This paper proposes a novel reversible data hiding scheme for encrypted images with high payload based on homomorphic encryption. In this algorithm, each pixel of the original image is firstly divided into five parts,...This paper proposes a novel reversible data hiding scheme for encrypted images with high payload based on homomorphic encryption. In this algorithm, each pixel of the original image is firstly divided into five parts, which are to be encrypted by applying the homomorphic application based on the Paillier algorithm. Then a serial of operations are carried out in the encrypted domain so as to embed the additional data into the encrypted image. Finally, the embedded additional data can be perfectly extracted, and the host image can be recovered without error when the marked image is decrypted directly. Security analysis, extensive experiment results and comparisons illustrate that it has high security, and the original image recovery is free of any error. Meanwhile, the embedding capacity of this algorithm is enhanced when compared with other literatures.展开更多
Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recurs...Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform.The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload.By scrambling the cover image,Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.The hybrid combination of Integer wavelet transform and Arnold transform results to build a more efficient and secure system.The proposed method employs a set of keys to ensure that information cannot be decoded by an attacker.The experimental results show that it aids in the development of a more secure storage system and withstand few tampering attacks The suggested technique is tested on many image formats,including medical images.Various performance metrics proves that the retrieved cover image and hidden image are both intact.This System is proven to withstand rotation attack as well.展开更多
Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization ...Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization (VQ) indices, but the encoding strategies adopted by their scheme expand the final codestream. This paper designs four embedding and encoding strategies to improve Wang et aL's scheme. The experiment result of the proposed scheme compared with that of the Wang et aL's scheme reduces the bit rates of the final codestream by 4.6% and raises the payload by 1.09% on average.展开更多
In recent years, significant research has been devoted to the development of Intrusion Detection Systems (IDS) able to detect anomalous computer network traffic indicative of malicious activity. While signature-based ...In recent years, significant research has been devoted to the development of Intrusion Detection Systems (IDS) able to detect anomalous computer network traffic indicative of malicious activity. While signature-based IDS have proven effective in discovering known attacks, anomaly-based IDS hold the even greater promise of being able to automatically detect previously undocumented threats. Traditional IDS are generally trained in batch mode, and therefore cannot adapt to evolving network data streams in real time. To resolve this limitation, data stream mining techniques can be utilized to create a new type of IDS able to dynamically model a stream of network traffic. In this paper, we present two methods for anomalous network packet detection based on the data stream mining paradigm. The first of these is an adapted version of the DenStream algorithm for stream clustering specifically tailored to evaluate network traffic. In this algorithm, individual packets are treated as points and are flagged as normal or abnormal based on their belonging to either normal or outlier clusters. The second algorithm utilizes a histogram to create a model of the evolving network traffic to which incoming traffic can be compared using Pearson correlation. Both of these algorithms were tested using the first week of data from the DARPA ’99 dataset with Generic HTTP, Shell-code and Polymorphic attacks inserted. We were able to achieve reasonably high detection rates with moderately low false positive percentages for different types of attacks, though detection rates varied between the two algorithms. Overall, the histogram-based detection algorithm achieved slightly superior results, but required more parameters than the clustering-based algorithm. As a result of its fewer parameter requirements, the clustering approach can be more easily generalized to different types of network traffic streams.展开更多
This study aimed to evaluate the wake effect on the electric field detector(EFD) onboard the China Seismo-Electromagnetic Satellite(CSES-01). Through a series of experiments and analyses, we confirmed that the disturb...This study aimed to evaluate the wake effect on the electric field detector(EFD) onboard the China Seismo-Electromagnetic Satellite(CSES-01). Through a series of experiments and analyses, we confirmed that the disturbance phenomenon from probe B of the EFD is not caused by the boom layout. To validate and determine whether it is influenced by the wake effect, we conducted two experiments. In the first experiment, the entire satellite platform underwent a 90° counterclockwise yaw maneuver to allow probe B to avoid the plasma wake region. We then verified whether the disturbance was improved. In the second experiment, the satellite platform performed a 180° counterclockwise yaw maneuver, positioning probe B on the ram side of the satellite and completely avoiding all satellite wakes. The plasma wake effect of the satellite did not significantly influence the spherical probes of the EFD because the measurement accuracy stayed relatively stable under the two experiments, despite the observed abnormalities in the operating state of spherical probe B. This consistency in performance is important for electric field detection missions because the spatial electric field vector data obtained from these probes continue to effectively reflect information on spatial electromagnetic disturbances. These two experimental results showed that probe B consistently exhibited data jump phenomena under various maneuver states, whereas probes A, C, and D did not display such phenomena in any maneuver state.展开更多
基金the Research Program of Chongqing Education Commission(KJQN202001438,KJQN202001436)the Team Project Affiliated to Yangtze Normal University(2016XJTD01)。
文摘This paper proposes a novel reversible data hiding scheme for encrypted images with high payload based on homomorphic encryption. In this algorithm, each pixel of the original image is firstly divided into five parts, which are to be encrypted by applying the homomorphic application based on the Paillier algorithm. Then a serial of operations are carried out in the encrypted domain so as to embed the additional data into the encrypted image. Finally, the embedded additional data can be perfectly extracted, and the host image can be recovered without error when the marked image is decrypted directly. Security analysis, extensive experiment results and comparisons illustrate that it has high security, and the original image recovery is free of any error. Meanwhile, the embedding capacity of this algorithm is enhanced when compared with other literatures.
文摘Reversible data hiding is an information hiding technique that requires the retrieval of the error free cover image after the extraction of the secret image.We suggested a technique in this research that uses a recursive embedding method to increase capacity substantially using the Integer wavelet transform and the Arnold transform.The notion of Integer wavelet transforms is to ensure that all coefficients of the cover images are used during embedding with an increase in payload.By scrambling the cover image,Arnold transform adds security to the information that gets embedded and also allows embedding more information in each iteration.The hybrid combination of Integer wavelet transform and Arnold transform results to build a more efficient and secure system.The proposed method employs a set of keys to ensure that information cannot be decoded by an attacker.The experimental results show that it aids in the development of a more secure storage system and withstand few tampering attacks The suggested technique is tested on many image formats,including medical images.Various performance metrics proves that the retrieved cover image and hidden image are both intact.This System is proven to withstand rotation attack as well.
基金supported by the National Science Council,Taiwan under Grant No.NSC 99-2221-E-324-040-MY2
文摘Lossless data hiding can restore the original status of cover media after embedded secret data are extracted. In 2010, Wang et al. proposed a lossless data hiding scheme which hides secret data in vector quantization (VQ) indices, but the encoding strategies adopted by their scheme expand the final codestream. This paper designs four embedding and encoding strategies to improve Wang et aL's scheme. The experiment result of the proposed scheme compared with that of the Wang et aL's scheme reduces the bit rates of the final codestream by 4.6% and raises the payload by 1.09% on average.
文摘In recent years, significant research has been devoted to the development of Intrusion Detection Systems (IDS) able to detect anomalous computer network traffic indicative of malicious activity. While signature-based IDS have proven effective in discovering known attacks, anomaly-based IDS hold the even greater promise of being able to automatically detect previously undocumented threats. Traditional IDS are generally trained in batch mode, and therefore cannot adapt to evolving network data streams in real time. To resolve this limitation, data stream mining techniques can be utilized to create a new type of IDS able to dynamically model a stream of network traffic. In this paper, we present two methods for anomalous network packet detection based on the data stream mining paradigm. The first of these is an adapted version of the DenStream algorithm for stream clustering specifically tailored to evaluate network traffic. In this algorithm, individual packets are treated as points and are flagged as normal or abnormal based on their belonging to either normal or outlier clusters. The second algorithm utilizes a histogram to create a model of the evolving network traffic to which incoming traffic can be compared using Pearson correlation. Both of these algorithms were tested using the first week of data from the DARPA ’99 dataset with Generic HTTP, Shell-code and Polymorphic attacks inserted. We were able to achieve reasonably high detection rates with moderately low false positive percentages for different types of attacks, though detection rates varied between the two algorithms. Overall, the histogram-based detection algorithm achieved slightly superior results, but required more parameters than the clustering-based algorithm. As a result of its fewer parameter requirements, the clustering approach can be more easily generalized to different types of network traffic streams.
基金a project funded by the China National Space Administration (CNSA) and China Earthquake Administration (CEA)supported by the National Key R&D Program of Intergovernmental Cooperation in Science and Technology (Grant No. 2023YFE0117300)+3 种基金the International Space Science Institute (ISSI in Bern, Switzerland, and ISSI-BJ in Beijing, China)supporting International Team 23-583 led by Dedalo Marchetti and Essam Ghamrythe Hebei Province Graduate Professional Degree Excellent Teaching Case (Library) Construction Project (Grant No. KCJPZ2023060)the Open Fund for the Key Laboratory of Seismic Disaster Instruments and Monitoring Technology in Hebei Province (Grant No. FZ224104)。
文摘This study aimed to evaluate the wake effect on the electric field detector(EFD) onboard the China Seismo-Electromagnetic Satellite(CSES-01). Through a series of experiments and analyses, we confirmed that the disturbance phenomenon from probe B of the EFD is not caused by the boom layout. To validate and determine whether it is influenced by the wake effect, we conducted two experiments. In the first experiment, the entire satellite platform underwent a 90° counterclockwise yaw maneuver to allow probe B to avoid the plasma wake region. We then verified whether the disturbance was improved. In the second experiment, the satellite platform performed a 180° counterclockwise yaw maneuver, positioning probe B on the ram side of the satellite and completely avoiding all satellite wakes. The plasma wake effect of the satellite did not significantly influence the spherical probes of the EFD because the measurement accuracy stayed relatively stable under the two experiments, despite the observed abnormalities in the operating state of spherical probe B. This consistency in performance is important for electric field detection missions because the spatial electric field vector data obtained from these probes continue to effectively reflect information on spatial electromagnetic disturbances. These two experimental results showed that probe B consistently exhibited data jump phenomena under various maneuver states, whereas probes A, C, and D did not display such phenomena in any maneuver state.