首页 > 最新文献

International journal of network security & its applications最新文献

英文 中文
A k-Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution 基于密度分布的多边形k-匿名位置隐私保护方法
Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).08
Yong-Bing Zhang, Qiu-yu Zhang, Yan Yan, Yiqiang Jiang, Mo-yi Zhang
In order to solve the problem of out-off-balance caused by accuracy of location information between privacy protection security and query service quality, considering basic information comprehensively such as the environment and geographical features and so on, and adopting k- anonymous privacy protection mechanism, we present a k-anonymous location privacy protection method of polygon based on density distribution. Firstly, a k-anonymous irregular polygon region is structured in whole area. Then, according to the preset anonymous region and density threshold, the better effects of anonymous are obtained by expanding the region or adding the random dummy locations. Experimental results show that the proposed method improves the efficiency of anonymous and query accuracy. The balance between privacy protection security and query quality is achieved.
为解决位置信息准确性导致的隐私保护安全性与查询服务质量失衡问题,综合考虑环境、地理特征等基础信息,采用k-匿名隐私保护机制,提出了一种基于密度分布的多边形k-匿名位置隐私保护方法。首先,在整个区域内构造一个k-匿名不规则多边形区域;然后,根据预先设定的匿名区域和密度阈值,通过扩大区域或添加随机虚拟位置来获得较好的匿名效果。实验结果表明,该方法提高了匿名效率和查询精度。在隐私保护安全性和查询质量之间取得平衡。
{"title":"A k-Anonymous Location Privacy Protection Method of Polygon Based on Density Distribution","authors":"Yong-Bing Zhang, Qiu-yu Zhang, Yan Yan, Yiqiang Jiang, Mo-yi Zhang","doi":"10.6633/IJNS.202101_23(1).08","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).08","url":null,"abstract":"In order to solve the problem of out-off-balance caused by accuracy of location information between privacy protection security and query service quality, considering basic information comprehensively such as the environment and geographical features and so on, and adopting k- anonymous privacy protection mechanism, we present a k-anonymous location privacy protection method of polygon based on density distribution. Firstly, a k-anonymous irregular polygon region is structured in whole area. Then, according to the preset anonymous region and density threshold, the better effects of anonymous are obtained by expanding the region or adding the random dummy locations. Experimental results show that the proposed method improves the efficiency of anonymous and query accuracy. The balance between privacy protection security and query quality is achieved.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"42 1","pages":"57-66"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"84518428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Locking the door: tackling credential abuse 锁门:解决证书滥用问题
Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00030-1
Steve Mansfield-Devine
{"title":"Locking the door: tackling credential abuse","authors":"Steve Mansfield-Devine","doi":"10.1016/S1353-4858(21)00030-1","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00030-1","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"104 1","pages":"11-19"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"74568344","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing 基于访问树结构修剪的云计算访问控制方案
Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).17
Zeyu Wang, Min-Xu Gao, Lu Chen, Shimin Sun
In the era of rapid development of information, people are spreading and sharing information all the time. These resources bring us a lot of privacy challenges while bringing us convenience. Therefore, We propose an attribute based encryption access control scheme based on access tree structure pruning (ATSP-ABE). The scheme mainly prune the branch of the ID attribute of the right subtree user managed by the Data Owner (DO) and design the permission access attribute as the leaf node to replace the branch. For the left subtree of the access tree managed by the Attribute Authorization Center (AAC) the decision tree is generated by the data of the user feature attribute and the subtree with the best pruning performance is selected as the pruning result. Finally, pruning the reduced feature attributes in the decision tree in the access left subtree. The experimental results show that the ATSPABE scheme can improve the computational efficiency of attribute-based access control encryption, decryption and user attribute revocation in cloud computing. More than that makes the access tree structure more concise and strengthen the DO control attribute ability. Reducing Calculation overhead in the process of encryption and decryption of DO and AAC.
在信息快速发展的时代,人们每时每刻都在传播和分享信息。这些资源在给我们带来便利的同时,也给我们带来了很多隐私方面的挑战。因此,我们提出了一种基于访问树结构修剪(ATSP-ABE)的基于属性的加密访问控制方案。该方案主要对DO (Data Owner)所管理的权限子树用户ID属性的分支进行剪枝,并将权限访问属性设计为叶子节点来代替该分支。对于属性授权中心(Attribute Authorization Center, AAC)管理的访问树的左子树,由用户特征属性数据生成决策树,并选择剪枝性能最好的子树作为剪枝结果。最后,在访问左子树中对决策树中的约简特征属性进行剪枝。实验结果表明,ATSPABE方案可以提高云计算中基于属性的访问控制加解密和用户属性撤销的计算效率。使访问树结构更加简洁,增强了DO控制属性能力。减少了DO和AAC加解密过程中的计算开销。
{"title":"An Access Control Scheme Based on Access Tree Structure Pruning for Cloud Computing","authors":"Zeyu Wang, Min-Xu Gao, Lu Chen, Shimin Sun","doi":"10.6633/IJNS.202101_23(1).17","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).17","url":null,"abstract":"In the era of rapid development of information, people are spreading and sharing information all the time. These resources bring us a lot of privacy challenges while bringing us convenience. Therefore, We propose an attribute based encryption access control scheme based on access tree structure pruning (ATSP-ABE). The scheme mainly prune the branch of the ID attribute of the right subtree user managed by the Data Owner (DO) and design the permission access attribute as the leaf node to replace the branch. For the left subtree of the access tree managed by the Attribute Authorization Center (AAC) the decision tree is generated by the data of the user feature attribute and the subtree with the best pruning performance is selected as the pruning result. Finally, pruning the reduced feature attributes in the decision tree in the access left subtree. The experimental results show that the ATSPABE scheme can improve the computational efficiency of attribute-based access control encryption, decryption and user attribute revocation in cloud computing. More than that makes the access tree structure more concise and strengthen the DO control attribute ability. Reducing Calculation overhead in the process of encryption and decryption of DO and AAC.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"27 1","pages":"143-156"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"80730383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise 基于阈值的实时分析,利用SIEM专业知识进行端点异常的早期检测
Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00039-8
Sivaraman Eswaran, Aruna Srinivasan, Prasad B. Honnavalli
{"title":"A threshold-based, real-time analysis in early detection of endpoint anomalies using SIEM expertise","authors":"Sivaraman Eswaran, Aruna Srinivasan, Prasad B. Honnavalli","doi":"10.1016/S1353-4858(21)00039-8","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00039-8","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"44 1","pages":"7-16"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"89077296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Agile security testing 敏捷安全测试
Pub Date : 2021-01-01 DOI: 10.1016/S1353-4858(21)00042-8
D. Fox
{"title":"Agile security testing","authors":"D. Fox","doi":"10.1016/S1353-4858(21)00042-8","DOIUrl":"https://doi.org/10.1016/S1353-4858(21)00042-8","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"19 1","pages":"20"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"82033084","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Differentially Private K-means Clustering Scheme for Smart Grid 一种智能电网差分私有k均值聚类方案
Pub Date : 2021-01-01 DOI: 10.6633/IJNS.202101_23(1).15
Shuai Guo, Mi Wen, Xiao-Cong Liang
{"title":"A Differentially Private K-means Clustering Scheme for Smart Grid","authors":"Shuai Guo, Mi Wen, Xiao-Cong Liang","doi":"10.6633/IJNS.202101_23(1).15","DOIUrl":"https://doi.org/10.6633/IJNS.202101_23(1).15","url":null,"abstract":"","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"29 1","pages":"126-134"},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"85542578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Secure Blockchain Decentralized Voting for Verified Users 为经过验证的用户提供安全的区块链分散投票
Pub Date : 2021-01-01 DOI: 10.5121/ijnsa.2021.13502
P. Pospiech, Aleksander Marianski, M. Kedziora
The paper focuses onintroducing a decentralized e-voting scheme that uses blockchain to achieve security and anonymity. A blockchain network based on Ethereum was applied, to provide a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, smart contractswere used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. The proof-of-conceptimplementation uses the blind signature protocol and encryption with the RSA algorithm. Presented in this paper scheme for blockchain decentralized voting is fully implemented and potential issues are analyzed and discussed.
本文重点介绍了一种利用区块链实现安全性和匿名性的去中心化电子投票方案。应用基于以太坊的区块链网络,提供基于点对点架构的去中心化分布式数据库。在实施过程中,使用了智能合约。因此,可以对执行交易所需的合同条款进行编码。概念验证实现使用盲签名协议和RSA算法加密。本文提出了区块链去中心化投票方案,并对潜在问题进行了分析和讨论。
{"title":"Secure Blockchain Decentralized Voting for Verified Users","authors":"P. Pospiech, Aleksander Marianski, M. Kedziora","doi":"10.5121/ijnsa.2021.13502","DOIUrl":"https://doi.org/10.5121/ijnsa.2021.13502","url":null,"abstract":"The paper focuses onintroducing a decentralized e-voting scheme that uses blockchain to achieve security and anonymity. A blockchain network based on Ethereum was applied, to provide a decentralized and distributed database based on the Peer-to-Peer architecture. During the implementation, smart contractswere used. Thanks to this, it is possible to code the terms of the contract required to perform the transaction. The proof-of-conceptimplementation uses the blind signature protocol and encryption with the RSA algorithm. Presented in this paper scheme for blockchain decentralized voting is fully implemented and potential issues are analyzed and discussed.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"46 1","pages":""},"PeriodicalIF":0.0,"publicationDate":"2021-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87371029","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm 基于层次自收敛PCA-OCSVM算法的入侵检测方法研究
Pub Date : 2020-11-01 DOI: 10.6633/IJNS.202011_22(6).04
Yanpeng Cui, Zichuan Jin, Jianwei Hu
At present, traditional intrusion detection methods have some shortcomings, such as long detection time, low detection accuracy and poor classification effect. This paper will combine PCA and OCSVM algorithm to build a multi-level intrusion detection model, using attack feature analysis method to preprocess data, while data cleaning and data feature selection of training set. It highlights the characteristics of abnormal data and normal data, and weakens the influence of irrelevant features on training model. PCA algorithm is used to process data to improve detection rate and reduce noise. Different models are trained by different data features to detect four attack types, namely Probe, DDOS, R2L and U2R. The optimal dimension of PCA is automatically obtained by calculating the contribution rate M of feature, which improves the traditional method that requires frequent input of K value. The model is trained by using OCSVM algorithm based on RBF core, and the disadvantage of poor classification effect of OCSVM algorithm is eliminated through improved multi-layer detection mechanism. Finally, the KDDCUP99 data set is used for experimental verification. The results show that the proposed method has more advantages than the traditional detection method.
目前,传统的入侵检测方法存在检测时间长、检测准确率低、分类效果差等缺点。本文将PCA与OCSVM算法相结合,构建多级入侵检测模型,采用攻击特征分析方法对数据进行预处理,同时对训练集进行数据清洗和数据特征选择。它突出了异常数据和正常数据的特征,弱化了不相关特征对训练模型的影响。采用PCA算法对数据进行处理,提高了检测率,降低了噪声。利用不同的数据特征训练不同的模型,检测Probe、DDOS、R2L和U2R四种攻击类型。通过计算特征的贡献率M,自动得到主成分分析的最优维数,改进了需要频繁输入K值的传统方法。采用基于RBF核的OCSVM算法对模型进行训练,并通过改进的多层检测机制消除了OCSVM算法分类效果差的缺点。最后利用KDDCUP99数据集进行实验验证。结果表明,该方法比传统的检测方法具有更多的优点。
{"title":"Research on Intrusion Detection Method Based on Hierarchical Self-convergence PCA-OCSVM Algorithm","authors":"Yanpeng Cui, Zichuan Jin, Jianwei Hu","doi":"10.6633/IJNS.202011_22(6).04","DOIUrl":"https://doi.org/10.6633/IJNS.202011_22(6).04","url":null,"abstract":"At present, traditional intrusion detection methods have some shortcomings, such as long detection time, low detection accuracy and poor classification effect. This paper will combine PCA and OCSVM algorithm to build a multi-level intrusion detection model, using attack feature analysis method to preprocess data, while data cleaning and data feature selection of training set. It highlights the characteristics of abnormal data and normal data, and weakens the influence of irrelevant features on training model. PCA algorithm is used to process data to improve detection rate and reduce noise. Different models are trained by different data features to detect four attack types, namely Probe, DDOS, R2L and U2R. The optimal dimension of PCA is automatically obtained by calculating the contribution rate M of feature, which improves the traditional method that requires frequent input of K value. The model is trained by using OCSVM algorithm based on RBF core, and the disadvantage of poor classification effect of OCSVM algorithm is eliminated through improved multi-layer detection mechanism. Finally, the KDDCUP99 data set is used for experimental verification. The results show that the proposed method has more advantages than the traditional detection method.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"26 1","pages":"916-924"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"87466860","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Research on Blockchain Technologies in Bidding Systems 区块链技术在招标系统中的应用研究
Pub Date : 2020-11-01 DOI: 10.6633/IJNS.202011_22(6).01
Yi-Hui Chen, Li-Chin Huang, I. Lin, M. Hwang
Due to the popularity of the Internet, people are increasingly accepting the integration of electronic service applications. Whether it is communication, trading, or transportation, these have gradually changed people's lifestyles. Electronic auctions have also become one of the popular e-commerce activities. Electronic auction systems usually include bidders, auctioneers, and third parties that allow bidders to bid via the Internet. It replaces the inconvenience and low efficiency of traditional tendering. Electronic auctions can be divided into two types: open bidding and sealed bidding. The public bidding method is to continuously increase the bidding price until no bidder is willing to pay a higher bid. The deadline has arrived. The highest bidder is the winner of the public tender. Since bidders can bid multiple times, this bidding method is also called multiple bidding. The bidding method for sealed bids is that the bidder can only send the bill once. Once the deadline arrives, the auctioneer will compare all bills. The bidder with the highest bid is the winner of the "sealed bid". Since bidders can only bid once, this bidding method is also called a single bid auction. Both bidding methods have their practicability. But no matter what kind of bidding. It should rely on intermediaries to allow buyers and sellers to conduct transactions. Lead to trust and transaction cost issues. In this regard, we will use blockchain technology to develop smart contracts for public bidding and sealed bidding. It uses the characteristics of blockchain decentralization and low transaction costs to improve the shortcomings of electronic auctions.
由于互联网的普及,人们越来越接受电子服务应用的一体化。无论是通讯、贸易还是交通,这些都逐渐改变了人们的生活方式。电子拍卖也成为流行的电子商务活动之一。电子拍卖系统通常包括投标人、拍卖商和允许投标人通过互联网投标的第三方。它取代了传统招标的不方便和低效率。电子拍卖可分为公开拍卖和密封拍卖两种。公开招标法是不断提高投标价格,直到没有投标人愿意支付更高的出价。截止日期到了。出价最高者为公开招标的赢家。由于投标人可以多次投标,因此这种投标方式也称为多次投标。密封投标的投标方式是投标人只能发送一次账单。一旦截止日期到来,拍卖师会比较所有的账单。出价最高的人是“密封投标”的赢家。由于投标人只能投标一次,这种投标方式也被称为单标拍卖。两种招投标方法都有其实用性。但无论什么样的竞标。它应该依靠中介来允许买卖双方进行交易。导致信任和交易成本问题。在这方面,我们将使用区块链技术开发公开招标和密封招标的智能合约。它利用区块链去中心化和交易成本低的特点,改善了电子拍卖的缺点。
{"title":"Research on Blockchain Technologies in Bidding Systems","authors":"Yi-Hui Chen, Li-Chin Huang, I. Lin, M. Hwang","doi":"10.6633/IJNS.202011_22(6).01","DOIUrl":"https://doi.org/10.6633/IJNS.202011_22(6).01","url":null,"abstract":"Due to the popularity of the Internet, people are increasingly accepting the integration of electronic service applications. Whether it is communication, trading, or transportation, these have gradually changed people's lifestyles. Electronic auctions have also become one of the popular e-commerce activities. Electronic auction systems usually include bidders, auctioneers, and third parties that allow bidders to bid via the Internet. It replaces the inconvenience and low efficiency of traditional tendering. Electronic auctions can be divided into two types: open bidding and sealed bidding. The public bidding method is to continuously increase the bidding price until no bidder is willing to pay a higher bid. The deadline has arrived. The highest bidder is the winner of the public tender. Since bidders can bid multiple times, this bidding method is also called multiple bidding. The bidding method for sealed bids is that the bidder can only send the bill once. Once the deadline arrives, the auctioneer will compare all bills. The bidder with the highest bid is the winner of the "sealed bid". Since bidders can only bid once, this bidding method is also called a single bid auction. Both bidding methods have their practicability. But no matter what kind of bidding. It should rely on intermediaries to allow buyers and sellers to conduct transactions. Lead to trust and transaction cost issues. In this regard, we will use blockchain technology to develop smart contracts for public bidding and sealed bidding. It uses the characteristics of blockchain decentralization and low transaction costs to improve the shortcomings of electronic auctions.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"153 1","pages":"897-904"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"86209090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening 基于拉普拉斯图像锐化对比度增强的可逆数据隐藏
Pub Date : 2020-11-01 DOI: 10.6633/IJNS.202011_22(6).10
Chen-Kuei Yang, Zhihong Li, Wenxia Cai, S. Weng, Li Liu, Anhong Wang
In 2014, Wu et al. proposed a reversible data hiding method with contrast enhancement (RDH-CE) that emphasized that the visual quality of the image was more important than having a high peak signal-to-noise ratio (PSNR). But this method focused only on global enhancements and ignored the details. There were more obvious distortions of the visual image as the embedding level increased, and embedding capacity was relatively low when the embedding level was small. Therefore, in this paper, we proposed a new RDH method with contrast enhancement based on Laplacian sharpening. First, the details of the edges of images and the clarity of images were emphasized by Laplacian sharpening, and the visual distortions of the images were reduced by sharpening scale factor. Then, the embedding capacity was increased by combining the difference expansion and digital inverse transformation to apply the operator to all of the pixels in the image. The experimental results demonstrate the effectiveness of the proposed scheme.
2014年,Wu等人提出了一种具有对比度增强的可逆数据隐藏方法(RDH-CE),该方法强调图像的视觉质量比峰值信噪比(PSNR)高更为重要。但这种方法只关注全局增强而忽略了细节。随着嵌入水平的增加,视觉图像的畸变更为明显,嵌入水平较小时,嵌入容量相对较低。因此,本文提出了一种基于拉普拉斯锐化的对比度增强RDH方法。首先,利用拉普拉斯锐化技术突出图像边缘的细节和图像的清晰度,并利用锐化比例因子降低图像的视觉畸变;然后,结合差分展开和数字逆变换,将算子应用于图像中的所有像素,增加了嵌入容量。实验结果证明了该方案的有效性。
{"title":"Reversible Data Hiding with Contrast Enhancement Based on Laplacian Image Sharpening","authors":"Chen-Kuei Yang, Zhihong Li, Wenxia Cai, S. Weng, Li Liu, Anhong Wang","doi":"10.6633/IJNS.202011_22(6).10","DOIUrl":"https://doi.org/10.6633/IJNS.202011_22(6).10","url":null,"abstract":"In 2014, Wu et al. proposed a reversible data hiding method with contrast enhancement (RDH-CE) that emphasized that the visual quality of the image was more important than having a high peak signal-to-noise ratio (PSNR). But this method focused only on global enhancements and ignored the details. There were more obvious distortions of the visual image as the embedding level increased, and embedding capacity was relatively low when the embedding level was small. Therefore, in this paper, we proposed a new RDH method with contrast enhancement based on Laplacian sharpening. First, the details of the edges of images and the clarity of images were emphasized by Laplacian sharpening, and the visual distortions of the images were reduced by sharpening scale factor. Then, the embedding capacity was increased by combining the difference expansion and digital inverse transformation to apply the operator to all of the pixels in the image. The experimental results demonstrate the effectiveness of the proposed scheme.","PeriodicalId":93303,"journal":{"name":"International journal of network security & its applications","volume":"38 1","pages":"966-974"},"PeriodicalIF":0.0,"publicationDate":"2020-11-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"73386537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
期刊
International journal of network security & its applications
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1