期刊文献+
共找到14篇文章
< 1 >
每页显示 20 50 100
A SVM Based Text Steganalysis Algorithm for Spacing Coding 被引量:2
1
作者 YANG Yu 《China Communications》 SCIE CSCD 2014年第A01期108-113,共6页
Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines ... Group distance coding is suitable for secret communication covered by printed documents. However there is no effective method against it. The study found that the hiding method will make group distances of text lines coverage on specified values, and make variances of group distances among N-Window text lines become small. Inspired by the discovery, the research brings out a Support Vector Machine (SVM) based steganalysis algorithm. To avoid the disturbance of large difference among words length from same line, the research only reserves samples whose occurrence-frequencies are ± 10dB of the maximum frequency. The results show that the correct rate of the SVM classifier is higher than 90%. 展开更多
关键词 text steganalysis SVM steganalysis space-coding detecting
在线阅读 下载PDF
Sea Route Monitoring System Using Wireless Sensor Network Based on the Data Compression Algorithm 被引量:1
2
作者 LI Yang ZHANG Zhongshan +3 位作者 HUANGFU Wei CHAI Xiaomeng ZHU Xinpeng ZHU Hongliang 《China Communications》 SCIE CSCD 2014年第A01期179-186,共8页
The wireless sensor network (WSN) plays an important role in monitoring the environment near the harbor in order to make the ships nearby out of dangers and to optimize the utilization of limited sea routes. Based o... The wireless sensor network (WSN) plays an important role in monitoring the environment near the harbor in order to make the ships nearby out of dangers and to optimize the utilization of limited sea routes. Based on the historical data collected by the buoys with sensing capacities, a novel data compression algorithm called adaptive time piecewise constant vector quantization (ATPCVQ) is proposed to utilize the principal components. The proposed system is capable of lowering the budget of wireless communication and enhancing the lifetime of sensor nodes subject to the constrain of data precision. Furthermore, the proposed algorithm is verified by using the practical data in Qinhuangdao Port of China. 展开更多
关键词 wireless sensor network sea route monitoring data compression principal component analysis
在线阅读 下载PDF
A Hybrid Approach for Selection in Service Community 被引量:1
3
作者 TANG Chaogang 《China Communications》 SCIE CSCD 2014年第A01期114-120,共7页
Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organizati... Although there have been existing competitions among web service (WS) providers, they still have opportunities to cooperate together for common profits. WS community as a mean to provide an ontological organization of WSs that share the same domain of interest has realized this kind of fancy in the sense that providers can work together to compete against others outside the community. Service selection in WS community is different from the traditional service selection, since WS community should take into account its own benefits. Therefore, we propose a hybrid approach to make service selection in WS community. The approach considers the profits of both WS community and the services within it. The experimental evaluation shows that the approach has a great advantage over other approach without consideration of community's benefits. 展开更多
关键词 COMMUNITY service selection PROFITS dominating TOP-K
在线阅读 下载PDF
GRADIENT ENERGY DETECTION OF LSB STEGANOGRAPHY 被引量:1
4
作者 LiZhi SuiAifen +1 位作者 NiuXinxin YangYixian 《Journal of Electronics(China)》 2005年第1期47-52,共6页
The spatial Least Significant Bit (LSB) steganography results in the alteration of the smooth characteristics between adjoining pixels of the raw image. The relation between the length of embedded message and the grad... The spatial Least Significant Bit (LSB) steganography results in the alteration of the smooth characteristics between adjoining pixels of the raw image. The relation between the length of embedded message and the gradient energy is theoretically analyzed, and then a steganalysis and detection method, named Gradient Energy-Flipping Rate (GEFR) detection is proposed. Based on the analysis of the variation of the gradient energy, which results from the LSB steganography in color and grayscale image, the secret message embedded in the target image is detected, and the length of the embedded message is estimated. The method is proved effective and accurate by simulation (detection rate reaches O.Olbit per pixel). 展开更多
关键词 STEGANOGRAPHY STEGANALYSIS DETECTION Gradient energy
在线阅读 下载PDF
ELLIPTIC CURVE CRYPTOGRAPHY BASED AUTHENTICATED KEY AGREEMENT WITH PRE-SHARED PASSWORD 被引量:1
5
作者 SuiAifen LucasC.K.Hui +1 位作者 YangYixian K.P.Chow 《Journal of Electronics(China)》 2005年第3期268-272,共5页
Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Probl... Based on elliptic curve Diffie-Hellman algorithm, an Elliptic Curve Authenticated Key Agreement (ECAKA) protocol with pre-shared password is proposed. Its security relies on the Elliptic Curve Discrete Logarithm Problem (ECDLP). It provides identity authentication, key validation and perfect forward secrecy, and it can foil man-in-the-middle attacks. 展开更多
关键词 Elliptic Curve Cryptography (ECC) DIFFIE-HELLMAN Simple Authenticated Key Agreement (SAKA)
在线阅读 下载PDF
Securing Patient-Centric Personal Health Records Sharing System in Cloud Computing
6
作者 CHEN Danwei CHEN Linling +3 位作者 FAN Xiaowei HE Liwen PAN Su Hu Ruoxiang 《China Communications》 SCIE CSCD 2014年第A01期121-127,共7页
Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a n... Personal health record (PHR) enables patients to manage their own electronic medical records (EMR) in a centralized way, and it is oRen outsourced to be stored in a third-party server. In this paper we propose a novel secure and scalable system for sharing PHRs. We focus on the multiple data owner scenario, and divide the users in the system into multiple security domains that greatly reduce the key management complexity for owners and users. A high degree of patient privacy is guaranteed by exploiting hierarchical and multi- authority attribute-sets based encryption (HM- ASBE). Our system not only supports compound attributes due to flexible attribute sets combinations, but also achieves fine-grained access control. Our scheme supports efficient on-demand user/attribute revocation and break-glass access under emergency scenarios. 展开更多
关键词 personal health records attribute- based encryption data privacy fine-grained access control
在线阅读 下载PDF
An Energy-saving Algorithm for Wireless Sensor Networks E3ased on Network Coding and Compressed Sensing
7
作者 QIN Tuanfa 《China Communications》 SCIE CSCD 2014年第A01期171-178,共8页
An energy-saving algorithm for wireless sensor networks based on network coding and compressed sensing (CS-NCES) is proposed in this paper. Along with considering the correlations of data spatial and temporal, the a... An energy-saving algorithm for wireless sensor networks based on network coding and compressed sensing (CS-NCES) is proposed in this paper. Along with considering the correlations of data spatial and temporal, the algorithm utilizes the similarities between the encoding matrix of network coding and the measurement matrix of compressed sensing. The source node firstly encodes the data, then compresses the coding data by cot-npressed sensing over finite fields. Compared with the network coding scheme, simulation results show that CS-NCES reduces the energy consumption about 25.30/0-34.50/0 and improves the efficiency of data reconstruction about 1.56%- 5.98%. The proposed algorithm can not only enhance the usability of network coding in wireless sensor networks, but also improve the network performance. 展开更多
关键词 wireless sensor networks network coding compressed sensing deterministic matrix network energy-efficiency.
在线阅读 下载PDF
Stateless Transitive Signature Schemes 被引量:1
8
作者 MAChun-guang CAIMan-chun YANGYi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2004年第4期43-47,共5页
A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes b... A new practical method is introduced to transform the stateful transitive signature scheme to stateless one with-out the loss of security.According to the approach,two concrete stateless transitive signature schemes based on Factoringand RSA are presented respectively.Under the assumption of the hardness of factoring and one-more-RSA-inversion prob-lem,both two schemes are secure under the adaptive chosen-message attacks in random oracle model. 展开更多
关键词 stateless signature transitive signature scheme one-more-RSA-inversion random oracle model
原文传递
A Solution of Secure Communication in the Current and Future Mobile Network 被引量:1
9
作者 LIDong YANGYi-xian +1 位作者 NIUXin-xin CHOUHsi-tseng 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2005年第1期1-4,共4页
To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile ... To secure wireless communication, this paper provides a solution based on theabilities of the current mobile terminals. This paper also proposes a mechanism that can secure thecommunication between the current mobile terminals and the Internet Web Server. Yield to thecapabilities of the current mobile terminals, the public key techniques cannot be used now. But inthe future, the memory space and the computation ability of the mobile terminals will no longer beany puzzles, so certificate and Public Key Infrastructure (PKI) can be used to make wirelesscommunication security. This paper also proposes PKI architecture in the future mobile network.Finally this paper makes an assumption of the network's development and its secure issues. 展开更多
关键词 PKI mobile network secret key public key
原文传递
Combining Digital Watermarks with Two-Color Bitmap Image
10
作者 SAADAAmer YANGYi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期31-35,共5页
A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the waterm... A technology for combining digital watermarks with two-color bitmap image based on the threshold watermarking method is presented. Our technology doesn't add any thing to the digital media, but combines the watermarks in two-color bitmap image by looking for some characteristic values in the bitmap and uses the relationship between the watermarks and the characteristic values to prove the copyright protection. The choice of the characteristic values depends on the choice of a cryptographic key known by the owner of the bitmap. The benefit of using a cryptographic key is to combine the watermarks with the bitmap in a high secure way. 展开更多
关键词 digital watermarks information hiding copyright protection
原文传递
Modified Harn Authentication Key Exchange Scheme
11
作者 LIZi-chen LIZhong-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第1期75-77,共3页
Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out at first that there is a weakness in Harn's system and then we propose two modified schemes ... Recently, Harn proposed one digital signature scheme for Diffie-Hellman key exchange system. In this paper, we point out at first that there is a weakness in Harn's system and then we propose two modified schemes to avoid this weakness. 展开更多
关键词 Digital signature Key exchange CRYPTOGRAPHY
原文传递
On the Structure of 0/1 Balance Knapsack Module 2~N
12
作者 ZHANGChun-qi YANGYi-xian YOULin 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2003年第1期34-38,共5页
In this paper, we prove that the 0/1 balance knapsack module 2~N isequivalent to the standard balance knapsack with its weight matrix being the upper triangle matrix,its number equals to 2^(N(N-1)/2)N(! ), and the ith... In this paper, we prove that the 0/1 balance knapsack module 2~N isequivalent to the standard balance knapsack with its weight matrix being the upper triangle matrix,its number equals to 2^(N(N-1)/2)N(! ), and the ith component' s nolinear complexity of the outputsequence being i. 展开更多
关键词 KNAPSACK COMPLEXITY STRUCTURE
原文传递
Optimal Design of FIR Digital Filter Using Genetic Algorithm
13
作者 MaXiaomin YangYixian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 1998年第1期12-16,共5页
A modified genetic algorithm is presented with its characteristics and principle. Finite Impulse Response (FIR) filter is designed by using the genetic algorithm. The advantages and potentials of the proposed ways are... A modified genetic algorithm is presented with its characteristics and principle. Finite Impulse Response (FIR) filter is designed by using the genetic algorithm. The advantages and potentials of the proposed ways are demonstrated by simulation results. 展开更多
关键词 genetic algorithm FIR filter
原文传递
Single-Term Unlinkable Electronic Cash Based on Bit Commitment
14
作者 ZHONGMing YANGYi-xian 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2000年第4期77-80,共4页
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部