期刊文献+
共找到19,196篇文章
< 1 2 250 >
每页显示 20 50 100
Electroacoustic tomography with dual-frequency array for real-time monitoring of electroporation
1
作者 Luke Xu Yifei Xu Liangzhong Xiang 《Journal of Innovative Optical Health Sciences》 2026年第1期45-55,共11页
Electroacoustic Tomography(EAT)is an imaging technique that detects ultrasound waves induced by electrical pulses,offering a solution for real-time electroporation monitoring.This study presents EAT system using a dua... Electroacoustic Tomography(EAT)is an imaging technique that detects ultrasound waves induced by electrical pulses,offering a solution for real-time electroporation monitoring.This study presents EAT system using a dual-frequency ultrasound array.The broadband nature of electroacoustic signals requires ultrasound detector to cover both the high-frequency range(around 6MHz)signals generated by small targets and the low-frequency range(around 1MHz)signals generated by large targets.In our EAT system,we use the 6 MHz array to detect high-frequency signals from the electrodes,and the 1 MHz array for the electrical field.To test this,we conducted simulations using COMSOL Multiphysics^(®) and MATLAB's k-Wave toolbox,followed by experiments using a custom-built setup with a dual-frequency transducer and real-time data acquisition.The results demonstrated that the dual-frequency EAT system could accurately and simultaneously monitor the electroporation process,effectively showing both the treatment area and electrode placement with the application of 1 kV electric pulses with 100 ns duration.The axial resolution of the 6MHz array for EAT was 0.45 mm,significantly better than the 2mm resolution achieved with the 1MHz array.These findings validate the potential of dual-frequency EAT as a superior method for real-time electroporation monitoring. 展开更多
关键词 DUAL-FREQUENCY electroacoustic imaging real-time ELECTROPORATION
原文传递
A New Image Encryption Algorithm Based on Cantor Diagonal Matrix and Chaotic Fractal Matrix
2
作者 Hongyu Zhao Shengsheng Wang 《Computers, Materials & Continua》 2026年第1期636-660,共25页
Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes ... Driven by advancements in mobile internet technology,images have become a crucial data medium.Ensuring the security of image information during transmission has thus emerged as an urgent challenge.This study proposes a novel image encryption algorithm specifically designed for grayscale image security.This research introduces a new Cantor diagonal matrix permutation method.The proposed permutation method uses row and column index sequences to control the Cantor diagonal matrix,where the row and column index sequences are generated by a spatiotemporal chaotic system named coupled map lattice(CML).The high initial value sensitivity of the CML system makes the permutation method highly sensitive and secure.Additionally,leveraging fractal theory,this study introduces a chaotic fractal matrix and applies this matrix in the diffusion process.This chaotic fractal matrix exhibits selfsimilarity and irregularity.Using the Cantor diagonal matrix and chaotic fractal matrix,this paper introduces a fast image encryption algorithm involving two diffusion steps and one permutation step.Moreover,the algorithm achieves robust security with only a single encryption round,ensuring high operational efficiency.Experimental results show that the proposed algorithm features an expansive key space,robust security,high sensitivity,high efficiency,and superior statistical properties for the ciphered images.Thus,the proposed algorithm not only provides a practical solution for secure image transmission but also bridges fractal theory with image encryption techniques,thereby opening new research avenues in chaotic cryptography and advancing the development of information security technology. 展开更多
关键词 Image encryption spatiotemporal chaotic system chaotic fractal matrix cantor diagonal matrix
在线阅读 下载PDF
Energy relief effect of real-time drilling to prevent rockburst in high-stress rock
3
作者 Zhichao He Fengqiang Gong +2 位作者 Li Ren Weimin Yang Xuezhen Wu 《Journal of Rock Mechanics and Geotechnical Engineering》 2026年第2期1460-1475,共16页
To investigate the energy relief effect of real-time drilling in preventing rockburst in high-stress rock,a series of high-stress real-time drilling uniaxial compression tests were conducted on red sandstone specimens... To investigate the energy relief effect of real-time drilling in preventing rockburst in high-stress rock,a series of high-stress real-time drilling uniaxial compression tests were conducted on red sandstone specimens using the SG4500 drilling rig.Results showed that the mechanical behavior(i.e.peak strength and rockburst intensity)of the rock was weakened under high-stress real-time drilling and exhibited a downward trend as the drilling diameter increased.The real-time drilling energy dissipation index(ERD)was proposed to characterize the energy relief during high-stress real-time drilling.The ERD exhibited a linear increase with the real-time drilling diameter.Furthermore,the elastic strain energy of post-drilling rock showed a linear relationship with the square of stress across different stress levels,which also applied to the peak elastic strain energy and the square of peak stress.This findingreveals the intrinsic link between the weakening effect of peak elastic strain energy and peak strength due to high-stress real-time drilling,confirmingthe consistency between energy relief and pressure relief effects.By establishing relationships among rockburst proneness,peak elastic strain energy,and peak strength,it was demonstrated that high-stress real-time drilling reduces rockburst proneness through energy dissipation.Specifically,both peak elastic strain energy and rockburst proneness decreased with larger drill bit diameters,consistent with reductions in peak strength,rockburst intensity,and fractal dimensions of high-stress real-time drilled rock.These results validate the energy relief mechanism of real-time drilling in mitigating rockburst risks. 展开更多
关键词 Rock mechanics ROCKBURST real-time drilling Drilling energy relief Energy storage capacity Rockburst proneness
在线阅读 下载PDF
Real-Time Identification Technology for Encrypted DNS Traffic with Privacy Protection
4
作者 Zhipeng Qin Hanbing Yan +2 位作者 Biyang Zhang Peng Wang Yitao Li 《Computers, Materials & Continua》 2025年第6期5811-5829,共19页
With the widespread adoption of encrypted Domain Name System(DNS)technologies such as DNS over Hyper Text Transfer Protocol Secure(HTTPS),traditional port and protocol-based traffic analysis methods have become ineffe... With the widespread adoption of encrypted Domain Name System(DNS)technologies such as DNS over Hyper Text Transfer Protocol Secure(HTTPS),traditional port and protocol-based traffic analysis methods have become ineffective.Although encrypted DNS enhances user privacy protection,it also provides concealed communication channels for malicious software,compelling detection technologies to shift towards statistical featurebased and machine learning approaches.However,these methods still face challenges in real-time performance and privacy protection.This paper proposes a real-time identification technology for encrypted DNS traffic with privacy protection.Firstly,a hierarchical architecture of cloud-edge-end collaboration is designed,incorporating task offloading strategies to balance privacy protection and identification efficiency.Secondly,a privacy-preserving federated learning mechanismbased on Federated Robust Aggregation(FedRA)is proposed,utilizingMedoid aggregation and differential privacy techniques to ensure data privacy and enhance identification accuracy.Finally,an edge offloading strategy based on a dynamic priority scheduling algorithm(DPSA)is designed to alleviate terminal burden and reduce latency.Simulation results demonstrate that the proposed technology significantly improves the accuracy and realtime performance of encrypted DNS traffic identification while protecting privacy,making it suitable for various network environments. 展开更多
关键词 encrypted DNS edge computing federated learning real-time detection privacy protection
在线阅读 下载PDF
IoT Services:Realizing Private Real-Time Detection via Authenticated Conjunctive Searchable Encryption 被引量:2
5
作者 Chungen Xu Lin Mei +2 位作者 Jinxue Cheng Yu Zhao Cong Zuo 《Journal of Cyber Security》 2021年第1期55-67,共13页
With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large ... With the rapid development of wireless communication technology,the Internet of Things is playing an increasingly important role in our everyday.The amount of data generated by sensor devices is increasing as a large number of connectable devices are deployed in many fields,including the medical,agricultural,and industrial areas.Uploading data to the cloud solves the problem of data overhead but results in privacy issues.Therefore,the question of how to manage the privacy of uploading data and make it available to be interconnected between devices is a crucial issue.In this paper,we propose a scheme that supports real-time authentication with conjunctive keyword detection(RA-CKD),this scheme can realize the interconnection of encrypted data between devices while ensuring some measure of privacy for both encrypted data and detection tokens.Through authentication technology,connected devices can both authenticate each other’s identity and prevent malicious adversaries from interfering with device interconnection.Finally,we prove that our scheme can resist inside keyword guessing attack through rigorous security reduction.The experiment shows that the efficiency of RA-CKD is good enough to be practical. 展开更多
关键词 Searchable encryption conjunctive keyword search Internet of Things AUTHENTICATION
暂未订购
奶牛乳房炎病原体三重Real-time PCR检测方法的建立及应用
6
作者 郭思宇 高雅欣 +5 位作者 纪佳豪 李梓豪 刘文扬 徐博 王三毛 李睿文 《动物医学进展》 北大核心 2025年第12期39-44,共6页
为了建立同时检测奶牛临床型乳房炎中肺炎克雷伯菌(Kp)、产色葡萄球菌(Sc)和牛支原体(Mb),基于Kp ZKIR基因、Sc sodA基因和Mb opp D/F基因设计特异性引物,建立三重实时定量荧光PCR方法(real-time PCR)。试验采用在单一real-time PCR检... 为了建立同时检测奶牛临床型乳房炎中肺炎克雷伯菌(Kp)、产色葡萄球菌(Sc)和牛支原体(Mb),基于Kp ZKIR基因、Sc sodA基因和Mb opp D/F基因设计特异性引物,建立三重实时定量荧光PCR方法(real-time PCR)。试验采用在单一real-time PCR检测方法的基础上对三重real-time PCR检测方法进行优化,并确定退火条件为60℃,肺炎克雷伯菌、产色葡萄球菌以及牛支原体上、下游引物浓度为20μmol/L、荧光探针浓度为10μmol/L。结果表明,该方法对标准品pUC57-ZKIR-Kp、pUC57-sodA-Sc、pUC57-opp D/F-Mb最低检测限分别为1.55×10^(2) copies/μL、1.44×10^(2) copies/μL、1.34×10^(2) copies/μL,灵敏度高;仅对Kp、Sc、Mb这3种病原产生荧光曲线,对其他病原无交叉反应,特异性强;其中组内、组间变异系数均小于2%,重复性良好。利用建立的多重real-time PCR对233份临床样品进行检测,Kp、Sc、Mb检出率分别为73.09%、21.97%、6.72%,与单一real-time PCR方法检测结果一致。说明建立的多重real-time PCR在实际应用中具有灵敏度高、特异性强、重复性良好、检测速度快等优点,可为奶牛临床型乳房炎病原的快速检测、临床诊断和流行病学调查提供有效检测手段。 展开更多
关键词 临床型乳房炎 三重real-time PCR 肺炎克雷伯菌 产色葡萄球菌 牛支原体
在线阅读 下载PDF
Medical Image Encryption Based on Fisher-Yates Scrambling and Filter Diffusion 被引量:1
7
作者 HUANG Jiacin GUO Yali +1 位作者 GAO Ruoyun LI Shanshan 《Journal of Shanghai Jiaotong university(Science)》 2025年第1期136-152,共17页
A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,whic... A medical image encryption is proposed based on the Fisher-Yates scrambling,filter diffusion and S-box substitution.First,chaotic sequence associated with the plaintext is generated by logistic-sine-cosine system,which is used for the scrambling,substitution and diffusion processes.The three-dimensional Fisher-Yates scrambling,S-box substitution and diffusion are employed for the first round of encryption.The chaotic sequence is adopted for secondary encryption to scramble the ciphertext obtained in the first round.Then,three-dimensional filter is applied to diffusion for further useful information hiding.The key to the algorithm is generated by the combination of hash value of plaintext image and the input parameters.It improves resisting ability of plaintext attacks.The security analysis shows that the algorithm is effective and efficient.It can resist common attacks.In addition,the good diffusion effect shows that the scheme can solve the differential attacks encountered in the transmission of medical images and has positive implications for future research. 展开更多
关键词 medical image encryption Fisher-Yates scrambling three-dimensional filter diffusion bidirectional diffusion S-box substitution
原文传递
Real-time monitoring of disc cutter wear in tunnel boring machines:A sound and vibration sensor-based approach with machine learning technique 被引量:1
8
作者 Mohammad Amir Akhlaghi Raheb Bagherpour Seyed Hadi Hoseinie 《Journal of Rock Mechanics and Geotechnical Engineering》 2025年第3期1700-1722,共23页
Large portions of the tunnel boring machine(TBM)construction cost are attributed to disc cutter consumption,and assessing the disc cutter's wear level can help determine the optimal time to replace the disc cutter... Large portions of the tunnel boring machine(TBM)construction cost are attributed to disc cutter consumption,and assessing the disc cutter's wear level can help determine the optimal time to replace the disc cutter.Therefore,the need to monitor disc cutter wear in real-time has emerged as a technical challenge for TBMs.In this study,real-time disc cutter wear monitoring is developed based on sound and vibration sensors.For this purpose,the microphone and accelerometer were used to record the sound and vibration signals of cutting three different types of rocks with varying abrasions on a laboratory scale.The relationship between disc cutter wear and the sound and vibration signal was determined by comparing the measurements of disc cutter wear with the signal plots for each sample.The features extracted from the signals showed that the sound and vibration signals are impacted by the progression of disc wear during the rock-cutting process.The signal features obtained from the rock-cutting operation were utilized to verify the machine learning techniques.The results showed that the multilayer perceptron(MLP),random subspace-based decision tree(RS-DT),DT,and random forest(RF)methods could predict the wear level of the disc cutter with an accuracy of 0.89,0.951,0.951,and 0.927,respectively.Based on the accuracy of the models and the confusion matrix,it was found that the RS-DT model has the best estimate for predicting the level of disc wear.This research has developed a method that can potentially determine when to replace a tool and assess disc wear in real-time. 展开更多
关键词 TBM disc cutter WEAR SOUND VIBRATION Machine learning real-time wear estimation
在线阅读 下载PDF
Public-Key Function-Private Inner-Product Predicate Encryption from Pairings
9
作者 WAN Ming WANG Geng GU Da-Wu 《密码学报(中英文)》 北大核心 2025年第1期227-246,共20页
This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals noth... This study constructs a function-private inner-product predicate encryption(FP-IPPE)and achieves standard enhanced function privacy.The enhanced function privacy guarantees that a predicate secret key skf reveals nothing about the predicate f,as long as f is drawn from an evasive distribution with sufficient entropy.The proposed scheme extends the group-based public-key function-private predicate encryption(FP-PE)for“small superset predicates”proposed by Bartusek et al.(Asiacrypt 19),to the setting of inner-product predicates.This is the first construction of public-key FP-PE with enhanced function privacy security beyond the equality predicates,which is previously proposed by Boneh et al.(CRYPTO 13).The proposed construction relies on bilinear groups,and the security is proved in the generic bilinear group model. 展开更多
关键词 predicate encryption function privacy inner product generic group model
在线阅读 下载PDF
IoT-Based Real-Time Medical-Related Human Activity Recognition Using Skeletons and Multi-Stage Deep Learning for Healthcare 被引量:1
10
作者 Subrata Kumer Paul Abu Saleh Musa Miah +3 位作者 Rakhi Rani Paul Md.EkramulHamid Jungpil Shin Md Abdur Rahim 《Computers, Materials & Continua》 2025年第8期2513-2530,共18页
The Internet of Things(IoT)and mobile technology have significantly transformed healthcare by enabling real-time monitoring and diagnosis of patients.Recognizing Medical-Related Human Activities(MRHA)is pivotal for he... The Internet of Things(IoT)and mobile technology have significantly transformed healthcare by enabling real-time monitoring and diagnosis of patients.Recognizing Medical-Related Human Activities(MRHA)is pivotal for healthcare systems,particularly for identifying actions critical to patient well-being.However,challenges such as high computational demands,low accuracy,and limited adaptability persist in Human Motion Recognition(HMR).While some studies have integrated HMR with IoT for real-time healthcare applications,limited research has focused on recognizing MRHA as essential for effective patient monitoring.This study proposes a novel HMR method tailored for MRHA detection,leveraging multi-stage deep learning techniques integrated with IoT.The approach employs EfficientNet to extract optimized spatial features from skeleton frame sequences using seven Mobile Inverted Bottleneck Convolutions(MBConv)blocks,followed by Convolutional Long Short Term Memory(ConvLSTM)to capture spatio-temporal patterns.A classification module with global average pooling,a fully connected layer,and a dropout layer generates the final predictions.The model is evaluated on the NTU RGB+D 120 and HMDB51 datasets,focusing on MRHA such as sneezing,falling,walking,sitting,etc.It achieves 94.85%accuracy for cross-subject evaluations and 96.45%for cross-view evaluations on NTU RGB+D 120,along with 89.22%accuracy on HMDB51.Additionally,the system integrates IoT capabilities using a Raspberry Pi and GSM module,delivering real-time alerts via Twilios SMS service to caregivers and patients.This scalable and efficient solution bridges the gap between HMR and IoT,advancing patient monitoring,improving healthcare outcomes,and reducing costs. 展开更多
关键词 real-time human motion recognition(HMR) ENConvLSTM EfficientNet ConvLSTM skeleton data NTU RGB+D 120 dataset MRHA
在线阅读 下载PDF
Improved Resilience of Image Encryption Based on Hybrid TEA and RSA Techniques
11
作者 Muath AlShaikh Ahmed Manea Alkhalifah Sultan Alamri 《Computer Systems Science & Engineering》 2025年第1期353-376,共24页
Data security is crucial for improving the confidentiality,integrity,and authenticity of the image content.Maintaining these security factors poses significant challenges,particularly in healthcare,business,and social... Data security is crucial for improving the confidentiality,integrity,and authenticity of the image content.Maintaining these security factors poses significant challenges,particularly in healthcare,business,and social media sectors,where information security and personal privacy are paramount.The cryptography concept introduces a solution to these challenges.This paper proposes an innovative hybrid image encryption algorithm capable of encrypting several types of images.The technique merges the Tiny Encryption Algorithm(TEA)and Rivest-Shamir-Adleman(RSA)algorithms called(TEA-RSA).The performance of this algorithm is promising in terms of cost and complexity,an encryption time which is below 10ms was recorded.It is implied by correlation coefficient analysis that after encryption there is a notable decrease in pixel correlation,therefore making it effective at disguising pixel relationships via obfuscation.Moreover,our technique achieved the highest Normalized Pixel Cross-Correlation(NPCC),Number of Pixel Change Rate(NPCR)value over 99%consistent,and a Unified Average Changing Intensity(UACI)value which stands at around 33.86 thereby making it insensitive to statistical attacks hence leading to massive alteration of pixel values and intensities.These make clear the resistance of this process to any sort of hacking attempt whatsoever that might want unauthorized access into its domain.It is important to note that the integrity of images is well preserved throughout encryption as well as decryption stages in line with these low decryption times are clear indications.These results collectively indicate that the algorithm is effective in ensuring secure and efficient image encryption while maintaining the overall integrity and quality of the encrypted images.The proposed hybrid approach has been investigated against cryptoanalysis such as Cyphertext-only attacks,Known-plaintext attacks,Chosen-plaintext attacks,and Chosen-ciphertext attacks.Moreover,the proposed approach explains a good achievement against cropping and differential attacks. 展开更多
关键词 Image encryption hybrid encryption SYMMETRIC ASYMMETRIC RSA TEA CRYPTANALYSIS
在线阅读 下载PDF
Real-Time Communication Driver for MPU Accelerometer Using Predictable Non-Blocking I2C Communication
12
作者 Valentin Stangaciu Mihai-Vladimir Ghimpau Adrian-Gabriel Sztanarec 《Computers, Materials & Continua》 2025年第11期3213-3229,共17页
Along with process control,perception represents the main function performed by the Edge Layer of an Internet of Things(IoT)network.Many of these networks implement various applications where the response time does no... Along with process control,perception represents the main function performed by the Edge Layer of an Internet of Things(IoT)network.Many of these networks implement various applications where the response time does not represent an important parameter.However,in critical applications,this parameter represents a crucial aspect.One important sensing device used in IoT designs is the accelerometer.In most applications,the response time of the embedded driver software handling this device is generally not analysed and not taken into account.In this paper,we present the design and implementation of a predictable real-time driver stack for a popular accelerometer and gyroscope device family.We provide clear justifications for why this response time is extremely important for critical applications in the acquisition process of such data.We present extensive measurements and experimental results that demonstrate the predictability of our solution,making it suitable for critical real-time systems. 展开更多
关键词 real-time accelerometer real-time sensing Internet of Things real-time wireless sensor networks predictable time-bounded accelerometer real-time systems
在线阅读 下载PDF
Random Strip Peeling:A novel lightweight image encryption for IoT devices based on colour planes permutation
13
作者 Kenan Ince Cemile Ince Davut Hanbay 《CAAI Transactions on Intelligence Technology》 2025年第2期529-544,共16页
This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevale... This paper introduces a novel lightweight colour image encryption algorithm,specifically designed for resource-constrained environments such as Internet of Things(IoT)devices.As IoT systems become increasingly prevalent,secure and efficient data transmission becomes crucial.The proposed algorithm addresses this need by offering a robust yet resource-efficient solution for image encryption.Traditional image encryption relies on confusion and diffusion steps.These stages are generally implemented linearly,but this work introduces a new RSP(Random Strip Peeling)algorithm for the confusion step,which disrupts linearity in the lightweight category by using two different sequences generated by the 1D Tent Map with varying initial conditions.The diffusion stage then employs an XOR matrix generated by the Logistic Map.Different evaluation metrics,such as entropy analysis,key sensitivity,statistical and differential attacks resistance,and robustness analysis demonstrate the proposed algorithm's lightweight,robust,and efficient.The proposed encryption scheme achieved average metric values of 99.6056 for NPCR,33.4397 for UACI,and 7.9914 for information entropy in the SIPI image dataset.It also exhibits a time complexity of O(2×M×N)for an image of size M×N. 展开更多
关键词 chaotic encryption image scrambling algorithm lightweight image encryption symmetric encryption
在线阅读 下载PDF
Approximate Homomorphic Encryption for MLaaS by CKKS with Operation-Error-Bound
14
作者 Ray-I Chang Chia-Hui Wang +1 位作者 Yen-Ting Chang Lien-Chen Wei 《Computers, Materials & Continua》 2025年第10期503-518,共16页
As data analysis often incurs significant communication and computational costs,these tasks are increasingly outsourced to cloud computing platforms.However,this introduces privacy concerns,as sensitive data must be t... As data analysis often incurs significant communication and computational costs,these tasks are increasingly outsourced to cloud computing platforms.However,this introduces privacy concerns,as sensitive data must be transmitted to and processed by untrusted parties.To address this,fully homomorphic encryption(FHE)has emerged as a promising solution for privacy-preserving Machine-Learning-as-a-Service(MLaaS),enabling computation on encrypted data without revealing the plaintext.Nevertheless,FHE remains computationally expensive.As a result,approximate homomorphic encryption(AHE)schemes,such as CKKS,have attracted attention due to their efficiency.In our previous work,we proposed RP-OKC,a CKKS-based clustering scheme implemented via TenSEAL.However,errors inherent to CKKS operations—termed CKKS-errors—can affect the accuracy of the result after decryption.Since these errors can be mitigated through post-decryption rounding,we propose a data pre-scaling technique to increase the number of significant digits and reduce CKKS-errors.Furthermore,we introduce an Operation-Error-Estimation(OEE)table that quantifies upper-bound error estimates for various CKKS operations.This table enables error-aware decryption correction,ensuring alignment between encrypted and plaintext results.We validate our method on K-means clustering using the Kaggle Customer Segmentation dataset.Experimental results confirm that the proposed scheme enhances the accuracy and reliability of privacy-preserving data analysis in cloud environments. 展开更多
关键词 Privacy protection K-means clustering cloud computing approximate homomorphic encryption fully homomorphic encryption
在线阅读 下载PDF
A Brief Discussion on Data Encryption and Decryption Technology and Its Applications
15
作者 Zhihong Jin 《Journal of Electronic Research and Application》 2025年第2期159-165,共7页
With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role i... With the rapid development of information technology,data security issues have received increasing attention.Data encryption and decryption technology,as a key means of ensuring data security,plays an important role in multiple fields such as communication security,data storage,and data recovery.This article explores the fundamental principles and interrelationships of data encryption and decryption,examines the strengths,weaknesses,and applicability of symmetric,asymmetric,and hybrid encryption algorithms,and introduces key application scenarios for data encryption and decryption technology.It examines the challenges and corresponding countermeasures related to encryption algorithm security,key management,and encryption-decryption performance.Finally,it analyzes the development trends and future prospects of data encryption and decryption technology.This article provides a systematic understanding of data encryption and decryption techniques,which has good reference value for software designers. 展开更多
关键词 Data encryption Data decryption Communication security Data storage encryption Key management
在线阅读 下载PDF
IDCE:Integrated Data Compression and Encryption for Enhanced Security and Efficiency
16
作者 Muhammad Usama Arshad Aziz +2 位作者 Suliman A.Alsuhibany Imtiaz Hassan Farrukh Yuldashev 《Computer Modeling in Engineering & Sciences》 2025年第4期1029-1048,共20页
Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive da... Data compression plays a vital role in datamanagement and information theory by reducing redundancy.However,it lacks built-in security features such as secret keys or password-based access control,leaving sensitive data vulnerable to unauthorized access and misuse.With the exponential growth of digital data,robust security measures are essential.Data encryption,a widely used approach,ensures data confidentiality by making it unreadable and unalterable through secret key control.Despite their individual benefits,both require significant computational resources.Additionally,performing them separately for the same data increases complexity and processing time.Recognizing the need for integrated approaches that balance compression ratios and security levels,this research proposes an integrated data compression and encryption algorithm,named IDCE,for enhanced security and efficiency.Thealgorithmoperates on 128-bit block sizes and a 256-bit secret key length.It combines Huffman coding for compression and a Tent map for encryption.Additionally,an iterative Arnold cat map further enhances cryptographic confusion properties.Experimental analysis validates the effectiveness of the proposed algorithm,showcasing competitive performance in terms of compression ratio,security,and overall efficiency when compared to prior algorithms in the field. 展开更多
关键词 Chaotic maps SECURITY data compression data encryption integrated compression and encryption
在线阅读 下载PDF
Enhancing Post-Quantum Information Security: A Novel Two-Dimensional Chaotic System for Quantum Image Encryption
17
作者 Fatima Asiri Wajdan Al Malwi 《Computer Modeling in Engineering & Sciences》 2025年第5期2053-2077,共25页
Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematica... Ensuring information security in the quantum era is a growing challenge due to advancements in cryptographic attacks and the emergence of quantum computing.To address these concerns,this paper presents the mathematical and computer modeling of a novel two-dimensional(2D)chaotic system for secure key generation in quantum image encryption(QIE).The proposed map employs trigonometric perturbations in conjunction with rational-saturation functions and hence,named as Trigonometric-Rational-Saturation(TRS)map.Through rigorous mathematical analysis and computational simulations,the map is extensively evaluated for bifurcation behaviour,chaotic trajectories,and Lyapunov exponents.The security evaluation validates the map’s non-linearity,unpredictability,and sensitive dependence on initial conditions.In addition,the proposed TRS map has further been tested by integrating it in a QIE scheme.The QIE scheme first quantum-encodes the classic image using the Novel Enhanced Quantum Representation(NEQR)technique,the TRS map is used for the generation of secure diffusion key,which is XOR-ed with the quantum-ready image to obtain the encrypted images.The security evaluation of the QIE scheme demonstrates superior security of the encrypted images in terms of statistical security attacks and also against Differential attacks.The encrypted images exhibit zero correlation and maximum entropy with demonstrating strong resilience due to 99.62%and 33.47%results for Number of Pixels Change Rate(NPCR)and Unified Average Changing Intensity(UACI).The results validate the effectiveness of TRS-based quantum encryption scheme in securing digital images against emerging quantum threats,making it suitable for secure image encryption in IoT and edge-based applications. 展开更多
关键词 Information security chaotic map modeling post-quantum security quantum image encryption chaotic map image encryption
在线阅读 下载PDF
Adaptive Attribute-Based Honey Encryption: A Novel Solution for Cloud Data Security
18
作者 Reshma Siyal Muhammad Asim +4 位作者 Long Jun Mohammed Elaffendi Sundas Iftikhar Rana Alnashwan Samia Allaoua Chelloug 《Computers, Materials & Continua》 2025年第2期2637-2664,共28页
A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built... A basic procedure for transforming readable data into encoded forms is encryption, which ensures security when the right decryption keys are used. Hadoop is susceptible to possible cyber-attacks because it lacks built-in security measures, even though it can effectively handle and store enormous datasets using the Hadoop Distributed File System (HDFS). The increasing number of data breaches emphasizes how urgently creative encryption techniques are needed in cloud-based big data settings. This paper presents Adaptive Attribute-Based Honey Encryption (AABHE), a state-of-the-art technique that combines honey encryption with Ciphertext-Policy Attribute-Based Encryption (CP-ABE) to provide improved data security. Even if intercepted, AABHE makes sure that sensitive data cannot be accessed by unauthorized parties. With a focus on protecting huge files in HDFS, the suggested approach achieves 98% security robustness and 95% encryption efficiency, outperforming other encryption methods including Ciphertext-Policy Attribute-Based Encryption (CP-ABE), Key-Policy Attribute-Based Encryption (KB-ABE), and Advanced Encryption Standard combined with Attribute-Based Encryption (AES+ABE). By fixing Hadoop’s security flaws, AABHE fortifies its protections against data breaches and enhances Hadoop’s dependability as a platform for processing and storing massive amounts of data. 展开更多
关键词 CYBERSECURITY data security cloud storage hadoop encryption and decryption privacy protection attribute-based honey encryption
在线阅读 下载PDF
Reconfigurable origami chiral response for holographic imaging and information encryption
19
作者 Zhibiao Zhu Yongfeng Li +4 位作者 Jiafu Wang Ze Qin Lixin Jiang Yang Chen Shaobo Qu 《Opto-Electronic Science》 2025年第4期1-11,共11页
With the rapid development of holographic technology,metasurface-based holographic communication schemes have demonstrated immense potential for electromagnetic(EM)multifunctionality.However,traditional passive metasu... With the rapid development of holographic technology,metasurface-based holographic communication schemes have demonstrated immense potential for electromagnetic(EM)multifunctionality.However,traditional passive metasurfaces are severely limited by their lack of reconfigurability,hindering the realization of versatile holographic applications.Origami,an art form that mechanically induces spatial deformations,serves as a platform for multifunctional devices and has garnered significant attention in optics,physics,and materials science.The Miura-ori folding paradigm,characterized by its continuous reconfigurability in folded states,remains unexplored in the context of holographic imaging.Herein,we integrate the principles of Rosenfeld with L-and D-metal chiral enantiomers on a Miura-ori surface to tailor the aperture distribution.Leveraging the continuously tunable nature of the Miura-ori's folded states,the chiral response of the metallic structures varies across different folding configurations,enabling distinct EM holographic imaging functionalities.In the planar state,holographic encryption is achieved.Under specific folding conditions and driven by spin circularly polarized(CP)waves at a particular frequency,multiplexed holographic images can be reconstructed on designated focal planes with CP selectivity.Notably,the fabricated origami metasurface exhibits a large negative Poisson ratio,facilitating portability and deployment and offering novel avenues for spin-selective systems,camouflage,and information encryption. 展开更多
关键词 ORIGAMI RECONFIGURABLE chiral response holographic imaging information encryption
在线阅读 下载PDF
Homomorphic Encryption for Machine Learning Applications with CKKS Algorithms:A Survey of Developments and Applications
20
作者 Lingling Wu Xu An Wang +7 位作者 Jiasen Liu Yunxuan Su Zheng Tu Wenhao Liu Haibo Lei Dianhua Tang Yunfei Cao Jianping Zhang 《Computers, Materials & Continua》 2025年第10期89-119,共31页
Due to the rapid advancement of information technology,data has emerged as the core resource driving decision-making and innovation across all industries.As the foundation of artificial intelligence,machine learning(M... Due to the rapid advancement of information technology,data has emerged as the core resource driving decision-making and innovation across all industries.As the foundation of artificial intelligence,machine learning(ML)has expanded its applications into intelligent recommendation systems,autonomous driving,medical diagnosis,and financial risk assessment.However,it relies on massive datasets,which contain sensitive personal information.Consequently,Privacy-Preserving Machine Learning(PPML)has become a critical research direction.To address the challenges of efficiency and accuracy in encrypted data computation within PPML,Homomorphic Encryption(HE)technology is a crucial solution,owing to its capability to facilitate computations on encrypted data.However,the integration of machine learning and homomorphic encryption technologies faces multiple challenges.Against this backdrop,this paper reviews homomorphic encryption technologies,with a focus on the advantages of the Cheon-Kim-Kim-Song(CKKS)algorithm in supporting approximate floating-point computations.This paper reviews the development of three machine learning techniques:K-nearest neighbors(KNN),K-means clustering,and face recognition-in integration with homomorphic encryption.It proposes feasible schemes for typical scenarios,summarizes limitations and future optimization directions.Additionally,it presents a systematic exploration of the integration of homomorphic encryption and machine learning from the essence of the technology,application implementation,performance trade-offs,technological convergence and future pathways to advance technological development. 展开更多
关键词 Homomorphic encryption machine learning CKKS PPML
在线阅读 下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部