首页 > 最新文献

信息安全(英文)最新文献

英文 中文
The History, Trend, types, and Mitigation of Distributed Denial of Service Attacks 分布式拒绝服务攻击的历史、趋势、类型和缓解措施
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144026
Richard Kabanda, Bertrand Byera, Henrietta Emeka
Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.
随着时间的推移,世界已经数字化,人们完全依赖互联网。更多的小工具在互联网生态系统中不断相互连接。这一事实使互联网成为每个人的全球信息来源。尽管如此,网络犯罪分子的攻击知识已经得到了发展,并导致了互联网及其数据存储的不同攻击方法。本文将讨论拒绝服务(DoS)和分布式拒绝服务(DDoS)的起源和意义。这些类型的攻击仍然是坏人用来给全球组织造成运营、声誉和财务损失的最有效的方法。这些类型的攻击阻碍了网络性能和可用性。受害者的网络充斥着大量的非法流量,因此拒绝了授权用户的真正流量通过。本文将探讨这种网络威胁的检测机制和缓解技术。
{"title":"The History, Trend, types, and Mitigation of Distributed Denial of Service Attacks","authors":"Richard Kabanda, Bertrand Byera, Henrietta Emeka","doi":"10.4236/jis.2023.144026","DOIUrl":"https://doi.org/10.4236/jis.2023.144026","url":null,"abstract":"Over time, the world has transformed digitally and there is total dependence on the internet. Many more gadgets are continuously interconnected in the internet ecosystem. This fact has made the Internet a global information source for every being. Despite all this, attacker knowledge by cybercriminals has advanced and resulted in different attack methodologies on the internet and its data stores. This paper will discuss the origin and significance of Denial of Service (DoS) and Distributed Denial of Service (DDoS). These kinds of attacks remain the most effective methods used by the bad guys to cause substantial damage in terms of operational, reputational, and financial damage to organizations globally. These kinds of attacks have hindered network performance and availability. The victim’s network is flooded with massive illegal traffic hence, denying genuine traffic from passing through for authorized users. The paper will explore detection mechanisms, and mitigation techniques for this network threat.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"2014 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211766","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Extensive Study and Review of Privacy Preservation Models for the Multi-Institutional Data 多机构数据隐私保护模型的广泛研究与回顾
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144020
Sagarkumar Patel, Rachna Patel, Ashok Akbari, Srinivasa Reddy Mukkala
The deep learning models hold considerable potential for clinical applications, but there are many challenges to successfully training deep learning models. Large-scale data collection is required, which is frequently only possible through multi-institutional cooperation. Building large central repositories is one strategy for multi-institution studies. However, this is hampered by issues regarding data sharing, including patient privacy, data de-identification, regulation, intellectual property, and data storage. These difficulties have lessened the impracticality of central data storage. In this survey, we will look at 24 research publications that concentrate on machine learning approaches linked to privacy preservation techniques for multi-institutional data, highlighting the multiple shortcomings of the existing methodologies. Researching different approaches will be made simpler in this case based on a number of factors, such as performance measures, year of publication and journals, achievements of the strategies in numerical assessments, and other factors. A technique analysis that considers the benefits and drawbacks of the strategies is additionally provided. The article also looks at some potential areas for future research as well as the challenges associated with increasing the accuracy of privacy protection techniques. The comparative evaluation of the approaches offers a thorough justification for the research’s purpose.
深度学习模型在临床应用中具有相当大的潜力,但要成功训练深度学习模型存在许多挑战。需要大规模的数据收集,而这往往只有通过多机构合作才能实现。构建大型中央存储库是多机构研究的一种策略。然而,这受到数据共享问题的阻碍,包括患者隐私、数据去识别、监管、知识产权和数据存储。这些困难减少了中央数据存储的不可行性。在本调查中,我们将研究24篇研究出版物,这些出版物专注于与多机构数据隐私保护技术相关的机器学习方法,突出了现有方法的多个缺点。在这种情况下,根据一些因素,如业绩衡量、出版年份和期刊、战略在数字评估方面的成就以及其他因素,研究不同的方法将变得更简单。另外还提供了考虑这些策略的优点和缺点的技术分析。本文还探讨了未来研究的一些潜在领域,以及与提高隐私保护技术准确性相关的挑战。对这些方法的比较评价为研究目的提供了充分的理由。
{"title":"An Extensive Study and Review of Privacy Preservation Models for the Multi-Institutional Data","authors":"Sagarkumar Patel, Rachna Patel, Ashok Akbari, Srinivasa Reddy Mukkala","doi":"10.4236/jis.2023.144020","DOIUrl":"https://doi.org/10.4236/jis.2023.144020","url":null,"abstract":"The deep learning models hold considerable potential for clinical applications, but there are many challenges to successfully training deep learning models. Large-scale data collection is required, which is frequently only possible through multi-institutional cooperation. Building large central repositories is one strategy for multi-institution studies. However, this is hampered by issues regarding data sharing, including patient privacy, data de-identification, regulation, intellectual property, and data storage. These difficulties have lessened the impracticality of central data storage. In this survey, we will look at 24 research publications that concentrate on machine learning approaches linked to privacy preservation techniques for multi-institutional data, highlighting the multiple shortcomings of the existing methodologies. Researching different approaches will be made simpler in this case based on a number of factors, such as performance measures, year of publication and journals, achievements of the strategies in numerical assessments, and other factors. A technique analysis that considers the benefits and drawbacks of the strategies is additionally provided. The article also looks at some potential areas for future research as well as the challenges associated with increasing the accuracy of privacy protection techniques. The comparative evaluation of the approaches offers a thorough justification for the research’s purpose.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136053659","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Domestic Cyberterrorism & Strategic Communications: Literature Review 国内网络恐怖主义战略传播:文献综述
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144027
Robb Shawe, Ian R. McAndrew
Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, healthcare and public health, and transportation systems virtually at risk. Consequently, this is due primarily to the country’s heavy dependence on computer networks. With both domestic and international terrorists increasingly targeting any vulnerabilities in computer systems and networks, information sharing among security agencies has become critical. Cyberterrorism can be regarded as the purest form of information warfare. This literature review examines cyberterrorism and strategic communications, focusing on domestic cyberterrorism. Notable themes include the meaning of cyberterrorism, how cyberterrorism differs from cybercrime, and the threat posed by cyberterrorism to the USA. Prevention and deterrence of cyberterrorism through information sharing and legislation are also key themes. Finally, gaps in knowledge are identified, and questions warranting additional research are outlined.
网络恐怖主义对美利坚合众国(美国)的国家安全构成重大威胁,商业设施、水坝、应急服务、粮食和农业、医疗保健和公共卫生以及运输系统等关键基础设施实际上面临风险。因此,这主要是由于该国对计算机网络的严重依赖。随着国内和国际恐怖分子越来越多地瞄准计算机系统和网络的任何漏洞,安全机构之间的信息共享变得至关重要。网络恐怖主义可以被视为最纯粹的信息战形式。这篇文献综述研究了网络恐怖主义和战略传播,重点是国内网络恐怖主义。值得注意的主题包括网络恐怖主义的含义,网络恐怖主义与网络犯罪的区别,以及网络恐怖主义对美国构成的威胁。通过信息共享和立法预防和威慑网络恐怖主义也是关键主题。最后,确定了知识上的差距,并概述了需要进一步研究的问题。
{"title":"Domestic Cyberterrorism & Strategic Communications: Literature Review","authors":"Robb Shawe, Ian R. McAndrew","doi":"10.4236/jis.2023.144027","DOIUrl":"https://doi.org/10.4236/jis.2023.144027","url":null,"abstract":"Cyberterrorism poses a significant threat to the national security of the United States of America (USA), with critical infrastructure, such as commercial facilities, dams, emergency services, food and agriculture, healthcare and public health, and transportation systems virtually at risk. Consequently, this is due primarily to the country’s heavy dependence on computer networks. With both domestic and international terrorists increasingly targeting any vulnerabilities in computer systems and networks, information sharing among security agencies has become critical. Cyberterrorism can be regarded as the purest form of information warfare. This literature review examines cyberterrorism and strategic communications, focusing on domestic cyberterrorism. Notable themes include the meaning of cyberterrorism, how cyberterrorism differs from cybercrime, and the threat posed by cyberterrorism to the USA. Prevention and deterrence of cyberterrorism through information sharing and legislation are also key themes. Finally, gaps in knowledge are identified, and questions warranting additional research are outlined.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135211762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
User Station Security Protection Method Based on Random Domain Name Detection and Active Defense 基于随机域名检测和主动防御的用户站安全防护方法
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.141004
Hongyan Yin, Xiaokang Ren, Jinyu Liu, Shuo Zhang, Wenkun Liu
{"title":"User Station Security Protection Method Based on Random Domain Name Detection and Active Defense","authors":"Hongyan Yin, Xiaokang Ren, Jinyu Liu, Shuo Zhang, Wenkun Liu","doi":"10.4236/jis.2023.141004","DOIUrl":"https://doi.org/10.4236/jis.2023.141004","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334576","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Closing the Cybersecurity Skill Gap in Kenya: Curriculum Interventions in Higher Education 关闭网络安全技能差距在肯尼亚:课程干预高等教育
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.142009
R. M. Kaibiru, Simon M. Karume, Faith Kibas, Martin Luther Bwangah Onga’nyo
{"title":"Closing the Cybersecurity Skill Gap in Kenya: Curriculum Interventions in Higher Education","authors":"R. M. Kaibiru, Simon M. Karume, Faith Kibas, Martin Luther Bwangah Onga’nyo","doi":"10.4236/jis.2023.142009","DOIUrl":"https://doi.org/10.4236/jis.2023.142009","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70335265","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Systematic Review: Analysis of Coding Vulnerabilities across Languages 系统回顾:跨语言编码漏洞分析
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144019
Shreyas Sakharkar
The boom of coding languages in the 1950s revolutionized how our digital world was construed and accessed. The languages invented then, including Fortran, are still in use today due to their versatility and ability to underpin a large majority of the older portions of our digital world and applications. Fortran, or Formula Translation, was a programming language implemented by IBM that shortened the apparatus of coding and the efficacy of the language syntax. Fortran marked the beginning of a new era of efficient programming by reducing the number of statements needed to operate a machine several-fold. Since then, dozens more languages have come into regular practice and have been increasingly diversified over the years. Some modern languages include Python, Java, JavaScript, C, C++, and PHP. These languages significantly improved efficiency and also have a broad range of uses. Python is mainly used for website/software development, data analysis, task automation, image processing, and graphic design applications. On the other hand, Java is primarily used as a client-side programming language. Expanding the coding languages allowed for increasing accessibility but also opened up applications to pertinent security issues. These security issues have varied by prevalence and language. Previous research has narrowed its focus on individual languages, failing to evaluate the security. This research paper investigates the severity and frequency of coding vulnerabilities comparatively across different languages and contextualizes their uses in a systematic literature review.
20世纪50年代编码语言的繁荣彻底改变了我们对数字世界的理解和访问方式。当时发明的语言,包括Fortran,至今仍在使用,因为它们的多功能性和支撑我们数字世界和应用程序的大部分旧部分的能力。Fortran,即公式翻译,是一种由IBM实现的编程语言,它缩短了编码设备和语言语法的有效性。Fortran将操作机器所需的语句数量减少了几倍,标志着高效编程新时代的开始。从那时起,数十种语言进入了常规实践,并且多年来越来越多样化。一些现代语言包括Python、Java、JavaScript、C、c++和PHP。这些语言显著地提高了效率,并且具有广泛的用途。Python主要用于网站/软件开发、数据分析、任务自动化、图像处理和平面设计应用程序。另一方面,Java主要用作客户端编程语言。扩展编码语言可以增加可访问性,但也使应用程序面临相关的安全问题。这些安全问题因流行程度和语言而异。之前的研究只关注单个语言,没有对安全性进行评估。本文对不同语言中编码漏洞的严重程度和频率进行了比较研究,并对其使用进行了系统的文献综述。
{"title":"Systematic Review: Analysis of Coding Vulnerabilities across Languages","authors":"Shreyas Sakharkar","doi":"10.4236/jis.2023.144019","DOIUrl":"https://doi.org/10.4236/jis.2023.144019","url":null,"abstract":"The boom of coding languages in the 1950s revolutionized how our digital world was construed and accessed. The languages invented then, including Fortran, are still in use today due to their versatility and ability to underpin a large majority of the older portions of our digital world and applications. Fortran, or Formula Translation, was a programming language implemented by IBM that shortened the apparatus of coding and the efficacy of the language syntax. Fortran marked the beginning of a new era of efficient programming by reducing the number of statements needed to operate a machine several-fold. Since then, dozens more languages have come into regular practice and have been increasingly diversified over the years. Some modern languages include Python, Java, JavaScript, C, C++, and PHP. These languages significantly improved efficiency and also have a broad range of uses. Python is mainly used for website/software development, data analysis, task automation, image processing, and graphic design applications. On the other hand, Java is primarily used as a client-side programming language. Expanding the coding languages allowed for increasing accessibility but also opened up applications to pertinent security issues. These security issues have varied by prevalence and language. Previous research has narrowed its focus on individual languages, failing to evaluate the security. This research paper investigates the severity and frequency of coding vulnerabilities comparatively across different languages and contextualizes their uses in a systematic literature review.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"135798382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem 基于理想格和中国剩余定理的无界全同态加密方案
Pub Date : 2023-01-01 DOI: 10.4236/jis.2023.144021
Zhiyong Zheng, Fengxia Liu, Kun Tian
We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos [1] in 1978, and to some new problems that appeared in Peikert [2] as open questions 10 and open questions 11 a few years ago. Our scheme is completely different from the breakthrough work [3] of Gentry in 2009. Gentry’s bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of an unbounded FHE scheme is straightforward and can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique.
我们提出了一种无界全同态加密方案,即允许人们在不需要解密数据或不知道解密密钥的情况下对加密数据进行任何所需函数的计算。这是对Rivest、Adleman和Dertouzos[1]在1978年提出的一个老问题的理性解决,也是对几年前在Peikert[2]中作为开放问题10和开放问题11出现的一些新问题的理性解决。我们的方案与Gentry在2009年的突破性工作[3]完全不同。Gentry的自引导技术从某种程度上同态的加密方案构建了一个完全同态的加密(FHE)方案,该方案强大到足以评估其自身的解密函数。迄今为止,它仍然是唯一已知的获得无界FHE的方法。我们构造的无界FHE方案简单明了,可以在任何刷新的密文上处理无界同态计算,而不需要自提变换技术。
{"title":"An Unbounded Fully Homomorphic Encryption Scheme Based on Ideal Lattices and Chinese Remainder Theorem","authors":"Zhiyong Zheng, Fengxia Liu, Kun Tian","doi":"10.4236/jis.2023.144021","DOIUrl":"https://doi.org/10.4236/jis.2023.144021","url":null,"abstract":"We propose an unbounded fully homomorphic encryption scheme, i.e. a scheme that allows one to compute on encrypted data for any desired functions without needing to decrypt the data or knowing the decryption keys. This is a rational solution to an old problem proposed by Rivest, Adleman, and Dertouzos [1] in 1978, and to some new problems that appeared in Peikert [2] as open questions 10 and open questions 11 a few years ago. Our scheme is completely different from the breakthrough work [3] of Gentry in 2009. Gentry’s bootstrapping technique constructs a fully homomorphic encryption (FHE) scheme from a somewhat homomorphic one that is powerful enough to evaluate its own decryption function. To date, it remains the only known way of obtaining unbounded FHE. Our construction of an unbounded FHE scheme is straightforward and can handle unbounded homomorphic computation on any refreshed ciphertexts without bootstrapping transformation technique.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"36 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2023-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"136208528","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Meta-Review of Recent and Landmark Honeypot Research and Surveys 最近和具有里程碑意义的蜜罐研究和调查的元综述
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134011
Gbenga Ikuomenisan, Y. Morgan
{"title":"Meta-Review of Recent and Landmark Honeypot Research and Surveys","authors":"Gbenga Ikuomenisan, Y. Morgan","doi":"10.4236/jis.2022.134011","DOIUrl":"https://doi.org/10.4236/jis.2022.134011","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334863","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Hybrid Successive CFA Image Encryption-Watermarking Algorithm Based on the Quaternionic Wavelet Transform (QWT) 基于四元数小波变换(QWT)的混合连续CFA图像加密-水印算法
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.134013
Hervé Abena Ndongo, Marcelin Vournone, Mireille Pouyap, Taya Ngakawa, Paul Abena Malobe
In this paper, we present a new robust hybrid algorithm combining successively chaotic encryption and blind watermarking of images based on the quaternionic wavelet transform (QWT) to ensure the secure transfer of digital data. The calculations of the different evaluation parameters have been per-formed in order to determine the robustness of our algorithm to certain attacks. The application of this hybrid algorithm on CFA (Color Filter Array) images, allowed us to guarantee the integrity of the digital data and to pro-pose an autonomous transmission system. The results obtained after simulation of this successive hybrid algorithm of chaotic encryption and then blind watermarking are appreciated through the values of the evaluation parameters which are the peak signal-to-noise ratio (PSNR) and the correlation coefficient (CC), and by the visual observation of the extracted watermarks before and after attacks. The values of these parameters show that this successive hybrid algorithm is robust against some conventional attacks.
本文提出了一种基于四元数小波变换(QWT)的图像连续混沌加密与盲水印相结合的鲁棒混合算法,以保证数字数据的安全传输。对不同的评估参数进行了计算,以确定算法对某些攻击的鲁棒性。该混合算法在彩色滤波阵列(CFA)图像上的应用,使我们能够保证数字数据的完整性,并提出一个自主传输系统。通过峰值信噪比(PSNR)和相关系数(CC)的评价参数值,以及攻击前后提取的水印的目视观察,对该混沌加密-盲水印连续混合算法的仿真结果进行评价。这些参数的值表明,该连续混合算法对一些常规攻击具有鲁棒性。
{"title":"Hybrid Successive CFA Image Encryption-Watermarking Algorithm Based on the Quaternionic Wavelet Transform (QWT)","authors":"Hervé Abena Ndongo, Marcelin Vournone, Mireille Pouyap, Taya Ngakawa, Paul Abena Malobe","doi":"10.4236/jis.2022.134013","DOIUrl":"https://doi.org/10.4236/jis.2022.134013","url":null,"abstract":"In this paper, we present a new robust hybrid algorithm combining successively chaotic encryption and blind watermarking of images based on the quaternionic wavelet transform (QWT) to ensure the secure transfer of digital data. The calculations of the different evaluation parameters have been per-formed in order to determine the robustness of our algorithm to certain attacks. The application of this hybrid algorithm on CFA (Color Filter Array) images, allowed us to guarantee the integrity of the digital data and to pro-pose an autonomous transmission system. The results obtained after simulation of this successive hybrid algorithm of chaotic encryption and then blind watermarking are appreciated through the values of the evaluation parameters which are the peak signal-to-noise ratio (PSNR) and the correlation coefficient (CC), and by the visual observation of the extracted watermarks before and after attacks. The values of these parameters show that this successive hybrid algorithm is robust against some conventional attacks.","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"1 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334910","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Verifiable Credentials System with Privacy-Preserving Based on Blockchain 基于区块链的可验证隐私保护凭证系统
Pub Date : 2022-01-01 DOI: 10.4236/jis.2022.132003
Zhiji Li
{"title":"A Verifiable Credentials System with Privacy-Preserving Based on Blockchain","authors":"Zhiji Li","doi":"10.4236/jis.2022.132003","DOIUrl":"https://doi.org/10.4236/jis.2022.132003","url":null,"abstract":"","PeriodicalId":57259,"journal":{"name":"信息安全(英文)","volume":"37 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2022-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70334692","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
期刊
信息安全(英文)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1