期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
Access Control Mechanism for Blog Posts with Fine- Grained Ability Using Simple Operations
1
作者 Yi-Hui Chen chi-shiang chan Yuan-Yu Tsai 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第2期194-198,共5页
Access control enables the owners to assign different users different permissions to see different views. The current blog system does not support fine-grained authorization. That is, the bloggers disallow to just ass... Access control enables the owners to assign different users different permissions to see different views. The current blog system does not support fine-grained authorization. That is, the bloggers disallow to just assign partial contents of the blog posts (i.e., a paragraph or several paragraphs) to readers. The management cost is no doubt to be significantly increased while handling the authorizations on the huge amount of blog articles. In this paper, we propose a scheme for supporting a fine-grained access control mechanism on blog articles. The advantage is that bloggers are able to authorize partial contents of blog posts to different users or groups of users. 展开更多
关键词 Index Terms Authorization blog articles finegrained access control.
下载PDF
Efficient Certificateless Aggregate Signature Scheme 被引量:2
2
作者 Yu-Chi Chen Gwoboa Homg +2 位作者 Chao-Liang Liu Yuan-Yu Tsa chi-shiang chan 《Journal of Electronic Science and Technology》 CAS 2012年第3期209-214,共6页
In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before f... In ubiquitous computing, data should be able to be accessed from any location, and the correctness of data becomes vital during the communication. Suppose that many users sign different messages respectively, before forwarding or sending these messages, then the verifier must spend a lot of computing time to verify their signatures. Consequently, the aggregate signature scheme is an effective method of improving efficiency in this kind of systems, which provides the convenience for the verifier. In this paper, we propose a new certificateless aggregate signature scheme which is efficient in generating a signature and verification. This scheme is provably secure under the extended computational Diffie-Hellman assumption. 展开更多
关键词 Aggregate signature certificatelessaggregate signature certificateless cryptography digitalsignature.
下载PDF
Double-Layer Data Embedding Scheme Based on Three-Pixel Differences 被引量:1
3
作者 Chiao-Chih Huang chi-shiang chan 《Journal of Electronic Science and Technology》 CAS 2011年第4期297-300,共4页
Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but ... Steganography is a technique to hide the secret data into digital media without getting any unexpected notices. The traditional steganographic method, namely least significant bit (LSB) replacement, is a simple but insecure scheme. To overcome the traditional drawbacks, this paper proposes a steganographic scheme, which is called double-layer hiding method. The experimental results confirm that the proposed scheme achieves better biding capacity with high ability of resisting security analysis. 展开更多
关键词 Hiding capacity least significant bit replacement security analysis STEGANOGRAPHY visual quality.
下载PDF
Dual Image Reversible Data Hiding by Modifying Least Significant-Bit Matching Revisited Rules
4
作者 chi-shiang chan Chao-Liang Liu Yuan-Yu Tsai 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期217-221,共5页
The concept of dual image reversible data hiding(DIRDH) is the technique that can produce two camouflage images after embedding secret data into one original image.Moreover,not only can the secret data be extracted ... The concept of dual image reversible data hiding(DIRDH) is the technique that can produce two camouflage images after embedding secret data into one original image.Moreover,not only can the secret data be extracted from two camouflage images but also the original image can be recovered.To achieve high image quality,Lu et al.'s method applied least-significant-bit(LSB) matching revisited to DIRDH.In order to further improve the image quality,the proposed method modifies LSB matching revisited rules and applies them to DIRDH.According to the experimental results,the image quality of the proposed method is better than that of Lu et al.'s method. 展开更多
关键词 Index Terms-Data hiding dual imaging technique least-significant-bit (LSB) matching revisited reversible
下载PDF
An Adaptive Steganographic Algorithm for Point Geometry Based on Nearest Neighbors Search
5
作者 Yuan-Yu Tsai chi-shiang chan 《Journal of Electronic Science and Technology》 CAS 2012年第3期220-226,共7页
In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between p... In this study, we extend our previous adaptive steganographic algorithm to support point geometry. For the purpose of the vertex decimation process presented in the previous work, the neighboring information between points is necessary. Therefore, a nearest neighbors search scheme, considering the local complexity of the processing point, is used to determinate the neighbors for each point in a point geometry. With the constructed virtual connectivity, the secret message can be embedded successfully after the vertex decimation and data embedding processes. The experimental results show that the proposed algorithm can preserve the advantages of previous work, including higher estimation accuracy, high embedding capacity, acceptable model distortion, and robustness against similarity transformation attacks. Most importantly, this work is the first 3D steganographic algorithm for point geometry with adaptation. 展开更多
关键词 ADAPTATION nearest neighbors search point geometry steganography.
下载PDF
Guest Editorial Special Issue on Information Security and Applications
6
作者 chi-shiang chan Yi-Hui Chen Yuan-Yu Tsai 《Journal of Electronic Science and Technology》 CAS CSCD 2017年第3期209-210,共2页
With the growing of digitized data transforming on Internet,the issues of information security,data privacy,and forensic analysis have become more and more attracted.Researchers have provided solutions for problems in... With the growing of digitized data transforming on Internet,the issues of information security,data privacy,and forensic analysis have become more and more attracted.Researchers have provided solutions for problems in the field.The objective of this special issue is to present research and development activities in the various aspects.After a very careful review, 展开更多
关键词 Guest Editorial Special Issue on Information Security and Applications NFC
下载PDF
An Image Authentication Method by Grouping Most Significant Bits
7
作者 chi-shiang chan Yuan-Yu Tsai Chao-Liang Liu 《Journal of Electronic Science and Technology》 CAS 2013年第1期33-37,共5页
In 2011, Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged. Due to this rearrangement, the value of the most-significant bit of each tampered p... In 2011, Chan proposed an image authentication method by producing the parity check bits from pixels whose bits have been rearranged. Due to this rearrangement, the value of the most-significant bit of each tampered pixel can be determined according to its parity check bits. With the help of the most-significant bit of the pixel, the pixel can be recovered by selecting two possible (7, 4) Hamming code words. However, if the distance between two Hamming code words is within a certain range, incorrect selection may occur. Chan's method added one additional bit to indicate the correct one. It is trivial that this may degrade the quality of the authenticated image. In this paper, we group four most-significant bits into different groups to form a mapping codebook and the mapping codebook is used to produce authentication data instead of the (7, 4) Hamming code book. The experimental results show that the proposed method has a greater ability to recover tampered areas. 展开更多
关键词 Image authentication information hiding tamper proofing.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部