期刊文献+
共找到5篇文章
< 1 >
每页显示 20 50 100
Tamper Detection and Localization for Quranic Text Watermarking Scheme Based on Hybrid Technique 被引量:1
1
作者 Ali A.R.Alkhafaji Nilam Nur Amir Sjarif +3 位作者 M.A.Shahidan Nurulhuda Firdaus Mohd Azmi Haslina Md Sarkan Suriayati Chuprat 《Computers, Materials & Continua》 SCIE EI 2021年第7期77-102,共26页
The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult... The text of the Quran is principally dependent on the Arabic language.Therefore,improving the security and reliability of the Quran’s text when it is exchanged via internet networks has become one of the most difcult challenges that researchers face today.Consequently,the diacritical marks in the Holy Quran which represent Arabic vowels(i,j.s)known as the kashida(or“extended letters”)must be protected from changes.The cover text of the Quran and its watermarked text are different due to the low values of the Peak Signal to Noise Ratio(PSNR),and Normalized Cross-Correlation(NCC);thus,the location for tamper detection accuracy is low.The gap addressed in this paper to improve the security of Arabic text in the Holy Quran by using vowels with kashida.To enhance the watermarking scheme of the text of the Quran based on hybrid techniques(XOR and queuing techniques)of the purposed scheme.The methodology propose scheme consists of four phases:The rst phase is pre-processing.This is followed by the second phase where an embedding process takes place to hide the data after the vowel letters wherein if the secret bit is“1”,it inserts the kashida but does not insert the kashida if the bit is“0”.The third phase is an extraction process and the last phase is to evaluate the performance of the proposed scheme by using PSNR(for the imperceptibility),and NCC(for the security of the watermarking).Experiments were performed on three datasets of varying lengths under multiple random locations of insertion,reorder and deletion attacks.The experimental results were revealed the improvement of the NCC by 1.76%,PSNR by 9.6%compared to available current schemes. 展开更多
关键词 Text watermarking tamper detection AUTHENTICATION quranic text exclusive-or operation queuing technique
下载PDF
Design of 1.5 bit quantization correlator in satellite navigation software receiver
2
作者 Hongwei Zhou Tian Jin Fangyao Lü 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2016年第2期449-456,共8页
Currently, 1 bit or 2 bit signal quantization is widely used in satellite navigation software receivers. The bit-wise parallel algorithm has been proposed for 1 bit and 2 bit signal quantization, which performs correl... Currently, 1 bit or 2 bit signal quantization is widely used in satellite navigation software receivers. The bit-wise parallel algorithm has been proposed for 1 bit and 2 bit signal quantization, which performs correlation with high efficiency. In order to improve the performance of the correlator, this paper proposes a new 1.5 bit quantization method. Theoretical analyses are made from the aspects of complexity and quantization loss, and performance comparison between 1.5 bit quantization correlator and traditional correlators is discussed. The results show that the 1.5 bit quantization algorithm can save about 30 percent complexity under similar quantization loss, reduce more than 0.5 dB signal noise ratio(SNR) loss under similar complexity. It shows great performance improvement for correlators of satellite navigation software receivers. 展开更多
关键词 correlator bit-wise 1.5 bit quantization satellite navigation
下载PDF
MINIMISATION OF EXCLUSIVE-OR LOGIC FUNCTIONS
3
作者 张彦仲 《Science China Mathematics》 SCIE 1990年第4期477-485,共9页
An efficient computer algorithm for minimisation of exclusive-OR logic function is presented. The algorithm is n/(1 + (n-1)2-n) times faster than fast Reed-Muller transform algorithm for minimizing an exclusive-OR fun... An efficient computer algorithm for minimisation of exclusive-OR logic function is presented. The algorithm is n/(1 + (n-1)2-n) times faster than fast Reed-Muller transform algorithm for minimizing an exclusive-OR function with n input variables. 展开更多
关键词 minimisation exclusive-or LOGIC functions.
原文传递
OPTIMIZATION OF MULTIPLE-OUTPUT EXCLUSIVE-OR LOGIC CIRCUITS
4
作者 张彦仲 《Science China Mathematics》 SCIE 1990年第5期625-633,共9页
A method is presented for optimizing multiple-output exclusive-OR logic circuits. The effect of common gates on the optimization of logic circuits is studied. The concepts of common function, residue function and rema... A method is presented for optimizing multiple-output exclusive-OR logic circuits. The effect of common gates on the optimization of logic circuits is studied. The concepts of common function, residue function and remainder term are introduced. A computer method for searching the optimum polarity is proposed. This method can be used to design the logic circuit which needs the minimum number of exclusive-OR gates. 展开更多
关键词 exclusive-or LOGIC CIRCUITS optimization.
原文传递
Correlation power attack on a message authentication code based on SM3
5
作者 Ye YUAN Kai-ge QU +2 位作者 Li-jiWU Jia-weiMA Xiang-min ZHANG 《Frontiers of Information Technology & Electronic Engineering》 SCIE EI CSCD 2019年第7期930-946,共17页
Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel sec... Hash-based message authentication code(HMAC)is widely used in authentication and message integrity.As a Chinese hash algorithm,the SM3 algorithm is gradually winning domestic market value in China.The side channel security of HMAC based on SM3(HMAC-SM3)is still to be evaluated,especially in hardware implementation,where only intermediate values stored in registers have apparent Hamming distance leakage.In addition,the algorithm structure of SM3 determines the difficulty in HMAC-SM3 side channel analysis.In this paper,a skillful bit-wise chosen-plaintext correlation power attack procedure is proposed for HMAC-SM3 hardware implementation.Real attack experiments on a field programmable gate array(FPGA)board have been performed.Experimental results show that we can recover the key from the hypothesis space of 2256 based on the proposed procedure. 展开更多
关键词 HMAC-SM3 Side channel analysis Correlation power attack bit-wise chosen-plaintext
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部