期刊文献+
共找到4,918篇文章
< 1 2 246 >
每页显示 20 50 100
A Review of Image Steganography Based on Multiple Hashing Algorithm
1
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms hash-LSB approach RSA algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
下载PDF
基于word-hashing的DGA僵尸网络深度检测模型 被引量:9
2
作者 赵科军 葛连升 +1 位作者 秦丰林 洪晓光 《东南大学学报(自然科学版)》 EI CAS CSCD 北大核心 2017年第A01期30-33,共4页
针对使用域名生成算法(DGA)僵尸网络隐蔽性强,传统检测算法特征提取复杂的问题,提出一种无需提取具体特征的深度学习模型DGA域名检测方法.首先基于word-hashing将所有域名转用二元语法字符串表示,利用词袋模型把域名映射到高维向量空间... 针对使用域名生成算法(DGA)僵尸网络隐蔽性强,传统检测算法特征提取复杂的问题,提出一种无需提取具体特征的深度学习模型DGA域名检测方法.首先基于word-hashing将所有域名转用二元语法字符串表示,利用词袋模型把域名映射到高维向量空间.然后利用5层深度神经网络对转换为高维向量的域名进行训练分类检测.通过深度模型,能够从训练数据中发现不同层次抽象的隐藏模式和特征,而这些模式和特征使用传统的统计方法大多是无法发现的.实验中使用了10万条DGA域名和10万条合法域名作为样本,与基于自然语言特征分类算法进行对比实验.实验结果表明该深度模型对DGA域名检测准确率达到97.23%,比基于自然语言特征分类算法得到的检测准确率高3.7%. 展开更多
关键词 DGA 僵尸网络 wordhashing 深度学习
下载PDF
基于直方图量化和混沌系统的感知图像Hashing算法 被引量:1
3
作者 邓绍江 王方晓 +1 位作者 张岱固 王瑜 《计算机应用》 CSCD 北大核心 2008年第11期2804-2807,共4页
研究了基于图像灰度级压缩的直方图差值量化(DQH)技术,并结合混沌系统,提出了一种新的感知图像Hash ing算法。算法首先利用混沌系统把压缩后的图像中各个灰度级的出现概率调制成一个固定长度的中间Hash序列;然后将中间Hash序列经过差值... 研究了基于图像灰度级压缩的直方图差值量化(DQH)技术,并结合混沌系统,提出了一种新的感知图像Hash ing算法。算法首先利用混沌系统把压缩后的图像中各个灰度级的出现概率调制成一个固定长度的中间Hash序列;然后将中间Hash序列经过差值量化和二值量化得到最终的图像Hash序列。仿真结果表明,该算法对JPEG压缩、低通滤波、图像缩放和旋转等操作有良好的鲁棒性,而且混沌系统的引入使算法具有较强的安全性。 展开更多
关键词 图像hash 差值量化 混沌系统 直方图
下载PDF
Trie Hashing结构平均路径长度分析
4
作者 王宏 熊西文 朱振文 《大连理工大学学报》 EI CAS CSCD 北大核心 1991年第5期507-514,共8页
针对 W.Litwin提出的 Trie Hashing结构的路径长度分析问题,研究并揭示 了该结构所具有的某些新的性质;建立了必要的分析前提.从而给出了 Trie Hashing 结构平均路径长度的分析方法。所得估计式仅与... 针对 W.Litwin提出的 Trie Hashing结构的路径长度分析问题,研究并揭示 了该结构所具有的某些新的性质;建立了必要的分析前提.从而给出了 Trie Hashing 结构平均路径长度的分析方法。所得估计式仅与外部结点数目有关,理论分析与模拟 实验的结果表明,对于 Trie Hashing 结构,文中的分析方法明显优于 Klein 和 wood的类似结果。 展开更多
关键词 T-H结构 算法分析
下载PDF
动态HASHING算法及其改进
5
作者 王艳军 安小宇 《光盘技术》 2009年第6期51-,53,共2页
对两种动态散列算法可扩展散列和线形散列进行了研究,提出了改进的动态散列算法。改进算法避免了不必要的溢出桶,散列桶的数量线性增长,避免了因查找键分布异常而出现频繁的桶分裂及桶地址表更新的现象。
关键词 动态散列 可扩展散列 线性散列
下载PDF
Recent development of perceptual image hashing 被引量:7
6
作者 王朔中 张新鹏 《Journal of Shanghai University(English Edition)》 CAS 2007年第4期323-331,共9页
The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the... The easy generation, storage, transmission and reproduction of digital images have caused serious abuse and security problems. Assurance of the rightful ownership, integrity, and authenticity is a major concern to the academia as well as the industry. On the other hand, efficient search of the huge amount of images has become a great challenge. Image hashing is a technique suitable for use in image authentication and content based image retrieval (CBIR). In this article, we review some representative image hashing techniques proposed in the recent years, with emphases on how to meet the conflicting requirements of perceptual robustness and security. Following a brief introduction to some earlier methods, we focus on a typical two-stage structure and some geometric-distortion resilient techniques. We then introduce two image hashing approaches developed in our own research, and reveal security problems in some existing methods due to the absence of secret keys in certain stage of the image feature extraction, or availability of a large quantity of images, keys, or the hash function to the adversary. More research efforts are needed in developing truly robust and secure image hashing techniques. 展开更多
关键词 image hashing perceptual robustness SECURITY image authentication.
下载PDF
机群系统上基于Hashing的多目标串匹配并行算法
7
作者 范曾 钟诚 +1 位作者 莫倩芸 刘萍 《微电子学与计算机》 CSCD 北大核心 2007年第9期165-168,共4页
基于孙子定理构造均匀的Hash函数并继承Karp-Rabin模式匹配思想,利用"筛选"方法,给出一种机群系统上的多目标串匹配并行算法。通过预处理将字符串映射成惟一的一对整数值,采用比较一对整数值来取代逐个字符比较字符串的方法... 基于孙子定理构造均匀的Hash函数并继承Karp-Rabin模式匹配思想,利用"筛选"方法,给出一种机群系统上的多目标串匹配并行算法。通过预处理将字符串映射成惟一的一对整数值,采用比较一对整数值来取代逐个字符比较字符串的方法使得匹配过程快速且比较结果是确定的;"筛选"节省了比较时间。算法分析和实验结果表明该并行算法简明、高效和可扩展。 展开更多
关键词 多目标串匹配:词典匹配:并行算法:hashing:机群系统
下载PDF
Fast Near-duplicate Image Detection in Riemannian Space by A Novel Hashing Scheme 被引量:2
8
作者 Ligang Zheng Chao Song 《Computers, Materials & Continua》 SCIE EI 2018年第9期529-539,共11页
There is a steep increase in data encoded as symmetric positive definite(SPD)matrix in the past decade.The set of SPD matrices forms a Riemannian manifold that constitutes a half convex cone in the vector space of mat... There is a steep increase in data encoded as symmetric positive definite(SPD)matrix in the past decade.The set of SPD matrices forms a Riemannian manifold that constitutes a half convex cone in the vector space of matrices,which we sometimes call SPD manifold.One of the fundamental problems in the application of SPD manifold is to find the nearest neighbor of a queried SPD matrix.Hashing is a popular method that can be used for the nearest neighbor search.However,hashing cannot be directly applied to SPD manifold due to its non-Euclidean intrinsic geometry.Inspired by the idea of kernel trick,a new hashing scheme for SPD manifold by random projection and quantization in expanded data space is proposed in this paper.Experimental results in large scale nearduplicate image detection show the effectiveness and efficiency of the proposed method. 展开更多
关键词 RIEMANNIAN MANIFOLD CONGRUENT transformation hashing KERNEL TRICK
下载PDF
Robust Image Hashing via Random Gabor Filtering and DWT 被引量:4
9
作者 Zhenjun Tang Man Ling +4 位作者 Heng Yao Zhenxing Qian Xianquan Zhang Jilian Zhang Shijie Xu 《Computers, Materials & Continua》 SCIE EI 2018年第5期331-344,共14页
Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on rand... Image hashing is a useful multimedia technology for many applications,such as image authentication,image retrieval,image copy detection and image forensics.In this paper,we propose a robust image hashing based on random Gabor filtering and discrete wavelet transform(DWT).Specifically,robust and secure image features are first extracted from the normalized image by Gabor filtering and a chaotic map called Skew tent map,and then are compressed via a single-level 2-D DWT.Image hash is finally obtained by concatenating DWT coefficients in the LL sub-band.Many experiments with open image datasets are carried out and the results illustrate that our hashing is robust,discriminative and secure.Receiver operating characteristic(ROC)curve comparisons show that our hashing is better than some popular image hashing algorithms in classification performance between robustness and discrimination. 展开更多
关键词 Image hashing Gabor filtering chaotic map skew tent map discrete wavelet transform.
下载PDF
Feature Fusion Multi-View Hashing Based on Random Kernel Canonical Correlation Analysis 被引量:2
10
作者 Junshan Tan Rong Duan +2 位作者 Jiaohua Qin Xuyu Xiang Yun Tan 《Computers, Materials & Continua》 SCIE EI 2020年第5期675-689,共15页
Hashing technology has the advantages of reducing data storage and improving the efficiency of the learning system,making it more and more widely used in image retrieval.Multi-view data describes image information mor... Hashing technology has the advantages of reducing data storage and improving the efficiency of the learning system,making it more and more widely used in image retrieval.Multi-view data describes image information more comprehensively than traditional methods using a single-view.How to use hashing to combine multi-view data for image retrieval is still a challenge.In this paper,a multi-view fusion hashing method based on RKCCA(Random Kernel Canonical Correlation Analysis)is proposed.In order to describe image content more accurately,we use deep learning dense convolutional network feature DenseNet to construct multi-view by combining GIST feature or BoW_SIFT(Bag-of-Words model+SIFT feature)feature.This algorithm uses RKCCA method to fuse multi-view features to construct association features and apply them to image retrieval.The algorithm generates binary hash code with minimal distortion error by designing quantization regularization terms.A large number of experiments on benchmark datasets show that this method is superior to other multi-view hashing methods. 展开更多
关键词 hashing multi-view data random kernel canonical correlation analysis feature fusion deep learning
下载PDF
ViT2CMH:Vision Transformer Cross-Modal Hashing for Fine-Grained Vision-Text Retrieval 被引量:1
11
作者 Mingyong Li Qiqi Li +1 位作者 Zheng Jiang Yan Ma 《Computer Systems Science & Engineering》 SCIE EI 2023年第8期1401-1414,共14页
In recent years,the development of deep learning has further improved hash retrieval technology.Most of the existing hashing methods currently use Convolutional Neural Networks(CNNs)and Recurrent Neural Networks(RNNs)... In recent years,the development of deep learning has further improved hash retrieval technology.Most of the existing hashing methods currently use Convolutional Neural Networks(CNNs)and Recurrent Neural Networks(RNNs)to process image and text information,respectively.This makes images or texts subject to local constraints,and inherent label matching cannot capture finegrained information,often leading to suboptimal results.Driven by the development of the transformer model,we propose a framework called ViT2CMH mainly based on the Vision Transformer to handle deep Cross-modal Hashing tasks rather than CNNs or RNNs.Specifically,we use a BERT network to extract text features and use the vision transformer as the image network of the model.Finally,the features are transformed into hash codes for efficient and fast retrieval.We conduct extensive experiments on Microsoft COCO(MS-COCO)and Flickr30K,comparing with baselines of some hashing methods and image-text matching methods,showing that our method has better performance. 展开更多
关键词 hash learning cross-modal retrieval fine-grained matching TRANSFORMER
下载PDF
基于RESTful以及Salted Password Hashing算法的模拟试衣间系统 被引量:1
12
作者 夏禹 《现代信息科技》 2019年第11期196-198,共3页
本文主要从系统设计、功能实现、整体架构的角度介绍了基于B/S模式下的模拟试衣间系统。本文还着重地介绍了Salted Password Hashing加密算法与传统的哈希函数加密算法之间存在的区别与联系,Salted Password Hashing加密算法在传统的软... 本文主要从系统设计、功能实现、整体架构的角度介绍了基于B/S模式下的模拟试衣间系统。本文还着重地介绍了Salted Password Hashing加密算法与传统的哈希函数加密算法之间存在的区别与联系,Salted Password Hashing加密算法在传统的软件系统中能够发挥重要作用,以及RESTful架构下软件系统的使用设计、实现方案及REST设计规范为实际软件编程带来的便利。 展开更多
关键词 模拟试衣间系统 RESTFUL 前后端分离 Salted PASSWORD hashing
下载PDF
Lung Nodule Image Retrieval Based on Convolutional Neural Networks and Hashing
13
作者 Yan Qiang Xiaolan Yang +2 位作者 Juanjuan Zhao Qiang Cui Xiaoping Du 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期17-26,共10页
Lung medical image retrieval based on content similarity plays an important role in computer-aided diagnosis of lung cancer.In recent years,binary hashing has become a hot topic in this field due to its compressed sto... Lung medical image retrieval based on content similarity plays an important role in computer-aided diagnosis of lung cancer.In recent years,binary hashing has become a hot topic in this field due to its compressed storage and fast query speed.Traditional hashing methods often rely on highdimensional features based hand-crafted methods,which might not be optimally compatible with lung nodule images.Also,different hashing bits contribute to the image retrieval differently,and therefore treating the hashing bits equally affects the retrieval accuracy.Hence,an image retrieval method of lung nodule images is proposed with the basis on convolutional neural networks and hashing.First,apre-trained and fine-tuned convolutional neural network is employed to learn multilevel semantic features of the lung nodules.Principal components analysis is utilized to remove redundant information and preserve informative semantic features of the lung nodules.Second,the proposed method relies on nine sign labels of lung nodules for the training set,and the semantic feature is combined to construct hashing functions.Finally,returned lung nodule images can be easily ranked with the query-adaptive search method based on weighted Hamming distance.Extensive experiments and evaluations on the dataset demonstrate that the proposed method can significantly improve the expression ability of lung nodule images,which further validates the effectiveness of the proposed method. 展开更多
关键词 LUNG NODULE image retrieval convolutional neural networks INFORMATIVE SEMANTIC features hashing
下载PDF
Content-based image hashing using wave atoms
14
作者 刘芳 梁瀚贤 +1 位作者 郑利明 季晓勇 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第4期38-48,共11页
It is well known that robustness, fragility, and security are three important criteria of image hashing; however how to build a system that can strongly meet these three criteria is still a challenge. In this paper, a... It is well known that robustness, fragility, and security are three important criteria of image hashing; however how to build a system that can strongly meet these three criteria is still a challenge. In this paper, a content-based image hashing scheme using wave atoms is proposed, which satisfies the above criteria. Compared with traditional transforms like wavelet transform and discrete cosine transform (DCT), wave atom transform is adopted for the sparser expansion and better characteristics of texture feature extraction which shows better performance in both robustness and fragility. In addition, multi-frequency detection is presented to provide an application-defined trade-off. To ensure the security of the proposed approach and its resistance to a chosen-plaintext attack, a randomized pixel modulation based on the Rdnyi chaotic map is employed, combining with the nonliner wave atom transform. The experimental results reveal that the proposed scheme is robust against content-preserving manipulations and has a good discriminative capability to malicions tampering. 展开更多
关键词 image hashing AUTHENTICATION wave atom transform chaotic system
下载PDF
Homomorphic Hashing Verification for Wireless Sensor Networks Rateless Codes Over-the-Air Programming
15
作者 Hao He Weidong Yi +1 位作者 Ming Li Yongrui Chen 《Journal of Beijing Institute of Technology》 EI CAS 2019年第1期109-118,共10页
The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of... The homomorphic hash algorithm(HHA)is introduced to help on-the-fly verify the vireless sensor network(WSN)over-the-air programming(OAP)data based on rateless codes.The receiver calculates the hash value of a group of data by homomorphic hash function,and then it compares the hash value with the receiving message digest.Because the feedback channel is deliberately removed during the distribution process,the rateless codes are often vulnerable when they face security issues such as packets contamination or attack.This method prevents contaminating or attack on rateless codes and reduces the potential risks of decoding failure.Compared with the SHA1 and MD5,HHA,which has a much shorter message digest,will deliver more data.The simulation results show that to transmit and verify the same amount of OAP data,HHA method sends 17.9% to 23.1%fewer packets than MD5 and SHA1 under different packet loss rates. 展开更多
关键词 wireless sensor network(WSN) over-the-air PROGRAMMING rateless CODES homomorphic hashing security
下载PDF
Improved locality-sensitive hashing method for the approximate nearest neighbor problem
16
作者 陆颖华 马廷淮 +3 位作者 钟水明 曹杰 王新 Abdullah Al-Dhelaane 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期217-225,共9页
In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor probl... In recent years, the nearest neighbor search (NNS) problem has been widely used in various interesting applications. Locality-sensitive hashing (LSH), a popular algorithm for the approximate nearest neighbor problem, is proved to be an efficient method to solve the NNS problem in the high-dimensional and large-scale databases. Based on the scheme of p-stable LSH, this paper introduces a novel improvement algorithm called randomness-based locality-sensitive hashing (RLSH) based on p-stable LSH. Our proposed algorithm modifies the query strategy that it randomly selects a certain hash table to project the query point instead of mapping the query point into all hash tables in the period of the nearest neighbor query and reconstructs the candidate points for finding the nearest neighbors. This improvement strategy ensures that RLSH spends less time searching for the nearest neighbors than the p-stable LSH algorithm to keep a high recall. Besides, this strategy is proved to promote the diversity of the candidate points even with fewer hash tables. Experiments are executed on the synthetic dataset and open dataset. The results show that our method can cost less time consumption and less space requirements than the p-stable LSH while balancing the same recall. 展开更多
关键词 approximate nearest neighbor problem locality-sensitive hashing
下载PDF
Hybrid Key Duplication Hashing Techniques for IP Address Lookup
17
作者 Rujiroj Tiengtavat Wei-Ming Lin 《International Journal of Communications, Network and System Sciences》 2011年第5期323-334,共12页
This In the past decade there has been an increasing need for designs to address the time and cost efficiency issues from various computer network applications such as general IP address lookup and specific network in... This In the past decade there has been an increasing need for designs to address the time and cost efficiency issues from various computer network applications such as general IP address lookup and specific network intrusion detection. Hashing techniques have been widely adopted for this purpose, among which XOR-operation-based hashing is one of most popular techniques due to its relatively small hash process delay. In most current commonly used XOR-hashing algorithms, each of the hash key bits is usually explicitly XORed only at most once in the hash process, which may limit the amount of potential randomness that can be introduced by the hashing process. In [1] a series of bit duplication techniques are proposed by systematically duplicating one row of key bits. This paper further looks into various ways in duplicating and reusing key bits to maximize randomness needed in the hashing process so as to enhance the overall performance further. Our simulation results show that, even with a slight increase in hardware requirement, a very significant reduction in the amount of hash collision can be obtained by the proposed technique. 展开更多
关键词 hash Algorithm IP ADDRESS LOOKUP INTRUSION Detection
下载PDF
Hashing文件组织中关于碰撞和溢出的处理
18
作者 赵秀云 《沈阳建筑工程学院学报》 1989年第3期65-72,共8页
Hashing文件组织是直接存取记录的一种基本方式,其核心是进行代码地址转换.由于Hashing方法是将记录随机地分配到存贮区中的,难免发生碰撞和溢出,本文就如何处理这些问题作了一些探讨.
关键词 文件组织 散列算法 碰撞 溢出
下载PDF
基于Vision Transformer Hashing的民族布艺图案哈希检索算法研究 被引量:1
19
作者 韩雨萌 宁涛 +1 位作者 段晓东 高原 《大连民族大学学报》 CAS 2023年第3期250-254,共5页
针对民族布艺图案复杂多样、语义提取、图像识别与检索困难等问题,以蜡染图案和织锦图案为例,提出一种图像检索算法,以提高匹配和检索民族布艺图案的准确度。结合民族布艺图案领域知识将民族布艺图案图像进行预处理,使用VIT为主干网络... 针对民族布艺图案复杂多样、语义提取、图像识别与检索困难等问题,以蜡染图案和织锦图案为例,提出一种图像检索算法,以提高匹配和检索民族布艺图案的准确度。结合民族布艺图案领域知识将民族布艺图案图像进行预处理,使用VIT为主干网络在哈希检索算法框架下进行图像检索。该方法优化了深度哈希检索算法,通过自身的自注意力机制提升了提取图案深层语义特征的能力,提高了深度哈希算法检索民族布艺图案的速度和精度。实验结果表明:提出的方法最佳检索精度可以达到95.32%。 展开更多
关键词 图像检索 深度哈希检索 VIT 民族布艺图案检索
下载PDF
IDSH: An Improved Deep Supervised Hashing Method for Image Retrieval
20
作者 Chaowen Lu Feifei Lee +2 位作者 Lei Chen Sheng Huang Qiu Chen 《Computer Modeling in Engineering & Sciences》 SCIE EI 2019年第11期593-608,共16页
Image retrieval has become more and more important because of the explosive growth of images on the Internet.Traditional image retrieval methods have limited image retrieval performance due to the poor image expressio... Image retrieval has become more and more important because of the explosive growth of images on the Internet.Traditional image retrieval methods have limited image retrieval performance due to the poor image expression abhility of visual feature and high dimension of feature.Hashing is a widely-used method for Approximate Nearest Neighbor(ANN)search due to its rapidity and timeliness.Meanwhile,Convolutional Neural Networks(CNNs)have strong discriminative characteristics which are used for image classification.In this paper,we propose a CNN architecture based on improved deep supervised hashing(IDSH)method,by which the binary compact codes can be generated directly.The main contributions of this paper are as follows:first,we add a Batch Normalization(BN)layer before each activation layer to prevent the gradient from vanishing and improve the training speed;secondly,we use Divide-and-Encode Module to map image features to approximate hash codes;finally,we adopt center loss to optimize training.Extensive experimental results on four large-scale datasets:MNIST,CIFAR-10,NUS-WIDE and SVHN demonstrate the effectiveness of the proposed method compared with other state-of-the-art hashing methods. 展开更多
关键词 Image RETRIEVAL convolutional NEURAL network hash functions center LOSS
下载PDF
上一页 1 2 246 下一页 到第
使用帮助 返回顶部