首页 > 最新文献

2009 International Conference on Networks Security, Wireless Communications and Trusted Computing最新文献

英文 中文
Study the Logic Invariability in Subroutine's Junk Code Fuzzy Transformation 子程序垃圾代码模糊变换的逻辑不变性研究
Guo-zi Sun, Baobing Wang, Dan-wei Chen, Qiang Cai
Junk code fuzzy transformation (JCFT) is one of the effective approaches of the code obfuscation technology. Based on the analysis of current junk code strategies, this paper presents a new method named junk code encryption algorithm of subroutine, and depicts the algorithm with formalized language. The paper studies how to prove the logic invariability of subroutine’s JCFT with formalized method. After studying the formalized definition of subroutine’s JCFT, some lemmas are extracted. With these lemmas, and from three aspects such as "XOR and CMP Expansion", "False Embranchment Construction" and "JNE Append Junk Code", the paper proves that the procedure which transforms with subroutine’s JCFT has the same logicality with the original procedure.
垃圾代码模糊变换(JCFT)是一种有效的代码混淆技术。在分析现有垃圾码加密策略的基础上,提出了一种新的垃圾码加密子程序算法,并用形式化语言描述了该算法。本文研究了如何用形式化的方法证明子程序的jft的逻辑不变性。在研究了子程序JCFT的形式化定义后,提取了一些引理。利用这些引理,从“异或与CMP展开”、“假分支构造”和“JNE附加垃圾代码”三个方面证明了用子程序的JCFT变换后的程序与原程序具有相同的逻辑性。
{"title":"Study the Logic Invariability in Subroutine's Junk Code Fuzzy Transformation","authors":"Guo-zi Sun, Baobing Wang, Dan-wei Chen, Qiang Cai","doi":"10.1109/NSWCTC.2009.204","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.204","url":null,"abstract":"Junk code fuzzy transformation (JCFT) is one of the effective approaches of the code obfuscation technology. Based on the analysis of current junk code strategies, this paper presents a new method named junk code encryption algorithm of subroutine, and depicts the algorithm with formalized language. The paper studies how to prove the logic invariability of subroutine’s JCFT with formalized method. After studying the formalized definition of subroutine’s JCFT, some lemmas are extracted. With these lemmas, and from three aspects such as \"XOR and CMP Expansion\", \"False Embranchment Construction\" and \"JNE Append Junk Code\", the paper proves that the procedure which transforms with subroutine’s JCFT has the same logicality with the original procedure.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"455 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116410926","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology 基于无线传感器网络技术的石油钻井监测系统的研究与开发
Qinghua Xu, Jinyu Jiang, Xianbiao Wang
Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.
介绍了石油钻井现场无线传感器网络的建设。基于Zigbee技术,搭建了系统框架,进行了软硬件配置,并对系统流程进行了分析。实现了TinyOS操作系统在CC2430平台上的移植,无线传感器网络的数据采集、程序调试和性能测试。监测系统采集的数据与实际情况吻合。因此,该监控系统可用于石油钻井过程的监控。
{"title":"Research and Development of Oil Drilling Monitoring System Based on Wireless Sensor Network Technology","authors":"Qinghua Xu, Jinyu Jiang, Xianbiao Wang","doi":"10.1109/NSWCTC.2009.270","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.270","url":null,"abstract":"Introduce the construction of wireless sensor networks on oil-drilling site. Build the framework of the system, configure the software and hardware, and analysis the process based on Zigbee technology. Realize the transplantation of TinyOS Operating system on the CC2430 Platform, data collecting, program debugging, and performance testing of wireless sensor networks. The data collected by the monitoring system coincides with the actual situation. So this monitoring system could be used to monitor the process of oil drilling.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114638772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
The Upper and Lower Bound of Distributed Cooperative Communication 分布式协作通信的上下界
Changsong Xia, Weijun Cheng, B. Zhu
In order to study the impact of node mobility upon distributed cooperative communication, a three-node model  was established. It used Alamouti coding. Using bit error rate as a metric, the cooperative communication parameter was defined. Compared with Alamouti2×1 and direct communication separately, cooperative communication achieved its upper and lower bound. The simulation results show that under the circumstance of S-R channel’s good performance, as long as S-D and R-D channel satisfy certain conditions, the cooperative communication will be superior to Alamouti2×1 and direct communication.
为了研究节点移动性对分布式协作通信的影响,建立了一个三节点模型。它使用阿拉穆蒂编码。以误码率为度量标准,定义了协作通信参数。与Alamouti2×1和单独的直接传播相比,合作传播达到了它的上限和下限。仿真结果表明,在S-R信道性能良好的情况下,只要S-D和R-D信道满足一定条件,合作通信将优于Alamouti2×1和直接通信。
{"title":"The Upper and Lower Bound of Distributed Cooperative Communication","authors":"Changsong Xia, Weijun Cheng, B. Zhu","doi":"10.1109/NSWCTC.2009.219","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.219","url":null,"abstract":"In order to study the impact of node mobility upon distributed cooperative communication, a three-node model  was established. It used Alamouti coding. Using bit error rate as a metric, the cooperative communication parameter was defined. Compared with Alamouti2×1 and direct communication separately, cooperative communication achieved its upper and lower bound. The simulation results show that under the circumstance of S-R channel’s good performance, as long as S-D and R-D channel satisfy certain conditions, the cooperative communication will be superior to Alamouti2×1 and direct communication.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116940232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
The Research of Hybrid Network Communication System in NC System 数控系统中混合网络通信系统的研究
Kun-qi Wang, Pengju Wang, Ya-nan Wang
Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.
将有线通信网络与无线通信相结合,提出了一种应用于数控系统的混合网络通信系统。数控系统采用上位机与下位机相结合的操作方式,形成有线通信网络。上位机实现了CAD、CAM、图形自动编程、刀具位置计算、NC代码生成等功能。下位机仅作为运动控制系统。数控机床的一些故障信号由下位机传输到上位机。下位机与上位机通过基于TCP / IP协议的网线和以太网交换机连接。采用工业以太网作为平台。另外,通过虚拟串口技术将数控系统与PDA连接,形成微型网络,对虚拟蓝牙技术的无报警故障进行诊断。用NT端口软件直接访问PC机中的虚拟串口。在c++ Builder6中,通过带定时器的蓝牙无线通信模块从顶层应用程序中定期访问数控机床的信息,包括数控代码、刀具位置数据等。通过ActiveSync软件将数控机床信息以Access文件的形式保存在PDA数据库中。在c++ Builder6中采用虚拟Winsock技术设计了上位机通信程序和下位机通信程序。采用evb3.0编写PDA接收数据模块程序。在基于上述方法的实验中,在下位机正常运行的情况下,上位机实现了CAD、CAM、图形自动编程、刀具位置计算、NC代码生成等功能,增加了数控系统的功能。当下位机与PDA连接时,可以成功地将过程信息传递到PDA,提高数控系统运行时的维护效率。将混合网络通信系统应用于数控系统中,提高了系统的功能和维护效率。
{"title":"The Research of Hybrid Network Communication System in NC System","authors":"Kun-qi Wang, Pengju Wang, Ya-nan Wang","doi":"10.1109/NSWCTC.2009.345","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.345","url":null,"abstract":"Wire communication network combining wireless communication, a hybrid network communication system applied in NC system is proposed. Operation mode of the upper computer combining the lower computer is adopted in NC system to create wire communication network. Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer. The lower computer is only as motion control system. Some fault signals in NC machine tool are transmitted from lower computer to upper computer. The lower computer is connected with the upper computer by the network cables and Ethernet switchboard based on TCP / IP protocol. The industrial Ethernet network is adopted as the platform. Otherwise, NC system is connected with PDA by virtual serial port technology to create Piconet and diagnose the no-alarm fault in virtual of Bluetooth technology. Virtual serial port in PC is directly accessed with NT port software. The information of NC machine, including NC code, cutter location data and so on, is regularly accessed from top-level application program by Bluetooth wireless communication module with timer component in C++Builder6. The information of NC machine is saved as the Access file in PDA database by ActiveSync software. The Upper computer communication program and the lower computer communication program is designed in virtual of Winsock technology in C++Builder6. The PDA receiving data module program is compiled by evb3.0. In the experiment based on the method above, Many functions, including CAD, CAM, Graph automatic programming, cutter location calculating, NC code generation and so on, are achieved in upper computer to increase functions in NC system while the lower computer normally running. When the lower computer is connected with PDA, process information is successfully transferred to PDA to increase maintainable efficiency while NC system is running. The hybrid network communication system applied in NC system to increase functions and maintainable efficiency.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114781727","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Topology Optimization for Target Localization in Wireless Sensor Networks 无线传感器网络中目标定位的拓扑优化
Chao Yang, Lijun Chen, Daoxu Chen, Li Xie
Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.
目标定位是无线传感器网络中的一个重要应用。然而,由于单个节点的能力和环境噪声的限制,单个传感器往往无法准确定位目标,需要将多个传感器的观测结果结合起来以提高定位精度。本文采用一种广泛应用的节点定位算法——质心法进行目标定位。我们首先确定了影响质心法精度的两个因素:节点密度和均匀性。在此基础上,提出了一种基于聚类的网络分类方法。在这种基于集群的网络中,只有一部分传感器处于活动状态,通过调整节点密度和均匀度来提高定位精度。实验结果表明,采用该分类方法可以在减少活动节点的情况下提高定位结果的准确性。
{"title":"Topology Optimization for Target Localization in Wireless Sensor Networks","authors":"Chao Yang, Lijun Chen, Daoxu Chen, Li Xie","doi":"10.1109/NSWCTC.2009.28","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.28","url":null,"abstract":"Target localization is an important application in wireless sensor networks. However, because of the limitation of the capability of the individual nodes and the noises in the environment, a single sensor usually cannot localize a target accurately and observations from multiple sensors need to be combined to improve the localization accuracy. In this paper, the Centroid method, a widely used node localization algorithm is applied to target localization. We first identify two factors that affect the accuracy of the Centroid method: node density and uniformity. Then we propose a classifying procedure by which a cluster-based network is formed. In this cluster-based network, only a part of sensors are active and the node density and uniformity is adjusted to improve the localization accuracy. Experimental results show that by using our classifying method, the accuracy of the localization result can be improved with fewer active nodes.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115685628","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Flexible Authorizations with Logic Program 灵活的授权与逻辑程序
Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang
Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.
柔性授权是普适计算中一个重要的研究领域。逻辑程序无论在理论上还是在实践中都是一种有价值的表达和推理柔性授权的方法。本文主要研究如何使用逻辑程序来指定灵活的授权策略。分析了灵活授权的特点。研究了基于有序析取逻辑程序的冲突解决和动态授权问题。
{"title":"Flexible Authorizations with Logic Program","authors":"Mingsheng Zhang, Wu Chen, Yisong Wang, Mingyi Zhang","doi":"10.1109/NSWCTC.2009.9","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.9","url":null,"abstract":"Flexible authorization is a significant research realm in pervasive computing. Logic program is a worthy approach for expressing and reasoning flexible authorization not only in theory but also in practice. This paper mainly focuses on specifying flexible authorization policies using logic programs. The features of the flexible authorizations are analyzed. The conflicts resolution and dynamic authorization based on LPOD (Logic Program with Ordered Disjunction) are studied.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121547268","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Research on Policy-based Access Control Model 基于策略的访问控制模型研究
Lin Zhi, Wang Jing, Chen Xiao-su, Jia Lian-xing
Because of the limitations of condition configuration and execution mechanism, the exiting access control models are not flexible and can not support multi-policy. Focusing on this, the paper presents a policy-based access control model (PBAC). Different from the traditional models which restrict session only with subject authorization, PBAC realizes policy-based access control by defining attribute to describe session property, performing a new policy management method that is free from application logic, and advocating an independent access control decision mechanism. As a consequence, PBAC is more flexible on restricting session, and makes great progress on multi-policy supporting. The comparison analysis indicates that PBAC is superior to the current access control models.
由于条件配置和执行机制的限制,现有的访问控制模型不够灵活,不能支持多策略。为此,本文提出了一种基于策略的访问控制模型(PBAC)。与传统模型仅通过主体授权对会话进行限制不同,PBAC通过定义属性来描述会话属性,实现了一种不受应用逻辑约束的策略管理方法,倡导独立的访问控制决策机制,从而实现了基于策略的访问控制。因此,PBAC在限制会话方面更加灵活,在多政策支持方面也取得了很大进展。对比分析表明,PBAC优于现有的访问控制模型。
{"title":"Research on Policy-based Access Control Model","authors":"Lin Zhi, Wang Jing, Chen Xiao-su, Jia Lian-xing","doi":"10.1109/NSWCTC.2009.313","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.313","url":null,"abstract":"Because of the limitations of condition configuration and execution mechanism, the exiting access control models are not flexible and can not support multi-policy. Focusing on this, the paper presents a policy-based access control model (PBAC). Different from the traditional models which restrict session only with subject authorization, PBAC realizes policy-based access control by defining attribute to describe session property, performing a new policy management method that is free from application logic, and advocating an independent access control decision mechanism. As a consequence, PBAC is more flexible on restricting session, and makes great progress on multi-policy supporting. The comparison analysis indicates that PBAC is superior to the current access control models.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"109 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121345015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
Remote Attestation for Custom-built Software 定制软件的远程认证
Ce Meng, Yeping He, Qian Zhang
With trusted computing technology, we can build trust relations between computing platforms distributed on network. But current methods which are merely based on the integrity of components to justify the dependability of remote runtime environment, are hard to adapt today’s Internet full of heterogeneous platforms due to the scalability of measurement list. Especially when verifying open source software, this shortcoming is more obvious for the reason that all possible custom-built versions have to be considered. To solve this problem, we extended existing method to limit the size of measurement list by attesting the building process of custom-built software.
利用可信计算技术,我们可以在分布在网络上的计算平台之间建立信任关系。但是,现有的方法仅仅基于组件的完整性来证明远程运行环境的可靠性,由于测量表的可扩展性,难以适应当今充满异构平台的互联网。特别是在验证开源软件时,这个缺点更加明显,因为必须考虑所有可能的定制版本。为了解决这一问题,我们扩展了现有的方法,通过验证定制软件的构建过程来限制测量列表的大小。
{"title":"Remote Attestation for Custom-built Software","authors":"Ce Meng, Yeping He, Qian Zhang","doi":"10.1109/NSWCTC.2009.158","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.158","url":null,"abstract":"With trusted computing technology, we can build trust relations between computing platforms distributed on network. But current methods which are merely based on the integrity of components to justify the dependability of remote runtime environment, are hard to adapt today’s Internet full of heterogeneous platforms due to the scalability of measurement list. Especially when verifying open source software, this shortcoming is more obvious for the reason that all possible custom-built versions have to be considered. To solve this problem, we extended existing method to limit the size of measurement list by attesting the building process of custom-built software.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124677416","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
An Improved Colour Image Encryption Based on Chaotic Map and OCML Model 基于混沌映射和OCML模型的彩色图像加密改进
Jun He, Jun Zheng, Zhi-bin Li, Hai-feng Qian
In this paper, an improved colour image encryption is proposed, which is based on a chaotic logistic map and the one-way coupled-map lattices (OCML) model. The results of several experimental, statistical analyses and key sensitivity tests prove the security robustness of the proposed cryptosystem.
提出了一种基于混沌逻辑映射和单向耦合映射格(OCML)模型的彩色图像加密算法。实验、统计分析和密钥敏感性测试的结果证明了该密码系统的安全鲁棒性。
{"title":"An Improved Colour Image Encryption Based on Chaotic Map and OCML Model","authors":"Jun He, Jun Zheng, Zhi-bin Li, Hai-feng Qian","doi":"10.1109/NSWCTC.2009.243","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.243","url":null,"abstract":"In this paper, an improved colour image encryption is proposed, which is based on a chaotic logistic map and the one-way coupled-map lattices (OCML) model. The results of several experimental, statistical analyses and key sensitivity tests prove the security robustness of the proposed cryptosystem.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122601016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
An Image Encryption Algorithm Based on Discrete Wavelet Transform and Two Dimension Cat Mapping 基于离散小波变换和二维Cat映射的图像加密算法
Chunjiang Pang
This article introduced a kind of method to produce two value sequences by separating the two-dimensional cat mapping sequence, according to the distribution of this two value sequence, establish exclusive corresponding relationships between the two-dimensional cat mapping chaos sequence and the discrete wavelet transformation coefficient matrix. The value of the discrete wavelet transformation coefficient matrix was encrypted and the scrambled by adjusting chaos sequence. The test result indicated that this algorithm can overcome the flaw of lower-dimensional chaos dynamics system easy to attack, and has the characteristics of highly secrecy, simple key, precise uniformity between restructuring image and original image. Meanwhile it can withstand the noise effect from the transmission process.
本文介绍了一种通过分离二维cat映射序列产生两个值序列的方法,根据这两个值序列的分布,建立二维cat映射混沌序列与离散小波变换系数矩阵之间的排他对应关系。通过调整混沌序列对离散小波变换系数矩阵的值进行加密和置乱。实验结果表明,该算法克服了低维混沌动力学系统易被攻击的缺陷,具有高度保密性、密钥简单、重构图像与原始图像一致性精确等特点。同时能承受传动过程中的噪声影响。
{"title":"An Image Encryption Algorithm Based on Discrete Wavelet Transform and Two Dimension Cat Mapping","authors":"Chunjiang Pang","doi":"10.1109/NSWCTC.2009.191","DOIUrl":"https://doi.org/10.1109/NSWCTC.2009.191","url":null,"abstract":"This article introduced a kind of method to produce two value sequences by separating the two-dimensional cat mapping sequence, according to the distribution of this two value sequence, establish exclusive corresponding relationships between the two-dimensional cat mapping chaos sequence and the discrete wavelet transformation coefficient matrix. The value of the discrete wavelet transformation coefficient matrix was encrypted and the scrambled by adjusting chaos sequence. The test result indicated that this algorithm can overcome the flaw of lower-dimensional chaos dynamics system easy to attack, and has the characteristics of highly secrecy, simple key, precise uniformity between restructuring image and original image. Meanwhile it can withstand the noise effect from the transmission process.","PeriodicalId":433291,"journal":{"name":"2009 International Conference on Networks Security, Wireless Communications and Trusted Computing","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-04-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130688184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
期刊
2009 International Conference on Networks Security, Wireless Communications and Trusted Computing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1