首页 > 最新文献

2007 International Conference on Computational Intelligence and Security (CIS 2007)最新文献

英文 中文
Spectral Correspondence Using Local Similarity Analysis 基于局部相似度分析的光谱对应
Jun Tang, Dong Liang, Nian Wang, Zhaohong Jia
This paper presents a novel algorithm for point correspondences using graph spectral analysis. Firstly, the correspondence probabilities are computed by using the eigenvectors and eigenvalues of the proximity matrix as well as the method of alternated row and column normalizations. Secondly, local similarity evaluated by shape context is incorporated into our spectral method to refine the results of spectral correspondence via a probabilistic relaxation approach. Experiments on both real-world and synthetic data show that our method possesses comparatively high accuracy.
本文提出了一种基于图谱分析的点对应算法。首先,利用接近矩阵的特征向量和特征值以及行、列交替归一化方法计算对应概率;其次,将基于形状上下文的局部相似度评估方法引入到谱方法中,通过概率松弛方法改进谱对应结果。在实际数据和合成数据上的实验表明,该方法具有较高的精度。
{"title":"Spectral Correspondence Using Local Similarity Analysis","authors":"Jun Tang, Dong Liang, Nian Wang, Zhaohong Jia","doi":"10.1109/CIS.2007.74","DOIUrl":"https://doi.org/10.1109/CIS.2007.74","url":null,"abstract":"This paper presents a novel algorithm for point correspondences using graph spectral analysis. Firstly, the correspondence probabilities are computed by using the eigenvectors and eigenvalues of the proximity matrix as well as the method of alternated row and column normalizations. Secondly, local similarity evaluated by shape context is incorporated into our spectral method to refine the results of spectral correspondence via a probabilistic relaxation approach. Experiments on both real-world and synthetic data show that our method possesses comparatively high accuracy.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"44 16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133626455","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
An Adaptive Join Strategy in Distributed Data Stream Management System 分布式数据流管理系统中的自适应连接策略
Xiaojing Li, Yu Gu, D. Yue, Ge Yu
As data stream springs up in various areas, distributed data stream management systems are being paid more and more attention. In DSMS, join is one of the most common but complicated operators, and the efficiency of continuous queries may be influenced by join directly. This paper mainly studies the join operation over data stream located on two different sites in WAN. Firstly, data model, query model and cost model are defined, and then a simple direct-join strategy and a semi-join strategy are proposed, which are respectively ideal under certain conditions but can't adapt to the variation of data stream. Finally, based on the analysis of the two strategies, an optimized adaptive join strategy is presented. The efficiency and flexibility of our strategy is proved by extensive experiments. Key words: distributed data stream management, continuous query, adaptive join.
随着数据流在各个领域的兴起,分布式数据流管理系统越来越受到人们的重视。在DSMS中,连接是最常见但也是最复杂的操作之一,连接可能直接影响连续查询的效率。本文主要研究了广域网中位于两个不同站点的数据流的联接操作。首先定义了数据模型、查询模型和成本模型,然后提出了简单的直接连接策略和半连接策略,这两种策略在一定条件下是理想的,但不能适应数据流的变化。最后,在分析两种策略的基础上,提出了一种优化的自适应连接策略。大量的实验证明了该策略的有效性和灵活性。关键词:分布式数据流管理,连续查询,自适应联接。
{"title":"An Adaptive Join Strategy in Distributed Data Stream Management System","authors":"Xiaojing Li, Yu Gu, D. Yue, Ge Yu","doi":"10.1109/CIS.2007.55","DOIUrl":"https://doi.org/10.1109/CIS.2007.55","url":null,"abstract":"As data stream springs up in various areas, distributed data stream management systems are being paid more and more attention. In DSMS, join is one of the most common but complicated operators, and the efficiency of continuous queries may be influenced by join directly. This paper mainly studies the join operation over data stream located on two different sites in WAN. Firstly, data model, query model and cost model are defined, and then a simple direct-join strategy and a semi-join strategy are proposed, which are respectively ideal under certain conditions but can't adapt to the variation of data stream. Finally, based on the analysis of the two strategies, an optimized adaptive join strategy is presented. The efficiency and flexibility of our strategy is proved by extensive experiments. Key words: distributed data stream management, continuous query, adaptive join.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132064633","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Generalized Synchronization Theorem for Non-Autonomous Differential Equation with Application in Encryption Scheme 非自治微分方程的广义同步定理及其在加密方案中的应用
Ting Liu, Ye Ji, Lequan Min, Geng Zhao, Xiaohong Qin
This paper introduces a constructive theorem for design- ing a non-autonomous driven system, which can achieve generalized chaos synchronization (GCS) to a driving sys- tem. As a first application, a encryption scheme is established based on GCS non-autonomous systems. This scheme has the functions of the datum authentication and one-time-pad. As a second application, the non-autonomous Driven van der Pol oscillator is selected as a driving system. A invertible transform H is introduced to design a driven sys- tem such that the two systems are in GS with respect to H. Based on the GCS systems and the scheme one can en- crypt and decrypt original information without any loss. The analysis of the key space and sensitivity of key param- eters show that this scheme has sound security. The key space of the scheme is larger that 2148. It can be expected that our theorem provides a new tool for studying and understanding the GS phenomena and the scheme offers a new method for information encryption.
本文介绍了一个设计非自主驱动系统的构造定理,该定理可以实现对驱动系统的广义混沌同步。作为第一个应用,建立了基于GCS非自治系统的加密方案。该方案具有基准认证和一次性录入功能。作为第二种应用,选择非自主驱动范德堡尔振荡器作为驱动系统。引入可逆变换H来设计一个驱动系统,使两个系统相对于H处于GS状态。基于GCS系统和该方案,可以对原始信息进行无损失的加密和解密。对密钥空间和密钥参数灵敏度的分析表明,该方案具有良好的安全性。该方案的键空间大于2148。可以预期,我们的定理为研究和理解GS现象提供了新的工具,该方案为信息加密提供了一种新的方法。
{"title":"Generalized Synchronization Theorem for Non-Autonomous Differential Equation with Application in Encryption Scheme","authors":"Ting Liu, Ye Ji, Lequan Min, Geng Zhao, Xiaohong Qin","doi":"10.1109/CIS.2007.170","DOIUrl":"https://doi.org/10.1109/CIS.2007.170","url":null,"abstract":"This paper introduces a constructive theorem for design- ing a non-autonomous driven system, which can achieve generalized chaos synchronization (GCS) to a driving sys- tem. As a first application, a encryption scheme is established based on GCS non-autonomous systems. This scheme has the functions of the datum authentication and one-time-pad. As a second application, the non-autonomous Driven van der Pol oscillator is selected as a driving system. A invertible transform H is introduced to design a driven sys- tem such that the two systems are in GS with respect to H. Based on the GCS systems and the scheme one can en- crypt and decrypt original information without any loss. The analysis of the key space and sensitivity of key param- eters show that this scheme has sound security. The key space of the scheme is larger that 2148. It can be expected that our theorem provides a new tool for studying and understanding the GS phenomena and the scheme offers a new method for information encryption.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114448303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PSO Algorithm Based Online Self-Tuning of PID Controller 基于粒子群算法的PID控制器在线自整定
Xuzhou Li, Fei Yu, You-bo Wang
Proportional-Integral-Derivative (PID) controller is still widely used in control engineering, and tuning of PID is a crucial operation. We utilize particle swarm optimization algorithm to design an online self- tuning framework of PID controller. Our system is simulated in Matlab based on particle swarm optimi- zation algorithm. Experiment focus on several prob- lems application concerned. Our conclusions include that different fitness function can lead to different time response, and application system should initialize range of each particle as small as possible. Moreover, the conclusions also include that we should choose a modest generations for the online system with linearly inertia weight consume less times evolutionary genera- tion, not a larger one. These conclusions can contrib- ute mostly to application system concerning about cal- culation cost. Keywords: PSO, PID controller, Matlab
比例-积分-导数(PID)控制器在控制工程中仍有广泛的应用,其中PID的整定是一个关键的操作。利用粒子群算法设计了PID控制器的在线自整定框架。基于粒子群优化算法,在Matlab中对系统进行了仿真。实验重点研究了应用中涉及的几个问题。我们的结论包括不同的适应度函数会导致不同的时间响应,应用系统应使每个粒子的初始化范围尽可能小。对于线性惯性权重的在线系统,我们应该选择一个适度的代,而不是选择一个更大的代。这些结论对计算成本相关的应用系统有较大的参考价值。关键词:粒子群算法,PID控制器,Matlab
{"title":"PSO Algorithm Based Online Self-Tuning of PID Controller","authors":"Xuzhou Li, Fei Yu, You-bo Wang","doi":"10.1109/CIS.2007.194","DOIUrl":"https://doi.org/10.1109/CIS.2007.194","url":null,"abstract":"Proportional-Integral-Derivative (PID) controller is still widely used in control engineering, and tuning of PID is a crucial operation. We utilize particle swarm optimization algorithm to design an online self- tuning framework of PID controller. Our system is simulated in Matlab based on particle swarm optimi- zation algorithm. Experiment focus on several prob- lems application concerned. Our conclusions include that different fitness function can lead to different time response, and application system should initialize range of each particle as small as possible. Moreover, the conclusions also include that we should choose a modest generations for the online system with linearly inertia weight consume less times evolutionary genera- tion, not a larger one. These conclusions can contrib- ute mostly to application system concerning about cal- culation cost. Keywords: PSO, PID controller, Matlab","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"20 9","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131874054","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 35
Human Body Segmentation in the Presence of Occlusion 遮挡存在下的人体分割
Bi Sheng, Xiaoyan Shen, Qiang Wang
Human body segmentation in complex situation is an important processing stage in video surveillance. The results have great affects on tracking, behavior recognition or object identification. In this paper, we present a method to segment region in which human bodies are overlapping or walking together. The multiple human objects region is segmented using potential function clustering in the vertical projection histograms of the region, the segmented results are verified by analyzing their geometry features. If the results are not consistent with the human geometry feature, it shows that multiple humans are overlapping. A binocular vision algorithm is proposed to segment the region based on distance. The Experimental results prove the algorithm works robustly, adaptively and efficiently.
复杂情况下的人体分割是视频监控中的一个重要处理阶段。结果对跟踪、行为识别或目标识别都有很大的影响。在本文中,我们提出了一种分割人体重叠或一起行走区域的方法。在区域的垂直投影直方图中利用势函数聚类对多人体目标区域进行分割,并通过分析其几何特征对分割结果进行验证。如果结果与人体几何特征不一致,则说明多个人体重叠。提出了一种基于距离的双目视觉区域分割算法。实验结果证明了该算法的鲁棒性、自适应性和有效性。
{"title":"Human Body Segmentation in the Presence of Occlusion","authors":"Bi Sheng, Xiaoyan Shen, Qiang Wang","doi":"10.1109/CIS.2007.149","DOIUrl":"https://doi.org/10.1109/CIS.2007.149","url":null,"abstract":"Human body segmentation in complex situation is an important processing stage in video surveillance. The results have great affects on tracking, behavior recognition or object identification. In this paper, we present a method to segment region in which human bodies are overlapping or walking together. The multiple human objects region is segmented using potential function clustering in the vertical projection histograms of the region, the segmented results are verified by analyzing their geometry features. If the results are not consistent with the human geometry feature, it shows that multiple humans are overlapping. A binocular vision algorithm is proposed to segment the region based on distance. The Experimental results prove the algorithm works robustly, adaptively and efficiently.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128327734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Flexible Subscription Model for Broadcasted Digital Contents 广播数字内容的灵活订阅模式
Franz Kollmann
This paper introduces subscriptions as authorizations to access contents within time periods. For a technical real- ization of the subscriptions, a new key assignment scheme is proposed that supports fine-granular adjustable restrictions on both, contents and validity duration. Its security is based on the reliance of tamper-proof devices and hash functions. Since per subscription only one key pair is required, it is very suitable in practice. Additionally, a concept based on prepaid cards is given that unburdens the server from user authentication and preserves the users' anonymity.
本文介绍了订阅作为在时间段内访问内容的授权。为了在技术上实现订阅,提出了一种新的密钥分配方案,该方案支持对内容和有效期进行细粒度可调限制。它的安全性基于对防篡改设备和哈希函数的依赖。由于每次订阅只需要一个密钥对,因此在实践中非常适合。此外,还提出了基于预付卡的概念,减轻了服务器对用户身份验证的负担,并保持了用户的匿名性。
{"title":"A Flexible Subscription Model for Broadcasted Digital Contents","authors":"Franz Kollmann","doi":"10.1109/CIS.2007.155","DOIUrl":"https://doi.org/10.1109/CIS.2007.155","url":null,"abstract":"This paper introduces subscriptions as authorizations to access contents within time periods. For a technical real- ization of the subscriptions, a new key assignment scheme is proposed that supports fine-granular adjustable restrictions on both, contents and validity duration. Its security is based on the reliance of tamper-proof devices and hash functions. Since per subscription only one key pair is required, it is very suitable in practice. Additionally, a concept based on prepaid cards is given that unburdens the server from user authentication and preserves the users' anonymity.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"117 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116177582","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A New Centralized Group Key Distribution and Revocation in Sensor Network 传感器网络中一种新的集中式组密钥分发与撤销方法
Tegshbayar Gerelbayar, Jong Sou Park
Sensor networks have a wide spectrum of military and civil applications, particularly with respect to security and secure keys for encryption and authentication. This paper presents a new centralized approach which focuses on the group key distribution with revocation capability for sen- sor networks. We propose a new personal key share dis- tribution. When utilized, this approach proves to be secure against k-number of illegitimate colluding nodes. In con- trast to related approaches, our scheme can overcome the security shortcomings while keeping the small overhead re- quirements per node. It will be shown that our scheme is unconditionally secure and achieves forward secrecy. The analysis is demonstrated in terms of communication and storage overheads.
传感器网络具有广泛的军事和民用应用,特别是在安全性和用于加密和认证的安全密钥方面。本文提出了一种新的集中方法,重点研究了传感器网络中具有撤销能力的组密钥分发。提出了一种新的个人密钥共享分配方案。当使用时,这种方法被证明对k个非法串通节点是安全的。与其他方法相比,我们的方案在保证每个节点的小开销要求的同时,克服了安全缺点。证明了该方案是无条件安全的,并实现了前向保密。从通信和存储开销的角度进行了分析。
{"title":"A New Centralized Group Key Distribution and Revocation in Sensor Network","authors":"Tegshbayar Gerelbayar, Jong Sou Park","doi":"10.1109/CIS.2007.11","DOIUrl":"https://doi.org/10.1109/CIS.2007.11","url":null,"abstract":"Sensor networks have a wide spectrum of military and civil applications, particularly with respect to security and secure keys for encryption and authentication. This paper presents a new centralized approach which focuses on the group key distribution with revocation capability for sen- sor networks. We propose a new personal key share dis- tribution. When utilized, this approach proves to be secure against k-number of illegitimate colluding nodes. In con- trast to related approaches, our scheme can overcome the security shortcomings while keeping the small overhead re- quirements per node. It will be shown that our scheme is unconditionally secure and achieves forward secrecy. The analysis is demonstrated in terms of communication and storage overheads.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"451 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116180391","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Tree Encoding for the Degree-Constrained Spanning Tree Problem 度约束生成树问题的一种新的树编码方法
Gengui Zhou, Z. Meng, Z. Cao, Jian Cao
The degree-constrained minimum spanning tree (dc- MST) problem is of high practical importance. Up to now there are few effective algorithms to solve this problem because of its NP-hard complexity. More recently, a ge- netic algorithm (GA) approach for this problem was tried by using Pr¨ufer number to encode a spanning tree. The Pr¨ufer number is a skillful encoding for tree but not efficient enough to deal with the dc-MST problem. In this paper, a new tree encoding is developed directly based on the de- gree constraint on each vertex and the connectivity among vertices. We denote it as degree-based permutation encod- ing and apply it to the dc-MST problem by using the GA approach. Compared with the numerical results and CPU runtimes between two encodings, the new degree-based per- mutation is effective to deal with the dc-MST problem and even more efficient than the Pr¨ufer number to evolve to the optimal or near-optimal solutions.
度约束最小生成树(dc- MST)问题具有重要的实际意义。由于该问题具有NP-hard的复杂性,目前还没有有效的算法来解决该问题。最近,一种用普氏数编码生成树的遗传算法(GA)方法被用来解决这个问题。普氏数是一种熟练的树编码,但不足以有效地处理dc-MST问题。本文基于顶点的度约束和顶点间的连通性,直接提出了一种新的树编码方法。我们将其表示为基于度的排列编码,并利用遗传算法将其应用于dc-MST问题。与数值结果和两种编码之间的CPU运行时间相比,新的基于度的每突变是有效的处理dc-MST问题,甚至比普氏数更有效地进化到最优或近最优解。
{"title":"A New Tree Encoding for the Degree-Constrained Spanning Tree Problem","authors":"Gengui Zhou, Z. Meng, Z. Cao, Jian Cao","doi":"10.1109/CIS.2007.16","DOIUrl":"https://doi.org/10.1109/CIS.2007.16","url":null,"abstract":"The degree-constrained minimum spanning tree (dc- MST) problem is of high practical importance. Up to now there are few effective algorithms to solve this problem because of its NP-hard complexity. More recently, a ge- netic algorithm (GA) approach for this problem was tried by using Pr¨ufer number to encode a spanning tree. The Pr¨ufer number is a skillful encoding for tree but not efficient enough to deal with the dc-MST problem. In this paper, a new tree encoding is developed directly based on the de- gree constraint on each vertex and the connectivity among vertices. We denote it as degree-based permutation encod- ing and apply it to the dc-MST problem by using the GA approach. Compared with the numerical results and CPU runtimes between two encodings, the new degree-based per- mutation is effective to deal with the dc-MST problem and even more efficient than the Pr¨ufer number to evolve to the optimal or near-optimal solutions.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116607164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
An Improved Key Agreement Protocol Based on Key Association Set for Dynamic Peer Group 一种基于密钥关联集的改进动态对等体组密钥协商协议
Chuyuan Wei, Ying Hao, Cheng Lv, Liping Qian
Secure group communication is a research hotspot. The Tree-based Group Diffie-Hellman Protocol is a fairly good key management scheme for dynamic peer group communications. Through analyzing TGDH protocol, the authors have found out that a deficiency exists with its communication mode. A lot of redundant messages are used to complete group re-keying so that more communication bandwidth will be consumed in TGDH. This paper aims to solve the deficiency and improve TGDH through designing a preparatory algorithm of finding a Key Association Set. A new re-keying protocol is also designed by using the algorithm. Theoretical analysis shows that our protocol effectively decreases the communication and storage overload of TGDH, with the communication bandwidth descending from O (nlogn) to O (n) and the key storage descending from O (n) to O (logn). The simulation result also shows the improved protocol has a better communication performance.
安全群通信是一个研究热点。基于树的组Diffie-Hellman协议是一种较好的动态对等组通信密钥管理方案。通过对TGDH协议的分析,发现其通信模式存在不足。由于使用了大量冗余消息来完成组重键,因此在TGDH中会消耗更多的通信带宽。本文旨在通过设计一种寻找密钥关联集的预备算法来解决这一不足并改进TGDH。利用该算法设计了一种新的重密钥协议。理论分析表明,我们的协议有效地降低了TGDH的通信和存储过载,通信带宽从0 (nlogn)下降到O (n),密钥存储从O (n)下降到O (logn)。仿真结果表明,改进后的协议具有更好的通信性能。
{"title":"An Improved Key Agreement Protocol Based on Key Association Set for Dynamic Peer Group","authors":"Chuyuan Wei, Ying Hao, Cheng Lv, Liping Qian","doi":"10.1109/CIS.2007.175","DOIUrl":"https://doi.org/10.1109/CIS.2007.175","url":null,"abstract":"Secure group communication is a research hotspot. The Tree-based Group Diffie-Hellman Protocol is a fairly good key management scheme for dynamic peer group communications. Through analyzing TGDH protocol, the authors have found out that a deficiency exists with its communication mode. A lot of redundant messages are used to complete group re-keying so that more communication bandwidth will be consumed in TGDH. This paper aims to solve the deficiency and improve TGDH through designing a preparatory algorithm of finding a Key Association Set. A new re-keying protocol is also designed by using the algorithm. Theoretical analysis shows that our protocol effectively decreases the communication and storage overload of TGDH, with the communication bandwidth descending from O (nlogn) to O (n) and the key storage descending from O (n) to O (logn). The simulation result also shows the improved protocol has a better communication performance.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125589102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Analysis on the Sensitivity Attack to Watermarking Schemes with Patchwork Detection Boundaries 基于拼接检测边界的水印方案敏感性攻击分析
Qiyang Zhao, Zhonglin Wang, Baolin Yin
The sensitivity attack is a main threat to the security of watermarking schemes with open detectors. By the attempts across the detection boundary, the attackers gain adequate information of the embedded watermark to remove it with- out introducing serious distortions into the watermarked works. In some image watermarking schemes, the detection boundaries are the patchworks of certain numbers of hyper- planes. Here the existing sensitivity attacks are not suitable anymore for the detection functions have numbers of differ- ent gradients. The letter proposed a new sensitivity attack in which the attacking directions were calculated with a cer- tain number of gradients estimated separately with the old sensitivity attack. Our experiments show the new attack can remove the watermarks successfully without seriously tam- pering the fidelity.
灵敏度攻击是对开放检测器水印方案安全性的主要威胁。通过跨检测边界的尝试,攻击者可以在不给水印作品带来严重失真的情况下,获得嵌入水印的足够信息来去除水印。在一些图像水印方案中,检测边界是由一定数量的超平面拼接而成。由于检测函数的梯度个数不同,现有的灵敏度攻击方法已不再适用。文中提出了一种新的灵敏度攻击方法,该方法利用一定数量的梯度分别与旧的灵敏度攻击方法估计攻击方向。实验结果表明,该方法能够在不严重影响图像保真度的前提下成功地去除水印。
{"title":"Analysis on the Sensitivity Attack to Watermarking Schemes with Patchwork Detection Boundaries","authors":"Qiyang Zhao, Zhonglin Wang, Baolin Yin","doi":"10.1109/CIS.2007.115","DOIUrl":"https://doi.org/10.1109/CIS.2007.115","url":null,"abstract":"The sensitivity attack is a main threat to the security of watermarking schemes with open detectors. By the attempts across the detection boundary, the attackers gain adequate information of the embedded watermark to remove it with- out introducing serious distortions into the watermarked works. In some image watermarking schemes, the detection boundaries are the patchworks of certain numbers of hyper- planes. Here the existing sensitivity attacks are not suitable anymore for the detection functions have numbers of differ- ent gradients. The letter proposed a new sensitivity attack in which the attacking directions were calculated with a cer- tain number of gradients estimated separately with the old sensitivity attack. Our experiments show the new attack can remove the watermarks successfully without seriously tam- pering the fidelity.","PeriodicalId":127238,"journal":{"name":"2007 International Conference on Computational Intelligence and Security (CIS 2007)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2007-12-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131290","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
2007 International Conference on Computational Intelligence and Security (CIS 2007)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1