首页 > 最新文献

2009 Fifth International Conference on Information Assurance and Security最新文献

英文 中文
2-Level-Wavelet-Based License Plate Edge Detection 基于二级小波的车牌边缘检测
Pub Date : 2009-10-09 DOI: 10.1109/IAS.2009.295
Ming-Kan Wu, J. Wei, Hao-Chung Shih, Chian C. Ho
Against well-known vertical Sobel operator adopted by most License Plate Detection (LPD) algorithms, this paper presents a robust and real-time method to enhance both edge density and intensity of license plates under various outdoor environments. The proposed method applies HL subband feature of 2D Discrete Wavelet Transform (DWT) twice to significantly highlight the vertical edges of license plates and suppress the surrounding background noise. Then, license plates can easily be extracted and located by the orthogonal projection histogram analysis with local recursive Otsu segmentation and morphological closing operator. Experimental results show LPD system based on the proposed 2-level 2D Haar DWT is better than that based on conventional vertical Sobel operator or 1-level 2D Haar DWT in terms of the detection rate.
针对车牌检测算法中常用的垂直Sobel算子,提出了一种鲁棒、实时的车牌边缘密度和强度增强方法。该方法利用两次二维离散小波变换(DWT)的HL子带特征,显著突出车牌垂直边缘,抑制周围背景噪声。然后,结合局部递归Otsu分割和形态闭合算子,利用正交投影直方图分析,方便地提取和定位车牌。实验结果表明,基于2级二维Haar DWT的LPD系统在检测率方面优于传统的垂直Sobel算子和1级二维Haar DWT。
{"title":"2-Level-Wavelet-Based License Plate Edge Detection","authors":"Ming-Kan Wu, J. Wei, Hao-Chung Shih, Chian C. Ho","doi":"10.1109/IAS.2009.295","DOIUrl":"https://doi.org/10.1109/IAS.2009.295","url":null,"abstract":"Against well-known vertical Sobel operator adopted by most License Plate Detection (LPD) algorithms, this paper presents a robust and real-time method to enhance both edge density and intensity of license plates under various outdoor environments. The proposed method applies HL subband feature of 2D Discrete Wavelet Transform (DWT) twice to significantly highlight the vertical edges of license plates and suppress the surrounding background noise. Then, license plates can easily be extracted and located by the orthogonal projection histogram analysis with local recursive Otsu segmentation and morphological closing operator. Experimental results show LPD system based on the proposed 2-level 2D Haar DWT is better than that based on conventional vertical Sobel operator or 1-level 2D Haar DWT in terms of the detection rate.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127864870","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 16
E-government Security Management: Key Factors and Countermeasure 电子政务安全管理:关键因素及对策
Pub Date : 2009-10-09 DOI: 10.1109/IAS.2009.146
Jin-fu Wang
Almost all of United Nations member countries now operating government web sites--called e-government. Its implementation is based on information technology which is now as important as tanks, ships, and aircraft in any nation’s defense. So nowadays, with the fast development of information technology, e-government security is considered one of the crucial factors for achieving an advanced stage of e-government. As the number of e-government services introduced to the user increases, a higher level of e-government security is required. This article aims to formulate the key factors for security management. Firstly introduce the concept of e-government and information security, presents a review of ICT management in the public sector, information security management and e-government in recent literature by focusing on issues and trends. The paper then for successful e-government security management analysis the key factors. Put forward a managerial conceptual framework followed. Finally, the corresponding countermeasures for e-government management are proposed.
几乎所有的联合国成员国现在都在运营政府网站——被称为电子政府。它的实施是基于信息技术的,在任何国家的国防中,信息技术与坦克、舰船和飞机一样重要。因此,在信息技术快速发展的今天,电子政务安全被认为是实现电子政务高级阶段的关键因素之一。随着提供给用户的电子政务服务数量的增加,对电子政务的安全性提出了更高的要求。本文旨在阐述安全管理的关键因素。首先介绍了电子政务和信息安全的概念,通过关注问题和趋势,对公共部门信息通信技术管理、信息安全管理和电子政务的最新文献进行了综述。论文接着分析了成功进行电子政务安全管理的关键因素。提出了相应的管理概念框架。最后,提出了相应的电子政务管理对策。
{"title":"E-government Security Management: Key Factors and Countermeasure","authors":"Jin-fu Wang","doi":"10.1109/IAS.2009.146","DOIUrl":"https://doi.org/10.1109/IAS.2009.146","url":null,"abstract":"Almost all of United Nations member countries now operating government web sites--called e-government. Its implementation is based on information technology which is now as important as tanks, ships, and aircraft in any nation’s defense. So nowadays, with the fast development of information technology, e-government security is considered one of the crucial factors for achieving an advanced stage of e-government. As the number of e-government services introduced to the user increases, a higher level of e-government security is required. This article aims to formulate the key factors for security management. Firstly introduce the concept of e-government and information security, presents a review of ICT management in the public sector, information security management and e-government in recent literature by focusing on issues and trends. The paper then for successful e-government security management analysis the key factors. Put forward a managerial conceptual framework followed. Finally, the corresponding countermeasures for e-government management are proposed.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121660259","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising 一种自适应阈值联合多尺度图像去噪算法
Pub Date : 2009-10-09 DOI: 10.1109/IAS.2009.157
Jin He, Yinpei Sun, Ying Luo, Qun Zhang
Curvelet transform is one of the recently developed multiscale transform, which can well deal with the singularity of line and provides optimally sparse representation of images with edges. But now the image denoising based on curvelet transform is almost used the Monte Carlo threshold, it is not used the feature of images’ curvelet coefficients effectively, so the best result can not be reached. Meanwhile, the wavelet transform codes homogeneous areas better than the curvelet transform. In this paper a joint multiscale algorithm with auto-adapted Monte Carlo threshold is proposed. This algorithm is implemented by combining the wavelet transform and the fast discrete curvelet transform, in which the auto-adapted Monte Carlo threshold is used. Experimental results show that this method eliminate white Gaussian noise effectively, improves Peak Signal to Noise Ratio (PSNR) and realizes the balance between protecting image details and wiping off noise better.
曲波变换是近年来发展起来的一种多尺度变换,它可以很好地处理直线的奇异性,并为带有边缘的图像提供最优的稀疏表示。但目前基于曲线变换的图像去噪多采用蒙特卡罗阈值,没有有效地利用图像曲线系数的特征,无法达到最佳效果。同时,小波变换对均匀区域的编码优于曲线变换。本文提出了一种自适应蒙特卡罗阈值联合多尺度算法。该算法采用小波变换和快速离散曲线变换相结合的方法实现,并采用自适应蒙特卡罗阈值。实验结果表明,该方法有效地消除了高斯白噪声,提高了峰值信噪比(PSNR),更好地实现了保护图像细节与去噪之间的平衡。
{"title":"A Joint Multiscale Algorithm with Auto-adapted Threshold for Image Denoising","authors":"Jin He, Yinpei Sun, Ying Luo, Qun Zhang","doi":"10.1109/IAS.2009.157","DOIUrl":"https://doi.org/10.1109/IAS.2009.157","url":null,"abstract":"Curvelet transform is one of the recently developed multiscale transform, which can well deal with the singularity of line and provides optimally sparse representation of images with edges. But now the image denoising based on curvelet transform is almost used the Monte Carlo threshold, it is not used the feature of images’ curvelet coefficients effectively, so the best result can not be reached. Meanwhile, the wavelet transform codes homogeneous areas better than the curvelet transform. In this paper a joint multiscale algorithm with auto-adapted Monte Carlo threshold is proposed. This algorithm is implemented by combining the wavelet transform and the fast discrete curvelet transform, in which the auto-adapted Monte Carlo threshold is used. Experimental results show that this method eliminate white Gaussian noise effectively, improves Peak Signal to Noise Ratio (PSNR) and realizes the balance between protecting image details and wiping off noise better.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121141916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Security Threats and Countermeasures for Intra-vehicle Networks 车载网络的安全威胁与对策
Pub Date : 2009-10-09 DOI: 10.1109/IAS.2009.350
David Wampler, Huirong Fu, Ye Zhu
Controller Area Network (CAN) is the leading serial bus system for embedded control. More than two billion CAN nodes have been sold since the protocol's development in the early 1980s. CAN is a mainstream network and was internationally standardized (ISO 11898–1) in 1993. This paper describes an approach to implementing security services on top of a higher level Controller Area Network (CAN) protocol, in particular, CANopen. Since the CAN network is an open, unsecured network, every node has access to all data on the bus. A system which produces and consumes sensitive data is not well suited for this environment. Therefore, a general-purpose security solution is needed which will allow secure nodes access to the basic security services such as authentication, integrity, and confidentiality.
控制器局域网(CAN)是嵌入式控制的主要串行总线系统。自20世纪80年代初协议开发以来,已经销售了超过20亿个CAN节点。CAN是一个主流网络,在1993年被国际标准化(ISO 11898-1)。本文描述了一种在高级控制器局域网(CAN)协议(特别是CANopen)之上实现安全服务的方法。由于CAN网络是一个开放的、不安全的网络,因此每个节点都可以访问总线上的所有数据。产生和使用敏感数据的系统不太适合这种环境。因此,需要一种通用的安全解决方案,它将允许安全节点访问基本的安全服务,如身份验证、完整性和机密性。
{"title":"Security Threats and Countermeasures for Intra-vehicle Networks","authors":"David Wampler, Huirong Fu, Ye Zhu","doi":"10.1109/IAS.2009.350","DOIUrl":"https://doi.org/10.1109/IAS.2009.350","url":null,"abstract":"Controller Area Network (CAN) is the leading serial bus system for embedded control. More than two billion CAN nodes have been sold since the protocol's development in the early 1980s. CAN is a mainstream network and was internationally standardized (ISO 11898–1) in 1993. This paper describes an approach to implementing security services on top of a higher level Controller Area Network (CAN) protocol, in particular, CANopen. Since the CAN network is an open, unsecured network, every node has access to all data on the bus. A system which produces and consumes sensitive data is not well suited for this environment. Therefore, a general-purpose security solution is needed which will allow secure nodes access to the basic security services such as authentication, integrity, and confidentiality.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126064720","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
Proxy Re-encryption Scheme Based on SK Identity Based Encryption 基于SK身份加密的代理重加密方案
Pub Date : 2009-09-11 DOI: 10.1109/ICCSIT.2009.5234980
Xu An Wang, Xiaoyuan Yang
The concept of proxy re-cryptography comes from the work of Blaze,Bleumer, and Strauss in 1998cite{Blaze:98}. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without relying on trusted parties. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE to CBE, IBE to CBE, CBE to IBE and IBE to IBEcite{Matsuo:07}. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working groupcite{P1363.3:08}. One feature of their schemes is that they are all based on BB1 identity based encryptioncite{BB04a}. We reconsider the problem of constructing proxy re-encryption based onSK identity based encryption. Surprisingly, if we consider the help of PKG, then it is easy to construct proxy re-encryption based on SK identity based encryption. Interestingly , our proxy re-encryption scheme even can achieve CCA2 secure, which makes it is unique.
代理重新加密的概念来自Blaze、Bleumer和Strauss在1998年的工作cite{Blaze:98}。代理重新加密的目标是在不依赖于受信任方的情况下,安全地启用从一个密钥到另一个密钥的密文重新加密。2007年,Matsuo提出了四种代理再加密方案的概念:CBE to CBE、IBE to CBE、CBE to IBE和IBE to IBE cite{Matsuo:07}。目前,ieee 1363.3工作组cite{P1363.3:08}正在对CBE到IBE和IBE到IBE代理再加密方案进行标准化。他们的方案的一个特点是他们都是基于BB1身份加密cite{BB04a}。在基于sk身份的加密基础上,重新考虑了构建代理重加密的问题。令人惊讶的是,如果我们考虑到PKG的帮助,那么基于SK身份的加密很容易构建代理重加密。有趣的是,我们的代理重加密方案甚至可以实现CCA2安全,这使得它具有独特性。
{"title":"Proxy Re-encryption Scheme Based on SK Identity Based Encryption","authors":"Xu An Wang, Xiaoyuan Yang","doi":"10.1109/ICCSIT.2009.5234980","DOIUrl":"https://doi.org/10.1109/ICCSIT.2009.5234980","url":null,"abstract":"The concept of proxy re-cryptography comes from the work of Blaze,Bleumer, and Strauss in 1998cite{Blaze:98}. The goal of proxy re-encryption is to securely enable the re-encryption of ciphertexts from one key to another, without relying on trusted parties. In 2007, Matsuo proposed the concept of four types of proxy re-encryption schemes: CBE to CBE, IBE to CBE, CBE to IBE and IBE to IBEcite{Matsuo:07}. Now CBE to IBE and IBE to IBE proxy re-encryption schemes are being standardized by IEEEP1363.3 working groupcite{P1363.3:08}. One feature of their schemes is that they are all based on BB1 identity based encryptioncite{BB04a}. We reconsider the problem of constructing proxy re-encryption based onSK identity based encryption. Surprisingly, if we consider the help of PKG, then it is easy to construct proxy re-encryption based on SK identity based encryption. Interestingly , our proxy re-encryption scheme even can achieve CCA2 secure, which makes it is unique.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124272831","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm 一种基于重排序DCT系数和SPIHT算法的多重描述编码框架
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.56
Lin-Lin Tang, Zhe-ming Lu, Faxin Yu
A novel MDC algorithm based on Discrete Cosine Transform (DCT) and the Set Partition in Hierarchical Trees (SPIHT) is proposed in this paper. Different from the commonly used DCT algorithm, all the transformed coefficients are reshaped into the wavelet decomposition structure to facilitate the use of the SPIHT algorithm. Then the direction-based information is used to form the three different channels. By using different bit rates to encode the information from three different orientations, i.e., vertical, horizontal and diagonal directions, the redundancy is introduced into the three channels. Every channel contains the hybrid information from three different directions. Experimental results show the advantages of this novel algorithm and the theoretical analysis has also been studied.
提出了一种基于离散余弦变换(DCT)和层次树集分割(SPIHT)的多数据集分割算法。与常用的DCT算法不同的是,所有变换后的系数都被重构成小波分解结构,便于SPIHT算法的使用。然后利用基于方向的信息形成三个不同的通道。通过对垂直、水平和对角三个不同方向的信息采用不同的比特率进行编码,从而在三个信道中引入冗余。每个通道包含来自三个不同方向的混合信息。实验结果表明了该算法的优越性,并进行了理论分析。
{"title":"A Novel Multiple Description Coding Frame Based on Reordered DCT Coefficients and SPIHT Algorithm","authors":"Lin-Lin Tang, Zhe-ming Lu, Faxin Yu","doi":"10.1109/IAS.2009.56","DOIUrl":"https://doi.org/10.1109/IAS.2009.56","url":null,"abstract":"A novel MDC algorithm based on Discrete Cosine Transform (DCT) and the Set Partition in Hierarchical Trees (SPIHT) is proposed in this paper. Different from the commonly used DCT algorithm, all the transformed coefficients are reshaped into the wavelet decomposition structure to facilitate the use of the SPIHT algorithm. Then the direction-based information is used to form the three different channels. By using different bit rates to encode the information from three different orientations, i.e., vertical, horizontal and diagonal directions, the redundancy is introduced into the three channels. Every channel contains the hybrid information from three different directions. Experimental results show the advantages of this novel algorithm and the theoretical analysis has also been studied.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115426470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation 基于脉冲调幅的视频信息伪装处理算法研究
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.308
Y. Qiu, Jin Tian, Liuyu Qian
In this paper, the video information camouflage processing method based on the pulse amplitude modulation was studied aim at the electromagnetic characteristic of computer video information. Camouflage information modulation function was proposed, the matching vision relation between character information and background color was determined, and the image fusion processing algorithm of camouflage modulation information and useful information was confirmed. Finally, the correctness and effectiveness of theoretical analysis was validated through simulation and experiments.
本文针对计算机视频信息的电磁特性,研究了基于脉冲调幅的视频信息伪装处理方法。提出了伪装信息调制函数,确定了人物信息与背景颜色的匹配视觉关系,确定了伪装调制信息与有用信息的图像融合处理算法。最后,通过仿真和实验验证了理论分析的正确性和有效性。
{"title":"Research on Video Information Camouflage Processing Algorithm Based on Pulse Amplitude Modulation","authors":"Y. Qiu, Jin Tian, Liuyu Qian","doi":"10.1109/IAS.2009.308","DOIUrl":"https://doi.org/10.1109/IAS.2009.308","url":null,"abstract":"In this paper, the video information camouflage processing method based on the pulse amplitude modulation was studied aim at the electromagnetic characteristic of computer video information. Camouflage information modulation function was proposed, the matching vision relation between character information and background color was determined, and the image fusion processing algorithm of camouflage modulation information and useful information was confirmed. Finally, the correctness and effectiveness of theoretical analysis was validated through simulation and experiments.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117158098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Deadlock Detection Based on Resource Allocation Graph 基于资源分配图的死锁检测
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.64
Qinqin Ni, Weizhen Sun, Sen Ma
Deadlock occurs randomly and is difficult to detect, it always has a negative impact on the effective execution of operating system. This paper uses the principle of adjacency matrix, path matrix and strongly-connected component of simple directed graph in graph theory, gives a model of detecting deadlock by exploring strongly-connected component from resource allocation graph. The experiment shows that it can detect resources and processes involved in deadlock effectively by this detection method. The paper provides a new idea for the research of operating system algorithms, and a new way for auxiliary teaching and practical engineering.
死锁的发生是随机的,而且很难检测到,它总是对操作系统的有效执行产生负面影响。利用图论中简单有向图的邻接矩阵、路径矩阵和强连通分量的原理,给出了一种从资源分配图中挖掘强连通分量来检测死锁的模型。实验表明,该检测方法可以有效地检测出陷入死锁的资源和进程。本文为操作系统算法的研究提供了新的思路,为辅助教学和工程实践提供了新的途径。
{"title":"Deadlock Detection Based on Resource Allocation Graph","authors":"Qinqin Ni, Weizhen Sun, Sen Ma","doi":"10.1109/IAS.2009.64","DOIUrl":"https://doi.org/10.1109/IAS.2009.64","url":null,"abstract":"Deadlock occurs randomly and is difficult to detect, it always has a negative impact on the effective execution of operating system. This paper uses the principle of adjacency matrix, path matrix and strongly-connected component of simple directed graph in graph theory, gives a model of detecting deadlock by exploring strongly-connected component from resource allocation graph. The experiment shows that it can detect resources and processes involved in deadlock effectively by this detection method. The paper provides a new idea for the research of operating system algorithms, and a new way for auxiliary teaching and practical engineering.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117191529","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A Dynamic Layering Scheme of Multicast Key Management 一种组播密钥管理的动态分层方案
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.344
Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu
Group key management is a difficult task in implementing large and dynamic secure multicast. In this paper, a new scheme is proposed in the basis of in-depth analysis of the requirements of the secure multicast and group key management. The scheme is based on the multicast group security architecture and multicast security group key management architecture proposed by IETF. This scheme constructs group key based on pairings and distributes the group key using HSAH function polynomial, and manages group key making use of the dynamic layering GCKS. The scheme is better in security, lower in computation cost and communication cost. The analysis comparison proves that the scheme has strong scalability and efficiency.
组密钥管理是实现大型动态安全组播的难点。本文在深入分析安全组播和组密钥管理需求的基础上,提出了一种新的方案。该方案基于IETF提出的组播组安全体系结构和组播安全组密钥管理体系结构。该方案基于对构造组密钥,利用HSAH函数多项式对组密钥进行分发,并利用动态分层GCKS对组密钥进行管理。该方案具有较高的安全性、较低的计算成本和通信成本。分析比较表明,该方案具有较强的可扩展性和高效性。
{"title":"A Dynamic Layering Scheme of Multicast Key Management","authors":"Fan Yang, Xiaoping Li, Qingkuan Dong, Yanming Liu","doi":"10.1109/IAS.2009.344","DOIUrl":"https://doi.org/10.1109/IAS.2009.344","url":null,"abstract":"Group key management is a difficult task in implementing large and dynamic secure multicast. In this paper, a new scheme is proposed in the basis of in-depth analysis of the requirements of the secure multicast and group key management. The scheme is based on the multicast group security architecture and multicast security group key management architecture proposed by IETF. This scheme constructs group key based on pairings and distributes the group key using HSAH function polynomial, and manages group key making use of the dynamic layering GCKS. The scheme is better in security, lower in computation cost and communication cost. The analysis comparison proves that the scheme has strong scalability and efficiency.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"56 8","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120809133","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
A High Quality Reversible Data Hiding Method Using Interpolation Technique 基于插值技术的高质量可逆数据隐藏方法
Pub Date : 2009-08-18 DOI: 10.1109/IAS.2009.79
C. Yang, Chun-Hao Hsu
We propose a high quality and imperceptible reversible data hiding method in this paper. We divide the cover image into 5 by 5 blocks with non-overlapping boundaries, shrink them, and generate back to 5 by 5 blocks by interpolation technique. If the absolute value of the difference between the interpolation value and the original gray level is less than a threshold in the middle of the four 3 by 3 overlapping blocks of each 5 by 5 block. We may embed one bit of the secret data in this position. We apply PRNG to shuffle the hidden data before embedding. Simply follow the embedding steps to extract the embedded data where the location is embedded then shuffle back the order to find the hidden data. The experiment results demonstrate our method is quite imperceptible with high quality and can obtain the original cover image after extracting all hidden secret data.
本文提出了一种高质量、不易察觉的可逆数据隐藏方法。我们将覆盖图像分割成边界不重叠的5 × 5块,将其缩小,并通过插值技术生成回5 × 5块。如果插值值与原始灰度值之差的绝对值小于每个5 × 5块的四个3 × 3重叠块中间的一个阈值。我们可以在这个位置嵌入一点秘密数据。我们在嵌入前使用PRNG对隐藏数据进行洗牌。只需按照嵌入步骤提取嵌入位置的嵌入数据,然后将顺序打乱以找到隐藏的数据。实验结果表明,该方法具有较好的隐蔽性和高质量,可以在提取所有隐藏的秘密数据后获得原始的封面图像。
{"title":"A High Quality Reversible Data Hiding Method Using Interpolation Technique","authors":"C. Yang, Chun-Hao Hsu","doi":"10.1109/IAS.2009.79","DOIUrl":"https://doi.org/10.1109/IAS.2009.79","url":null,"abstract":"We propose a high quality and imperceptible reversible data hiding method in this paper. We divide the cover image into 5 by 5 blocks with non-overlapping boundaries, shrink them, and generate back to 5 by 5 blocks by interpolation technique. If the absolute value of the difference between the interpolation value and the original gray level is less than a threshold in the middle of the four 3 by 3 overlapping blocks of each 5 by 5 block. We may embed one bit of the secret data in this position. We apply PRNG to shuffle the hidden data before embedding. Simply follow the embedding steps to extract the embedded data where the location is embedded then shuffle back the order to find the hidden data. The experiment results demonstrate our method is quite imperceptible with high quality and can obtain the original cover image after extracting all hidden secret data.","PeriodicalId":240354,"journal":{"name":"2009 Fifth International Conference on Information Assurance and Security","volume":"31 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127238563","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 9
期刊
2009 Fifth International Conference on Information Assurance and Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1