首页 > 最新文献

EURASIP Journal on Information Security最新文献

英文 中文
Robust JPEG steganography based on the robustness classifier 基于鲁棒性分类器的鲁棒 JPEG 隐写术
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-12-11 DOI: 10.1186/s13635-023-00148-x
Jimin Zhang, Xianfeng Zhao, Xiaolei He
Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular image-sharing social networks requires robustness. Currently, most robust steganography algorithms rely on the resistance of embedding to the general JPEG recompression process. The operations in a specific compression channel are usually ignored, which reduces the robustness performance. Besides, to acquire the robust cover image, the state-of-the-art robust steganography needs to upload the cover image to social networks several times, which may be insecure regarding behavior security. In this paper, a robust steganography method based on the softmax outputs of a trained classifier and protocol message embedding is proposed. In the proposed method, a deep learning-based robustness classifier is trained to model the specific process of the JPEG recompression channel. The prediction result of the classifier is used to select the robust DCT blocks to form the embedding domain. The selection information is embedded as the protocol messages into the middle-frequency coefficients of DCT blocks. To further improve the recovery possibility of the protocol message, a robustness enhancement method is proposed. It decreases the predicted non-robust possibility of the robustness classifier by modifying low-frequency coefficients of DCT blocks. The experimental results show that the proposed method has better robustness performance compared with state-of-the-art robust steganography and does not have the disadvantage regarding behavior security. The method is universal and can be implemented in different JPEG compression channels after fine-tuning the classifier. Moreover, it has better security performance compared with the state-of-the-art method when embedding large-sized secret messages.
由于社交网络中的 JPEG 重压缩会改变上传图像的 DCT 系数,因此在流行的图像共享社交网络中应用图像隐写术需要具备鲁棒性。目前,大多数鲁棒性隐写术算法都依赖于嵌入对一般 JPEG 重压缩过程的抵抗力。特定压缩通道中的操作通常会被忽略,从而降低了鲁棒性能。此外,最先进的鲁棒隐写术在获取鲁棒封面图像时,需要多次将封面图像上传到社交网络,在行为安全性方面可能存在不安全因素。本文提出了一种基于训练分类器软最大输出和协议信息嵌入的鲁棒隐写方法。在所提出的方法中,基于深度学习的鲁棒性分类器经过训练,以模拟 JPEG 重压缩信道的特定过程。分类器的预测结果用于选择稳健的 DCT 块以形成嵌入域。选择信息作为协议信息嵌入到 DCT 块的中频系数中。为了进一步提高协议信息的恢复可能性,提出了一种鲁棒性增强方法。它通过修改 DCT 块的低频系数来降低鲁棒性分类器预测的非鲁棒性可能性。实验结果表明,与最先进的鲁棒隐写术相比,所提出的方法具有更好的鲁棒性能,而且在行为安全性方面没有缺点。该方法具有通用性,在对分类器进行微调后,可在不同的 JPEG 压缩信道中实施。此外,与最先进的方法相比,该方法在嵌入大容量秘密信息时具有更好的安全性能。
{"title":"Robust JPEG steganography based on the robustness classifier","authors":"Jimin Zhang, Xianfeng Zhao, Xiaolei He","doi":"10.1186/s13635-023-00148-x","DOIUrl":"https://doi.org/10.1186/s13635-023-00148-x","url":null,"abstract":"Because the JPEG recompression in social networks changes the DCT coefficients of uploaded images, applying image steganography in popular image-sharing social networks requires robustness. Currently, most robust steganography algorithms rely on the resistance of embedding to the general JPEG recompression process. The operations in a specific compression channel are usually ignored, which reduces the robustness performance. Besides, to acquire the robust cover image, the state-of-the-art robust steganography needs to upload the cover image to social networks several times, which may be insecure regarding behavior security. In this paper, a robust steganography method based on the softmax outputs of a trained classifier and protocol message embedding is proposed. In the proposed method, a deep learning-based robustness classifier is trained to model the specific process of the JPEG recompression channel. The prediction result of the classifier is used to select the robust DCT blocks to form the embedding domain. The selection information is embedded as the protocol messages into the middle-frequency coefficients of DCT blocks. To further improve the recovery possibility of the protocol message, a robustness enhancement method is proposed. It decreases the predicted non-robust possibility of the robustness classifier by modifying low-frequency coefficients of DCT blocks. The experimental results show that the proposed method has better robustness performance compared with state-of-the-art robust steganography and does not have the disadvantage regarding behavior security. The method is universal and can be implemented in different JPEG compression channels after fine-tuning the classifier. Moreover, it has better security performance compared with the state-of-the-art method when embedding large-sized secret messages.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"26 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138566733","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The design of network security protection trust management system based on an improved hidden Markov model 基于改进隐马尔可夫模型的网络安全防护信任管理系统设计
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-11-23 DOI: 10.1186/s13635-023-00146-z
Shaojun Chen
With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also gradually becoming prominent. At present, research on network security protection mainly starts from the overall perspective, and some studies also start from the interaction between nodes. However, the trust management mechanisms in these studies do not have a predictive function. Therefore, to predict trust levels and protect network security, this paper innovatively proposes a trust management system for network security protection based on the improved hidden Markov model. The research divides the trust level of inter-node interactions by calculating the threat level of inter-node interactions and predicts the trust level of inter-node interactions through an optimized hidden Markov model. In addition, the study designs an estimation of the types of interactive threats between nodes based on alarm data. The research results show that when inactive interaction tuples are not excluded, the average prediction accuracy of the combined model is 95.5%. In response time, the maximum values of the active and passive cluster management pages are 38 ms and 33 ms, respectively, while the minimum values are 16 ms and 14 ms, with an average of 26.2 ms and 24 ms, respectively. The trust management system designed by the research institute has good performance and can provide systematic support for network security protection, which has good practical significance.
随着互联网的发展,网络安全问题日益复杂,节点交互安全的重要性也逐渐凸显。目前对网络安全防护的研究主要从整体角度出发,也有一些研究从节点间的交互角度出发。然而,这些研究中的信任管理机制并不具有预测功能。因此,为了预测信任水平,保护网络安全,本文创新性地提出了一种基于改进隐马尔可夫模型的网络安全保护信任管理系统。本研究通过计算节点间交互的威胁等级划分节点间交互的信任等级,并通过优化的隐马尔可夫模型预测节点间交互的信任等级。此外,研究还设计了一种基于告警数据的节点间交互威胁类型估计方法。研究结果表明,在不排除非活跃相互作用元组的情况下,组合模型的平均预测精度为95.5%。在响应时间方面,主动和被动集群管理页面的最大值分别为38 ms和33 ms,最小值分别为16 ms和14 ms,平均分别为26.2 ms和24 ms。该研究所设计的信任管理系统性能良好,可为网络安全防护提供系统支持,具有良好的现实意义。
{"title":"The design of network security protection trust management system based on an improved hidden Markov model","authors":"Shaojun Chen","doi":"10.1186/s13635-023-00146-z","DOIUrl":"https://doi.org/10.1186/s13635-023-00146-z","url":null,"abstract":"With the growth of the Internet, network security issues have become increasingly complex, and the importance of node interaction security is also gradually becoming prominent. At present, research on network security protection mainly starts from the overall perspective, and some studies also start from the interaction between nodes. However, the trust management mechanisms in these studies do not have a predictive function. Therefore, to predict trust levels and protect network security, this paper innovatively proposes a trust management system for network security protection based on the improved hidden Markov model. The research divides the trust level of inter-node interactions by calculating the threat level of inter-node interactions and predicts the trust level of inter-node interactions through an optimized hidden Markov model. In addition, the study designs an estimation of the types of interactive threats between nodes based on alarm data. The research results show that when inactive interaction tuples are not excluded, the average prediction accuracy of the combined model is 95.5%. In response time, the maximum values of the active and passive cluster management pages are 38 ms and 33 ms, respectively, while the minimum values are 16 ms and 14 ms, with an average of 26.2 ms and 24 ms, respectively. The trust management system designed by the research institute has good performance and can provide systematic support for network security protection, which has good practical significance.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"254 1","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-11-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"138506654","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks 基于模糊逻辑的无线传感器网络分层节能路由算法
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-19 DOI: 10.1186/s13635-023-00144-1
Dan Wang, Qing Wu, Ming Hu
Abstract Currently, sensor energy assembly in wireless sensor networks is limited, and clustering methods are not effective to improve sensor energy consumption rate. Thus, a hierarchical energy-saving routing algorithm based on fuzzy logic was constructed by considering three aspects: residual energy value, centrality, and distance value between nodes and base stations. The remaining sensor nodes selected by fuzzy logic algorithm have a longer time to live and greater residual energy than those selected by low-power adaptive clustering hierarchical protocol algorithm, fuzzy unequal clustering algorithm, and fuzzy logic cluster head election algorithm. For network life cycle, the number of rounds in which the first dead node appears, in descending order, is studied: energy-saving routing algorithm (400 rounds) > new geographic cellular structure algorithm (300 rounds) > virtual grid based dynamic routes adjustment algorithm (100 rounds). Under the same experimental round, energy-saving routing algorithm’s remaining energy curve always reaches its maximum. The energy-saving routing algorithm by fuzzy logic constructed by this research institute can significantly improve network energy utilization, which has certain reference value.
目前,无线传感器网络中的传感器能量组装是有限的,聚类方法不能有效地提高传感器的能量消耗率。在此基础上,从剩余能量值、中心性和节点与基站之间的距离三个方面考虑,构建了一种基于模糊逻辑的分层节能路由算法。与低功耗自适应聚类分层协议算法、模糊不相等聚类算法和模糊逻辑簇头选举算法相比,模糊逻辑算法选择的剩余传感器节点具有更长的存活时间和更大的剩余能量。对于网络生命周期,研究第一个死节点出现的轮数由高到低:节能路由算法(400轮)>新的地理细胞结构算法(300轮)>基于虚拟网格的动态路线调整算法(100轮)。在同一实验轮下,节能路由算法的剩余能量曲线总是达到最大值。本研究所构建的基于模糊逻辑的节能路由算法能显著提高网络能源利用率,具有一定的参考价值。
{"title":"Hierarchical energy-saving routing algorithm using fuzzy logic in wireless sensor networks","authors":"Dan Wang, Qing Wu, Ming Hu","doi":"10.1186/s13635-023-00144-1","DOIUrl":"https://doi.org/10.1186/s13635-023-00144-1","url":null,"abstract":"Abstract Currently, sensor energy assembly in wireless sensor networks is limited, and clustering methods are not effective to improve sensor energy consumption rate. Thus, a hierarchical energy-saving routing algorithm based on fuzzy logic was constructed by considering three aspects: residual energy value, centrality, and distance value between nodes and base stations. The remaining sensor nodes selected by fuzzy logic algorithm have a longer time to live and greater residual energy than those selected by low-power adaptive clustering hierarchical protocol algorithm, fuzzy unequal clustering algorithm, and fuzzy logic cluster head election algorithm. For network life cycle, the number of rounds in which the first dead node appears, in descending order, is studied: energy-saving routing algorithm (400 rounds) > new geographic cellular structure algorithm (300 rounds) > virtual grid based dynamic routes adjustment algorithm (100 rounds). Under the same experimental round, energy-saving routing algorithm’s remaining energy curve always reaches its maximum. The energy-saving routing algorithm by fuzzy logic constructed by this research institute can significantly improve network energy utilization, which has certain reference value.","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135778295","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction: Mobile authentication of copy detection patterns 更正:副本检测模式的移动认证
Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-10-03 DOI: 10.1186/s13635-023-00143-2
Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy
{"title":"Correction: Mobile authentication of copy detection patterns","authors":"Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy","doi":"10.1186/s13635-023-00143-2","DOIUrl":"https://doi.org/10.1186/s13635-023-00143-2","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-10-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135739074","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User authentication and access control to blockchain-based forensic log data 基于区块链的取证日志数据的用户身份验证和访问控制
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-07-25 DOI: 10.1186/s13635-023-00142-3
Md. Ezazul Islam, Md. Rafiqul Islam, Madhu Chetty, Suryani Lim, Mehmood A. Chadhar
{"title":"User authentication and access control to blockchain-based forensic log data","authors":"Md. Ezazul Islam, Md. Rafiqul Islam, Madhu Chetty, Suryani Lim, Mehmood A. Chadhar","doi":"10.1186/s13635-023-00142-3","DOIUrl":"https://doi.org/10.1186/s13635-023-00142-3","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-07-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45851146","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM 基于多域数据和集成双向LSTM的网络入侵检测
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-06-26 DOI: 10.1186/s13635-023-00139-y
Xiaoning Wang, Jia Liu, Chunjiong Zhang
{"title":"Network intrusion detection based on multi-domain data and ensemble-bidirectional LSTM","authors":"Xiaoning Wang, Jia Liu, Chunjiong Zhang","doi":"10.1186/s13635-023-00139-y","DOIUrl":"https://doi.org/10.1186/s13635-023-00139-y","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-06-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"46475057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training 高斯类-条件单纯形损失用于精确的,对抗鲁棒的深度分类器训练
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-10 DOI: 10.1186/s13635-023-00137-0
Arslan Ali, Andrea Migliorati, T. Bianchi, E. Magli
{"title":"Gaussian class-conditional simplex loss for accurate, adversarially robust deep classifier training","authors":"Arslan Ali, Andrea Migliorati, T. Bianchi, E. Magli","doi":"10.1186/s13635-023-00137-0","DOIUrl":"https://doi.org/10.1186/s13635-023-00137-0","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48925705","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT 面向物联网的无线传感器网络多网关认证与密钥协议方案
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-03-08 DOI: 10.1186/s13635-023-00138-z
Jen-Ho Yang
{"title":"A multi-gateway authentication and key-agreement scheme on wireless sensor networks for IoT","authors":"Jen-Ho Yang","doi":"10.1186/s13635-023-00138-z","DOIUrl":"https://doi.org/10.1186/s13635-023-00138-z","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":" ","pages":""},"PeriodicalIF":3.6,"publicationDate":"2023-03-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44646077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Mobile authentication of copy detection patterns. 复制检测模式的移动身份验证。
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2023-01-01 Epub Date: 2023-06-06 DOI: 10.1186/s13635-023-00140-5
Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy

In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes.

近年来,拷贝检测模式(CDP)作为连接物理世界和数字世界的纽带引起了人们的广泛关注,这对物联网和品牌保护应用产生了极大的兴趣。然而,CDP在未经授权方的可复制性或可复制性方面的安全性在很大程度上仍未得到探索。在这方面,本文解决了实物防伪问题,旨在从机器学习的角度研究现代CDP的认证方面和对非法复制的抵抗力。当代码在工业打印机上打印并在常规光线条件下通过现代手机登记时,特别注意在真实验证条件下的可靠认证。从(i)作为基线方法的多类监督分类和(ii)作为现实应用案例的一类分类的角度,对CDP的认证方面进行了理论和实证研究,涉及四种类型的仿制品。所获得的结果表明,现代机器学习方法和现代手机的技术能力允许在所考虑的伪造类别下在最终用户手机上可靠地验证CDP。
{"title":"Mobile authentication of copy detection patterns.","authors":"Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy","doi":"10.1186/s13635-023-00140-5","DOIUrl":"10.1186/s13635-023-00140-5","url":null,"abstract":"<p><p>In the recent years, the copy detection patterns (CDP) attracted a lot of attention as a link between the physical and digital worlds, which is of great interest for the internet of things and brand protection applications. However, the security of CDP in terms of their reproducibility by unauthorized parties or clonability remains largely unexplored. In this respect, this paper addresses a problem of anti-counterfeiting of physical objects and aims at investigating the authentication aspects and the resistances to illegal copying of the modern CDP from machine learning perspectives. A special attention is paid to a reliable authentication under the real-life verification conditions when the codes are printed on an industrial printer and enrolled via modern mobile phones under regular light conditions. The theoretical and empirical investigation of authentication aspects of CDP is performed with respect to four types of copy fakes from the point of view of (i) multi-class supervised classification as a baseline approach and (ii) one-class classification as a real-life application case. The obtained results show that the modern machine-learning approaches and the technical capacities of modern mobile phones allow to reliably authenticate CDP on end-user mobile phones under the considered classes of fakes.</p>","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2023 1","pages":"4"},"PeriodicalIF":3.6,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10244288/pdf/","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"9612480","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Improved scheme and evaluation method for progressive visual cryptography 一种改进的渐进视觉密码方案及评价方法
IF 3.6 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS Pub Date : 2022-12-17 DOI: 10.1186/s13635-022-00136-7
Binh Le Thanh Thai, Hidema Tanaka, Kohtaro Watanabe
{"title":"Improved scheme and evaluation method for progressive visual cryptography","authors":"Binh Le Thanh Thai, Hidema Tanaka, Kohtaro Watanabe","doi":"10.1186/s13635-022-00136-7","DOIUrl":"https://doi.org/10.1186/s13635-022-00136-7","url":null,"abstract":"","PeriodicalId":46070,"journal":{"name":"EURASIP Journal on Information Security","volume":"2022 1","pages":"1-13"},"PeriodicalIF":3.6,"publicationDate":"2022-12-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48698303","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
EURASIP Journal on Information Security
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1