期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
高阶隐写直觉模糊集距离安全性测度
1
作者 周宇 欧阳春娟 刘欢 《井冈山大学学报(自然科学版)》 2023年第5期79-85,共7页
在隐写安全性研究滞后于隐写算法发展的前提下,隐写安全性研究成为亟待解决的问题。根据隐写通信过程的模糊不确定性,对隐写数据采用n阶Markov链建模,提出了隐写系统直觉模糊集距离安全性测度,并证明了该安全性测度的有界性、交换性和... 在隐写安全性研究滞后于隐写算法发展的前提下,隐写安全性研究成为亟待解决的问题。根据隐写通信过程的模糊不确定性,对隐写数据采用n阶Markov链建模,提出了隐写系统直觉模糊集距离安全性测度,并证明了该安全性测度的有界性、交换性和一致性。仿真实验表明,该安全性测度具有对不同隐写算法的度量区分能力。与确定模式下安全性相比较,在相同数据统计模型下,直觉模糊集距离安全性测度获得了更全面的隐蔽性评价。 展开更多
关键词 安全性 马尔可夫链 直觉模糊集距离 有界性
下载PDF
基于边信息估计的JPEG图像隐写方法 被引量:2
2
作者 王丽娜 王博 +1 位作者 翟黎明 徐一波 《华南理工大学学报(自然科学版)》 EI CAS CSCD 北大核心 2018年第5期9-15,共7页
基于JPEG图像的隐写方法通常利用原始图像的边信息来提高隐写安全性.然而现有的JPEG图像隐写方法在使用边信息时需要提前获取未压缩的原始图像,当原始图像不可获得时,往往不能把边信息用于设计隐写方法.文中提出了一种在不具有未压缩的... 基于JPEG图像的隐写方法通常利用原始图像的边信息来提高隐写安全性.然而现有的JPEG图像隐写方法在使用边信息时需要提前获取未压缩的原始图像,当原始图像不可获得时,往往不能把边信息用于设计隐写方法.文中提出了一种在不具有未压缩的原始图像的情况下,通过估计图像的边信息来提高JPEG图像隐写安全性的方法.首先,使用卷积神经网络对JPEG载体图像进行恢复,得到估计的原始图像;其次,通过得到的估计图像计算取整误差;然后利用取整误差来控制嵌入过程中离散余弦变换(DCT)系数的修改方向;最后结合DCT系数的失真代价和STC编码来实现隐写嵌入.文中提出的边信息估计方法能够应用于现有的JPEG图像自适应隐写方法,如JC-UED和J-UNIWARD.实验结果表明,该方法能较好地恢复图像的边信息,并能显著提高现有JPEG图像自适应隐写方法的安全性. 展开更多
关键词 写术 JPEG图像 边信息 安全性
下载PDF
基于贝叶斯网络模型和矩阵嵌入的VoIP隐写算法 被引量:3
3
作者 高瞻瞻 汤光明 王硕 《计算机研究与发展》 EI CSCD 北大核心 2018年第4期854-863,共10页
网络语音电话(voice over IP,VoIP)已成为目前人们沟通交流的普遍选择.相比文本、图像等传统隐写载体,网络语音数据流隐蔽性好,隐藏空间更大,因而得到越来越多的关注.目前的网络语音隐写研究围绕算法设计展开,已有成果的抗检测性有待进... 网络语音电话(voice over IP,VoIP)已成为目前人们沟通交流的普遍选择.相比文本、图像等传统隐写载体,网络语音数据流隐蔽性好,隐藏空间更大,因而得到越来越多的关注.目前的网络语音隐写研究围绕算法设计展开,已有成果的抗检测性有待进一步加强,且缺乏安全性理论指导.为此,首先分析语音帧的时序性特点,以相对熵的形式定义了基于贝叶斯网络模型的隐写安全性.通过分析语音编码过程,建立了固定码本参数的贝叶斯网络模型并将参数分为二元载体和三元载体2类.应用矩阵嵌入技术确定载体的修改位置,减少修改量;以最小化安全性测度为目标确定三元载体元素的修改方向,降低隐写对载体统计特性的影响.实验表明:在不显著增加计算复杂度的前提下,所提算法取得了比已有算法更好的感知透明性和抗检测能力. 展开更多
关键词 VoIP 贝叶斯网络 矩阵嵌入 固定码本 安全性
下载PDF
关注安全环保的药品包装材料 被引量:2
4
作者 肖军 《印刷质量与标准化》 2014年第12期10-17,共8页
当今人们对自己所消费的医药产品的质量要求越来越高,同时对医药商品的外衣"包装"的要求也越来越高,作为药物直接接触的包装材料就面对巨大的挑战。安全性成为医药产品包装在医药行业中发展的基础,因此广受社会的关注。
关键词 药品包装材料 药包材 医药行业 产品包装 药品质量 塑料包装 阻隔性能 金属包装 质量要求 安全性隐
下载PDF
基于分数基音延迟动态搜索的语音隐写算法
5
作者 田晖 严艳 +3 位作者 汤莉莉 吴俊彦 王慧东 全韩彧 《电子学报》 EI CAS CSCD 北大核心 2023年第1期67-75,共9页
论文提出了一种基于分数基音延迟动态搜索的语音隐写算法.该算法可根据隐藏容量(x比特/子帧)的需要将分数基音延迟候选值集合划分为2x个子集,每个子集代表不同的x比特信息.在闭环基音搜索过程中,可为每个子帧选择既能表示待嵌入隐秘信... 论文提出了一种基于分数基音延迟动态搜索的语音隐写算法.该算法可根据隐藏容量(x比特/子帧)的需要将分数基音延迟候选值集合划分为2x个子集,每个子集代表不同的x比特信息.在闭环基音搜索过程中,可为每个子帧选择既能表示待嵌入隐秘信息且内插后的归一化相关系数最大的分数基音延迟候选值,从而有效降低隐写操作对于原始载体的影响.以目前IP语音系统中广泛使用的自适应多速率语音编码为例,对该算法从隐藏容量、不可感知性及抗检测性三方面进行了性能评估并与相关工作进行了对比分析.实验结果表明,本文提出的隐写算法较之现有基于基音延迟的隐写算法可在确保较高隐写容量的同时达到更好隐写安全性(即更好抗检测能力和不可感知性). 展开更多
关键词 语音 动态搜索 分数基音延迟 自适应多速率语音编码 安全性
下载PDF
Big Data Security and Privacy: A Review 被引量:3
6
作者 MATTURDI Bardi ZHOU Xianwei +1 位作者 LI Shuai LIN Fuhong 《China Communications》 SCIE CSCD 2014年第A02期135-145,共11页
While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contrad... While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy. 展开更多
关键词 big data value of big data security and privacy
下载PDF
Digital Signatures for e-Government - a Long-Term Security Architecture 被引量:1
7
作者 Przemyslaw Blaskiewicz Przemyslaw Kubiak Miroslaw Kutylowski 《China Communications》 SCIE CSCD 2010年第6期64-70,共7页
The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarante... The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side. 展开更多
关键词 MRSA PSS padding hash based signatures kleptography deterministic signatures
下载PDF
A Knowledge Management Framework of the Information Technology-Based Approach for Improving Occupational Safety Training of Young Workers
8
作者 Irena Hejduk Waldemar Karwowski 《Chinese Business Review》 2016年第1期42-47,共6页
This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of ... This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of explicit and tacit knowledge in the field of vocational occupational safety and health (OSH) training. This project identifies three specific research steps for the development of the knowledge management framework of the information technology-based approach for improving occupational safety training of young workers, including: (1) the development of the conceptual model of the flow of explicit knowledge of OSH; (2) evaluation of the effectiveness of formal and explicit knowledge sources for OSH and training methods using these sources in the context of attitudes towards health and safety at work; and (3) verification of the proposed model of vocational training with the use of combined explicit and hidden knowledge. The proposed framework includes consideration of the effectiveness of the formal and informal sources of safety knowledge. A mapping from the formal sources of explicit knowledge about the occupational safety to expected attitudes (hidden knowledge) towards OSH outcomes, including emotional, cognitive, and behavioral aspects has been used. The above framework should help to improve the system of vocational training for young workers in Poland. 展开更多
关键词 knowledge management occupational safety education and training young workers
下载PDF
The Cloud Storage Ciphertext Retrieval Scheme Based on ORAM 被引量:1
9
作者 SONG Ningning SUN Yan 《China Communications》 SCIE CSCD 2014年第A02期156-165,共10页
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi... Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level. 展开更多
关键词 cloud storage ciphertext retrieval scheme ORAM index map
下载PDF
Revealing the Invisible: A New Approach for Enhancing Industrial Safety, Reliability and Remaining Life Assessment
10
作者 Isaac Einav Boris Artemiev Sergey Zhukov 《Journal of Chemistry and Chemical Engineering》 2015年第3期191-198,共8页
Today's industry requires more reliable information on the current status of their hard assets; prognosis for continued usability of systems and better predictability of equipment life cycle maintenance. Therefore, a... Today's industry requires more reliable information on the current status of their hard assets; prognosis for continued usability of systems and better predictability of equipment life cycle maintenance. Therefore, an innovative technique for early detection of potential failure and condition monitoring is urgently required by many engineers. This document describes a novel approach to improve industrial equipment safety, reliability and life cycle management. A new field portable instrument called the "IMS (indicator of mechanical stresses)" utilizes magneto-anisotropic ("cross") transducers to measure anisotropy of magnetic properties in ferromagnetic material. Mechanical stresses including residual stresses in Ferro-magnetic parts, are "not visible" to most traditional NDT (non-destructive testing) methods; for example, radiography and ultrasonic inspection. Stress build-up can be the first indicator that something is faulty with a structure. This can be the result of a manufacturing defect; or as assets age and fatigue, stress loads can become unevenly distributed throughout the metal. We outline the evaluation of IMS as a fast screening tool to provide structural condition or deterioration feedback in novel applications for pipelines, petrochemical refinery, cranes, and municipal infrastructure. 展开更多
关键词 IMS mechanical stress concentration mechanical stress gradient stress detection and classification.
下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部