期刊文献+
共找到3,582篇文章
< 1 2 180 >
每页显示 20 50 100
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
1
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 data encryption data decryption Communication security data storage encryption Key management
在线阅读 下载PDF
IDCE:Integrated Data Compression and Encryption for Enhanced Security and Efficiency
2
作者 Muhammad Usama Arshad Aziz +2 位作者 Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev 《Computer Modeling in Engineering & Sciences》 2025年第4期1029-1048,共20页
Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive da... Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and misuse.With the exponential growth of digital data,robust security measures are essential.Data encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key control.Despite their individual benefits,both require significant computational resources.Additionally,performing them separately for the same data increases complexity and processing time.Recognizing the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and efficiency.Thealgorithmoperates on 128-bit block sizes and a 256-bit secret key length.It combines Huffman coding for compression and a Tent map for encryption.Additionally,an iterative Arnold cat map further enhances cryptographic confusion properties.Experimental analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field. 展开更多
关键词 Chaotic maps SECURITY data compression data encryption integrated compression and encryption
在线阅读 下载PDF
Fluorescence Behavior and Emission Mechanisms of Poly(ethylene succinamide)and Its Applications in Fe^(3+)Detection and Data Encryption 被引量:4
3
作者 Xubao Jiang Qinghui Wang +2 位作者 Bin Li Shusheng Li Xiang Zheng Kong 《Chinese Journal of Polymer Science》 SCIE EI CAS CSCD 2023年第1期129-142,共14页
Conventional fluorescent polymers are featured by large conjugation structures.In contrast,a new class of fluorescent polymers without any conjugations is gaining great interest in immerging applications.Polyamide is ... Conventional fluorescent polymers are featured by large conjugation structures.In contrast,a new class of fluorescent polymers without any conjugations is gaining great interest in immerging applications.Polyamide is a typical member of the conjugation-free fluorescent polymers.However,studies on their electrophotonic property are hardly available,although widely used in many fields.Herein,poly(ethylene succinamide),PA24,is synthesized;its chemical structure confirmed through multiple techniques(NMR,FTIR,XRD,etc.).PA24 is highly emissive as solid and in its solution at room temperature,and the emission is excitation and concentration dependant,with an unusual blue shift under excitation from 270 nm to 320 nm,a hardly observed phenomenon for all fluorescent polymers.Quite similar emission behavior is also observed under cryogenic condition at 77 K.Its emission behavior is thoroughly studied;the ephemeral emission blue-shift is interpreted through Förster resonance energy transfer.Based on its structures,the emission mechanism is ascribed to cluster-triggered emission,elucidated from multianalyses(NMR,FTIR,UV absorbance and DLS).In presence of a dozen of competitive metal ions,PA24 emission at 450 nm is selectively quenched by Fe^(3+).PA24 is used as probe for Fe^(3+)and H_(2)O_(2) detections and in data encryption.Therefore,this work provides a novel face of polyamide with great potential applications as sensors in different fields. 展开更多
关键词 POLYAMIDE Fluorescent emission Cluster formation Ferric ion detection data encryption
原文传递
Adaptive and Dynamic Mobile Phone Data Encryption Method 被引量:1
4
作者 CAO Wanpeng BI Wei 《China Communications》 SCIE CSCD 2014年第1期103-109,共7页
To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm... To enhance the security of user data in the clouds,we present an adaptive and dynamic data encryption method to encrypt user data in the mobile phone before it is uploaded.Firstly,the adopted data encryption algorithm is not static and uniform.For each encryption,this algorithm is adaptively and dynamically selected from the algorithm set in the mobile phone encryption system.From the mobile phone's character,the detail encryption algorithm selection strategy is confirmed based on the user's mobile phone hardware information,personalization information and a pseudo-random number.Secondly,the data is rearranged with a randomly selected start position in the data before being encrypted.The start position's randomness makes the mobile phone data encryption safer.Thirdly,the rearranged data is encrypted by the selected algorithm and generated key.Finally,the analysis shows this method possesses the higher security because the more dynamics and randomness are adaptively added into the encryption process. 展开更多
关键词 data encryption mobile phone cloud storage pseudo-random number
在线阅读 下载PDF
Novel Approach to Data Encryption Based on Matrix Computations 被引量:1
5
作者 Rosilah Hassan Selver Pepic +2 位作者 Muzafer Saracevic Khaleel Ahmad Milan Tasic 《Computers, Materials & Continua》 SCIE EI 2021年第2期1139-1153,共15页
In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square He... In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse. 展开更多
关键词 SECURITY data encryption matrix computations cloud computing machine learning
在线阅读 下载PDF
Data encryption based on a 9D complex chaotic system with quaternion for smart grid
6
作者 张芳芳 黄哲 +3 位作者 寇磊 李扬 曹茂永 马凤英 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第1期217-226,共10页
With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large a... With the development of smart grid, operation and control of a power system can be realized through the power communication network, especially the power production and enterprise management business involve a large amount of sensitive information, and the requirements for data security and real-time transmission are gradually improved. In this paper, a new 9-dimensional(9D) complex chaotic system with quaternion is proposed for the encryption of smart grid data. Firstly, we present the mathematical model of the system, and analyze its attractors, bifurcation diagram, complexity,and 0–1 test. Secondly, the pseudo-random sequences are generated by the new chaotic system to encrypt power data.Finally, the proposed encryption algorithm is verified with power data and images in the smart grid, which can ensure the encryption security and real time. The verification results show that the proposed encryption scheme is technically feasible and available for power data and image encryption in smart grid. 展开更多
关键词 9-dimensional complex chaotic system data encryption QUATERNION smart grid REAL-TIME
原文传递
Time Parameter Based Low-Energy Data Encryption Method for Mobile Applications
7
作者 Li-Woei Chen Kun-Lin Tsai +2 位作者 Fang-Yie Leu Wen-Cheng Jiang Shih-Ting Tseng 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第9期2779-2794,共16页
Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G... Various mobile devices and applications are now used in daily life.These devices require high-speed data processing,low energy consumption,low communication latency,and secure data transmission,especially in 5G and 6G mobile networks.High-security cryptography guarantees that essential data can be transmitted securely;however,it increases energy consumption and reduces data processing speed.Therefore,this study proposes a low-energy data encryption(LEDE)algorithm based on the Advanced Encryption Standard(AES)for improving data transmission security and reducing the energy consumption of encryption in Internet-of-Things(IoT)devices.In the proposed LEDE algorithm,the system time parameter is employed to create a dynamic S-Box to replace the static S-Box of AES.Tests indicated that six-round LEDE encryption achieves the same security level as 10-round conventional AES encryption.This reduction in encryption time results in the LEDE algorithm having a 67.4%lower energy consumption and 43.9%shorter encryption time than conventional AES;thus,the proposed LEDE algorithm can improve the performance and the energy consumption of IoT edge devices. 展开更多
关键词 Mobile application security AES data encryption time parameter mobile device
在线阅读 下载PDF
Mode of Operation for Modification, Insertion, and Deletion of Encrypted Data
8
作者 Taek-Young Youn Nam-Su Jho 《Computers, Materials & Continua》 SCIE EI 2022年第10期151-164,共14页
Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services th... Due to the development of 5G communication,many aspects of information technology(IT)services are changing.With the development of communication technologies such as 5G,it has become possible to provide IT services that were difficult to provide in the past.One of the services made possible through this change is cloud-based collaboration.In order to support secure collaboration over cloud,encryption technology to securely manage dynamic data is essential.However,since the existing encryption technology is not suitable for encryption of dynamic data,a new technology that can provide encryption for dynamic data is required for secure cloudbased collaboration.In this paper,we propose a new encryption technology to support secure collaboration for dynamic data in the cloud.Specifically,we propose an encryption operation mode which can support data updates such as modification,addition,and deletion of encrypted data in an encrypted state.To support the dynamic update of encrypted data,we invent a new mode of operation technique named linked-block cipher(LBC).Basic idea of our work is to use an updatable random value so-called link to link two encrypted blocks.Due to the use of updatable random link values,we can modify,insert,and delete an encrypted data without decrypt it. 展开更多
关键词 data encryption cloud-based collaboration dynamic data update
在线阅读 下载PDF
Application of Data Encryption Technology in Computer Network Communication Security
9
作者 LIUBoting JIANGYu 《外文科技期刊数据库(文摘版)自然科学》 2022年第7期010-014,共5页
When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current ... When integrating data encryption technology into the security management of computer network communication, it is necessary to select the corresponding technical scheme according to the characteristics of the current network environment, clarify the types and application characteristics of security protection technology, improve the security management mode, and prevent people from using computers. The current security management scheme is gradually improved, so that the application advantages of data encryption technology can be fully highlighted and peoples information security can be maintained. 展开更多
关键词 data encryption COMPUTER network communication security application
原文传递
A Reversible Data Hiding with Quality Controllable Scheme for Encrypted-Compressed Image
10
作者 LI Xinyan MOU Huajian +1 位作者 YAN Bing GAO Li 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2019年第5期383-390,共8页
In order to achieve image encryption and data embedding simultaneously, a reversible data hiding(RDH) algorithm for encrypted-compressed image in wavelet domain is proposed. This scheme employs the quality controllabl... In order to achieve image encryption and data embedding simultaneously, a reversible data hiding(RDH) algorithm for encrypted-compressed image in wavelet domain is proposed. This scheme employs the quality controllable parameter. Moreover it has larger embedding capacity and smaller quality control parameters than other methods in literatures. Meanwhile, the cross chaotic map is employed to generate chaotic sequences, and the total keys of the algorithm is far large. Experimental results and comparisons show that the proposed scheme has large capacity, high security, and strong resistance to brute-force. 展开更多
关键词 REVERSIBLE data hiding in encrypted image cross CHAOTIC map DIFFUSE and SCRAMBLE encryption-compression
原文传递
Improved Research on Fuzzy Search over Encrypted Cloud Data Based on Keywords
11
作者 Ping Zhang Jianzhong Wang 《Journal of Computer and Communications》 2015年第9期90-98,共9页
A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The cl... A search strategy over encrypted cloud data based on keywords has been improved and has presented a method using different strategies on the client and the server to improve the search efficiency in this paper. The client uses the Chinese and English to achieve the synonym construction of the keywords, the establishment of the fuzzy-syllable words and synonyms set of keywords and the implementation of fuzzy search strategy over the encryption of cloud data based on keywords. The server side through the analysis of the user’s query request provides keywords for users to choose and topic words and secondary words are picked out. System will match topic words with historical inquiry in time order, and then the new query result of the request is directly gained. The analysis of the simulation experiment shows that the fuzzy search strategy can make better use of historical results on the basis of privacy protection for the realization of efficient data search, saving the search time and improving the efficiency of search. 展开更多
关键词 CLOUD data FUZZY SEARCH KEYWORDS SYNONYMS Searchable encryptION
暂未订购
基于区块链的分层属性基可搜索加密方案
12
作者 高改梅 张爱贞 +3 位作者 刘春霞 杨玉丽 党伟超 杜苗莲 《计算机工程与设计》 北大核心 2026年第2期442-451,共10页
针对分层属性基加密算法的用户权限越界问题以及搜索权限上的局限性,提出基于区块链的分层属性基可搜索加密方案。在分层访问树的基础上,修改密文项设计分层属性基加密算法。基于非对称可搜索加密构造用户陷门及搜索算法,以实现用户对... 针对分层属性基加密算法的用户权限越界问题以及搜索权限上的局限性,提出基于区块链的分层属性基可搜索加密方案。在分层访问树的基础上,修改密文项设计分层属性基加密算法。基于非对称可搜索加密构造用户陷门及搜索算法,以实现用户对分层加密数据的有效搜索。利用区块链技术记录和验证搜索工作,通过链上链下的协同存储机制实现与云服务器的数据交互。验证了BC-HABSE方案在困难问题假设下密文和陷门的不可区分性安全。实验结果分析表明,BCHABSE在密钥生成时间、陷门生成时间和搜索时间上优于其它方案,适用于层次文件数据共享场景。 展开更多
关键词 分层访问树 分层属性基加密 可搜索加密 数据共享 区块链 云服务器 协同存储
在线阅读 下载PDF
基于可信执行环境的层次角色基分级加密方案
13
作者 赵佳 王妍淳 +1 位作者 马洪亮 李琪 《信息网络安全》 北大核心 2026年第2期315-324,共10页
文章提出一种基于可信执行环境的层次角色基分级加密方案,以解决现有加密技术在数据敏感性保护和运行时的安全问题。该方案结合了层次角色基加密技术和可信计算,根据数据敏感性选择不同层次的角色公钥进行加密,实现对数据访问权限和敏... 文章提出一种基于可信执行环境的层次角色基分级加密方案,以解决现有加密技术在数据敏感性保护和运行时的安全问题。该方案结合了层次角色基加密技术和可信计算,根据数据敏感性选择不同层次的角色公钥进行加密,实现对数据访问权限和敏感性要求的动态匹配。对于一般性数据,采用深层节点的角色密钥进行加密;对于高度敏感数据,使用靠近根节点的浅层节点的角色密钥进行加密。此外,该方案将加密操作和密钥管理操作置于可信执行环境中,可有效防止加密密钥和敏感数据被窃取或篡改,弥补了传统加密方案在系统运行时防护能力差的不足。同时,该方案结合可信执行环境的硬件隔离特性和层次角色基加密技术,不仅提升了系统的抗攻击能力,还实现了更精细的权限管理。实验结果表明,该方案在保证数据安全的同时具有较高的计算效率。 展开更多
关键词 数据加密 身份基加密 可信执行环境 Intel SGX
在线阅读 下载PDF
基于区块链的多权威属性基加密方案
14
作者 李杰 马海英 +1 位作者 孙国荣 杨及坤 《计算机应用与软件》 北大核心 2026年第2期356-362,370,共8页
针对现有属性基加密存在属性撤销效率低、用户密钥难协调的问题,将区块链和属性基加密相结合,构造一种基于区块链多权威属性加密方案。该方案利用多个属性权威为用户并行地生成属性私钥,利用智能合约和分布式账本记录用户与其属性之间... 针对现有属性基加密存在属性撤销效率低、用户密钥难协调的问题,将区块链和属性基加密相结合,构造一种基于区块链多权威属性加密方案。该方案利用多个属性权威为用户并行地生成属性私钥,利用智能合约和分布式账本记录用户与其属性之间的映射关系,实现属性私钥分布式分发和撤销,使得属性撤销无需属性私钥更新,减少用户计算开销。安全性证明和效率分析表明,该方案不仅提高属性私钥撤销的效率,且保障数据的前向和后向安全性。 展开更多
关键词 区块链 多权威属性基加密 细粒度授权 属性撤销 物联网数据交易
在线阅读 下载PDF
中继链环境下一种2阶段跨链访问控制机制
15
作者 张佩云 陶帅 +1 位作者 陈健 陈子寒 《计算机研究与发展》 北大核心 2026年第1期255-272,共18页
随着区块链技术的迅速发展,数据等资产已不满足于只在单个区块链上流通,因此跨链技术应运而生。跨链技术改善了区块链数据孤岛问题,但也为数据在不同区块链上的传输与共享带来了新的挑战。一方面,不同区块链用户存储数据方式通常不同,... 随着区块链技术的迅速发展,数据等资产已不满足于只在单个区块链上流通,因此跨链技术应运而生。跨链技术改善了区块链数据孤岛问题,但也为数据在不同区块链上的传输与共享带来了新的挑战。一方面,不同区块链用户存储数据方式通常不同,各区块链数据验证方式往往也不统一。因此,其他区块链上的用户可能传输虚假或者不一致的数据,导致数据难以被有效验证其真实性和一致性,从而影响跨链访问控制的可靠性。另一方面,虽然当前代理重加密技术能有效实现1对1的访问控制,但单一代理存在中心化问题,以及在跨链场景下面临多用户并发导致的访问控制时间开销大的问题。针对上述问题,提出中继链环境下一种2阶段跨链访问控制机制,分别从数据验证和代理重加密阶段2个阶段进行设计。在数据验证阶段,为确保加密数据的来源真实性和一致性,结合Fiat-Shamir启发式与星际文件系统(interplanetary file system,IPFS),设计一种数据验证方法对数据进行快速验证,使得加密数据可被用户正确接收,加密数据在IPFS中安全存储以缓解链上存储压力;在代理重加密阶段,设计一种改进的阈值代理重加密方法,以有效应对多用户场景下的访问控制,基于重加密更新算法对重加密过程进行优化,在实现去中心化重加密的同时,降低重加密的时间开销,并有效提高多用户访问控制的重加密事务处理效率。实验结果表明,所提出的机制在数据验证方面的开销较小,并在多用户场景下加密、重加密及解密过程的开销均优于对比方法。 展开更多
关键词 中继链 代理重加密 数据验证 访问控制 数据共享
在线阅读 下载PDF
基于DataSocket技术的SMI敏感数据加密方法 被引量:6
16
作者 万方 雷光波 徐承志 《计算机仿真》 北大核心 2021年第8期217-221,共5页
由于以往加密方法是将所有的图像信息全部加密成密文图像,导致图像信息膨胀,影响了图像信息传输质量。为解决上述问题,研究一种基于DataSocket技术的序列监控图像敏感数据加密方法。方法先是序列监控图像敏感数据压缩处理,减少信息冗余... 由于以往加密方法是将所有的图像信息全部加密成密文图像,导致图像信息膨胀,影响了图像信息传输质量。为解决上述问题,研究一种基于DataSocket技术的序列监控图像敏感数据加密方法。方法先是序列监控图像敏感数据压缩处理,减少信息冗余度,具体包括图像分块、颜色空间转换、离散余弦变换、离散余弦变换系数量化以及编码等操作;然后利用混沌系统进行图像加密处理,包括实数混沌序列生成与转换、置乱和扩散等。实验结果表明:对比其它三种方法的加密结果,上述方法应用下信息熵最大,PSNR值较大,说明上述方法既能确保监控图像敏感信息安全,提高了图像的传输质量。 展开更多
关键词 序列监控图像 敏感数据 混沌加密方法
在线阅读 下载PDF
基于RSA的访问数据匿名签名安全认证方法
17
作者 武伟 刘宏英 曲霄红 《现代电子技术》 北大核心 2026年第4期47-51,共5页
针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法... 针对访问数据时,访问请求信息中包含个人或组织的敏感信息,且未加密的请求数据在认证传输过程中容易被第三方恶意修改或插入其他内容的问题,提出一种基于RSA的访问数据匿名签名安全认证方法。利用基于角色的访问控制机制,由基于RSA算法的访问请求信息加密方法对访问请求数据进行加密,并为访问系统中每个用户角色分配RSA密钥对,公钥共享给所有成员(管理员与用户);当用户申请访问数据时,采用基于环签名的匿名认证方法,使用多个成员的公钥生成环签名,以实现对访问请求的安全匿名认证。管理员使用公钥验证匿名签名,认证通过后解密访问请求数据并授权访问。测试结果表明:所提方法使用于某风电系统后,系统仅支持访问数据匿名签名安全认证合格的用户访问;且该方法具有高效率数据加解密能力,加密过程中素数位数为90 bit时,能保证系统的抗攻击能力更强。 展开更多
关键词 匿名签名 数据加密 RSA算法 安全认证 环签名 密钥设计
在线阅读 下载PDF
云存储环境下具有审计功能的高效数据共享方案
18
作者 张宇航 常金勇 +1 位作者 杨璐瑶 徐茂智 《计算机科学》 北大核心 2026年第3期459-468,共10页
随着云存储技术的普及,其安全性问题也越来越突出:云服务器可能因故障或外部攻击导致用户的存储数据丢失;同时,基于云存储的数据共享过程还可能面临恶意用户的非法访问风险。现有研究多聚焦于云存储环境下单一安全性功能的实现。对此,... 随着云存储技术的普及,其安全性问题也越来越突出:云服务器可能因故障或外部攻击导致用户的存储数据丢失;同时,基于云存储的数据共享过程还可能面临恶意用户的非法访问风险。现有研究多聚焦于云存储环境下单一安全性功能的实现。对此,在对云存储数据完整性进行安全审计的基础上,完成了数据共享过程的安全访问控制。在数据完整性审计过程中,采用基于身份的同态认证技术为存储数据生成标签,用户通过验证云服务器返回的聚合标签可以获知其存储数据的完整性,从而解决云存储数据意外丢失的问题;在数据共享阶段,采用基于属性加密与对称加密结合的混合形式,不仅可以降低外包数据的计算、通信和存储开销,还可以实现对未授权用户的控制权限管理,从而解决数据共享过程中的高效性与权限管理的平衡问题。性能分析表明,所设计的系统在数据完整性审计和共享过程中均具有较低的计算、通信开销以及存储冗余,为云存储环境下的数据安全存储与高效共享提供了新的研究思路。 展开更多
关键词 云存储 完整性审计 数据共享 基于属性加密
在线阅读 下载PDF
基于同态加密算法的医院影像数据隐私保护研究
19
作者 何绪成 常媛媛 +1 位作者 王洋 马献 《医疗卫生装备》 2026年第2期47-51,共5页
目的:为了确保医院影像数据的安全性,提出一种基于同态加密算法的医院影像数据隐私保护方法。方法:首先,将原始医学影像划分为多个互不重叠的子块,对于同一子块的像素,采用一致的密钥展开加法同态加密,再对加密后的图像以子块为单位进行... 目的:为了确保医院影像数据的安全性,提出一种基于同态加密算法的医院影像数据隐私保护方法。方法:首先,将原始医学影像划分为多个互不重叠的子块,对于同一子块的像素,采用一致的密钥展开加法同态加密,再对加密后的图像以子块为单位进行Arnold置乱处理。之后根据医学影像像素值和预测值之间的差值绝对值确定嵌入条件,依据嵌入条件判定是否嵌入信息和嵌入容量,从而完成医院影像数据初步加密。其次,先基于混沌映射形成的阈值获取边缘映射,并选取双正弦映射生成随机序列,再将序列中的数值分配给阈值形成边缘映射,之后经正弦映射置乱、影像数据异或处理及混沌序列排序置换完成首轮加密增强,随后结合位平面操作实施像素级置乱与扩散,生成最终的密文图像,以保障影像隐私与安全。最后,在公开的肺影像数据库联盟(Lung Image Database Consortium,LIDC)数据集的医院影像数据集内选取部分肺部影像进行实验,比较提出的方法与基于混沌浮点运算的方法和基于光线投射采样的方法对肺部影像的加密效果。结果:与基于混沌浮点运算的方法和基于光线投射采样的方法相比,提出的方法平均加密时间更短、像素值平均改变强度(unified average changing intensity,UACI)和像素数变化率(number of pixels change rate,NPCR)更高,且加密后的图像无法识别出原始肺部影像中的任何信息。结论:提出的方法能够显著提升医院影像数据的隐私保护水平,防止数据被非法获取或误用。 展开更多
关键词 同态加密算法 医院影像数据 医学影像数据 隐私保护
在线阅读 下载PDF
基于云计算和AES加密算法的物联网数据安全共享方法
20
作者 傅学磊 《信息技术》 2026年第1期91-96,共6页
为了实现保护数据、令用户可以无障碍访问物联网数据,提出一种基于云计算和AES加密算法的物联网数据安全共享方法。通过云储存技术提取物联网数据中的关键字,识别数据行为;使用AES加密算法对访问数据进行加密,提高数据共享的安全性和用... 为了实现保护数据、令用户可以无障碍访问物联网数据,提出一种基于云计算和AES加密算法的物联网数据安全共享方法。通过云储存技术提取物联网数据中的关键字,识别数据行为;使用AES加密算法对访问数据进行加密,提高数据共享的安全性和用户保密性;构建基于云计算的物联网数据共享框架,经过数据传输加密协议,对数据收发两端双向加密传输,在确认数据传输安全的前提下,完成物联网数据的安全共享行为。通过实验可知,所提方法的计算开销和通信开销较低,随着数据量的增加,数据流量和吞吐量波动稳定,保证数据传输效率,有效避免了数据外泄,维护了安全的网络数据访问环境,为数据安全共享提供保障。 展开更多
关键词 云计算 物联网环境 AES加密算法 数据安全共享 隐私保护
在线阅读 下载PDF
上一页 1 2 180 下一页 到第
使用帮助 返回顶部