Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines ...Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%.展开更多
The wireless sensor network (WSN) plays an important role in monitoring the environment near the harbor in order to make the ships nearby out of dangers and to optimize the utilization of limited sea routes. Based o...The wireless sensor network (WSN) plays an important role in monitoring the environment near the harbor in order to make the ships nearby out of dangers and to optimize the utilization of limited sea routes. Based on the historical data collected by the buoys with sensing capacities, a novel data compression algorithm called adaptive time piecewise constant vector quantization (ATPCVQ) is proposed to utilize the principal components. The proposed system is capable of lowering the budget of wireless communication and enhancing the lifetime of sensor nodes subject to the constrain of data precision. Furthermore, the proposed algorithm is verified by using the practical data in Qinhuangdao Port of China.展开更多
Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organizati...Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organization of WSs that share the same domain of interest has realized this kind of fancy in the sense that providers can work together to compete against others outside the community. Service selection in WS community is different from the traditional service selection, since WS community should take into account its own benefits. Therefore, we propose a hybrid approach to make service selection in WS community. The approach considers the profits of both WS community and the services within it. The experimental evaluation shows that the approach has a great advantage over other approach without consideration of community's benefits.展开更多
The spatial Least Significant Bit (LSB) steganography results in the alteration of the smooth characteristics between adjoining pixels of the raw image. The relation between the length of embedded message and the grad...The spatial Least Significant Bit (LSB) steganography results in the alteration of the smooth characteristics between adjoining pixels of the raw image. The relation between the length of embedded message and the gradient energy is theoretically analyzed, and then a steganalysis and detection method, named Gradient Energy-Flipping Rate (GEFR) detection is proposed. Based on the analysis of the variation of the gradient energy, which results from the LSB steganography in color and grayscale image, the secret message embedded in the target image is detected, and the length of the embedded message is estimated. The method is proved effective and accurate by simulation (detection rate reaches O.Olbit per pixel).展开更多
Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Probl...Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It provides identity authentication, key validation and perfect forward secrecy, and it can foil man-in-the-middle attacks.展开更多
Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a n...Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus on the multiple data owner scenario, and divide the users in the system into multiple security domains that greatly reduce the key management complexity for owners and users. A high degree of patient privacy is guaranteed by exploiting hierarchical and multi- authority attribute-sets based encryption (HM- ASBE). Our system not only supports compound attributes due to flexible attribute sets combinations, but also achieves fine-grained access control. Our scheme supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.展开更多
An energy-saving algorithm for wireless sensor networks based on network coding and compressed sensing (CS-NCES) is proposed in this paper. Along with considering the correlations of data spatial and temporal, the a...An energy-saving algorithm for wireless sensor networks based on network coding and compressed sensing (CS-NCES) is proposed in this paper. Along with considering the correlations of data spatial and temporal, the algorithm utilizes the similarities between the encoding matrix of network coding and the measurement matrix of compressed sensing. The source node firstly encodes the data, then compresses the coding data by cot-npressed sensing over finite fields. Compared with the network coding scheme, simulation results show that CS-NCES reduces the energy consumption about 25.30/0-34.50/0 and improves the efficiency of data reconstruction about 1.56%- 5.98%. The proposed algorithm can not only enhance the usability of network coding in wireless sensor networks, but also improve the network performance.展开更多
A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes b...A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes based on Factoringand RSA are presented respectively.Under the assumption of the hardness of factoring and one-more-RSA-inversion prob-lem,both two schemes are secure under the adaptive chosen-message attacks in random oracle model.展开更多
To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile ...To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile terminals and the Internet Web Server. Yield to thecapabilities of the current mobile terminals, the public key techniques cannot be used now. But inthe future, the memory space and the computation ability of the mobile terminals will no longer beany puzzles, so certificate and Public Key Infrastructure (PKI) can be used to make wirelesscommunication security. This paper also proposes PKI architecture in the future mobile network.Finally this paper makes an assumption of the network's development and its secure issues.展开更多
A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the waterm...A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the watermarks in two-color bitmap image by looking for some characteristic values in the bitmap and uses the relationship between the watermarks and the characteristic values to prove the copyright protection. The choice of the characteristic values depends on the choice of a cryptographic key known by the owner of the bitmap. The benefit of using a cryptographic key is to combine the watermarks with the bitmap in a high secure way.展开更多
Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out at first that there is a weakness in Harn's system and then we propose two modified schemes ...Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out at first that there is a weakness in Harn's system and then we propose two modified schemes to avoid this weakness.展开更多
In this paper, we prove that the 0/1 balance knapsack module 2~N isequivalent to the standard balance knapsack with its weight matrix being the upper triangle matrix,its number equals to 2^(N(N-1)/2)N(! ), and the ith...In this paper, we prove that the 0/1 balance knapsack module 2~N isequivalent to the standard balance knapsack with its weight matrix being the upper triangle matrix,its number equals to 2^(N(N-1)/2)N(! ), and the ith component' s nolinear complexity of the outputsequence being i.展开更多
A modified genetic algorithm is presented with its characteristics and principle. Finite Impulse Response (FIR) filter is designed by using the genetic algorithm. The advantages and potentials of the proposed ways are...A modified genetic algorithm is presented with its characteristics and principle. Finite Impulse Response (FIR) filter is designed by using the genetic algorithm. The advantages and potentials of the proposed ways are demonstrated by simulation results.展开更多
基金the National Natural Science Foundation of China under Grant No.61170269,No.61170272,No.61202082,No.61003285,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308,No.BUPT2013RC0311
文摘Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%.
基金key project of the National Natural Science Foundation of China,Information Acquirement and Publish System of Shipping Lane in Harbor,the fund of Beijing Science and Technology Commission Network Monitoring and Application Demonstration in Food Security,the Program for New Century Excellent Talents in University,National Natural Science Foundation of ChinaProject,Fundamental Research Funds for the Central Universities
文摘The wireless sensor network (WSN) plays an important role in monitoring the environment near the harbor in order to make the ships nearby out of dangers and to optimize the utilization of limited sea routes. Based on the historical data collected by the buoys with sensing capacities, a novel data compression algorithm called adaptive time piecewise constant vector quantization (ATPCVQ) is proposed to utilize the principal components. The proposed system is capable of lowering the budget of wireless communication and enhancing the lifetime of sensor nodes subject to the constrain of data precision. Furthermore, the proposed algorithm is verified by using the practical data in Qinhuangdao Port of China.
文摘Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organization of WSs that share the same domain of interest has realized this kind of fancy in the sense that providers can work together to compete against others outside the community. Service selection in WS community is different from the traditional service selection, since WS community should take into account its own benefits. Therefore, we propose a hybrid approach to make service selection in WS community. The approach considers the profits of both WS community and the services within it. The experimental evaluation shows that the approach has a great advantage over other approach without consideration of community's benefits.
文摘The spatial Least Significant Bit (LSB) steganography results in the alteration of the smooth characteristics between adjoining pixels of the raw image. The relation between the length of embedded message and the gradient energy is theoretically analyzed, and then a steganalysis and detection method, named Gradient Energy-Flipping Rate (GEFR) detection is proposed. Based on the analysis of the variation of the gradient energy, which results from the LSB steganography in color and grayscale image, the secret message embedded in the target image is detected, and the length of the embedded message is estimated. The method is proved effective and accurate by simulation (detection rate reaches O.Olbit per pixel).
基金Supported by "973" Program of China (No.G1999035805), "863" Program of China(No.2002AA143041), and RGC Project (No.HKU/7144/03E) of the Hong Kong SpecialAdministrative Region, China.
文摘Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It provides identity authentication, key validation and perfect forward secrecy, and it can foil man-in-the-middle attacks.
基金the National Natural Science Foundation of China under contract NO 61271235 and No.60973146,and the Fundamental Research Funds for the Central Universities under Grant No.BUPT2013RC0308
文摘Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus on the multiple data owner scenario, and divide the users in the system into multiple security domains that greatly reduce the key management complexity for owners and users. A high degree of patient privacy is guaranteed by exploiting hierarchical and multi- authority attribute-sets based encryption (HM- ASBE). Our system not only supports compound attributes due to flexible attribute sets combinations, but also achieves fine-grained access control. Our scheme supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios.
文摘An energy-saving algorithm for wireless sensor networks based on network coding and compressed sensing (CS-NCES) is proposed in this paper. Along with considering the correlations of data spatial and temporal, the algorithm utilizes the similarities between the encoding matrix of network coding and the measurement matrix of compressed sensing. The source node firstly encodes the data, then compresses the coding data by cot-npressed sensing over finite fields. Compared with the network coding scheme, simulation results show that CS-NCES reduces the energy consumption about 25.30/0-34.50/0 and improves the efficiency of data reconstruction about 1.56%- 5.98%. The proposed algorithm can not only enhance the usability of network coding in wireless sensor networks, but also improve the network performance.
文摘A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes based on Factoringand RSA are presented respectively.Under the assumption of the hardness of factoring and one-more-RSA-inversion prob-lem,both two schemes are secure under the adaptive chosen-message attacks in random oracle model.
基金This work is supported by National Science Foundation of China (No.60372094).
文摘To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile terminals and the Internet Web Server. Yield to thecapabilities of the current mobile terminals, the public key techniques cannot be used now. But inthe future, the memory space and the computation ability of the mobile terminals will no longer beany puzzles, so certificate and Public Key Infrastructure (PKI) can be used to make wirelesscommunication security. This paper also proposes PKI architecture in the future mobile network.Finally this paper makes an assumption of the network's development and its secure issues.
基金This project supported by the National Natural Science Foundation (No. 69802002,69882002, 69772035) and the National Project " 8
文摘A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the watermarks in two-color bitmap image by looking for some characteristic values in the bitmap and uses the relationship between the watermarks and the characteristic values to prove the copyright protection. The choice of the characteristic values depends on the choice of a cryptographic key known by the owner of the bitmap. The benefit of using a cryptographic key is to combine the watermarks with the bitmap in a high secure way.
基金This Project is supported by NSFC for Outstanding Young Scientists (No. 69425001) and National Project "973" (No.1999035805).
文摘Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out at first that there is a weakness in Harn's system and then we propose two modified schemes to avoid this weakness.
文摘In this paper, we prove that the 0/1 balance knapsack module 2~N isequivalent to the standard balance knapsack with its weight matrix being the upper triangle matrix,its number equals to 2^(N(N-1)/2)N(! ), and the ith component' s nolinear complexity of the outputsequence being i.
文摘A modified genetic algorithm is presented with its characteristics and principle. Finite Impulse Response (FIR) filter is designed by using the genetic algorithm. The advantages and potentials of the proposed ways are demonstrated by simulation results.