期刊文献+
共找到469篇文章
< 1 2 24 >
每页显示 20 50 100
Deep-learning-based ciphertext-only attack on optical double random phase encryption 被引量:9
1
作者 Meihua Liao Shanshan Zheng +4 位作者 Shuixin Pan Dajiang Lu Wenqi He Guohai Situ Xiang Peng 《Opto-Electronic Advances》 SCIE 2021年第5期12-23,共12页
Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical e... Optical cryptanalysis is essential to the further investigation of more secure optical cryptosystems.Learning-based at-tack of optical encryption eliminates the need for the retrieval of random phase keys of optical encryption systems but it is limited for practical applications since it requires a large set of plaintext-ciphertext pairs for the cryptosystem to be at-tacked.Here,we propose a two-step deep learning strategy for ciphertext-only attack(COA)on the classical double ran-dom phase encryption(DRPE).Specifically,we construct a virtual DRPE system to gather the training data.Besides,we divide the inverse problem in COA into two more specific inverse problems and employ two deep neural networks(DNNs)to respectively learn the removal of speckle noise in the autocorrelation domain and the de-correlation operation to retrieve the plaintext image.With these two trained DNNs at hand,we show that the plaintext can be predicted in real-time from an unknown ciphertext alone.The proposed learning-based COA method dispenses with not only the retrieval of random phase keys but also the invasive data acquisition of plaintext-ciphertext pairs in the DPRE system.Numerical simulations and optical experiments demonstrate the feasibility and effectiveness of the proposed learning-based COA method. 展开更多
关键词 optical encryption random phase encoding ciphertext-only attack deep learning
下载PDF
Attack on Optical Double Random Phase Encryption Based on the Principle of Ptychographical Imaging 被引量:2
2
作者 李拓 史祎诗 《Chinese Physics Letters》 SCIE CAS CSCD 2016年第1期63-66,共4页
The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can... The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can be converted to the model of ptyehographical imaging. Owing to the inherent merits of the ptyehographical imaging, the DRPE system can be breached totally in a fast and nearly perfect way, which is unavailable for currently existing attack methods. Further, since the decryption keys can be seen as an object to be imaged from the perspective of imaging, the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys. 展开更多
关键词 of as for it Attack on Optical Double random Phase encryption Based on the Principle of Ptychographical Imaging in IS on
下载PDF
A New Encryption-Then-Compression Scheme on Gray Images Using the Markov Random Field 被引量:1
3
作者 Chuntao Wang Yang Feng +2 位作者 Tianzheng Li Hao Xie Goo-Rak Kwon 《Computers, Materials & Continua》 SCIE EI 2018年第7期107-121,共15页
Compressing encrypted images remains a challenge.As illustrated in our previous work on compression of encrypted binary images,it is preferable to exploit statistical characteristics at the receiver.Through this line,... Compressing encrypted images remains a challenge.As illustrated in our previous work on compression of encrypted binary images,it is preferable to exploit statistical characteristics at the receiver.Through this line,we characterize statistical correlations between adjacent bitplanes of a gray image with the Markov random field(MRF),represent it with a factor graph,and integrate the constructed MRF factor graph in that for binary image reconstruction,which gives rise to a joint factor graph for gray images reconstruction(JFGIR).By exploiting the JFGIR at the receiver to facilitate the reconstruction of the original bitplanes and deriving theoretically the sum-product algorithm(SPA)adapted to the JFGIR,a novel MRF-based encryption-then-compression(ETC)scheme is thus proposed.After preferable universal parameters of the MRF between adjacent bitplanes are sought via a numerical manner,extensive experimental simulations are then carried out to show that the proposed scheme successfully compresses the first 3 and 4 most significant bitplanes(MSBs)for most test gray images and the others with a large portion of smooth area,respectively.Thus,the proposed scheme achieves significant improvement against the state-of-the-art leveraging the 2-D Markov source model at the receiver and is comparable or somewhat inferior to that using the resolution-progressive strategy in recovery. 展开更多
关键词 encryption-then-compression compressing encrypted image Markov random field compression efficiency factor graph.
下载PDF
Image encryption using random sequence generated from generalized information domain
4
作者 张夏衍 张国基 +2 位作者 李璇 任亚洲 伍杰华 《Chinese Physics B》 SCIE EI CAS CSCD 2016年第5期176-185,共10页
A novel image encryption method based on the random sequence generated from the generalized information domain and permutation–diffusion architecture is proposed. The random sequence is generated by reconstruction fr... A novel image encryption method based on the random sequence generated from the generalized information domain and permutation–diffusion architecture is proposed. The random sequence is generated by reconstruction from the generalized information file and discrete trajectory extraction from the data stream. The trajectory address sequence is used to generate a P-box to shuffle the plain image while random sequences are treated as keystreams. A new factor called drift factor is employed to accelerate and enhance the performance of the random sequence generator. An initial value is introduced to make the encryption method an approximately one-time pad. Experimental results show that the random sequences pass the NIST statistical test with a high ratio and extensive analysis demonstrates that the new encryption scheme has superior security. 展开更多
关键词 image encryption random number generator CRYPTOGRAPHY
下载PDF
Constructing Certificateless Encryption with Keyword Search against Outside and Inside Keyword Guessing Attacks 被引量:4
5
作者 Yang Lu Jiguo Li 《China Communications》 SCIE CSCD 2019年第7期156-173,共18页
Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to enc... Searchable public key encryption is a useful cryptographic paradigm that enables an untrustworthy server to retrieve the encrypted data without revealing the contents of the data. It offers a promising solution to encrypted data retrieval in cryptographic cloud storage. Certificateless public key cryptography (CLPKC) is a novel cryptographic primitive that has many merits. It overcomes the key escrow problem in identity-based cryptography (IBC) and the cumbersome certificate problem in conventional public key cryptography (PKC). Motivated by the appealing features of CLPKC, several certificateless encryption with keyword search (CLEKS) schemes have been presented in the literature. But, our cryptanalysis demonstrates that the previously proposed CLEKS frameworks suffer from the security vulnerability caused by the keyword guessing attack. To remedy the security weakness in the previous frameworks and provide resistance against both inside and outside keyword guessing attacks, we propose a new CLEKS framework. Under the new framework, we design a concrete CLEKS scheme and formally prove its security in the random oracle model. Compared with previous two CLEKS schemes, the proposed scheme has better overall performance while offering stronger security guarantee as it withstands the existing known types of keyword guessing attacks. 展开更多
关键词 searchable public key encryption CERTIFICATELESS encryption with KEYWORD search INSIDE KEYWORD guessing ATTACK OUTSIDE KEYWORD guessing ATTACK random oracle model
下载PDF
Double Encryption Using Trigonometric Chaotic Map and XOR of an Image 被引量:2
6
作者 Orawit Thinnukool Thammarat Panityakul Mahwish Bano 《Computers, Materials & Continua》 SCIE EI 2021年第12期3033-3046,共14页
In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes... In the most recent decades,a major number of image encryption plans have been proposed.The vast majority of these plans reached a highsecurity level;however,their moderate speeds because of their complicated processes made them of no use in real-time applications.Inspired by this,we propose another efficient and rapid image encryption plan dependent on the Trigonometric chaotic guide.In contrast to the most of current plans,we utilize this basic map to create just a couple of arbitrary rows and columns.Moreover,to additionally speed up,we raise the processing unit from the pixel level to the row/column level.The security of the new plot is accomplished through a substitution permutation network,where we apply a circular shift of rows and columns to break the solid connection of neighboring pixels.At that point,we join the XOR operation with modulo function to cover the pixels values and forestall any leaking of data.High-security tests and simulation analyses are carried out to exhibit that the scheme is very secure and exceptionally quick for real-time image processing at 80 fps(frames per second). 展开更多
关键词 Double image encryption target image random image trigonometric chaotic map
下载PDF
Image Encryption Scheme Based on Filter Bank and Lifting 被引量:1
7
作者 Saleh Saraireh Yazeed Al-Sbou +1 位作者 Ja’afer Al-Saraireh Othman Alsmadi 《International Journal of Communications, Network and System Sciences》 2014年第1期43-52,共10页
In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and evaluated. Many extensive techniques have been applied to examine the security of the image encryption using th... In this paper, the quality of image encryption using filter bank with lifting scheme has been studied and evaluated. Many extensive techniques have been applied to examine the security of the image encryption using the filter bank cipher with one or two rounds. To analyze and evaluate the proposed scheme, many parameters have been employed, such as, histogram analysis, correlation coefficient, global entropy, block entropy, avalanche effect, number of pixel change rate (NPCR), unified average change intensity (UACI), compression friendliness, exhaustive key analysis, and key sensitivity test. The simulation results showed that, the quality of the image encryption passes all these tests. Moreover, it reaches or excels the current state-of-the-arts. So that, the proposed image encryption process produces random-like output from the statistical point of views. 展开更多
关键词 randomNESS Test Image encryption encryption Quality FILTER BANK ENTROPY
下载PDF
Optical Image Encryption Based on Mixed Chaotic Maps and Single-Shot Digital Holography 被引量:3
8
作者 Yonggang Su Chen Tang +3 位作者 Xia Chen Biyuan Li Wenjun Xu Zhenkun Lei 《Transactions of Tianjin University》 EI CAS 2017年第2期184-191,共8页
Random phase masks play a key role in optical image encryption schemes based on double random phase technique. In this paper, a mixed chaotic method is proposed, which can efficiently solve some weaknesses that one-di... Random phase masks play a key role in optical image encryption schemes based on double random phase technique. In this paper, a mixed chaotic method is proposed, which can efficiently solve some weaknesses that one-dimensional (1-D) single chaotic maps encounter to generate random phase masks. Based on the chaotic random phase masks, optical image encryption and decryption are realized with a single-shot digital holographic technique. In the proposed encryption scheme, the initial value and parameters of mixed chaotic maps serve as secret keys, which is convenient for the key management and transmission. Moreover, it also possesses high resistance against statistical attack, brute-force attack, noise attack and shear attack. Simulation results and security analysis verify the validity and security of the proposed encryption scheme. © 2017, Tianjin University and Springer-Verlag Berlin Heidelberg. 展开更多
关键词 Chaotic systems Geometrical optics HOLOGRAPHY Image processing Lyapunov methods Optical data processing
下载PDF
Construction and Optimization of TRNG Based Substitution Boxes for Block Encryption Algorithms
9
作者 Muhammad Fahad Khan Khalid Saleem +4 位作者 Mohammed Alotaibi Mohammad Mazyad Hazzazi Eid Rehman Aaqif Afzaal Abbasi Muhammad Asif Gondal 《Computers, Materials & Continua》 SCIE EI 2022年第11期2679-2696,共18页
Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them suscept... Internet of Things is an ecosystem of interconnected devices that are accessible through the internet.The recent research focuses on adding more smartness and intelligence to these edge devices.This makes them susceptible to various kinds of security threats.These edge devices rely on cryptographic techniques to encrypt the pre-processed data collected from the sensors deployed in the field.In this regard,block cipher has been one of the most reliable options through which data security is accomplished.The strength of block encryption algorithms against different attacks is dependent on its nonlinear primitive which is called Substitution Boxes.For the design of S-boxes mainly algebraic and chaos-based techniques are used but researchers also found various weaknesses in these techniques.On the other side,literature endorse the true random numbers for information security due to the reason that,true random numbers are purely non-deterministic.In this paper firstly a natural dynamical phenomenon is utilized for the generation of true random numbers based S-boxes.Secondly,a systematic literature review was conducted to know which metaheuristic optimization technique is highly adopted in the current decade for the optimization of S-boxes.Based on the outcome of Systematic Literature Review(SLR),genetic algorithm is chosen for the optimization of s-boxes.The results of our method validate that the proposed dynamic S-boxes are effective for the block ciphers.Moreover,our results showed that the proposed substitution boxes achieve better cryptographic strength as compared with state-of-the-art techniques. 展开更多
关键词 IoT security sensors data encryption substitution box generation True random Number Generators(TRNG) heuristic optimization genetic algorithm
下载PDF
基于长度可变密钥的光学图像加密方法
10
作者 杨晓云 石峰 《激光杂志》 CAS 北大核心 2024年第2期107-112,共6页
为提升光学图像加密效果,设计了一种基于长度可变密钥的光学图像加密方法。基于混沌方程构成混沌序列均匀化普适算法,运用该算法生成均匀化伪随机序列,以此作为长度可变密钥,经空间光调制器调制后,转换此类密钥为伪随机相位掩模(PRPM),... 为提升光学图像加密效果,设计了一种基于长度可变密钥的光学图像加密方法。基于混沌方程构成混沌序列均匀化普适算法,运用该算法生成均匀化伪随机序列,以此作为长度可变密钥,经空间光调制器调制后,转换此类密钥为伪随机相位掩模(PRPM),运用两个转换后PRPM双重随机相位编码初始光学图像,并结合变形分数傅里叶变换(AFrFT),相位转换编码后光学图像,获得加密光学图像,完成光学图像加密。实验结果显示,该方法可针对不同光学图像生成敏感性与唯一性密钥,实现不同光学图像的加密处理,加密效果显著,加密光学图像的像素频数分布均匀,且解密后光学图像与初始光学图像几乎一致,整体加解密效果理想,可有效保障光学图像的安全性,而且本方法可以在最短3 s的时间内完成光学图像的加密和解密,加解密效率更高,综合效果更佳。 展开更多
关键词 长度可变密钥 光学图像加密 混沌序列 相位掩模 随机相位编码 傅里叶变换
下载PDF
基于小波压缩深度学习重构的多图像光学加密
11
作者 郭媛 贾德宝 +1 位作者 敬世伟 翟平 《计算机工程与设计》 北大核心 2024年第2期367-375,共9页
为解决多图像加密算法密文体积大、加密效果差、重构效果不理想等问题,提出一种基于小波压缩和深度学习重构的多图像光学加密方法。利用小波压缩提取多图像的低频部分,将重排后的新图放入改进的FDT-DRPE光学加密系统中得到密文;利用矢... 为解决多图像加密算法密文体积大、加密效果差、重构效果不理想等问题,提出一种基于小波压缩和深度学习重构的多图像光学加密方法。利用小波压缩提取多图像的低频部分,将重排后的新图放入改进的FDT-DRPE光学加密系统中得到密文;利用矢量分解和螺旋相位变换克服FDT-DRPE不敏感问题;构造的L_S混沌系统提高密钥敏感性。提出新型深度学习网络模型BHCN,解决传统图像重构精度不高问题。实验结果表明,密文体积可压缩至原图的1/4,重构图像的峰值信噪比为34.57 dB,结构相似性为0.9521,与同类文献相比,速度更快,重构效果更好,安全性更高。 展开更多
关键词 多图像光学加密 深度学习 小波压缩 菲涅尔双随机相位编码 矢量分解 混沌系统 比特分层
下载PDF
一种基于新型真随机数发生器的大数据加密方法
12
作者 朱金坛 《微型电脑应用》 2024年第2期184-187,共4页
为了解决大数据安全性不足的问题,在现场可编程门列阵的基础上,设计了一种融合了链式振荡环、触发器阵列以及异或门阵列的改进大数据加密方法。然后通过与L8M-LBE、R2S-LBE进行对比实验的方式对该方法进行验证。实验结果表明,改进加密... 为了解决大数据安全性不足的问题,在现场可编程门列阵的基础上,设计了一种融合了链式振荡环、触发器阵列以及异或门阵列的改进大数据加密方法。然后通过与L8M-LBE、R2S-LBE进行对比实验的方式对该方法进行验证。实验结果表明,改进加密方法的NIST测试通过率为97.5%,优于传统真随机数发生器。在加密硬件吞吐率测试方面,改进加密方法的吞吐率为1983.3 Mbps,优于L8M-LBE与R2S-LBE。实验结果证明改进后的真随机数发生器加密性能得到了极高的提升,能够为大数据加密安全提供一个新的思路。 展开更多
关键词 大数据安全 真随机发生器 现场可编程门列阵 加密
下载PDF
RC4加密算法改进研究及电路设计
13
作者 雷文媛 夏宏 师瑞峰 《计算机工程与设计》 北大核心 2024年第9期2561-2568,共8页
针对软件实现RC4算法易遭受攻击且效率不高的问题,基于硬件电路实现算法的思想,引入快速伪随机数发生器提出一种改进RC4并设计电路实现。结合种子密钥和伪随机数进行字节内部与字节间的置乱改进初始化算法,提高算法安全性;设计消耗更少... 针对软件实现RC4算法易遭受攻击且效率不高的问题,基于硬件电路实现算法的思想,引入快速伪随机数发生器提出一种改进RC4并设计电路实现。结合种子密钥和伪随机数进行字节内部与字节间的置乱改进初始化算法,提高算法安全性;设计消耗更少时钟周期的电路生成密钥流,提升加密效率。NIST检测显示改进RC4的密钥流序列随机性优于现存基于硬件的RC4产生的密钥流,仿真结果表明,电路能够完成正确加解密。 展开更多
关键词 加密算法 流密码 伪随机数发生器 密钥流随机性 硬件加密 混合进位加法器 随机性检测
下载PDF
基于滑动窗口和随机性特征的加密流量识别方案
14
作者 刘家池 况博裕 +2 位作者 苏铓 许亚倩 付安民 《网络与信息安全学报》 2024年第4期98-108,共11页
随着信息技术的发展,用户和组织对网络安全的关注度不断提高,数据加密传输逐渐成为主流,推动互联网中加密流量的比例不断攀升。然而,数据加密在保障隐私和安全的同时也成为非法内容逃避网络监管的手段。为实现加密流量的检测与分析,需... 随着信息技术的发展,用户和组织对网络安全的关注度不断提高,数据加密传输逐渐成为主流,推动互联网中加密流量的比例不断攀升。然而,数据加密在保障隐私和安全的同时也成为非法内容逃避网络监管的手段。为实现加密流量的检测与分析,需要高效地识别出加密流量。但是,压缩流量的存在会严重干扰对加密流量的识别。针对上述问题,设计了基于滑动窗口和随机性特征的加密流量识别方案,以高效且准确地识别加密流量。具体来说,所提方案根据滑动窗口机制对会话中数据传输报文的有效载荷进行采样,获取能够反映原始流量信息模式的数据块序列,针对每个数据块使用随机性测度算法进行样本特征提取,为原始载荷构建随机性特征。此外,通过设计基于CART(classification and reqression tree)算法的决策树模型,在提高加密和压缩流量识别的准确率的同时,极大降低了针对加密流量识别的漏报率。基于对多个权威网站数据的随机抽样,构建均衡的数据集,并通过实验证明了所提方案的可行性和高效性。 展开更多
关键词 加密流量 压缩流量 随机性特征 滑动采样
下载PDF
面向云审计的轻量级隐私保护方案
15
作者 张晓琴 姚远 王颖 《重庆大学学报》 CAS CSCD 北大核心 2024年第2期75-83,共9页
在大数据爆发式增长背景下,云存储服务的发展为用户数据存储带来了极大的方便,按需服务特性使其备受青睐。但由于失去了对云服务器中数据的直接控制,不确定因素可能导致用户的数据损坏,这给云存储发展带来极大挑战。笔者提出轻量级计算... 在大数据爆发式增长背景下,云存储服务的发展为用户数据存储带来了极大的方便,按需服务特性使其备受青睐。但由于失去了对云服务器中数据的直接控制,不确定因素可能导致用户的数据损坏,这给云存储发展带来极大挑战。笔者提出轻量级计算和验证的数据审计方案,简化了用户在上传数据之前的标签计算操作,保证用户上传数据的安全性。此外,云服务器和审计者的计算任务也得到减轻,进一步降低计算开销。为保护用户数据隐私,借鉴了图像加密中的置乱加密,让用户使用随机函数对数据块的位置进行置乱,同时让审计者计算出数据块的真实位置,完成审计操作。实验结果表明,该方案有效节省了审计流程中用户和服务器、审计者3方的计算资源,提升流程效率。 展开更多
关键词 数据审计 云服务器 隐私保护 置乱加密 随机函数
下载PDF
基于加密模式的协同式激光敌我识别技术
16
作者 唐大宇 潘向荣 《计算机测量与控制》 2024年第6期242-247,255,共7页
为了解决普通的激光敌我识别中,信号容易被侦收后破解的问题,提出了一种基于加密模式的协同式激光敌我识别技术,对激光敌我识别系统工作原理进行了研究与分析,采用通过时间信息产生一组伪随机数,利用一组高强度的改进加密算法对这组伪... 为了解决普通的激光敌我识别中,信号容易被侦收后破解的问题,提出了一种基于加密模式的协同式激光敌我识别技术,对激光敌我识别系统工作原理进行了研究与分析,采用通过时间信息产生一组伪随机数,利用一组高强度的改进加密算法对这组伪随机数进行变换产生加密数据,并经过扩频函数对变换后的加密数据进行扩频,结合RS纠错码产生最终编码的方法,增强数据的抗干扰能力,经实验测试实现了提高信号保密性和安全性的目的,为激光敌我识别的发展提供了新的思路。 展开更多
关键词 激光敌我识别 协同 伪随机数 扩频 加密算法
下载PDF
融合随机森林与SHAP的恶意加密流量预测模型 被引量:1
17
作者 吴燕 《哈尔滨商业大学学报(自然科学版)》 CAS 2024年第2期167-178,共12页
加密流量保护用户隐私信息的同时也会隐藏恶意行为,尽早发现恶意加密流量是抵御不同网络攻击(如分布拒绝式攻击、窃听、注入攻击等)和保护网络免受入侵的关键手段.传统基于端口、深度包检测等恶意流量检测方法难以对抗代码混淆、重新包... 加密流量保护用户隐私信息的同时也会隐藏恶意行为,尽早发现恶意加密流量是抵御不同网络攻击(如分布拒绝式攻击、窃听、注入攻击等)和保护网络免受入侵的关键手段.传统基于端口、深度包检测等恶意流量检测方法难以对抗代码混淆、重新包装等复杂攻击,而基于机器学习的方法也存在误报率高和决策过程难以理解的问题.为此,提出一种恶意加密流量检测高可解释性模型EPMRS,以弥补现有研究在性能与可解释性上存在的局限性.在数据去重,重编码及特征筛选等数据预处理的基础上,基于随机森林构建恶意加密流量检测模型,并与逻辑回归、KNN、LGBM等10种主流机器学习模型进行5折交叉验证的实验对比;基于SHAP框架从整体模型、核心风险特征交互效应及样本决策过程三个不同的层面,全面增强恶意加密流量检测模型的可解释性.EPMRS在MCCCU数据集的实证结果表明,EPMRS对未知加密恶意流量的检测准确率达到99.996%、误识别率为0.0003%,与已有工作相比,性能指标平均提升了0.287175%~7.513175%;同时,通过可解释性分析识别出了session(会话)、flow_duration(流持续时间)、Goodput(有效吞吐量)等为影响恶意加密流量检测的核心风险因素. 展开更多
关键词 恶意加密流量 网络安全 随机森林 SHAP模型 可解释性
下载PDF
基于物理加密及KNN算法的核军控核查技术研究
18
作者 何小锁 王圣凯 +2 位作者 窦小敏 路凯凯 何庆华 《核科学与工程》 CAS CSCD 北大核心 2024年第3期660-666,共7页
现阶段军控核查技术所面临的困难在于:核查人员需要在不探测敏感信息的前提下,对被检核武器的真实性给出准确结论。本工作结合物理掩模加密技术与K近邻算法,提出一种可自主加密识别核武器身份信息的核查系统。利用Geant4搭建基于中子裂... 现阶段军控核查技术所面临的困难在于:核查人员需要在不探测敏感信息的前提下,对被检核武器的真实性给出准确结论。本工作结合物理掩模加密技术与K近邻算法,提出一种可自主加密识别核武器身份信息的核查系统。利用Geant4搭建基于中子裂变反应的物理加密辐射指纹采集装置,并通过构造多种作弊情景下的样本建立数据库,同时本研究选择KNN算法建立机器学习模型应用于未知项目的身份认证,并从鲁棒性和安全性两方面量化了该核查系统的可行性。结果表明,当样本同位素丰度由武器级铀变为较低级浓缩铀(235U的丰度由96%变为70%及以下)或者样本几何形状发生细微改变时,该系统对这两种典型的作弊情景具有优良的鉴别能力。该核查方法利用智能算法实现了核武器的自主认证,提高效率的同时有效规避了人工篡改和窥探敏感信息的风险,此外,结合物理掩模加密技术,使得敏感信息从始至终没被测量,在一定程度上降低了通过软件后门等手段作弊的风险。基于物理加密及K近邻算法的核军控核查技术能够在保护被测项目敏感信息的基础上,以较高的准确率和效率鉴定其真实性。 展开更多
关键词 核军控核查 物理加密 KNN算法 随机掩模
下载PDF
支持数据隐私保护的恶意加密流量检测确认方法研究
19
作者 季奥颖 柳伟 +2 位作者 丁页顶 鲍喜妮 高源 《中国高新科技》 2024年第9期75-76,157,共3页
传统恶意加密流量检测技术需要对其进行无差别解密,会增加隐私泄露的风险。而利用对流量特征进行的提取与整体分析思路构建的检测手段能够支持数据隐私保护功能。文章以此为研究对象,利用随机森林算法对流量特征进行识别,并在聚类分析... 传统恶意加密流量检测技术需要对其进行无差别解密,会增加隐私泄露的风险。而利用对流量特征进行的提取与整体分析思路构建的检测手段能够支持数据隐私保护功能。文章以此为研究对象,利用随机森林算法对流量特征进行识别,并在聚类分析的矩阵计算下提供对数据隐私保护的支持,可为此种流量检测确认方法的研究与应用奠定理论基础。 展开更多
关键词 隐私保护 恶意加密 随机森林 检测
下载PDF
An Efficient Image Cipher Based on 2D Scrambled Image and Random Numbers
20
作者 Asghar Ali Sammia Ansar +2 位作者 Ashwag Albakri Nadeem Iqbal Shahid Yousaf 《Journal of Cyber Security》 2022年第3期169-183,共15页
Security of images plays an import role in communication in current era due to the popularity and high usage ofmultimedia content in the Internet.Image security is described as applying an encryption algorithm over th... Security of images plays an import role in communication in current era due to the popularity and high usage ofmultimedia content in the Internet.Image security is described as applying an encryption algorithm over the given plaintext images to produce cipher images that can be transmitted safely over the open channel,the Internet.The problem which plagues these image ciphers is that they are too much time consuming,and that do not meet the dictates of the present times.In this paper,we aim to provide an efficient image cipher.The previous studies employed many constructs like Langton’s Ant,15 puzzle game and Castle in the 2D scrambled image based image ciphers,which had grave implications related to the high execution time of the ciphers.The current study directly made use of the 2D scrambled image to realize the purpose.Moreover,no compromise has been made over the security of the proposed image cipher.Random numbers have been generated by triggering the Intertwining Logistic Chaotic map.The cipher has been subjected to many important validation metrics like key space,information entropy,correlation coefficient,crop attack and lastly time complexity to demonstrate its immunity to the various attacks,and its realworld application.In this paper,our proposed image cipher exhibits an encryption speed of 0.1797 s,which is far better than many of the existing encryption ciphers. 展开更多
关键词 encryption CIPHER random numbers image processing secret key chaotic map
下载PDF
上一页 1 2 24 下一页 到第
使用帮助 返回顶部