首页 > 最新文献

Computer Journal最新文献

英文 中文
CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain CD-BCM:基于区块链的跨域批量证书管理
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-21 DOI: 10.1093/comjnl/bxad025
Shixiong Yao, Pei Li, Jing Chen, Yuexing Zeng, Jiageng Chen, Donghui Wang
Abstract With the development of information networks, the entities from different network domains interact with each other more and more frequently. Therefore, identity management and authentication are essential in cross-domain setting. The traditional Public Key Infrastructure (PKI) architecture has some problems, including single point of failure, inefficient certificate revocation status management and also lack of privacy protection, which cannot meet the demand of cross-domain identity authentication. Blockchain is suitable for multi-participant collaboration in multi-trust domain scenarios. In this paper, a cross-domain certificate management scheme CD-BCM based on the consortium blockchain is proposed. For the issue of Certificate Authority’s single point of failure, we design a multi-signature algorithm. In addition, we propose a unified structure for batch certificates verification and conversion, which improve the efficiency of erroneous certificate identification. Finally, by comparing with current related schemes, our scheme achieves good functionality and scalability in the scenario of cross-domain certificate management.
摘要随着信息网络的发展,来自不同网络域的实体之间的交互越来越频繁。因此,在跨域设置中,身份管理和认证是必不可少的。传统的公钥基础设施(Public Key Infrastructure, PKI)体系结构存在单点故障、证书撤销状态管理效率低下以及缺乏隐私保护等问题,无法满足跨域身份认证的需求。区块链适用于多信任域场景下的多参与者协作。提出了一种基于联盟区块链的跨域证书管理方案CD-BCM。针对证书颁发机构的单点失效问题,设计了一种多重签名算法。此外,我们还提出了一种统一的批量证书验证和转换结构,提高了错误证书识别的效率。最后,通过与现有相关方案的比较,本方案在跨域证书管理场景下具有良好的功能性和可扩展性。
{"title":"CD-BCM:Cross-Domain Batch Certificates Management Based On Blockchain","authors":"Shixiong Yao, Pei Li, Jing Chen, Yuexing Zeng, Jiageng Chen, Donghui Wang","doi":"10.1093/comjnl/bxad025","DOIUrl":"https://doi.org/10.1093/comjnl/bxad025","url":null,"abstract":"Abstract With the development of information networks, the entities from different network domains interact with each other more and more frequently. Therefore, identity management and authentication are essential in cross-domain setting. The traditional Public Key Infrastructure (PKI) architecture has some problems, including single point of failure, inefficient certificate revocation status management and also lack of privacy protection, which cannot meet the demand of cross-domain identity authentication. Blockchain is suitable for multi-participant collaboration in multi-trust domain scenarios. In this paper, a cross-domain certificate management scheme CD-BCM based on the consortium blockchain is proposed. For the issue of Certificate Authority’s single point of failure, we design a multi-signature algorithm. In addition, we propose a unified structure for batch certificates verification and conversion, which improve the efficiency of erroneous certificate identification. Finally, by comparing with current related schemes, our scheme achieves good functionality and scalability in the scenario of cross-domain certificate management.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"66 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135001296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Overfull: Too Large Aggregate Signatures Based on Lattices Overfull:基于格的聚合签名过大
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-17 DOI: 10.1093/comjnl/bxad013
Katharina Boudgoust, Adeline Roux-Langlois
Abstract The Fiat-Shamir with Aborts paradigm of Lyubashevsky has given rise to efficient lattice-based signature schemes. One popular implementation is Dilithium, which has been selected for standardization by the US National Institute of Standards and Technology (NIST). Informally, it can be seen as a lattice analog of the well-known discrete-logarithm-based Schnorr signature. An interesting research question is whether it is possible to combine several unrelated signatures, issued from different signing parties on different messages, into one single aggregated signature. Of course, its size should be significantly smaller than the trivial concatenation of all signatures. Ideally, the aggregation can be done offline by a third party, called public aggregation. Previous works have shown that it is possible to half-aggregate Schnorr signatures, but it was left open if the underlying techniques can be adapted to the lattice setting. In this work, we show that, indeed, we can use similar strategies to obtain a signature scheme allowing for public aggregation whose hardness is proven assuming the intractability of well-studied problems on module lattices. Unfortunately, our scheme produces aggregated signatures that are larger than the trivial solution of concatenating. This is due to peculiarities that seem inherent to lattice-based cryptography. Its motivation is thus mainly pedagogical.
Lyubashevsky的Fiat-Shamir with Aborts范式提出了高效的基于格的签名方案。一种流行的实现是二锂,它已被美国国家标准与技术研究所(NIST)选择用于标准化。非正式地,它可以被看作是众所周知的基于离散对数的Schnorr签名的晶格模拟。一个有趣的研究问题是,是否有可能将不同签名方在不同消息上发布的几个不相关的签名合并为一个聚合签名。当然,它的大小应该明显小于所有签名的简单连接。理想情况下,聚合可以由第三方离线完成,称为公共聚合。先前的研究已经表明,Schnorr特征有可能半聚合,但如果基础技术可以适应晶格设置,那么它仍然是开放的。在这项工作中,我们表明,我们确实可以使用类似的策略来获得一个允许公共聚合的签名方案,其硬度被证明是假设在模格上研究得很好的问题的难解性。不幸的是,我们的方案产生的聚合签名比简单的连接解决方案要大。这是由于基于格的密码学所固有的特性。因此,其动机主要是教学性的。
{"title":"Overfull: Too Large Aggregate Signatures Based on Lattices","authors":"Katharina Boudgoust, Adeline Roux-Langlois","doi":"10.1093/comjnl/bxad013","DOIUrl":"https://doi.org/10.1093/comjnl/bxad013","url":null,"abstract":"Abstract The Fiat-Shamir with Aborts paradigm of Lyubashevsky has given rise to efficient lattice-based signature schemes. One popular implementation is Dilithium, which has been selected for standardization by the US National Institute of Standards and Technology (NIST). Informally, it can be seen as a lattice analog of the well-known discrete-logarithm-based Schnorr signature. An interesting research question is whether it is possible to combine several unrelated signatures, issued from different signing parties on different messages, into one single aggregated signature. Of course, its size should be significantly smaller than the trivial concatenation of all signatures. Ideally, the aggregation can be done offline by a third party, called public aggregation. Previous works have shown that it is possible to half-aggregate Schnorr signatures, but it was left open if the underlying techniques can be adapted to the lattice setting. In this work, we show that, indeed, we can use similar strategies to obtain a signature scheme allowing for public aggregation whose hardness is proven assuming the intractability of well-studied problems on module lattices. Unfortunately, our scheme produces aggregated signatures that are larger than the trivial solution of concatenating. This is due to peculiarities that seem inherent to lattice-based cryptography. Its motivation is thus mainly pedagogical.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135295446","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes 折叠超立方体的条件边容错强Menger边连通性
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-10 DOI: 10.1093/comjnl/bxad018
Shijie Zhao, Pingshan Li
Abstract Edge connectivity is an important parameter for the reliability of the inter-connection network. A graph $G$ is strong Menger edge-connected ($SM$-$lambda $ for short) if there exist min${deg _{G}(u),deg _{G}(v)}$ edge-disjoint paths between any pair of vertices $u$ and $v$ of $G$. The conditional edge-fault-tolerance strong Menger edge connectivity of $G$, denoted by $sm_{lambda }^{r}(G)$, is the maximum integer $m$ such that $G-F$ remains $SM$-$lambda $ for any edge set $F$ with $|F|leq m$ and $delta (G-F)geq r$, where $delta (G-F)geq r$ is the minimum degree of $G-F$. Most of the previous papers discussed $sm_{lambda }^{r}(G)$ in the case of $rleq 2$. In this paper, we show that $sm_{lambda }^{r}(FQ_{n})=2^{r}(n-r+1)-(n+1)$ for $1leq rleq n-2$, where $ngeq 4$.
摘要边缘连通性是衡量互联网络可靠性的一个重要参数。图表 $G$ 是强门格边连通的($SM$-$lambda $ (简而言之)如果存在最小的${deg _{G}(u),deg _{G}(v)}$ 任意顶点对之间的边不相交路径 $u$ 和 $v$ 的 $G$. 条件边-容错强门格边连通性 $G$,表示为 $sm_{lambda }^{r}(G)$,为最大整数 $m$ 这样 $G-F$ 遗骸 $SM$-$lambda $ 对于任意边集 $F$ 有 $|F|leq m$ 和 $delta (G-F)geq r$,其中 $delta (G-F)geq r$ 最小度是 $G-F$. 之前的大多数论文都讨论过 $sm_{lambda }^{r}(G)$ 在…的情况下 $rleq 2$. 在本文中,我们证明了这一点 $sm_{lambda }^{r}(FQ_{n})=2^{r}(n-r+1)-(n+1)$ 为了 $1leq rleq n-2$,其中 $ngeq 4$.
{"title":"On Conditional Edge-Fault-Tolerant Strong Menger Edge Connectivity Of Folded Hypercubes","authors":"Shijie Zhao, Pingshan Li","doi":"10.1093/comjnl/bxad018","DOIUrl":"https://doi.org/10.1093/comjnl/bxad018","url":null,"abstract":"Abstract Edge connectivity is an important parameter for the reliability of the inter-connection network. A graph $G$ is strong Menger edge-connected ($SM$-$lambda $ for short) if there exist min${deg _{G}(u),deg _{G}(v)}$ edge-disjoint paths between any pair of vertices $u$ and $v$ of $G$. The conditional edge-fault-tolerance strong Menger edge connectivity of $G$, denoted by $sm_{lambda }^{r}(G)$, is the maximum integer $m$ such that $G-F$ remains $SM$-$lambda $ for any edge set $F$ with $|F|leq m$ and $delta (G-F)geq r$, where $delta (G-F)geq r$ is the minimum degree of $G-F$. Most of the previous papers discussed $sm_{lambda }^{r}(G)$ in the case of $rleq 2$. In this paper, we show that $sm_{lambda }^{r}(FQ_{n})=2^{r}(n-r+1)-(n+1)$ for $1leq rleq n-2$, where $ngeq 4$.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136131933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms 提供一种基于可穿戴传感器数据和使用深度学习算法的人类活动跌倒早期预测方法
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-07 DOI: 10.1093/comjnl/bxad008
Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh-Tabari, Mehdi Golsorkhtabariamiri
Abstract Falling is one of the major health concerns, and its early detection is very important. The goal of this study is an early prediction of impending falls using wearable sensors data. The SisFall data set has been used along with two deep learning models (CNN and a combination model named Conv_Lstm). Also, a dynamic sampling method is offered to improve the accuracy of the models by increasing the equilibrium rate between the samples of the majority and minority classes. To fulfill the main idea of this paper, we present a future prediction strategy. Then, by defining a time variable ‘T’, the system replaces and labels the state of the next T s instead of considering the current state only. This leads to predicting falling states at the beginning moments of balance disturbance. The results of the experiments show that the Conv_Lstm model was able to predict the fall in 78% of cases and an average of 340 ms before the accident. Also, for the Sensitivity criterion, a value of 95.18% has been obtained. A post-processing module based on the median filter was implemented, which could increase the accuracy of predictions to 95%.
摘要跌倒是主要的健康问题之一,早期发现是非常重要的。这项研究的目的是利用可穿戴传感器数据对即将发生的跌倒进行早期预测。SisFall数据集与两个深度学习模型(CNN和一个名为Conv_Lstm的组合模型)一起使用。同时,提出了一种动态抽样方法,通过提高多数类和少数类样本之间的平衡率来提高模型的准确性。为了实现本文的主要思想,我们提出了一种未来预测策略。然后,通过定义一个时间变量“T”,系统替换并标记下一个T s的状态,而不是只考虑当前状态。这导致在平衡扰动的开始时刻预测落态。实验结果表明,Conv_Lstm模型能够在78%的情况下预测到摔倒,平均在事故发生前340毫秒。灵敏度判据为95.18%。实现了基于中值滤波的后处理模块,可将预测准确率提高到95%。
{"title":"Providing an Approach for Early Prediction of Fall in Human Activities Based on Wearable Sensor Data and the Use of Deep Learning Algorithms","authors":"Rahman Keramati Hatkeposhti, Meisam Yadollahzadeh-Tabari, Mehdi Golsorkhtabariamiri","doi":"10.1093/comjnl/bxad008","DOIUrl":"https://doi.org/10.1093/comjnl/bxad008","url":null,"abstract":"Abstract Falling is one of the major health concerns, and its early detection is very important. The goal of this study is an early prediction of impending falls using wearable sensors data. The SisFall data set has been used along with two deep learning models (CNN and a combination model named Conv_Lstm). Also, a dynamic sampling method is offered to improve the accuracy of the models by increasing the equilibrium rate between the samples of the majority and minority classes. To fulfill the main idea of this paper, we present a future prediction strategy. Then, by defining a time variable ‘T’, the system replaces and labels the state of the next T s instead of considering the current state only. This leads to predicting falling states at the beginning moments of balance disturbance. The results of the experiments show that the Conv_Lstm model was able to predict the fall in 78% of cases and an average of 340 ms before the accident. Also, for the Sensitivity criterion, a value of 95.18% has been obtained. A post-processing module based on the median filter was implemented, which could increase the accuracy of predictions to 95%.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136340909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware 软件和硬件中轻量级密码的安全有效掩蔽
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-03-01 DOI: 10.1093/comjnl/bxad002
Xuefeng Zhao
Abstract Masking is a well used and widely deployed countermeasure against side channel attacks, both in software and hardware. With masking comes at a great cost, search has focused on how to lower a performance penalty or find efficient masking implementation. In particular, our contribution is 2-fold: for software masking, we first find bitsliced implementations of Sbox with Multiplicative Complexity 4 and Multiplicative Depth 2, then adapt the common shares approach introduced by Coron et al. at CHES 2016 to make many cross-products $a_{i}cdot b_{j}$ can be reuse for parallel ISW-based 32-bit nonlinear operations. Therefore, we improve the efficiency of 2$times b/4/32$ parallel high-order masking of ISW scheme for RECTANGLE, TANGRAM and KNOT on 32-bit ARM embedded microprocessor, with roughly a 13%-34% speed-up, at cost of $(1+d) times 32$-bit randomness. For hardware masking, 4 bit cubic Sboxes with quadratic decomposition length 2, including RECTANGLE, TANGRAM, KNOT and LWC third-round candidates, can be implemented with a 3-share and 4-share threshold implementation (TI) by decomposing cubic permutations $S$ as a composition of sub-permutations having lower algebraic degrees. We use two decomposition form: one composition of two quadratic permutations $G$ and $F$, $S = Fcirc G$, is for efficiency; the other composition of some linear permutations $A_i$ and one quadratic permutation $G$, $S=A_3 circ G circ A_2 circ G circ A_1 $, is for reducing the area requirements. For $S = Fcirc G$, we introduce a new approach of searching through all possible quadratic permutations $G$ with 2$^{25.71}$, which is effcient than 2$^{26.23}$ in Poschmann et al. at J. Cryptol 2011. For $S=A_3 circ G circ A_2 circ G circ A_1 $, our approach of finding $A_i$ with complexity 2$^{27.71} $, which is effcient than the method introduced by Moradi et al. at ASIACRYPT 2016. In addition, we proposes a new decomposition that $S=G circ A_2 circ G circ A_1 $. We can find the fastest and the smallest hard-ware decomposition implementation of 4-bit permutations for TI with 3 and 4 shares.
掩蔽是一种应用广泛的对抗侧信道攻击的方法,无论是在软件还是硬件上都是如此。由于屏蔽的代价很大,搜索的重点是如何降低性能损失或找到有效的屏蔽实现。特别是,我们的贡献是双重的:对于软件屏蔽,我们首先找到了具有乘法复杂度4和乘法深度2的Sbox的位切片实现,然后采用Coron等人在CHES 2016上引入的公共共享方法,使许多交叉乘积$a_{i}cdot b_{j}$可以被重用用于并行的基于isw的32位非线性操作。因此,我们在32位ARM嵌入式微处理器上,以$(1+d) $ × 32位随机性为代价,提高了2$times b/4/32$并行ISW方案的高阶掩码效率,大约提高了13%-34%的速度。对于硬件掩蔽,通过将立方排列$S$分解为具有较低代数度的子排列的组合,可以用3共享和4共享阈值实现(TI)实现二次分解长度为2的4位立方Sboxes(包括RECTANGLE、TANGRAM、KNOT和LWC第三轮候选)。我们采用了两种分解形式:一种是由两个二次置换$G$和$F$组成,$S = Fcirc G$,是为了效率;另一个线性排列$A_i$和一个二次排列$G$的组合$S=A_3 circ G circ A_2 circ G circ A_1 $是为了减少面积要求。对于$S = Fcirc G$,我们引入了一种用2$^{25.71}$搜索所有可能的二次置换$G$的新方法,该方法比Poschmann et al. J. Cryptol 2011中的2$^{26.23}$高效。对于$S=A_3 circ G circ A_2 circ G circ A_1 $,我们找到复杂度为2$^{27.71}$的$A_i$的方法比Moradi等人在ASIACRYPT 2016上介绍的方法更有效。此外,我们提出了一个新的分解$S=G circ A_2 circ G circ A_1 $。我们可以找到最快和最小的硬件分解实现的4位排列的TI与3和4份额。
{"title":"Secure and Efficient Masking of Lightweight Ciphers in Software and Hardware","authors":"Xuefeng Zhao","doi":"10.1093/comjnl/bxad002","DOIUrl":"https://doi.org/10.1093/comjnl/bxad002","url":null,"abstract":"Abstract Masking is a well used and widely deployed countermeasure against side channel attacks, both in software and hardware. With masking comes at a great cost, search has focused on how to lower a performance penalty or find efficient masking implementation. In particular, our contribution is 2-fold: for software masking, we first find bitsliced implementations of Sbox with Multiplicative Complexity 4 and Multiplicative Depth 2, then adapt the common shares approach introduced by Coron et al. at CHES 2016 to make many cross-products $a_{i}cdot b_{j}$ can be reuse for parallel ISW-based 32-bit nonlinear operations. Therefore, we improve the efficiency of 2$times b/4/32$ parallel high-order masking of ISW scheme for RECTANGLE, TANGRAM and KNOT on 32-bit ARM embedded microprocessor, with roughly a 13%-34% speed-up, at cost of $(1+d) times 32$-bit randomness. For hardware masking, 4 bit cubic Sboxes with quadratic decomposition length 2, including RECTANGLE, TANGRAM, KNOT and LWC third-round candidates, can be implemented with a 3-share and 4-share threshold implementation (TI) by decomposing cubic permutations $S$ as a composition of sub-permutations having lower algebraic degrees. We use two decomposition form: one composition of two quadratic permutations $G$ and $F$, $S = Fcirc G$, is for efficiency; the other composition of some linear permutations $A_i$ and one quadratic permutation $G$, $S=A_3 circ G circ A_2 circ G circ A_1 $, is for reducing the area requirements. For $S = Fcirc G$, we introduce a new approach of searching through all possible quadratic permutations $G$ with 2$^{25.71}$, which is effcient than 2$^{26.23}$ in Poschmann et al. at J. Cryptol 2011. For $S=A_3 circ G circ A_2 circ G circ A_1 $, our approach of finding $A_i$ with complexity 2$^{27.71} $, which is effcient than the method introduced by Moradi et al. at ASIACRYPT 2016. In addition, we proposes a new decomposition that $S=G circ A_2 circ G circ A_1 $. We can find the fastest and the smallest hard-ware decomposition implementation of 4-bit permutations for TI with 3 and 4 shares.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"72 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136326043","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers 修正:基于fpga的LSTM神经网络用于实时雷达告警接收机脉冲信号检测的性能评估
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-27 DOI: 10.1093/comjnl/bxad021
{"title":"Correction to: Performance Evaluation of FPGA-Based LSTM Neural Networks for Pulse Signal Detection on Real-Time Radar Warning Receivers","authors":"","doi":"10.1093/comjnl/bxad021","DOIUrl":"https://doi.org/10.1093/comjnl/bxad021","url":null,"abstract":"","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135946315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Encoding with Combination Orientation Technique for RDH in Dual Stego Images 双隐写图像中RDH的组合方向编码
4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-06 DOI: 10.1093/comjnl/bxac178
C Shaji, I Shatheesh Sam
Abstract In this paper, initially, message intensities are used to create two encoding tables: an index and a code sequence. The table is then updated with $n$ secret data encoded into it. If the code sequence of the second encoding table matches the code sequence of the preceding or succeeding half of the two encoding tables, the second encoding table is folded. The folding is done when maximum intensity occurs in the utmost succeeding part of the two encoding tables. Finally, using the combination orientation approach, the encoded indices are embedded in the stego images. In the extraction phase, using the two stego images and the encoding with the combination orientation method, the encoded indices are obtained. The decoding is performed to extract the secret message as well as the cover image and there is no occurrence of overflow and underflow problems. It has a high visual quality and a high embedding capacity. The proposed technique achieved a maximum $mathrm{PSNR}$ of $49.49$dB and a $648 242$-bit embedding capacity. When compared to traditional techniques, the experimental results show that the proposed method outperforms them.
在本文中,首先使用消息强度创建两个编码表:索引和代码序列。然后用编码到表中的$n$ secret数据更新表。如果第二编码表的编码序列与两个编码表的前一半或后一半的编码序列匹配,则折叠第二编码表。当两个编码表的最大后续部分出现最大强度时,就进行折叠。最后,采用组合取向方法,将编码后的索引嵌入到隐写图像中。在提取阶段,利用两幅隐写图像,采用组合取向法进行编码,得到编码后的索引。进行解码,提取密文和封面图像,不存在溢出和下溢问题。它具有高视觉质量和高嵌入能力。该技术实现了49.49美元dB的最大PSNR和648美元242美元比特的嵌入容量。实验结果表明,该方法优于传统方法。
{"title":"Encoding with Combination Orientation Technique for RDH in Dual Stego Images","authors":"C Shaji, I Shatheesh Sam","doi":"10.1093/comjnl/bxac178","DOIUrl":"https://doi.org/10.1093/comjnl/bxac178","url":null,"abstract":"Abstract In this paper, initially, message intensities are used to create two encoding tables: an index and a code sequence. The table is then updated with $n$ secret data encoded into it. If the code sequence of the second encoding table matches the code sequence of the preceding or succeeding half of the two encoding tables, the second encoding table is folded. The folding is done when maximum intensity occurs in the utmost succeeding part of the two encoding tables. Finally, using the combination orientation approach, the encoded indices are embedded in the stego images. In the extraction phase, using the two stego images and the encoding with the combination orientation method, the encoded indices are obtained. The decoding is performed to extract the secret message as well as the cover image and there is no occurrence of overflow and underflow problems. It has a high visual quality and a high embedding capacity. The proposed technique achieved a maximum $mathrm{PSNR}$ of $49.49$dB and a $648 242$-bit embedding capacity. When compared to traditional techniques, the experimental results show that the proposed method outperforms them.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134921182","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aplikasi Pemesanan E-Ticket di Kolam Renang Primer Koperasi Angkatan Laut (Primkopal) Lanmar Jakarta Berbasis Android dengan Metode First Come First Serve Menggunakan Android Studio dan Firebase 在雅加达皇家合作组织(Primkopal)的初级泳池E-Ticket应用程序中,它采用了先到先服务的方法,使用Android Studio和Firebase
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-01 DOI: 10.58477/cj.v1i1.63
Andi Nurwansyah, NM Faizah, Winton Ginting
Primkopal Lanmar Jakarta Swimming Pool is one of the swimming pools under the auspices of the Jakarta Marine Base Marine Cooperative Primary which is engaged in business, in the form of Pool Rentals. Until now, Pool Ticket Ordering is still done manually. The method used by the Primkopal Swimming Pool management is currently inefficient. Therefore, this study has the objectives, (1) Designing a swimming pool ticket booking application that can be easily and quickly accessed by customers via gadgets, (2) Designing a swimming pool ticket ordering application that can be used by employees to update availability status information swimming pool, and (3) Designing a swimming pool ticket booking application that can provide an overview of the facilities offered by Primkopal Swimming Pool. From this goal, the authors built and designed an Android-based application for ordering e-tickets at the Lanmar Jakarta Navy Cooperative Primary Pool (Primkopal) with the First Come First Serve method using Android Studio and Firebase. The final result of this research is to improve the quality and service for prospective purchasers of Primkopal Lanmar Jakarta Swimming Pool Tickets.
Primkopal Lanmar雅加达游泳池是雅加达海军基地海洋合作初级组织主持下的游泳池之一,该组织以游泳池租赁的形式开展业务。到目前为止,门票订购仍然是手动完成的。Primkopal游泳池目前使用的管理方法效率低下。因此,本研究的目标是:(1)设计一个顾客可以通过小工具方便快捷地访问的游泳池门票预订应用程序;(2)设计一个员工可以使用的游泳池可用状态信息更新的游泳池预订应用程序;(3)设计一个可以提供Primkopal游泳池提供的设施概述的游泳池门票预订应用程序。基于这一目标,作者使用Android Studio和Firebase构建并设计了一个基于Android的应用程序,用于在雅加达海军合作初级池(Primkopal)订购电子机票,采用先到先得的方法。本研究的最终结果是提高Primkopal Lanmar雅加达游泳池门票的潜在购买者的质量和服务。
{"title":"Aplikasi Pemesanan E-Ticket di Kolam Renang Primer Koperasi Angkatan Laut (Primkopal) Lanmar Jakarta Berbasis Android dengan Metode First Come First Serve Menggunakan Android Studio dan Firebase","authors":"Andi Nurwansyah, NM Faizah, Winton Ginting","doi":"10.58477/cj.v1i1.63","DOIUrl":"https://doi.org/10.58477/cj.v1i1.63","url":null,"abstract":"Primkopal Lanmar Jakarta Swimming Pool is one of the swimming pools under the auspices of the Jakarta Marine Base Marine Cooperative Primary which is engaged in business, in the form of Pool Rentals. Until now, Pool Ticket Ordering is still done manually. The method used by the Primkopal Swimming Pool management is currently inefficient. Therefore, this study has the objectives, (1) Designing a swimming pool ticket booking application that can be easily and quickly accessed by customers via gadgets, (2) Designing a swimming pool ticket ordering application that can be used by employees to update availability status information swimming pool, and (3) Designing a swimming pool ticket booking application that can provide an overview of the facilities offered by Primkopal Swimming Pool. From this goal, the authors built and designed an Android-based application for ordering e-tickets at the Lanmar Jakarta Navy Cooperative Primary Pool (Primkopal) with the First Come First Serve method using Android Studio and Firebase. The final result of this research is to improve the quality and service for prospective purchasers of Primkopal Lanmar Jakarta Swimming Pool Tickets.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"60 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84017405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Sistem Informasi Data Perkara Tindak Pidana Khusus Pada Kejaksaan Tinggi Aceh
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-01 DOI: 10.58477/cj.v1i1.33
M. Fikri, Imilda, Syarifuddin
The Aceh High Prosecutor's Office is one of the most important parts of the Unitary State of the Republic of Indonesia's High Prosecutor's office. The Aceh High Prosecutor's Office is the "spearhead" of the Prosecutor's Office, even the performance of the Aceh High Prosecutor's Office is often measured by the community through the success of the Aceh High Prosecutor's Office in handling specific criminal cases. One of the duties of the Aceh High Prosecutor's Office is to process data on case files which are numerous and complex. Good data management is needed to ensure that these data can be used to generate information and make decisions. From the description of the background, the author limits the problem only to the design of a special crime case data system at the Aceh High Prosecutor's Office. The purpose of the discussion is to find out and design a data system design for special criminal cases at the web-based Aceh High Court. For the perfection of this research, the authors collected data using several data collection methods, including using field studies and literature studies as well as the waterfall method as a system development model. The system will really help users or managers of special criminal case data at the Aceh High Court more quickly, easily and accurately in every activity related to Special Crimes.
亚齐高级检察官办公室是印度尼西亚共和国统一国家高级检察官办公室最重要的组成部分之一。亚齐高级检察官办公室是检察官办公室的“先锋”,甚至亚齐高级检察官办公室的表现也经常由社区通过亚齐高级检察官办公室在处理具体刑事案件方面的成功来衡量。亚齐高级检察官办公室的职责之一是处理大量和复杂的案件档案数据。需要良好的数据管理,以确保这些数据可用于生成信息和做出决策。从背景的描述来看,作者将问题局限于亚齐高级检察官办公室特别犯罪案件数据系统的设计。讨论的目的是为基于网络的亚齐高等法院的特殊刑事案件找出并设计一个数据系统。为了完善本研究,作者使用了多种数据收集方法收集数据,包括实地调查和文献研究,以及瀑布法作为系统开发模型。该系统将真正帮助亚齐高等法院特别刑事案件数据的用户或管理人员更快、更容易和更准确地处理与特别罪行有关的每一项活动。
{"title":"Sistem Informasi Data Perkara Tindak Pidana Khusus Pada Kejaksaan Tinggi Aceh","authors":"M. Fikri, Imilda, Syarifuddin","doi":"10.58477/cj.v1i1.33","DOIUrl":"https://doi.org/10.58477/cj.v1i1.33","url":null,"abstract":"The Aceh High Prosecutor's Office is one of the most important parts of the Unitary State of the Republic of Indonesia's High Prosecutor's office. The Aceh High Prosecutor's Office is the \"spearhead\" of the Prosecutor's Office, even the performance of the Aceh High Prosecutor's Office is often measured by the community through the success of the Aceh High Prosecutor's Office in handling specific criminal cases. One of the duties of the Aceh High Prosecutor's Office is to process data on case files which are numerous and complex. Good data management is needed to ensure that these data can be used to generate information and make decisions. From the description of the background, the author limits the problem only to the design of a special crime case data system at the Aceh High Prosecutor's Office. The purpose of the discussion is to find out and design a data system design for special criminal cases at the web-based Aceh High Court. For the perfection of this research, the authors collected data using several data collection methods, including using field studies and literature studies as well as the waterfall method as a system development model. The system will really help users or managers of special criminal case data at the Aceh High Court more quickly, easily and accurately in every activity related to Special Crimes.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"1 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84030735","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Aplikasi Pencarian Hotel di Kota Jakarta Berbasis Android dengan Metode Location Based Service (LBS) Menggunakan Android Studio 在雅加达,基于Android的基于基于系统定位服务(LBS)的酒店搜索应用使用Android Studio
IF 1.4 4区 计算机科学 Q4 COMPUTER SCIENCE, HARDWARE & ARCHITECTURE Pub Date : 2023-02-01 DOI: 10.58477/cj.v1i1.65
Deo Rangga Sada Siregar, Lucky Koryanto, NM Faizah
The hotel is a resort for Jakarta and out of town people. Not all hotel locations are known to the public. Both in Jakarta city and out of city. This is due to the lack of information about hotels in Depok City. In order to be able to quickly provide information that can be used anytime, anywhere, it is necessary to advance and develop the times, such as the use of today's technology. B. Using an Android-based smartphone application to help a member of the public find a location and find a route to his Hotel of interest. Jakarta city. The waterfall process model is adopted as a research method. The hotel search application implementation uses JavaScript programming using Android Studio, location-based services, and maps sourced from the Google Maps API. The results of the survey are provided in the form of an Android-based hotel locator application in Jakarta city, allowing residents inside and outside Jakarta to find information about hotels and easily route from the user's location to the desired hotel in Jakarta. You will be able to obtain Cities with the help of GPS.
这家酒店是雅加达和外地人的度假胜地。并非所有酒店的位置都为公众所知。无论是在雅加达市内还是城外。这是由于缺乏关于德博城酒店的信息。为了能够快速地提供随时随地都可以使用的信息,就需要时代的进步和发展,比如今天的技术的使用。B.使用基于android的智能手机应用程序来帮助公众找到他感兴趣的酒店的位置和路线。雅加达的城市。采用瀑布过程模型作为研究方法。酒店搜索应用程序的实现使用JavaScript编程,使用Android Studio、基于位置的服务和来自Google maps API的地图。调查结果以雅加达市基于android的酒店定位应用程序的形式提供,允许雅加达内外的居民查找有关酒店的信息,并轻松地从用户所在位置到达雅加达所需的酒店。你将能够在GPS的帮助下获得城市。
{"title":"Aplikasi Pencarian Hotel di Kota Jakarta Berbasis Android dengan Metode Location Based Service (LBS) Menggunakan Android Studio","authors":"Deo Rangga Sada Siregar, Lucky Koryanto, NM Faizah","doi":"10.58477/cj.v1i1.65","DOIUrl":"https://doi.org/10.58477/cj.v1i1.65","url":null,"abstract":"The hotel is a resort for Jakarta and out of town people. Not all hotel locations are known to the public. Both in Jakarta city and out of city. This is due to the lack of information about hotels in Depok City. In order to be able to quickly provide information that can be used anytime, anywhere, it is necessary to advance and develop the times, such as the use of today's technology. B. Using an Android-based smartphone application to help a member of the public find a location and find a route to his Hotel of interest. Jakarta city. The waterfall process model is adopted as a research method. The hotel search application implementation uses JavaScript programming using Android Studio, location-based services, and maps sourced from the Google Maps API. The results of the survey are provided in the form of an Android-based hotel locator application in Jakarta city, allowing residents inside and outside Jakarta to find information about hotels and easily route from the user's location to the desired hotel in Jakarta. You will be able to obtain Cities with the help of GPS.","PeriodicalId":50641,"journal":{"name":"Computer Journal","volume":"21 1","pages":""},"PeriodicalIF":1.4,"publicationDate":"2023-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87820868","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
Computer Journal
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1