效果,信息加密被泄露的风险大大降低。其中,Paillier密码系统采用加法同态的方法,常用于电子商务等领域。ElGamal方法确保被Paillier加密的数据得到充分的保护,从而实现双层加固加密系统。 展开更多
关键词 Pailliers密码系统 加法同态加密 elgamal密码系统 两层加密 隐私侵犯 数据安全
在线阅读 下载PDF
Substring-searchable attribute-based encryption and its application for IoT devices 被引量:3
15
作者 Xi Sun Hao Wang +4 位作者 Xiu Fu Hong Qin Mei Jiang Likun Xue Xiaochao Wei 《Digital Communications and Networks》 SCIE CSCD 2021年第2期277-283,共7页
With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data lea... With the development of big data and cloud computing technology,more and more users choose to store data on cloud servers,which brings much convenience to their management and use of data,and also the risk of data leakage.A common method to prevent data leakage is to encrypt the data before uploading it,but the traditional encryption method is often not conducive to data sharing and querying.In this paper,a new kind of Attribute-Based Encryption(ABE)scheme,which is called the Sub-String Searchable ABE(SSS-ABE)scheme,is proposed for the sharing and querying of the encrypted data.In the SSS-ABE scheme,the data owner encrypts the data under an access structure,and only the data user who satisfies the access structure can query and decrypt it.The data user can make a substring query on the whole ciphertext without setting keywords in advance.In addition,the outsourcing method is also introduced to reduce the local computation of the decryption process so that the outsourcing SSS-ABE scheme can be applied to IoT devices. 展开更多
关键词 Attribute-based encryption Searchable encryption Outsourcing decryption IoT divices
在线阅读 下载PDF
Decryption of pure-position permutation algorithms 被引量:3
16
作者 赵晓宇 陈刚 +2 位作者 张亶 王肖虹 董光昌 《Journal of Zhejiang University Science》 EI CSCD 2004年第7期803-809,共7页
Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation ... Pure position permutation image encryption algorithms, commonly used as image encryption investigated in this work are unfortunately frail under known-text attack. In view of the weakness of pure position permutation algorithm,we put forward an effective decryption algorithm for all pure-position permutation algorithms. First, a summary of the pure position permutation image encryption algorithms is given by introducing the concept of ergodic matrices. Then, by using probability theory and algebraic principles, the decryption probability of pure-position permutation algorithms is verified theoretically; and then, by defining the operation system of fuzzy ergodic matrices, we improve a specific decryption al-gorithm. Finally, some simulation results are shown. 展开更多
关键词 decryption Image encryption FUZZY Position permutation
在线阅读 下载PDF
基于CF(p^n)的CCA安全ElGamal加密体制
17
作者 谭双权 何明星 +1 位作者 曾晟珂 石坤 《西华大学学报(自然科学版)》 CAS 2017年第1期12-16,共5页
基于CF(pn)域上的离散对数困难性问题,提出一种基于CF(pn)域的ElGamal加密算法,并在标准模型下证明该加密算法满足IND-CCA安全性要求。该算法的安全参数k的大小由构成CF(pn)域的素数p和多项式的阶n共同决定,改变了传统ElGamal算法安全... 基于CF(pn)域上的离散对数困难性问题,提出一种基于CF(pn)域的ElGamal加密算法,并在标准模型下证明该加密算法满足IND-CCA安全性要求。该算法的安全参数k的大小由构成CF(pn)域的素数p和多项式的阶n共同决定,改变了传统ElGamal算法安全性对大素数p的唯一依赖的现状。利用C语言实现了基于CF(pn)的ElGamal算法,而且通过异或和移位这类简单操作即可编程实现。通过与RSA、ElGamal、ECC、AES算法的效率对比,发现基于CF(2n)的ElGamal算法在执行效率方面比传统的ElGamal加密算法快1 000倍,比RSA快3倍,比ECC快2 000倍。 展开更多
关键词 CF(pn)有限域 IND-CCA 安全参数 elgamal加密方案 效率
在线阅读 下载PDF
A Novel Image Encryption Technique Based on Inter Block Difference 被引量:1
18
作者 THAMANAM Srinivasa Rao Potti Nagaraja +1 位作者 B.Balaji Naik K.Manjunathachari 《Journal of Shanghai Jiaotong university(Science)》 EI 2021年第4期488-493,共6页
Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic device... Data security plays a vital role in the current scenario due to the advanced and sophisticated data access techniques. Present development in data access is always a threat to data that are stored in electronic devices. Among all the forms of data, image is an important aspect that still needs methodologies to be stored securely. This work focuses on a novel technique to secure images using inter block difference and advanced encryption standard (AES). The AES algorithm is chosen for encryption since there is no prevalent attack that is successful in analyzing it. Instead of encrypting the entire image, only a part of the image is encrypted. The proposed work is found to reduce the encryption overhead in a significant way and at the same time preserves the safety of the image. It is also observed that the decryption is done in an efficient and time preserving manner. 展开更多
关键词 encryption decryption inter block difference advanced encryption standard(AES)
原文传递
Optical encryption with cascaded fractional wavelet transforms 被引量:1
19
作者 BAO Liang-hua CHEN Lin-fei ZHAO Dao-mu 《Journal of Zhejiang University-Science A(Applied Physics & Engineering)》 SCIE EI CAS CSCD 2006年第8期1431-1435,共5页
On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractiona... On the basis of fractional wavelet transform, we propose a new method called cascaded fractional wavelet transform to encrypt images. It has the virtues of fractional Fourier transform and wavelet transform. Fractional orders, standard focal lengths and scaling factors are its keys. Multistage fractional Fourier transforms can add the keys easily and strengthen information se-curity. This method can also realize partial encryption just as wavelet transform and fractional wavelet transform. Optical reali-zation of encryption and decryption is proposed. Computer simulations confirmed its possibility. 展开更多
关键词 Wavelet transform (WT) Cascaded fractional wavelet transform (CFWT) encryption decryption
在线阅读 下载PDF
基于ElGamal的同态交换加密水印算法 被引量:4
20
作者 方立娇 李子臣 丁海洋 《计算机系统应用》 2021年第5期234-240,共7页
针对多媒体信息安全与版权保护的需求,本文将ElGamal公钥密码体制与Patchwork数字水印算法相结合,提出一种新的同态密文域交换加密水印算法.算法利用ElGamal乘法同态的特性,将明文域嵌入水印的运算映射到密文域中,实现了加密与嵌入水印... 针对多媒体信息安全与版权保护的需求,本文将ElGamal公钥密码体制与Patchwork数字水印算法相结合,提出一种新的同态密文域交换加密水印算法.算法利用ElGamal乘法同态的特性,将明文域嵌入水印的运算映射到密文域中,实现了加密与嵌入水印操作的交换,在水印提取时,既可以在密文域提取水印,也可以解密后提取出水印.实验结果表明,该算法嵌入水印和数据加密的顺序不影响含水印信息密文数据的产生和在密文和明文中水印信息的提取,保证了水印嵌入操作的机密性和多媒体数据在分发管理过程中的安全性,同时,水印算法的综合性能也得到了改善. 展开更多
关键词 elgamal密码算法 同态加密 数字水印 信息安全 交换加密水印算法
在线阅读 下载PDF
上一页 1 2 54 下一页 到第
使用帮助 返回顶部