网络语音电话(voice over IP,VoIP)已成为目前人们沟通交流的普遍选择.相比文本、图像等传统隐写载体,网络语音数据流隐蔽性好,隐藏空间更大,因而得到越来越多的关注.目前的网络语音隐写研究围绕算法设计展开,已有成果的抗检测性有待进...网络语音电话(voice over IP,VoIP)已成为目前人们沟通交流的普遍选择.相比文本、图像等传统隐写载体,网络语音数据流隐蔽性好,隐藏空间更大,因而得到越来越多的关注.目前的网络语音隐写研究围绕算法设计展开,已有成果的抗检测性有待进一步加强,且缺乏安全性理论指导.为此,首先分析语音帧的时序性特点,以相对熵的形式定义了基于贝叶斯网络模型的隐写安全性.通过分析语音编码过程,建立了固定码本参数的贝叶斯网络模型并将参数分为二元载体和三元载体2类.应用矩阵嵌入技术确定载体的修改位置,减少修改量;以最小化安全性测度为目标确定三元载体元素的修改方向,降低隐写对载体统计特性的影响.实验表明:在不显著增加计算复杂度的前提下,所提算法取得了比已有算法更好的感知透明性和抗检测能力.展开更多
While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contrad...While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy.展开更多
The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarante...The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.展开更多
This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of ...This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of explicit and tacit knowledge in the field of vocational occupational safety and health (OSH) training. This project identifies three specific research steps for the development of the knowledge management framework of the information technology-based approach for improving occupational safety training of young workers, including: (1) the development of the conceptual model of the flow of explicit knowledge of OSH; (2) evaluation of the effectiveness of formal and explicit knowledge sources for OSH and training methods using these sources in the context of attitudes towards health and safety at work; and (3) verification of the proposed model of vocational training with the use of combined explicit and hidden knowledge. The proposed framework includes consideration of the effectiveness of the formal and informal sources of safety knowledge. A mapping from the formal sources of explicit knowledge about the occupational safety to expected attitudes (hidden knowledge) towards OSH outcomes, including emotional, cognitive, and behavioral aspects has been used. The above framework should help to improve the system of vocational training for young workers in Poland.展开更多
Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the securi...Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level.展开更多
Today's industry requires more reliable information on the current status of their hard assets; prognosis for continued usability of systems and better predictability of equipment life cycle maintenance. Therefore, a...Today's industry requires more reliable information on the current status of their hard assets; prognosis for continued usability of systems and better predictability of equipment life cycle maintenance. Therefore, an innovative technique for early detection of potential failure and condition monitoring is urgently required by many engineers. This document describes a novel approach to improve industrial equipment safety, reliability and life cycle management. A new field portable instrument called the "IMS (indicator of mechanical stresses)" utilizes magneto-anisotropic ("cross") transducers to measure anisotropy of magnetic properties in ferromagnetic material. Mechanical stresses including residual stresses in Ferro-magnetic parts, are "not visible" to most traditional NDT (non-destructive testing) methods; for example, radiography and ultrasonic inspection. Stress build-up can be the first indicator that something is faulty with a structure. This can be the result of a manufacturing defect; or as assets age and fatigue, stress loads can become unevenly distributed throughout the metal. We outline the evaluation of IMS as a fast screening tool to provide structural condition or deterioration feedback in novel applications for pipelines, petrochemical refinery, cranes, and municipal infrastructure.展开更多
文摘网络语音电话(voice over IP,VoIP)已成为目前人们沟通交流的普遍选择.相比文本、图像等传统隐写载体,网络语音数据流隐蔽性好,隐藏空间更大,因而得到越来越多的关注.目前的网络语音隐写研究围绕算法设计展开,已有成果的抗检测性有待进一步加强,且缺乏安全性理论指导.为此,首先分析语音帧的时序性特点,以相对熵的形式定义了基于贝叶斯网络模型的隐写安全性.通过分析语音编码过程,建立了固定码本参数的贝叶斯网络模型并将参数分为二元载体和三元载体2类.应用矩阵嵌入技术确定载体的修改位置,减少修改量;以最小化安全性测度为目标确定三元载体元素的修改方向,降低隐写对载体统计特性的影响.实验表明:在不显著增加计算复杂度的前提下,所提算法取得了比已有算法更好的感知透明性和抗检测能力.
文摘While Big Data gradually become a hot topic of research and business and has been everywhere used in many industries, Big Data security and privacy has been increasingly concerned. However, there is an obvious contradiction between Big Data security and privacy and the widespread use of Big Data. In this paper, we firstly reviewed the enormous benefits and challenges of security and privacy in Big Data. Then, we present some possible methods and techniques to ensure Big Data security and privacy.
文摘The framework of digital signature based on qualified certificates and X. 509 architecture is known to have many security risks. Moreover, the fraud prevention mechanism is fragile and does not provide strong guarantees that can be necessary for flow of legal documents. Mediated signatures have been proposed as a mechanism to effectively disable signature cards. In this paper we propose further mechanisms that can be applied on top of mediated RSA, compatible with the standard format, but providing security guarantees even in the case when RSA becomes broken or the keys are compromised. The solution is immune tokleptographic attacks as only deterministic algorithms are used on user's side.
文摘This paper aims to develop a novel knowledge management framework for improving the system of pro-safety attitudes among young worker population in Poland. This is done through an efficient use of existing sources of explicit and tacit knowledge in the field of vocational occupational safety and health (OSH) training. This project identifies three specific research steps for the development of the knowledge management framework of the information technology-based approach for improving occupational safety training of young workers, including: (1) the development of the conceptual model of the flow of explicit knowledge of OSH; (2) evaluation of the effectiveness of formal and explicit knowledge sources for OSH and training methods using these sources in the context of attitudes towards health and safety at work; and (3) verification of the proposed model of vocational training with the use of combined explicit and hidden knowledge. The proposed framework includes consideration of the effectiveness of the formal and informal sources of safety knowledge. A mapping from the formal sources of explicit knowledge about the occupational safety to expected attitudes (hidden knowledge) towards OSH outcomes, including emotional, cognitive, and behavioral aspects has been used. The above framework should help to improve the system of vocational training for young workers in Poland.
基金the National Natural Science Foundation of China under Grant,the Fundamental Research Funds for the Central Universities under Grant No.FRF-TP-14-046A2
文摘Due to its characteristics distribution and virtualization, cloud storage also brings new security problems. User's data is stored in the cloud, which separated the ownership from management. How to ensure the security of cloud data, how to increase data availability and how to improve user privacy perception are the key issues of cloud storage research, especially when the cloud service provider is not completely trusted. In this paper, a cloud storage ciphertext retrieval scheme based on AES and homomorphic encryption is presented. This ciphertext retrieval scheme will not only conceal the user retrieval information, but also prevent the cloud from obtaining user access pattern such as read-write mode, and access frequency, thereby ensuring the safety of the ciphertext retrieval and user privacy. The results of simulation analysis show that the performance of this ciphertext retrieval scheme requires less overhead than other schemes on the same security level.
文摘Today's industry requires more reliable information on the current status of their hard assets; prognosis for continued usability of systems and better predictability of equipment life cycle maintenance. Therefore, an innovative technique for early detection of potential failure and condition monitoring is urgently required by many engineers. This document describes a novel approach to improve industrial equipment safety, reliability and life cycle management. A new field portable instrument called the "IMS (indicator of mechanical stresses)" utilizes magneto-anisotropic ("cross") transducers to measure anisotropy of magnetic properties in ferromagnetic material. Mechanical stresses including residual stresses in Ferro-magnetic parts, are "not visible" to most traditional NDT (non-destructive testing) methods; for example, radiography and ultrasonic inspection. Stress build-up can be the first indicator that something is faulty with a structure. This can be the result of a manufacturing defect; or as assets age and fatigue, stress loads can become unevenly distributed throughout the metal. We outline the evaluation of IMS as a fast screening tool to provide structural condition or deterioration feedback in novel applications for pipelines, petrochemical refinery, cranes, and municipal infrastructure.