Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed adv...Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed advantage of optical encryption.Moreover,conventional neural networks are typically effective only on images from the same distribution as the training datasets,limiting their general applicability.In this paper,we propose an all-optical high-speed decryption scheme for real-time recovery of speckle-encoded ciphertexts.By constructing a physics-informed diffractive neural network that approximates the inverse transmission matrix of the scattering medium,secret images can be directly reconstructed from speckle fields without optoelectronic conversion or post-processing.The network is trained with only 2048 samples from the MNIST dataset.Its transfer learning capability is validated across three out-of-distribution datasets,with decrypted images achieving a Pearson correlation coefficient of 0.82 and a structural similarity index measure of 0.75,demonstrating excellent transfer learning capability.For the first time,to our knowledge,this scheme simultaneously overcomes the bottlenecks of decryption delay and limited network generalizability in conventional speckle-based cryptosystems,achieving real-time image decryption with strong transferability.It provides a new pathway for developing low-power,real-time,and broadly applicable optical encryption systems,demonstrating significant potential for applications in high-speed security optical communications.展开更多
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i...With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers.展开更多
Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decrypt...Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided.展开更多
Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,...Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension.展开更多
An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to latt...An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU.展开更多
In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive c...In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously.展开更多
The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computationa...The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.展开更多
为了研究桑椹低聚半乳糖(mulberry galacto-oligosaccharide,MGO)对鼠李糖乳酪杆菌EN-08胞内蛋白质表达的影响,采用串联质量标签(tandem mass tags,TMT)定量蛋白质组学技术进行分析。将鼠李糖乳酪杆菌EN-08分别接种到含MGO、桑椹多糖(mu...为了研究桑椹低聚半乳糖(mulberry galacto-oligosaccharide,MGO)对鼠李糖乳酪杆菌EN-08胞内蛋白质表达的影响,采用串联质量标签(tandem mass tags,TMT)定量蛋白质组学技术进行分析。将鼠李糖乳酪杆菌EN-08分别接种到含MGO、桑椹多糖(mulberry polysaccharide,MPS)和低聚半乳糖(galactooligosaccharides,GOS)的MRS培养基中发酵培养。培养18 h后提取所有样品的蛋白质进行TMT技术鉴定,采用相关性热图和主成分分析观察各组相关性,发现添加MGO和MPS后,鼠李糖乳酪杆菌EN-08全蛋白组成发生变化。在MGO组中鉴定出192个差异蛋白,其中上调蛋白有110个,下调蛋白有82个。KEGG功能注释显示,上调差异蛋白的功能主要集中在碳水化合物代谢和膜运输方面,分别有17个和16个上调蛋白参与。KEGG富集分析显示,上调差异蛋白质显著富集于果糖和甘露糖代谢以及磷酸转移酶系统通路,富集因子分别为0.2195和0.2286。分析结果表明,MGO主要从碳水化合物代谢以及环境信息处理这两方面影响菌株的生命活动。说明MGO可作为有潜力的碳源,促进菌体代谢调控,为鼠李糖乳酪杆菌EN-08的高密度工业化生产提供参考。展开更多
For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through desig...For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible.展开更多
With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recor...With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recorded surveillance videos to enhance efficiency and security.The proposed method leverages Dlib’s CNN-based facial recognition technology to identify Regions of Interest(ROIs)within the video,linking these ROIs to generate unique IDs.These IDs are then combined with a master key to create entity-specific keys,which are used to encrypt the ROIs within the video.This system supports selective decryption,effectively protecting personal information using surveillance footage.Additionally,the system overcomes the limitations of existing ROI recognition technologies by predicting unrecognized frames through post-processing.This research validates the proposed technology through experimental evaluations of execution time and post-processing techniques,ensuring comprehensive personal information protection.Guidelines for setting the thresholds used in this process are also provided.Implementing the proposed method could serve as an effective solution to security vulnerabilities that traditional approaches fail to address.展开更多
B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext...B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively.展开更多
This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by inform...This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology.展开更多
In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection o...In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value.展开更多
对比分析现行国家标准GB/T 31248—2014《电缆或光缆在受火条件下火焰蔓延热释放和产烟特性的试验方法》与欧盟标准EN 50399:2022 Common test methods for cables under fire conditions—Heat release and smoke production measureme...对比分析现行国家标准GB/T 31248—2014《电缆或光缆在受火条件下火焰蔓延热释放和产烟特性的试验方法》与欧盟标准EN 50399:2022 Common test methods for cables under fire conditions—Heat release and smoke production measurement on cables during flame spread test—Test apparatus,procedures,results主要技术差异,相比于国标,欧标关于试验装置的规定更加详细,同时增加了标准电缆试样校准、火焰形状校准、非圆形电缆数量及安装规定等技术内容。针对外径小于或等于5 mm的电缆,分析国标和欧标试样安装方式异同,并给出GB/T 31248—2014修订建议。展开更多
Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudass...Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost.展开更多
Friction stir processing(FSP) has emerged as a transformative solid-state technique for enhancing the mechanical performance and microstructural integrity of metallic materials,particularly in the context of additive ...Friction stir processing(FSP) has emerged as a transformative solid-state technique for enhancing the mechanical performance and microstructural integrity of metallic materials,particularly in the context of additive manufacturing(AM).This study demonstrates the effectiveness of FSP as a post-processing strategy for two distinct AM systems:wire arc additive manufacturing(WAAM) of low-carbon steel and selective laser melting(SLM) of Ti6Al4V alloy.In the case of WAAM fabricated steel,FSP significantly refined the coarse dendritic microstructure into ultrafine equiaxed grains,resulting in a 21 %-24 % increase in hardness and enhanced tensile properties at the overlapping regions.Similarly,for SLM fabricated Ti6Al4V,FSP eliminated the columnar prior-β grains and residual porosity,yielding a homogenous α+β structure with improved strengthductility balance and reduced anisotropy.These improvements were attributed to the dynamic recrystallization,conversion of low-angle to high-angle grain boundaries,and homogenization of phase constituents induced by FSP.Despite challenges such as tool wear and fixturing complexity,the study confirms that FSP can reliably bridge the performance gap in AM components by healing solidification defects,mitigating anisotropy,and tailoring the local microstructure.The findings position FSP as a versatile and scalable post-processing technique,crucial for advancing high-performance,application-ready components in aerospace,biomedical,and structural applications.展开更多
基金supported by the Guangdong Major Project of Basic Research(Grant No.2020B0301030009)the National Natural Science Foundation of China(Grant Nos.12174204,12174203,12074203,62335012,and 62435010)+5 种基金the Natural Science Foundation of Guangdong Province(Grant No.2023A1515012888)the Science and Technology Innovation Commission of Shenzhen(Grant Nos.JCYJ20220818101417039 and JCYJ20241202124428038)the Medical-Engineering Interdisciplinary Research Foundation of Shenzhen University(Grant No.86901/00000311)the Scientific Instrument Developing Project of Shenzhen University(Grant No.2023YQ001)the Shenzhen University 2035 Initiative(Grant No.2023B004)the Key R&D Program of Zhejiang(Grant No.30003AA240100)。
文摘Speckle-based optical cryptosystems are promising technologies for information security.However,existing techniques mostly rely on digital decryption,resulting in computational delay and undermining the high-speed advantage of optical encryption.Moreover,conventional neural networks are typically effective only on images from the same distribution as the training datasets,limiting their general applicability.In this paper,we propose an all-optical high-speed decryption scheme for real-time recovery of speckle-encoded ciphertexts.By constructing a physics-informed diffractive neural network that approximates the inverse transmission matrix of the scattering medium,secret images can be directly reconstructed from speckle fields without optoelectronic conversion or post-processing.The network is trained with only 2048 samples from the MNIST dataset.Its transfer learning capability is validated across three out-of-distribution datasets,with decrypted images achieving a Pearson correlation coefficient of 0.82 and a structural similarity index measure of 0.75,demonstrating excellent transfer learning capability.For the first time,to our knowledge,this scheme simultaneously overcomes the bottlenecks of decryption delay and limited network generalizability in conventional speckle-based cryptosystems,achieving real-time image decryption with strong transferability.It provides a new pathway for developing low-power,real-time,and broadly applicable optical encryption systems,demonstrating significant potential for applications in high-speed security optical communications.
文摘With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers.
基金supported by the National Natural Science Foundation of China(12471416,12171124,12301567)the Heilongjiang Provincial Natural Science Foundation of China(PL2024F015)+2 种基金the Postdoctoral Science Foundation of Heilongjiang Province of China(LBH-Z22199)the Fundamental Research Foun-dation for Universities of Heilongjiang Province of China(2022-KYYWF-0141)the Alexander von Humboldt Foundation of Germany.
文摘Dear Editor,This letter deals with the distributed recursive set-membership filtering(DRSMF)issue for state-saturated systems under encryption-decryption mechanism.To guarantee the data security,the encryption-decryption mechanism is considered in the signal transmission process.Specifically,a novel DRSMF scheme is developed such that,for both state saturation and encryption-decryption mechanism,the filtering error(FE)is limited to the ellipsoid domain.Then,the filtering error constraint matrix(FECM)is computed and a desirable filter gain is derived by minimizing the FECM.Besides,the bound-edness evaluation of the FECM is provided.
基金financially supported by Shanghai Pujiang Program 23PJ1406500.
文摘Black wings of butterfly Ornithoptera goliath and infrared-band radiative cooling function of Rapala dioetas butterfly wings are associated with black pigment(e.g.,melanin)and unique hierarchical micro/nanostructures,greatly stimulating biomimetic fabrication of functional photonic structures but mainly targeted to one prototype.Targeted at two-prototype integrated biomimetic fabrication from fully compositional/structural/functional aspects,femtosecond(fs)laser subtractive/additive-integrated hierarchical micro/nano-manufacturing technique is proposed in this work.This technique can one-step transfer refractory metals(e.g.,W,Mo,Nb,Ta)into black non-stoichiometric oxide nanomaterials with abundant oxygen vacancies and simultaneously enable the realization of in situ quasi-controllable micro/nanoscale hierarchical aggregation and assembly,all displaying black color but with tunable infrared emission.Adjusting the scan interval for biomimetic manufacturing can tailor the structural oxidation degree,the emission in the long-wave infrared(LWIR)band while keeping the blackness of hierarchical aggregates,and the confined height between the covering quartz plate and the ablated sample.The blackening efficiency of this technique can reach∼11.25 cm^(2)·min^(−1),opening opportunities for high-throughput optical/thermal applications.Selectively patterned Chinese characters,Arabic numbers,and English letters are easily fabricable,which are intrinsically invisible-infrared dual-band encrypted but decryptable via static/dynamic environment stimuli(e.g.,sample heating/cooling,introducing external hot/cold sources including human hands).The self-evolution from‘orderless’structuring to‘ordered’functionalization is validated for the proposed fs laser subtractive/additive-integrated biomimetic manufacturing,specifically from the synthesis of diverse black nanomaterials and the seemingly disordered micro/nano-aggregates to the ordered optical/thermal regulation capacities for a delicate modulation of information encryption and decryption,unveiling a new concept for future exploration and extension.
文摘An enhaned NTRU cryptosystem eliminating decryption failures is proposed without using padding schemes and can resist the oracle model andchosen-ciphertext attacks. Because lattice reduction is the main threat to lattice-based cryptosystems, lattice reductionalgorithms are analyzed to evaluate the security of this scheme. Furthermore, the new scheme remains the advantage of high efficiency of original NTRU.
基金Supported by the National Natural Science Foundation of China (60970119, 60803149)the National Basic Research Program of China (973 Program) (2007CB311201)
文摘In this paper, based on the verifiable pair and identity-based threshold cryptography, a novel identity-based (ID-based) threshold decryption scheme (IDTDS) is proposed, which is provably secure against adaptive chosen cipbertext attack under the computational bilinear Diffie-Hellman (CBDH) problem assumption in the random oracle. The pubic cheekability of ciphertext in the IDTDS is given by simply creating a signed E1Gamal encryption instead of a noninteractive zero-knowledge proof. Furthermore, we introduce a modified verifiable pairing to ensure all decryption shares are consistent. Our scheme is more efficient in verification than the schemes considered previously.
基金The National Natural Science Foundation of China (No. 60273049, 60303026, 60473020)
文摘The secure socket layer/ transport layer security(SSL/TLS) handshake protocol uses public key cryptographic algorithms such as RSA for key establishment. Typically, public key cryptographic algorithm is computational intensive due to the modular multiplications. Therefore, SSL/TLS servers often become swamped while performing public key decryptions when the simultaneous requests increase quickly. A batch RSA decryption algorithm was proposed. The novel algorithm provides the reasonable response time and optimizes server performance significantly. The decryption speedup is proportional to the batch size b, for instance, the speedup factor is 4, while in Shacham's scheme the acceleration rate is only 2.5 when b = 4.
基金the National Natural Science Foundation of China(No.60374066)
文摘For the applied limitation of the existing threshold decryption schemes based on the(t,n) structure, an identity-based threshold decryption scheme which can be applied on the access structure is proposed through designing a special distribution algorithm of the private key shares.The generation and distribution of private key shares,the encryption,the decryption and the combination are introduced in detail.The validity and security of the scheme are proved and analyzed.Comparisons with the existing schemes show that the proposed scheme is more flexible.
基金supported by the Institute of Information and Communications Technology Planning and Evaluation (IITP)funded by the Korea Government (MIST),Development of Collection and Integrated Analysis Methods of Automotive Inter and Intra System Artifacts through Construction of Event-Based Experimental System,under RS-2022-II221022.
文摘With the advancement of video recording devices and network infrastructure,we use surveillance cameras to protect our valuable assets.This paper proposes a novel system for encrypting personal information within recorded surveillance videos to enhance efficiency and security.The proposed method leverages Dlib’s CNN-based facial recognition technology to identify Regions of Interest(ROIs)within the video,linking these ROIs to generate unique IDs.These IDs are then combined with a master key to create entity-specific keys,which are used to encrypt the ROIs within the video.This system supports selective decryption,effectively protecting personal information using surveillance footage.Additionally,the system overcomes the limitations of existing ROI recognition technologies by predicting unrecognized frames through post-processing.This research validates the proposed technology through experimental evaluations of execution time and post-processing techniques,ensuring comprehensive personal information protection.Guidelines for setting the thresholds used in this process are also provided.Implementing the proposed method could serve as an effective solution to security vulnerabilities that traditional approaches fail to address.
文摘B.Libert and J.Quisquater proposed an identity(ID)-based threshold decryption scheme. This paper found flaw in their security reduction and presented two methods to prove this scheme is resist against chosen-plaintext attack(CPA), based on the weaker model of security known as selective ID-based threshold CPA and the common model known as ID-based threshold CPA respectively.
文摘This paper analyzes the problems in image encryption and decryption based on chaos theory. This article introduces the application of the two-stage Logistic algorithm in image encryption and decryption, then by information entropy analysis it is concluded that the security of this algorithm is higher compared with the original image;And a new image encryption and decryption algorithm based on the combination of two-stage Logistic mapping and <i>M</i> sequence is proposed. This new algorithm is very sensitive to keys;the key space is large and its security is higher than two-stage Logistic mapping of image encryption and decryption technology.
基金National Natural Science Foundation of China(No.11865013)Horizontal Project of Shangrao Normal University,China(No.K8000219T)+1 种基金Industrial Science and Technology Project in Shangrao of Jiangxi Province,China(No.17A005)Doctoral Scientific Research Foundation of Shangrao Normal University,China(No.6000108)。
文摘In modern society,information is becoming increasingly interconnected through networks,and the rapid development of information technology has caused people to pay more attention to the encryption and the protection of information.Image encryption technology is a key technology for ensuring the security performance of images.We extracted single channel RGB component images from a color image using MATLAB programs,encrypted and decrypted the color images by randomly disrupting rows,columns and regions of the image.Combined with histograms and the visual judgments of encryption images,it is shown that the information of the original image cannot be obtained from the encryption image easily.The results show that the color-image encryptions with the algorithm we used have good effect and fast operation speed.Thus this algorithm has certain practical value.
文摘对比分析现行国家标准GB/T 31248—2014《电缆或光缆在受火条件下火焰蔓延热释放和产烟特性的试验方法》与欧盟标准EN 50399:2022 Common test methods for cables under fire conditions—Heat release and smoke production measurement on cables during flame spread test—Test apparatus,procedures,results主要技术差异,相比于国标,欧标关于试验装置的规定更加详细,同时增加了标准电缆试样校准、火焰形状校准、非圆形电缆数量及安装规定等技术内容。针对外径小于或等于5 mm的电缆,分析国标和欧标试样安装方式异同,并给出GB/T 31248—2014修订建议。
文摘Internet of Things(IoT)interconnects devices via network protocols to enable intelligent sensing and control.Resource-constrained IoT devices rely on cloud servers for data storage and processing.However,this cloudassisted architecture faces two critical challenges:the untrusted cloud services and the separation of data ownership from control.Although Attribute-based Searchable Encryption(ABSE)provides fine-grained access control and keyword search over encrypted data,existing schemes lack of error tolerance in exact multi-keyword matching.In this paper,we proposed an attribute-based multi-keyword fuzzy searchable encryption with forward ciphertext search(FCS-ABMSE)scheme that avoids computationally expensive bilinear pairing operations on the IoT device side.The scheme supportsmulti-keyword fuzzy search without requiring explicit keyword fields,thereby significantly enhancing error tolerance in search operations.It further incorporates forward-secure ciphertext search to mitigate trapdoor abuse,as well as offline encryption and verifiable outsourced decryption to minimize user-side computational costs.Formal security analysis proved that the FCS-ABMSE scheme meets both indistinguishability of ciphertext under the chosen keyword attacks(IND-CKA)and the indistinguishability of ciphertext under the chosen plaintext attacks(IND-CPA).In addition,we constructed an enhanced variant based on type-3 pairings.Results demonstrated that the proposed scheme outperforms existing ABSE approaches in terms of functionalities,computational cost,and communication cost.
基金funded by the National Natural Science Foundation of China(Grant No.52322508)the R&D Program of Beijing Municipal Education Commission(Grant No.KZ20231000519).
文摘Friction stir processing(FSP) has emerged as a transformative solid-state technique for enhancing the mechanical performance and microstructural integrity of metallic materials,particularly in the context of additive manufacturing(AM).This study demonstrates the effectiveness of FSP as a post-processing strategy for two distinct AM systems:wire arc additive manufacturing(WAAM) of low-carbon steel and selective laser melting(SLM) of Ti6Al4V alloy.In the case of WAAM fabricated steel,FSP significantly refined the coarse dendritic microstructure into ultrafine equiaxed grains,resulting in a 21 %-24 % increase in hardness and enhanced tensile properties at the overlapping regions.Similarly,for SLM fabricated Ti6Al4V,FSP eliminated the columnar prior-β grains and residual porosity,yielding a homogenous α+β structure with improved strengthductility balance and reduced anisotropy.These improvements were attributed to the dynamic recrystallization,conversion of low-angle to high-angle grain boundaries,and homogenization of phase constituents induced by FSP.Despite challenges such as tool wear and fixturing complexity,the study confirms that FSP can reliably bridge the performance gap in AM components by healing solidification defects,mitigating anisotropy,and tailoring the local microstructure.The findings position FSP as a versatile and scalable post-processing technique,crucial for advancing high-performance,application-ready components in aerospace,biomedical,and structural applications.