期刊文献+
共找到16,497篇文章
< 1 2 250 >
每页显示 20 50 100
Medical Image Encryption Based on Fisher-Yates Scrambling and Filter Diffusion 被引量:1
1
作者 HUANG Jiacin GUO Yali +1 位作者 GAO Ruoyun LI Shanshan 《Journal of Shanghai Jiaotong university(Science)》 2025年第1期136-152,共17页
A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,whic... A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,which is used for the scrambling,substitution and diffusion processes.The three-dimensional Fisher-Yates scrambling,S-box substitution and diffusion are employed for the first round of encryption.The chaotic sequence is adopted for secondary encryption to scramble the ciphertext obtained in the first round.Then,three-dimensional filter is applied to diffusion for further useful information hiding.The key to the algorithm is generated by the combination of hash value of plaintext image and the input parameters.It improves resisting ability of plaintext attacks.The security analysis shows that the algorithm is effective and efficient.It can resist common attacks.In addition,the good diffusion effect shows that the scheme can solve the differential attacks encountered in the transmission of medical images and has positive implications for future research. 展开更多
关键词 medical image encryption Fisher-Yates scrambling three-dimensional filter diffusion bidirectional diffusion S-box substitution
原文传递
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
2
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
3
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
4
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
Approximate Homomorphic Encryption for MLaaS by CKKS with Operation-Error-Bound
5
作者 Ray-I Chang Chia-Hui Wang +1 位作者 Yen-Ting Chang Lien-Chen Wei 《Computers, Materials & Continua》 2025年第10期503-518,共16页
As data analysis often incurs significant communication and computational costs,these tasks are increasingly outsourced to cloud computing platforms.However,this introduces privacy concerns,as sensitive data must be t... As data analysis often incurs significant communication and computational costs,these tasks are increasingly outsourced to cloud computing platforms.However,this introduces privacy concerns,as sensitive data must be transmitted to and processed by untrusted parties.To address this,fully homomorphic encryption(FHE)has emerged as a promising solution for privacy-preserving Machine-Learning-as-a-Service(MLaaS),enabling computation on encrypted data without revealing the plaintext.Nevertheless,FHE remains computationally expensive.As a result,approximate homomorphic encryption(AHE)schemes,such as CKKS,have attracted attention due to their efficiency.In our previous work,we proposed RP-OKC,a CKKS-based clustering scheme implemented via TenSEAL.However,errors inherent to CKKS operations—termed CKKS-errors—can affect the accuracy of the result after decryption.Since these errors can be mitigated through post-decryption rounding,we propose a data pre-scaling technique to increase the number of significant digits and reduce CKKS-errors.Furthermore,we introduce an Operation-Error-Estimation(OEE)table that quantifies upper-bound error estimates for various CKKS operations.This table enables error-aware decryption correction,ensuring alignment between encrypted and plaintext results.We validate our method on K-means clustering using the Kaggle Customer Segmentation dataset.Experimental results confirm that the proposed scheme enhances the accuracy and reliability of privacy-preserving data analysis in cloud environments. 展开更多
关键词 Privacy protection K-means clustering cloud computing approximate homomorphic encryption fully homomorphic encryption
在线阅读 下载PDF
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
6
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
IDCE:Integrated Data Compression and Encryption for Enhanced Security and Efficiency
7
作者 Muhammad Usama Arshad Aziz +2 位作者 Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev 《Computer Modeling in Engineering & Sciences》 2025年第4期1029-1048,共20页
Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive da... Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and misuse.With the exponential growth of digital data,robust security measures are essential.Data encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key control.Despite their individual benefits,both require significant computational resources.Additionally,performing them separately for the same data increases complexity and processing time.Recognizing the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and efficiency.Thealgorithmoperates on 128-bit block sizes and a 256-bit secret key length.It combines Huffman coding for compression and a Tent map for encryption.Additionally,an iterative Arnold cat map further enhances cryptographic confusion properties.Experimental analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field. 展开更多
关键词 Chaotic maps SECURITY data compression data encryption integrated compression and encryption
在线阅读 下载PDF
A luminescent folded S-shaped high-nuclearity Eu_(19)-oxo-cluster embedded polyoxoniobate for information encryption
8
作者 Wen-Jun Xia Yong-Jiang Wang +4 位作者 Yun-Fei Cao Cai Sun Xin-Xiong Li Yan-Qiong Sun Shou-Tian Zheng 《Chinese Chemical Letters》 2025年第2期498-502,共5页
Ln-containing polyoxoniobates(PONbs)have appealing applications in luminescence,information encryption and magnetic fields,but the synthesis of PONbs containing high-nuclearity Ln-O clusters is challenging due to the ... Ln-containing polyoxoniobates(PONbs)have appealing applications in luminescence,information encryption and magnetic fields,but the synthesis of PONbs containing high-nuclearity Ln-O clusters is challenging due to the easy hydrolysis of Ln^(3+)ions in alkaline environments.In this paper,we are able to integrate CO_(3)^(2-)and high-nuclearity Ln-O clusters into PONb to construct an inorganic giant Eu_(19)-embedded PONb H_(49)K_(16)Na_(13)(H_(2)O)_(63)[Eu_(21)O_(2)(OH)_(7)(H_(2)O)_(5)(Nb_(7)O_(22))_(10)(Nb_(2)O_(6))_(2)(CO_(3))_(18)]·91H_(2)O(1),which contains the highest nuclearity Eu-O clusters and the largest number of Eu^(3+)ions among PONbs.In addition,the film that was prepared by mixing 1 with gelatin and glycerol,exhibits reversible luminescence switching behavior under acid/alkali stimulation and has been used to create a fluorescence-encoded information approach.This work paves a feasible strategy for the construction of high-nuclearity Ln-O cluster-containing PONbs and the expansion of the application of Ln-containing PONbs in information encryption. 展开更多
关键词 POLYOXONIOBATE LANTHANIDE Luminescence Information encryption Acid alkali stimulation
原文传递
Secure Medical Image Transmission Using Chaotic Encryption and Blockchain-Based Integrity Verification
9
作者 Rim Amdouni Mahdi Madani +2 位作者 Mohamed Ali Hajjaji El Bay Bourennane Mohamed Atri 《Computers, Materials & Continua》 2025年第9期5527-5553,共27页
Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blo... Ensuring the integrity and confidentiality of patient medical information is a critical priority in the healthcare sector.In the context of security,this paper proposes a novel encryption algorithm that integrates Blockchain technology,aiming to improve the security and privacy of transmitted data.The proposed encryption algorithm is a block-cipher image encryption scheme based on different chaotic maps:The logistic Map,the Tent Map,and the Henon Map used to generate three encryption keys.The proposed block-cipher system employs the Hilbert curve to perform permutation while a generated chaos-based S-Box is used to perform substitution.Furthermore,the integration of a Blockchain-based solution for securing data transmission and communication between nodes and authenticating the encrypted medical image’s authenticity adds a layer of security to our proposed method.Our proposed cryptosystem is divided into two principal modules presented as a pseudo-random number generator(PRNG)used for key generation and an encryption and decryption system based on the properties of confusion and diffusion.The security analysis and experimental tests for the proposed algorithm show that the average value of the information entropy of the encrypted images is 7.9993,the Number of Pixels Change Rate(NPCR)values are over 99.5%and the Unified Average Changing Intensity(UACI)values are greater than 33%.These results prove the strength of our proposed approach,demonstrating that it can significantly enhance the security of encrypted images. 展开更多
关键词 Medical image encryption chaotic maps blockchain substitution-Box security INTEGRITY
在线阅读 下载PDF
Reconfigurable origami chiral response for holographic imaging and information encryption
10
作者 Zhibiao Zhu Yongfeng Li +4 位作者 Jiafu Wang Ze Qin Lixin Jiang Yang Chen Shaobo Qu 《Opto-Electronic Science》 2025年第4期1-11,共11页
With the rapid development of holographic technology,metasurface-based holographic communication schemes have demonstrated immense potential for electromagnetic(EM)multifunctionality.However,traditional passive metasu... With the rapid development of holographic technology,metasurface-based holographic communication schemes have demonstrated immense potential for electromagnetic(EM)multifunctionality.However,traditional passive metasurfaces are severely limited by their lack of reconfigurability,hindering the realization of versatile holographic applications.Origami,an art form that mechanically induces spatial deformations,serves as a platform for multifunctional devices and has garnered significant attention in optics,physics,and materials science.The Miura-ori folding paradigm,characterized by its continuous reconfigurability in folded states,remains unexplored in the context of holographic imaging.Herein,we integrate the principles of Rosenfeld with L-and D-metal chiral enantiomers on a Miura-ori surface to tailor the aperture distribution.Leveraging the continuously tunable nature of the Miura-ori's folded states,the chiral response of the metallic structures varies across different folding configurations,enabling distinct EM holographic imaging functionalities.In the planar state,holographic encryption is achieved.Under specific folding conditions and driven by spin circularly polarized(CP)waves at a particular frequency,multiplexed holographic images can be reconstructed on designated focal planes with CP selectivity.Notably,the fabricated origami metasurface exhibits a large negative Poisson ratio,facilitating portability and deployment and offering novel avenues for spin-selective systems,camouflage,and information encryption. 展开更多
关键词 ORIGAMI RECONFIGURABLE chiral response holographic imaging information encryption
在线阅读 下载PDF
Random Strip Peeling:A novel lightweight image encryption for IoT devices based on colour planes permutation
11
作者 Kenan Ince Cemile Ince Davut Hanbay 《CAAI Transactions on Intelligence Technology》 2025年第2期529-544,共16页
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale... This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N. 展开更多
关键词 chaotic encryption image scrambling algorithm lightweight image encryption symmetric encryption
在线阅读 下载PDF
Chaos-Based Novel Watermarked Satellite Image Encryption Scheme
12
作者 Mohamed Medani Yahia Said +4 位作者 Nashwan Adnan Othman Farrukh Yuldashev Mohamed Kchaou Faisal Khaled Aldawood Bacha Rehman 《Computer Modeling in Engineering & Sciences》 2025年第4期1049-1070,共22页
Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted be... Satellite images are widely used for remote sensing and defence applications,however,they are subject to a variety of threats.To ensure the security and privacy of these images,theymust be watermarked and encrypted before communication.Therefore,this paper proposes a novel watermarked satellite image encryption scheme based on chaos,Deoxyribonucleic Acid(DNA)sequence,and hash algorithm.The watermark image,DNA sequence,and plaintext image are passed through the Secure Hash Algorithm(SHA-512)to compute the initial condition(keys)for the Tangent-Delay Ellipse Reflecting Cavity Map(TD-ERCS),Henon,and Duffing chaotic maps,respectively.Through bitwise XOR and substitution,the TD-ERCS map encrypts the watermark image.The ciphered watermark image is embedded in the plaintext image.The embedded plaintext image is permuted row-wise and column-wise using the Henon chaotic map.The permuted image is then bitwise XORed with the values obtained from the Duffing map.For additional security,the XORed image is substituted through a dynamic S-Box.To evaluate the efficiency and performance of the proposed algorithm,several tests are performed which prove its resistance to various types of attacks such as brute-force and statistical attacks. 展开更多
关键词 DNA sequence TD-ERCS chaoticmap henon chaoticmap duffing chaotic system SHA-512 encryption technique watermark embedding
在线阅读 下载PDF
A Privacy Protection Scheme for Verifiable Data Element Circulation Based on Fully Homomorphic Encryption
13
作者 Song Jiyuan Gao Hongmin +3 位作者 Ye Keke Shen Yushi Ma Zhaofeng Feng Chengzhi 《China Communications》 2025年第4期223-235,共13页
With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in p... With increasing demand for data circulation,ensuring data security and privacy is paramount,specifically protecting privacy while maximizing utility.Blockchain,while decentralized and transparent,faces challenges in privacy protection and data verification,especially for sensitive data.Existing schemes often suffer from inefficiency and high overhead.We propose a privacy protection scheme using BGV homomorphic encryption and Pedersen Secret Sharing.This scheme enables secure computation on encrypted data,with Pedersen sharding and verifying the private key,ensuring data consistency and immutability.The blockchain framework manages key shards,verifies secrets,and aids security auditing.This approach allows for trusted computation without revealing the underlying data.Preliminary results demonstrate the scheme's feasibility in ensuring data privacy and security,making data available but not visible.This study provides an effective solution for data sharing and privacy protection in blockchain applications. 展开更多
关键词 blockchain technology data element cir-culation data privacy homomorphic encryption se-cret sharing trusted computation
在线阅读 下载PDF
Photoswitchable dual-color fluorescent polymeric nanoparticles for self-erased time-resolved information encryption and anti-counterfeiting
14
作者 Hong Wang Yong Tian +4 位作者 Tiancheng Wu Shun He Jiaxi Cui Jian Chen Xudong Chen 《Chinese Chemical Letters》 2025年第7期468-472,共5页
Photoswitchable fluorescent polymeric nanoparticles were widely concerned because of their excellent features including the flexible design,easy preparation and functionalization,and thus exhibited great application p... Photoswitchable fluorescent polymeric nanoparticles were widely concerned because of their excellent features including the flexible design,easy preparation and functionalization,and thus exhibited great application potential in information encryption,anti-counterfeiting,but remained challenging in improving the security.Herein,we described a self-erased time-resolved information encryption via using photoswitchable dual-color fluorescent polymeric nanoparticles(PDFPNs)containing two fluorescence dyes(blue and red)and photochromic spiroxazine derivatives.In view of the different thermo-induced isomerization rates of photochromic spiroxazine derivatives in different flexible substrates,the decoloration rate of PDFPNs can be programmatically tuned by regulating ratio between rigid polymer and flexible polymer.Therefore,after ultraviolet light(UV)irradiation,correct information could only be recognized in preestablished time during the self-erased process.Our results indicated that PDFPNs exhibited fast photo-responsibility(2 min),high fluorescence contrast,well-pleasing photo-reversibility(>20 times),and programmable thermo-responsiveness(24 s-6 h).We thus demonstrated their application in the selferased time-resolved information encryption and anti-counterfeiting with high security. 展开更多
关键词 Photoswitchable dual-color fluorescence Polymeric nanoparticles FRET Self-erasure Time-resolved information encryption
原文传递
Detection of False Data Injection Attacks:A Protected Federated Deep Learning Based on Encryption Mechanism
15
作者 Chenxin Lin Qun Zhou +3 位作者 Zhan Wang Ximing Fan Yaochang Xu Yijia Xu 《Computers, Materials & Continua》 2025年第9期5859-5877,共19页
False Data Injection Attack(FDIA),a disruptive cyber threat,is becoming increasingly detrimental to smart grids with the deepening integration of information technology and physical power systems,leading to system unr... False Data Injection Attack(FDIA),a disruptive cyber threat,is becoming increasingly detrimental to smart grids with the deepening integration of information technology and physical power systems,leading to system unreliability,data integrity loss and operational vulnerability exposure.Given its widespread harm and impact,conducting in-depth research on FDIA detection is vitally important.This paper innovatively introduces a FDIA detection scheme:A Protected Federated Deep Learning(ProFed),which leverages Federated Averaging algorithm(FedAvg)as a foundational framework to fortify data security,harnesses pre-trained enhanced spatial-temporal graph neural networks(STGNN)to perform localized model training and integrates the Cheon-Kim-Kim-Song(CKKS)homomorphic encryption system to secure sensitive information.Simulation tests on IEEE 14-bus and IEEE 118-bus systems demonstrate that our proposed method outperforms other state-of-the-art detection methods across all evaluation metrics,with peak improvements reaching up to 35%. 展开更多
关键词 Smart grid FDIA federated learning STGNN CKKS homomorphic encryption
在线阅读 下载PDF
Efficient Searchable Encryption Scheme Supporting Fuzzy Multi-Keyword Ranking Search on Blockchain
16
作者 Hongliang Tian Zhong Fan +1 位作者 Zhiyang Ruan Aomen Zhao 《Computers, Materials & Continua》 2025年第6期5199-5217,共19页
With the continuous growth of exponential data in IoT,it is usually chosen to outsource data to the cloud server.However,cloud servers are usually provided by third parties,and there is a risk of privacy leakage.Encry... With the continuous growth of exponential data in IoT,it is usually chosen to outsource data to the cloud server.However,cloud servers are usually provided by third parties,and there is a risk of privacy leakage.Encrypting data can ensure its security,but at the same time,it loses the retrieval function of IoT data.Searchable Encryption(SE)can achieve direct retrieval based on ciphertext data.The traditional searchable encryption scheme has the problems of imperfect function,low retrieval efficiency,inaccurate retrieval results,and centralized cloud servers being vulnerable and untrustworthy.This paper proposes an Efficient searchable encryption scheme supporting fuzzy multi-keyword ranking search on the blockchain.The blockchain and IPFS are used to store the index and encrypted files in a distributed manner respectively.The tamper resistance of the distributed ledger ensures the authenticity of the data.The data retrieval work is performed by the smart contract to ensure the reliability of the data retrieval.The Local Sensitive Hash(LSH)function is combined with the Bloom Filter(BF)to realize the fuzzy multi-keyword retrieval function.In addition,to measure the correlation between keywords and files,a new weighted statistical algorithm combining RegionalWeight Score(RWS)and Term Frequency–Inverse Document Frequency(TF-IDF)is proposed to rank the search results.The balanced binary tree is introduced to establish the index structure,and the index binary tree traversal strategy suitable for this scheme is constructed to optimize the index structure and improve the retrieval efficiency.The experimental results show that the scheme is safe and effective in practical applications. 展开更多
关键词 Blockchain searchable encryption TF-IDF fuzzy multi-keyword search index tree
在线阅读 下载PDF
Joint Watermarking and Encryption for Social Image Sharing
17
作者 Conghuan Ye Shenglong Tan +3 位作者 Shi Li Jun Wang Qiankun Zuo Bing Xiong 《Computers, Materials & Continua》 2025年第5期2927-2946,共20页
With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social... With the fast development of multimedia social platforms,content dissemination on social media platforms is becomingmore popular.Social image sharing can also raise privacy concerns.Image encryption can protect social images.However,most existing image protection methods cannot be applied to multimedia social platforms because of encryption in the spatial domain.In this work,the authors propose a secure social image-sharing method with watermarking/fingerprinting and encryption.First,the fingerprint code with a hierarchical community structure is designed based on social network analysis.Then,discrete wavelet transform(DWT)from block discrete cosine transform(DCT)directly is employed.After that,all codeword segments are embedded into the LL,LH,and HL subbands,respectively.The selected subbands are confused based on Game of Life(GoL),and then all subbands are diffused with singular value decomposition(SVD).Experimental results and security analysis demonstrate the security,invisibility,and robustness of our method.Further,the superiority of the technique is elaborated through comparison with some related image security algorithms.The solution not only performs the fast transformation from block DCT to one-level DWT but also protects users’privacy in multimedia social platforms.With the proposed method,JPEG image secure sharing in multimedia social platforms can be ensured. 展开更多
关键词 Multimedia security digital watermarking image encryption image sharing privacy protection
在线阅读 下载PDF
Sine-Polynomial Chaotic Map(SPCM):A Decent Cryptographic Solution for Image Encryption in Wireless Sensor Networks
18
作者 David S.Bhatti Annas W.Malik +1 位作者 Haeung Choi Ki-Il Kim 《Computers, Materials & Continua》 2025年第10期2157-2177,共21页
Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a n... Traditional chaotic maps struggle with narrow chaotic ranges and inefficiencies,limiting their use for lightweight,secure image encryption in resource-constrained Wireless Sensor Networks(WSNs).We propose the SPCM,a novel one-dimensional discontinuous chaotic system integrating polynomial and sine functions,leveraging a piecewise function to achieve a broad chaotic range()and a high Lyapunov exponent(5.04).Validated through nine benchmarks,including standard randomness tests,Diehard tests,and Shannon entropy(3.883),SPCM demonstrates superior randomness and high sensitivity to initial conditions.Applied to image encryption,SPCM achieves 0.152582 s(39%faster than some techniques)and 433.42 KB/s throughput(134%higher than some techniques),setting new benchmarks for chaotic map-based methods in WSNs.Chaos-based permutation and exclusive or(XOR)diffusion yield near-zero correlation in encrypted images,ensuring strong resistance to Statistical Attacks(SA)and accurate recovery.SPCM also exhibits a strong avalanche effect(bit difference),making it an efficient,secure solution for WSNs in domains like healthcare and smart cities. 展开更多
关键词 Chaos theory chaotic system image encryption CRYPTOGRAPHY wireless sensor networks(WSNs)
在线阅读 下载PDF
Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps:An Ultra-Wide Range Dynamics for Image Encryption
19
作者 De Rosal Ignatius Moses Setiadi T.Sutojo +4 位作者 Supriadi Rustad Muhamad Akrom Sudipta Kr Ghosal Minh T.Nguyen Arnold Adimabua Ojugo 《Computers, Materials & Continua》 2025年第5期2161-2188,共28页
Data security has become a growing priority due to the increasing frequency of cyber-attacks,necessitating the development of more advanced encryption algorithms.This paper introduces Single Qubit Quantum Logistic-Sin... Data security has become a growing priority due to the increasing frequency of cyber-attacks,necessitating the development of more advanced encryption algorithms.This paper introduces Single Qubit Quantum Logistic-Sine XYZ-Rotation Maps(SQQLSR),a quantum-based chaos map designed to generate one-dimensional chaotic sequences with an ultra-wide parameter range.The proposed model leverages quantum superposition using Hadamard gates and quantum rotations along the X,Y,and Z axes to enhance randomness.Extensive numerical experiments validate the effectiveness of SQQLSR.The proposed method achieves a maximum Lyapunov exponent(LE)of≈55.265,surpassing traditional chaotic maps in unpredictability.The bifurcation analysis confirms a uniform chaotic distribution,eliminating periodic windows and ensuring higher randomness.The system also generates an expanded key space exceeding 10^(40),enhancing security against brute-force attacks.Additionally,SQQLSR is applied to image encryption using a simple three-layer encryption scheme combining permutation and substitution techniques.This approach is intentionally designed to highlight the impact of SQQLSR-generated chaotic sequences rather than relying on a complex encryption algorithm.Theencryption method achieves an average entropy of 7.9994,NPCR above 99.6%,and UACI within 32.8%–33.8%,confirming its strong randomness and sensitivity to minor modifications.The robustness tests against noise,cropping,and JPEG compression demonstrate its resistance to statistical and differential attacks.Additionally,the decryption process ensures perfect image reconstruction with an infinite PSNR value,proving the algorithm’s reliability.These results highlight SQQLSR’s potential as a lightweight yet highly secure encryption mechanism suitable for quantum cryptography and secure communications. 展开更多
关键词 Single qubit quantumchaotic quantumchaotic map quantumimage encryption quantumlogistic map quantum sine map
在线阅读 下载PDF
Homomorphic Encryption for Machine Learning Applications with CKKS Algorithms:A Survey of Developments and Applications
20
作者 Lingling Wu Xu An Wang +7 位作者 Jiasen Liu Yunxuan Su Zheng Tu Wenhao Liu Haibo Lei Dianhua Tang Yunfei Cao Jianping Zhang 《Computers, Materials & Continua》 2025年第10期89-119,共31页
Due to the rapid advancement of information technology,data has emerged as the core resource driving decision-making and innovation across all industries.As the foundation of artificial intelligence,machine learning(M... Due to the rapid advancement of information technology,data has emerged as the core resource driving decision-making and innovation across all industries.As the foundation of artificial intelligence,machine learning(ML)has expanded its applications into intelligent recommendation systems,autonomous driving,medical diagnosis,and financial risk assessment.However,it relies on massive datasets,which contain sensitive personal information.Consequently,Privacy-Preserving Machine Learning(PPML)has become a critical research direction.To address the challenges of efficiency and accuracy in encrypted data computation within PPML,Homomorphic Encryption(HE)technology is a crucial solution,owing to its capability to facilitate computations on encrypted data.However,the integration of machine learning and homomorphic encryption technologies faces multiple challenges.Against this backdrop,this paper reviews homomorphic encryption technologies,with a focus on the advantages of the Cheon-Kim-Kim-Song(CKKS)algorithm in supporting approximate floating-point computations.This paper reviews the development of three machine learning techniques:K-nearest neighbors(KNN),K-means clustering,and face recognition-in integration with homomorphic encryption.It proposes feasible schemes for typical scenarios,summarizes limitations and future optimization directions.Additionally,it presents a systematic exploration of the integration of homomorphic encryption and machine learning from the essence of the technology,application implementation,performance trade-offs,technological convergence and future pathways to advance technological development. 展开更多
关键词 Homomorphic encryption machine learning CKKS PPML
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部