期刊文献+
共找到10篇文章
< 1 >
每页显示 20 50 100
A Review of Image Steganography Based on Multiple Hashing Algorithm
1
作者 Abdullah Alenizi Mohammad Sajid Mohammadi +1 位作者 Ahmad A.Al-Hajji Arshiya Sajid Ansari 《Computers, Materials & Continua》 SCIE EI 2024年第8期2463-2494,共32页
Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a s... Steganography is a technique for hiding secret messages while sending and receiving communications through a cover item.From ancient times to the present,the security of secret or vital information has always been a significant problem.The development of secure communication methods that keep recipient-only data transmissions secret has always been an area of interest.Therefore,several approaches,including steganography,have been developed by researchers over time to enable safe data transit.In this review,we have discussed image steganography based on Discrete Cosine Transform(DCT)algorithm,etc.We have also discussed image steganography based on multiple hashing algorithms like the Rivest–Shamir–Adleman(RSA)method,the Blowfish technique,and the hash-least significant bit(LSB)approach.In this review,a novel method of hiding information in images has been developed with minimal variance in image bits,making our method secure and effective.A cryptography mechanism was also used in this strategy.Before encoding the data and embedding it into a carry image,this review verifies that it has been encrypted.Usually,embedded text in photos conveys crucial signals about the content.This review employs hash table encryption on the message before hiding it within the picture to provide a more secure method of data transport.If the message is ever intercepted by a third party,there are several ways to stop this operation.A second level of security process implementation involves encrypting and decrypting steganography images using different hashing algorithms. 展开更多
关键词 Image steganography multiple hashing algorithms Hash-LSB approach rsa algorithm discrete cosine transform(DCT)algorithm blowfish algorithm
下载PDF
Realization and Application of RSA in Chip Operating System
2
作者 Tu Hang Liu Yu-zhen +1 位作者 Zhang Huan-guo Qin Zhong-ping 《Wuhan University Journal of Natural Sciences》 CAS 2000年第3期297-297,共1页
As an outstanding asymmetric cryptography, RSA algorithm has a lot of virtues and thus is well applied in the scope of IC card applications. The paper deals with the application of RSA in smart cards and the approach ... As an outstanding asymmetric cryptography, RSA algorithm has a lot of virtues and thus is well applied in the scope of IC card applications. The paper deals with the application of RSA in smart cards and the approach in which the modular exponentiation of huge number is simplified by using the Chinese Remainder Theorem. We have already succeeded in completing RSA in IC cards. Results indicate that RSA algorithm applied in IC cards has the equivalent speed of DES algorithm with the same environment. 展开更多
关键词 smart card chip operating system information safety rsa algorithm
下载PDF
A Secure Method for Data Storage and Transmission in Sustainable Cloud Computing
3
作者 Muhammad Usman Sana Zhanli Li +3 位作者 Tayybah Kiren Hannan Bin Liaqat Shahid Naseem Atif Saeed 《Computers, Materials & Continua》 SCIE EI 2023年第5期2741-2757,共17页
Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encrypt... Cloud computing is a technology that provides secure storage space for the customer’s massive data and gives them the facility to retrieve and transmit their data efficiently through a secure network in which encryption and decryption algorithms are being deployed.In cloud computation,data processing,storage,and transmission can be done through laptops andmobile devices.Data Storing in cloud facilities is expanding each day and data is the most significant asset of clients.The important concern with the transmission of information to the cloud is security because there is no perceivability of the client’s data.They have to be dependent on cloud service providers for assurance of the platform’s security.Data security and privacy issues reduce the progression of cloud computing and add complexity.Nowadays;most of the data that is stored on cloud servers is in the form of images and photographs,which is a very confidential form of data that requires secured transmission.In this research work,a public key cryptosystem is being implemented to store,retrieve and transmit information in cloud computation through a modified Rivest-Shamir-Adleman(RSA)algorithm for the encryption and decryption of data.The implementation of a modified RSA algorithm results guaranteed the security of data in the cloud environment.To enhance the user data security level,a neural network is used for user authentication and recognition.Moreover;the proposed technique develops the performance of detection as a loss function of the bounding box.The Faster Region-Based Convolutional Neural Network(Faster R-CNN)gets trained on images to identify authorized users with an accuracy of 99.9%on training. 展开更多
关键词 Cloud computing data security rsa algorithm Faster R-CNN
下载PDF
Modified Adhoc On-Demand Distance Vector for Trust Evaluation And Attack Detection
4
作者 S.Soundararajan B.R.Tapas Bapu +3 位作者 C.Kotteeswaran S.Venkatasubramanian P.J.Sathish Kumar Ahmed Mudassar Ali 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期1227-1240,共14页
Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,abse... Recently,Wireless Sensor Network(WSN)becomes most potential technologies for providing improved services to several data gathering and track-ing applications.Because of the wireless medium,multi-hop communication,absence of physical protectivity,and accumulated traffic,WSN is highly vulner-able to security concerns.Therefore,this study explores a specific type of DoS attack identified as a selective forwarding attack where the misbehaving node in the network drops packet on a selective basis.It is challenging to determine if packet loss is caused by a collision in the medium access path,poor channel quality,or a selective forwarding assault.Identifying misbehaving nodes at the earliest opportunity is an acceptable solution for performing secure routing in such networks.As a result,in this study effort,we present a unique Modified Ad Hoc On-Demand Distance Vector(AODV)Routing protocol depending upon the One time password(OTP)method that employs the RSA algorithm.Finally,a trust evaluation process determines which approach is the most optimal.Accord-ing to the simulationfindings of the suggested routing protocol and comparison with existing routing protocols provided in this article,the proposed work is both efficient and cost-effective. 展开更多
关键词 Wireless sensor network selective forward attack one time password trust evaluation rsa algorithm
下载PDF
Asymmetric image encryption algorithm based on a new three-dimensional improved logistic chaotic map
5
作者 叶国栋 吴惠山 +1 位作者 黄小玲 Syh-Yuan Tan 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期153-163,共11页
Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shami... Based on some analyses of existing chaotic image encryption frameworks and a new designed three-dimensional improved logistic chaotic map(3D-ILM),an asymmetric image encryption algorithm using public-key Rivest–Shamir–Adleman(RSA)is presented in this paper.In the first stage,a new 3D-ILM is proposed to enhance the chaotic behavior considering analysis of time sequence,Lyapunov exponent,and Shannon entropy.In the second stage,combined with the public key RSA algorithm,a new key acquisition mathematical model(MKA)is constructed to obtain the initial keys for the 3D-ILM.Consequently,the key stream can be produced depending on the plain image for a higher security.Moreover,a novel process model(NPM)for the input of the 3D-ILM is built,which is built to improve the distribution uniformity of the chaotic sequence.In the third stage,to encrypt the plain image,a pre-process by exclusive OR(XOR)operation with a random matrix is applied.Then,the pre-processed image is performed by a permutation for rows,a downward modulo function for adjacent pixels,a permutation for columns,a forward direction XOR addition-modulo diffusion,and a backward direction XOR addition-modulo diffusion to achieve the final cipher image.Moreover,experiments show that the the proposed algorithm has a better performance.Especially,the number of pixels change rate(NPCR)is close to ideal case 99.6094%,with the unified average changing intensity(UACI)close to 33.4634%,and the information entropy(IE)close to 8. 展开更多
关键词 three-dimensional improved logistic chaotic map(3D-ILM) Rivest–Shamir–Adleman(rsa)algorithm image encryption CONFUSION ENTROPY
下载PDF
Security transmission and recognition of F-knowledge 被引量:7
6
作者 Zhang Ling Shi Kaiquan 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第4期877-882,共6页
The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of mu... The concept of F-knowledge is presented by employing S-rough sets. By engrafting and penetrating between the F-knowledge generated by S-rough sets and the RSA algorithm, the security transmission and recognition of multi-agent F-knowledge are proposed, which includes the security transmission of multi-agent F-knowledge with positive direction secret key and the security transmission of multi-agent F-knowledge with reverse direction secret key. Finally, the recognition criterion and the applications of F-knowledge are presented. The security of F-knowledge is a new application research direction of S-rough sets in information systems. 展开更多
关键词 S-rough sets F-knowledge security of knowledge rsa algorithm recognition criterion application.
下载PDF
A Cryptographic-Based Approach for Electricity Theft Detection in Smart Grid 被引量:2
7
作者 Khelifi Naim Benahmed Khelifa Bounaama Fateh 《Computers, Materials & Continua》 SCIE EI 2020年第4期97-117,共21页
In order to strengthen their security issues,electrical companies devote particular efforts to developing and enhancing their fraud detection techniques that cope with the information and communication technologies in... In order to strengthen their security issues,electrical companies devote particular efforts to developing and enhancing their fraud detection techniques that cope with the information and communication technologies integration in smart grid fields.Having been treated earlier by several researchers,various detection schemes adapted from attack models that benefit from the smart grid topologies weaknesses,aiming primarily to the identification of suspicious incoming hazards.Wireless meshes have been extensively used in smart grid communication architectures due to their facility,lightness of conception and low cost installation;however,the communicated packets are still exposed to be intercepted maliciously in order either to falsify pertinent information like the smart meter readings,or to inject false data instead,aiming at electricity theft during the communication phase.For this reason,this paper initiates a novel method based on RSA cryptographic algorithm to detect electricity fraud in smart grid.This new method consists of generating two different cryptograms of one electricity measurement before sending,after which the recipient is used to find the same value after decrypting the two cyphers in a normal case.Otherwise,a fraudulent manipulation could occur during the transmission stage.The presented method allows us to kill two birds with one stone.First,satisfactory outcomes are shown:the algorithm accuracy reaches 100%,from one hand,and the privacy is protected thanks to the cryptology concept on the other hand. 展开更多
关键词 Electricity consumption fraud detection rsa algorithm SECURITY smart grid
下载PDF
A Complex Encryption System Design Implemented by AES 被引量:1
8
作者 Zhimao Lu Houmed Mohamed 《Journal of Information Security》 2021年第2期177-187,共11页
With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security pr... With the rapid development of internet technology and the increasing popularity of e-commerce, data encryption technology plays a very important role in data security. Information security has two aspects: security protocol and cryptographic algorithm and the latter is the foundation and core technology of information security. Advanced Encryption Standard (AES) encryption algorithm is one of the most commonly used algorithms in symmetric encryption algorithms. Such algorithms face issues when used in the context of key management and security functions. This paper focuses on the systematic analysis of these issues and summarizes AES algorithm implementation, comprehensive application and algorithm comparison with other existing methods. To analyze the performance of the proposed algorithm and to make full use of the advantages of AES encryption algorithm, one needs to reduce round key and improve the key schedule, as well as organically integrate with RSA algorithm. Java language is used to implement the algorithm due to its large library, then to show the efficiency of the proposed method we compare different parameters, such as encryption/decryption speed, entropies and memory consumption...) with a classic algorithm. Based on the results of the comparison between AES and the hybrid AES algorithm, the proposed algorithm shows good performance and high security. It therefore can be used for key management and security functions, particularly for sharing sensitive files through insecure channel. This analysis provides a reference useful for selecting different encryption algorithms according to different business needs. 展开更多
关键词 AES Algorithm rsa Algorithm ENCRYPTION Key Management
下载PDF
High Efficiency Crypto-Watermarking System Based on Clifford-Multiwavelet for 3D Meshes Security
9
作者 Wajdi Elhamzi Malika Jallouli Yassine Bouteraa 《Computers, Materials & Continua》 SCIE EI 2022年第11期4329-4347,共19页
Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our appro... Since 3D mesh security has become intellectual property,3D watermarking algorithms have continued to appear to secure 3D meshes shared by remote users and saved in distant multimedia databases.The novelty of our approach is that it uses a new Clifford-multiwavelet transform to insert copyright data in a multiresolution domain,allowing us to greatly expand the size of the watermark.After that,our method does two rounds of insertion,each applying a different type of Clifford-wavelet transform.Before being placed into the Clifford-multiwavelet coefficients,the watermark,which is a mixture of the mesh description,source mesh signature(produced using SHA512),and a logo encrypted using the RSA(Ronald Shamir Adleman)technique,is encoded using Turbo-code.Using the Least Significant Bit method steps,data embedding involves modulation and insertion processes.Finally,the watermarked mesh is reconstructed using the inverse Cliffordmultiwavelet transform.Due to the utilization of a hybrid insertion domain,our technique has demonstrated a very high insertion rate while retaining mesh quality.The mesh is watermarked,and the extracted data is acquired in real-time.Our approach is also resistant to the most common types of attacks.Our findings reveal that the current approach improves on previous efforts. 展开更多
关键词 Digital watermarking Clifford-multiwavelet transform Multiwavelet entropy LSB method rsa algorithm rsa algorithm Turbocode 3D multiresolution meshes
下载PDF
A simplified scheme for secure offline electronic payment systems
10
作者 Md.Abdullah Al Rahat Kutubi Kazi Md.Rokibul Alam Yasuhiko Morimoto 《High-Confidence Computing》 2021年第2期26-34,共9页
This paper proposes a secure offline electronic(e-)payment scheme by adopting Schnorr’s untraceable blind signature(BS).Thereby,to satisfy the essential security requirements of e-payment systems,it requires much mor... This paper proposes a secure offline electronic(e-)payment scheme by adopting Schnorr’s untraceable blind signature(BS).Thereby,to satisfy the essential security requirements of e-payment systems,it requires much more simple computations and becomes more practical than many existing schemes.Other considerations are:to prevent the forgery of e-coin,the Bank is only the lawful entity to produce the valid e-coin;and others can verify its correctness.To confirm no swindling,the e-coin owner also sticks her private signing key with the e-coin before spending it as the payment.Hence,through the commitment with challenge-response of Schnorr’s BS,the merchant can verify the spent e-coin,and the trusted authority can identify the dishonest spender if multiple spending occurs.Moreover,it embeds three distinct information of date,namely expiration,deposit,and transaction dates with every e-coin.Thereby,it minimizes the size of the Bank’s database,correctly calculates the interest of the e-coin,and helps in arbiter if multiple spending,respectively.Finally,it evaluates the performance and analyzes essential security requirements of the proposed scheme,plus studies a comparison with existing ones. 展开更多
关键词 Offline electronic payment Schnorr’s blind signature rsa algorithm Zero-knowledge proof UNTRACEABILITY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部