期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Steganalysis Using Fractal Block Codes and AP Clustering in Grayscale Images 被引量:1
1
作者 Guang-Yu Kang Yu-Xin Su +2 位作者 shi-ze guo Rui-Xu guo Zhe-Ming Lu 《Journal of Electronic Science and Technology》 CAS 2011年第4期312-316,共5页
This paper presents a universal scheme (also called blind scheme) based on fractal compression and affinity propagation (AP) clustering to distinguish stego-images from cover grayscale images, which is a very chal... This paper presents a universal scheme (also called blind scheme) based on fractal compression and affinity propagation (AP) clustering to distinguish stego-images from cover grayscale images, which is a very challenging problem in steganalysis. Since fractal codes represent the "self-similarity" features of natural images, we adopt the statistical moment of fractal codes as the image features. We first build an image set to store the statistical features without hidden messages, of natural images with and and then apply the AP clustering technique to group this set. The experimental result shows that the proposed scheme performs better than Fridrich's traditional method. 展开更多
关键词 Affinity propagation clustering fractal compression STEGANALYSIS universal steganalysis.
下载PDF
Survey of design and security evaluation of authenticated encryption algorithms in the CAESAR competition 被引量:2
2
作者 Fan ZHANG Zi-yuan LIANG +3 位作者 Bo-lin YANG Xin-jie ZHAO shi-ze guo Kui REN 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2018年第12期1475-1499,共25页
The Competition for Authenticated Encryption: Security, Applicability, and Robustness(CAESAR)supported by the National Institute of Standards and Technology(NIST) is an ongoing project calling for submissions of authe... The Competition for Authenticated Encryption: Security, Applicability, and Robustness(CAESAR)supported by the National Institute of Standards and Technology(NIST) is an ongoing project calling for submissions of authenticated encryption(AE) schemes. The competition itself aims at enhancing both the design of AE schemes and related analysis. The design goal is to pursue new AE schemes that are more secure than advanced encryption standard with Galois/counter mode(AES-GCM) and can simultaneously achieve three design aspects: security,applicability, and robustness. The competition has a total of three rounds and the last round is approaching the end in 2018. In this survey paper, we first introduce the requirements of the proposed design and the progress of candidate screening in the CAESAR competition. Second, the candidate AE schemes in the final round are classified according to their design structures and encryption modes. Third, comprehensive performance and security evaluations are conducted on these candidates. Finally, the research trends of design and analysis of AE for the future are discussed. 展开更多
关键词 CAESAR COMPETITION Authenticated CIPHER BLOCK CIPHER STREAM CIPHER HASH function Security evaluation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部