期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
A Message Digest Disposing Algorithm Based on RC4
1
作者 LIUYabin CHEN Jing DU Ruiying ZHANG Huanguo 《Wuhan University Journal of Natural Sciences》 CAS 2010年第3期251-254,共4页
The characteristics of the wireless network determine the requirement of lightweight cryptography. Towards the huge cost of an existing algorithm such as MD5, this paper proposes a message digest scheme based on the R... The characteristics of the wireless network determine the requirement of lightweight cryptography. Towards the huge cost of an existing algorithm such as MD5, this paper proposes a message digest scheme based on the RC4 algorithm which broadens the application area of the RC4 and decreases the requirement of resource or cost. To test the randomicity of the algorithm's di- gest, fifteen kinds of randomicity test to NIST randomicity test standard had been done, and the comparative analysis which compares the digest's randomicity of the algorithm with MD5 had been performed as well. The performance of the algorithm had been analyzed in aspects of mono-directivity, randomicity, practicality and complexness. Statistic tests and analysis results illustrated that our scheme was of low cost of computing, good statistic performance, high running speed and lightweight. 展开更多
关键词 RC4 message digest algorithm CRYPTOGRAPHY information security
原文传递
An Improved Image Watermark Algorithm 被引量:1
2
作者 WANG Bin, DING You-dong, QIAN Mei School of Computer Engineering and Science, Shanghai University, Shanghai 200072, China 《Advances in Manufacturing》 SCIE CAS 2000年第S1期86-89,共4页
An improved Image watermark algorithm(IIWA) is given in this paper, the with flow chart and the work principle of this algorithm are introduced in detail Although the normal watermarking technique brings up a new way... An improved Image watermark algorithm(IIWA) is given in this paper, the with flow chart and the work principle of this algorithm are introduced in detail Although the normal watermarking technique brings up a new way of securing data transactions through the Internet, its robustness and integrity are vulnerable during the net transmission and image processing Using network signature technique, varied coding methods and other unique technique, IIWA improved the general watermark algorithm in the robustness and integrity in other words, IIWA greatly enhanced the transmission security and can be applied to information protection in the Internet 展开更多
关键词 STEGANOGRAPHY watermarking technique discrete cosine transform (DCT) message digest
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部