期刊文献+
共找到198篇文章
< 1 2 10 >
每页显示 20 50 100
A self-adapting image encryption algorithm based on spatiotemporal chaos and ergodic matrix 被引量:3
1
作者 罗玉玲 杜明辉 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第8期316-324,共9页
To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different bloc... To ensure the security of a digital image, a new self-adapting encryption algorithm based on the spatiotemporal chaos and ergodic matrix is proposed in this paper. First, the plain-image is divided into different blocks of the same size, and each block is sorted in ascending order to obtain the corresponding standard ergodic matrix. Then each block is encrypted by the spatiotemporal chaotic system and shuffled according to the standard ergodic matrix. Finally, all modules are rearranged to acquire the final encrypted image. In particular, the plain-image information is used in the initial conditions of the spatiotemporal chaos and the ergodic matrices, so different plain-images will be encrypted to obtain different cipherimages. Theoretical analysis and simulation results indicate that the performance and security of the proposed encryption scheme can encrypt the image effectively and resist various typical attacks. 展开更多
关键词 spatiotemporal chaos ergodic matrix standard map image encryption
下载PDF
Novel Approach to Data Encryption Based on Matrix Computations 被引量:1
2
作者 Rosilah Hassan Selver Pepic +2 位作者 Muzafer Saracevic Khaleel Ahmad Milan Tasic 《Computers, Materials & Continua》 SCIE EI 2021年第2期1139-1153,共15页
In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square He... In this paper,we provide a new approach to data encryption using generalized inverses.Encryption is based on the implementation of weighted Moore–Penrose inverse A y MNenxmT over the nx8 constant matrix.The square Hermitian positive definite matrix N8x8 p is the key.The proposed solution represents a very strong key since the number of different variants of positive definite matrices of order 8 is huge.We have provided NIST(National Institute of Standards and Technology)quality assurance tests for a random generated Hermitian matrix(a total of 10 different tests and additional analysis with approximate entropy and random digression).In the additional testing of the quality of the random matrix generated,we can conclude that the results of our analysis satisfy the defined strict requirements.This proposed MP encryption method can be applied effectively in the encryption and decryption of images in multi-party communications.In the experimental part of this paper,we give a comparison of encryption methods between machine learning methods.Machine learning algorithms could be compared by achieved results of classification concentrating on classes.In a comparative analysis,we give results of classifying of advanced encryption standard(AES)algorithm and proposed encryption method based on Moore–Penrose inverse. 展开更多
关键词 SECURITY data encryption matrix computations cloud computing machine learning
下载PDF
An Efficient Technique to Prevent Data Misuse with Matrix Cipher Encryption Algorithms
3
作者 Muhammad Nadeem Ali Arshad +4 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Moteeb Al Moteri Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第2期4059-4079,共21页
Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and preve... Many symmetric and asymmetric encryption algorithms have been developed in cloud computing to transmit data in a secure form.Cloud cryptography is a data encryption mechanism that consists of different steps and prevents the attacker from misusing the data.This paper has developed an efficient algorithm to protect the data from invaders and secure the data from misuse.If this algorithm is applied to the cloud network,the attacker will not be able to access the data.To encrypt the data,the values of the bytes have been obtained by converting the plain text to ASCII.A key has been generated using the Non-Deterministic Bit Generator(NRBG)mechanism,and the key is XNORed with plain text bits,and then Bit toggling has been implemented.After that,an efficient matrix cipher encryption algorithm has been developed,and this algorithm has been applied to this text.The capability of this algorithm is that with its help,a key has been obtained from the plain text,and only by using this key can the data be decrypted in the first steps.A plain text key will never be used for another plain text.The data has been secured by implementing different mechanisms in both stages,and after that,a ciphertext has been obtained.At the end of the article,the latest technique will be compared with different techniques.There will be a discussion on how the present technique is better than all the other techniques;then,the conclusion will be drawn based on comparative analysis. 展开更多
关键词 Symmetric CRYPTOGRAPHY CIPHERTEXT encryption DECRYPTION cloud security matrix cipher
下载PDF
CONSTRUCTION OF THE ENCRYPTION MATRIX BASED ON CHEBYSHEV CHAOTIC NEURAL NETWORKS
4
作者 Zou Ajin Wu Wei +1 位作者 Li Renfa Li Yongjiang 《Journal of Electronics(China)》 2012年第3期248-253,共6页
The paper proposes a novel algorithm to get the encryption matrix. Firstly, a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which availab... The paper proposes a novel algorithm to get the encryption matrix. Firstly, a chaotic sequence generated by Chebyshev chaotic neural networks is converted into a series of low-order integer matrices from which available encryption matrices are selected. Then, a higher order encryption matrix relating real world application is constructed by means of tensor production method based on selected encryption matrices. The results show that the proposed algorithm can produce a "one-time pad cipher" encryption matrix with high security; and the encryption results have good chaos and auto-correlation with the natural frequency of the plaintext being hidden and homogenized. 展开更多
关键词 Neural network encryption matrix CHAOS Tensor production
下载PDF
Research on the File Encryption and Programming based on Matrix Transformation
5
作者 Jiangtao Geng Qi Huang 《International Journal of Technology Management》 2013年第1期24-26,共3页
Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt f... Any linear transform matrix can be used to easily calculate a consistent form, and a plurality of conversion can be easily connected together by matrix multiplication. When performing file transfers, you can encrypt files matrix transformation. Article presents a matrix-based electronic document encryption and decryption algorithm, which relies on a special class of matrices combinatorial problems, the method to improve the security of electronic document system is feasible and effective, and finally give the source code and programming software. 展开更多
关键词 linear transformation file encryption and decryption matrix vc source code
下载PDF
A novel pseudo-random coupled LP spatiotemporal chaos and its application in image encryption 被引量:5
6
作者 Xingyuan Wang Yu Wang +2 位作者 Siwei Wang Yingqian Zhang Xiangjun Wu 《Chinese Physics B》 SCIE EI CAS CSCD 2018年第11期419-429,共11页
In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-rando... In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-random coupling method that can accelerate the system behavior of the fully spatial chaos. Here, because the better chaotic properties include a wide range of parameter settings and better ergodicity than a logistic map, the LP is used in PCLML as f(x). The Kolmogorov–Sinai entropy density and universality and the bifurcation diagram are employed to investigate the chaotic behaviors of the proposed PCLML model. Finally, we apply the LP and PCLML chaotic systems to image encryption to improve the effectiveness and security of the encryption scheme. By combining self-generating matrix model M and dynamic substitution box(S-Box) methods, we design a new image encryption algorithm. Numerical simulations and security analysis have been carried out to demonstrate that the proposed algorithm has a high security level and can efficiently encrypt several different kinds of images into random-like images. 展开更多
关键词 logistic-PWLCM map PCLML spatiotemporal chaos matrix model M dynamic S-Box image encryption
下载PDF
A Resistant Quantum Key Exchange Protocol and Its Corresponding Encryption Scheme 被引量:11
7
作者 MAO Shaowu ZHANG Huanguo WU Wanqing LIU Jinhui LI Shuanbao Wang Houzhen 《China Communications》 SCIE CSCD 2014年第9期124-134,共11页
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua... The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc. 展开更多
关键词 ergodic matrix tensor problem resist quantum key exchange protocol encryption
下载PDF
Secured Cloud Data Migration Technique by Competent Probabilistic Public Key Encryption 被引量:3
8
作者 M.G.Aruna K.G.Mohan 《China Communications》 SCIE CSCD 2020年第5期168-190,共23页
Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on ident... Cloud computing, a recently emerged paradigm faces major challenges in achieving the privacy of migrated data, network security, etc. Too many cryptographic technologies are raised to solve these issues based on identity, attributes and prediction algorithms yet;these techniques are highly prone to attackers. This would raise a need of an effective encryption technique, which would ensure secure data migration. With this scenario, our proposed methodology Efficient Probabilistic Public Key Encryption(EPPKE) is optimized with Covariance Matrix Adaptation Evolution Strategies(CMA-ES). It ensures data integrity through the Luhn algorithm with BLAKE 2b encapsulation. This enables an optimized security to the data which is migrated through cloud. The proposed methodology is implemented in Open Stack with Java Language. It achieves better results by providing security compared to other existing techniques like RSA, IBA, ABE, PBE, etc. 展开更多
关键词 Luhn algorithm encryption efficient probabilistic public key encryption(EPPKE) covariance matrix adaptation evolution strategies(CMA-ES) trusted third party(TTP)
下载PDF
Data Matrix码的AES加密与解密研究
9
作者 刘迪 周丹晨 《电子技术应用》 北大核心 2013年第11期125-128,共4页
将AES加密算法应用于Data Matrix码的加密,并在.net平台上运用C#语言开发加密Data Matrix生成系统。通过运用条码扫描枪对加密Data Matrix码进行识别,并利用AES解密程序对其所携数据解密验证,最后对该系统生成的80串比特流进行密码学随... 将AES加密算法应用于Data Matrix码的加密,并在.net平台上运用C#语言开发加密Data Matrix生成系统。通过运用条码扫描枪对加密Data Matrix码进行识别,并利用AES解密程序对其所携数据解密验证,最后对该系统生成的80串比特流进行密码学随机性测试。实验结果表明,该系统生成的加密条码在一定程度上提高了Data Matrix码的安全性,能够满足识别速度和可靠性的要求。 展开更多
关键词 DATA matrix AES 加密 随机性
下载PDF
Hill Matrix and Radix-64 Bit Algorithm to Preserve Data Confidentiality
10
作者 Ali Arshad Muhammad Nadeem +6 位作者 Saman Riaz Syeda Wajiha Zahra Ashit Kumar Dutta Zaid Alzaid Rana Alabdan Badr Almutairi Sultan Almotairi 《Computers, Materials & Continua》 SCIE EI 2023年第5期3065-3089,共25页
There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptog... There are many cloud data security techniques and algorithms available that can be used to detect attacks on cloud data,but these techniques and algorithms cannot be used to protect data from an attacker.Cloud cryptography is the best way to transmit data in a secure and reliable format.Various researchers have developed various mechanisms to transfer data securely,which can convert data from readable to unreadable,but these algorithms are not sufficient to provide complete data security.Each algorithm has some data security issues.If some effective data protection techniques are used,the attacker will not be able to decipher the encrypted data,and even if the attacker tries to tamper with the data,the attacker will not have access to the original data.In this paper,various data security techniques are developed,which can be used to protect the data from attackers completely.First,a customized American Standard Code for Information Interchange(ASCII)table is developed.The value of each Index is defined in a customized ASCII table.When an attacker tries to decrypt the data,the attacker always tries to apply the predefined ASCII table on the Ciphertext,which in a way,can be helpful for the attacker to decrypt the data.After that,a radix 64-bit encryption mechanism is used,with the help of which the number of cipher data is doubled from the original data.When the number of cipher values is double the original data,the attacker tries to decrypt each value.Instead of getting the original data,the attacker gets such data that has no relation to the original data.After that,a Hill Matrix algorithm is created,with the help of which a key is generated that is used in the exact plain text for which it is created,and this Key cannot be used in any other plain text.The boundaries of each Hill text work up to that text.The techniques used in this paper are compared with those used in various papers and discussed that how far the current algorithm is better than all other algorithms.Then,the Kasiski test is used to verify the validity of the proposed algorithm and found that,if the proposed algorithm is used for data encryption,so an attacker cannot break the proposed algorithm security using any technique or algorithm. 展开更多
关键词 CRYPTOGRAPHY symmetric cipher text encryption matrix cipher encoding decoding hill matrix 64-bit encryption
下载PDF
同态明文-密文矩阵运算及其应用
11
作者 刘洋 杨林翰 +2 位作者 陈经纬 吴文渊 冯勇 《通信学报》 EI CSCD 北大核心 2024年第2期150-161,共12页
支持单指令多数据操作的同态加密方案能有效提高密文计算的均摊效率,但密文结构导致矩阵运算复杂度高。在许多应用中,采用明文-密文矩阵操作可以在确保安全的同时实现隐私计算。基于此,提出一个适用于任意维数的明文-密文矩阵乘法方案... 支持单指令多数据操作的同态加密方案能有效提高密文计算的均摊效率,但密文结构导致矩阵运算复杂度高。在许多应用中,采用明文-密文矩阵操作可以在确保安全的同时实现隐私计算。基于此,提出一个适用于任意维数的明文-密文矩阵乘法方案。该方案通过明文矩阵编码和密文矩阵维数变换等步骤计算得到密文结果。与已知最好的Jiang等所提的密文方阵乘法算法相比,所提方案支持任意维数的矩阵乘法,并支持矩阵连乘;理论分析和实验结果均表明,所提方案具有更低的密文旋转复杂度和更高的计算效率。将所提方案应用在隐私保护的贝叶斯分类器中,能以更高安全参数和更少计算时间完成分类任务。 展开更多
关键词 同态加密 矩阵运算 机器学习 贝叶斯分类器
下载PDF
基于改进Logistic混沌和交叉混沌扩散的强鲁棒性图像加密
12
作者 郭媛 贾德宝 +1 位作者 王充 翟平 《信息安全学报》 CSCD 2024年第5期217-228,共12页
针对现有部分图像加密算法鲁棒性弱的问题,本文提出了一种基于改进Logistic混沌和交叉混沌序列扩散的强鲁棒性加密算法。首先,对Logistic一维混沌进行变换,构造出一种混沌序列分布更加随机的新混沌系统;然后,利用螺旋矩阵变换进行第一... 针对现有部分图像加密算法鲁棒性弱的问题,本文提出了一种基于改进Logistic混沌和交叉混沌序列扩散的强鲁棒性加密算法。首先,对Logistic一维混沌进行变换,构造出一种混沌序列分布更加随机的新混沌系统;然后,利用螺旋矩阵变换进行第一次置乱,利用明文的哈希值构造混沌的初始密钥,引入明文相关的两个数值val1和val2结合新混沌系统构造交叉混沌序列;接着对置乱后的序列进行交叉混沌的扩散。为克服螺旋矩阵变换部分像素未发生改变的问题,再进行一次交叉混沌置乱,形成置乱-扩散-置乱的加密框架。最后对本算法进行仿真模拟,其中本文密文图像的平均相关系数为–0.0027,更加趋近于0,大大的破坏了图像内部之间的相关性,达到图像加密的效果。像素变化率NPCR为99.61%,归一化强度UACI为33.36%,都分别接近于理想值99.60%和33.34%;密文图像的信息熵为7.9975,接近于理想值8,密钥的敏感性为10–17;能够在椒盐噪声和高斯噪声强度为0.2的情况下,仍然能够识别出解密图像。而且加密图像剪切1/2时,仍然能够恢复出明文图像;实验结果表明,本文算法具有较高的安全性,能够抵御选择明文攻击和穷举攻击,具有较强的抗噪声和抗剪切能力,对于图像传输过程中的安全性提供一定的保障,能够对于灰度图像达到安全稳定的加解密效果。 展开更多
关键词 图像加密 鲁棒性 混沌系统 交叉混沌扩散 螺旋矩阵置乱
下载PDF
基于像素预测和秘密图像共享的可逆信息隐藏
13
作者 袁卿宇 高铁杠 《计算机应用》 CSCD 北大核心 2024年第3期780-787,共8页
为增强图像加密的安全性以及增加加密图像的信息隐藏容量,提出一种基于像素预测和秘密图像共享的可逆信息隐藏算法。首先,利用共享矩阵逐行处理图像并分存为四个共享图像;其次,利用二维混沌映射生成随机密钥加密共享图像;再次,利用中值... 为增强图像加密的安全性以及增加加密图像的信息隐藏容量,提出一种基于像素预测和秘密图像共享的可逆信息隐藏算法。首先,利用共享矩阵逐行处理图像并分存为四个共享图像;其次,利用二维混沌映射生成随机密钥加密共享图像;再次,利用中值边缘检测器(MED)预测共享图像中可嵌入位置的像素值,预测值与原像素从高位开始比对相同的位数,根据规则记录标签值,提取参考像素的高三位与认证信息存入可嵌入位;最后,将标签值存入参考像素高位,剩余的可嵌入位为所提算法的嵌入容量。实验结果表明,所提算法不仅能够为信息隐藏提供大容量的嵌入空间,而且能够实现可逆数据隐藏并根据(k,n)阈值策略实现加密图像的无损复原。 展开更多
关键词 图像加密 共享矩阵 可逆数据隐藏 中值边缘检测器 嵌入空间
下载PDF
可搜索加密及其驱动的SQL隐私数据库设计
14
作者 陆海 薛显斌 +4 位作者 朱岩 陈娥 韩皓庭 孟疏桐 林鸿杰 《工程科学学报》 EI CSCD 北大核心 2024年第11期2085-2098,共14页
隐私数据库是促进国家大数据战略与数据要素市场发展中构建数据开放、共享及治理体系的重要手段,而可搜索加密作为实现隐私数据库的重要密码技术,仍存在缺乏灵活检索机制及抗量子安全等问题,也难以适配关系数据库中的结构化查询语言(SQL... 隐私数据库是促进国家大数据战略与数据要素市场发展中构建数据开放、共享及治理体系的重要手段,而可搜索加密作为实现隐私数据库的重要密码技术,仍存在缺乏灵活检索机制及抗量子安全等问题,也难以适配关系数据库中的结构化查询语言(SQL)查询机制.在对可搜索加密技术现状分析基础上,本文设计了可适配关系数据库SQL查询语言的隐私数据库架构,客户端引入隐私SQL引擎将索引和数据字段转变为密文状态;用户发起查询请求时,该引擎可依据查询策略生成查询凭证,隐私数据库进而依据凭证对密态索引进行密码化检索,匹配成功的密态数据字段可由用户私钥进行解密.进一步,本文在格密码体制下利用理想格上短整数解(R-SIS)和带误差学习(R-LWE)困难问题,设计了检索策略的属性基可搜索加密(RPABSE)方案用以支持上述隐私数据库密码系统的构建.该方案将查询策略与查询凭证相绑定,确保密文数据的索引可依据查询策略进行细粒度密码化检索;同时,引入小策略矩阵(SPM)来优化安全查询策略生成,降低索引匹配过程中累积误差.由安全性证明可知,查询凭证满足在选择策略攻击下的不可伪造性(EU-CPA),所提系统满足在带有策略和标识查询的选择明文攻击下的语义安全性(IND-PIQ-CPA). 展开更多
关键词 隐私数据库 安全查询策略 属性基可搜索加密 理想格 小策略矩阵
下载PDF
基于同态加密和模型水印的安全可信联邦学习
15
作者 黄慧杰 季鑫慧 +3 位作者 白锐 左毅 刘梦杰 陈珍萍 《计算机工程与设计》 北大核心 2024年第9期2591-2598,共8页
为防止联邦学习客户端共享的中间参数泄露,同时保证服务器与客户端的可信性,提出一种结合同态加密和模型水印的联邦学习框架。将Paillier加密技术运用到模型参数的安全聚合中,对参数聚合时的加法同态性进行证明,为提高加密效率在加密前... 为防止联邦学习客户端共享的中间参数泄露,同时保证服务器与客户端的可信性,提出一种结合同态加密和模型水印的联邦学习框架。将Paillier加密技术运用到模型参数的安全聚合中,对参数聚合时的加法同态性进行证明,为提高加密效率在加密前将模型参数进行量化处理;将模型水印技术拓展到安全联邦学习中,利用投影矩阵和正则化函数构建模型水印,将水印模型进行聚合。在MNIST和CIFAR10数据集上的实验验证了提出方法的有效性,提高模型参数加密效率,保证模型的版权。 展开更多
关键词 联邦学习 安全可信 参数量化 模型聚合 同态加密 投影矩阵 模型水印
下载PDF
Paillier同态加密下车辆协同自适应预测巡航控制
16
作者 杨敏艺 宋秀兰 +1 位作者 杨燕玲 柴伟豪 《计算机测量与控制》 2024年第8期153-160,共8页
车辆协同式自适应巡航控制(CACC)以其高效便捷的特点成为智能交通系统的研究热点,但随着车辆接入网络,网络攻击对车联网系统的安全性造成了很大威胁;针对传统方案较繁琐、密文密钥同时传输数据仍可能被篡改的问题,采用Paillier同态加密... 车辆协同式自适应巡航控制(CACC)以其高效便捷的特点成为智能交通系统的研究热点,但随着车辆接入网络,网络攻击对车联网系统的安全性造成了很大威胁;针对传统方案较繁琐、密文密钥同时传输数据仍可能被篡改的问题,采用Paillier同态加密算法对加速度进行加密,仅传输密文;针对控制目标设计一综合跟踪信号,并基于Paillier算法的同态性设计密文数乘运算,使加速度密文无须解密而直接用于自车构建跟踪信号;将跟踪信号与分布式模型预测控制(MPC)结合,采用线性矩阵不等式对控制策略的优化问题进行转化,求解最优控制输入,保证车辆队列的安全协同行驶;经Matlab仿真验证了控制系统的性能指标以及Paillier同态加密的有效性。 展开更多
关键词 Paillier同态加密 网络安全 协同自适应巡航控制 线性矩阵不等式 模型预测控制
下载PDF
基于不可逆分数阶离散映射的图像加密算法
17
作者 刘晓君 王普 鲁晨浩 《河南师范大学学报(自然科学版)》 CAS 北大核心 2024年第5期117-125,I0010,I0011,共11页
基于分数阶离散映射系统的混沌特性,提出了一种基于分数阶循环移位彩色图像加密算法.该算法首先通过利用伪随机发生器产生随机的二进制序列与原彩色图像关联,产成各层随机的初始值参数,其次利用分数阶离散映射产生混沌序列,对彩色图像... 基于分数阶离散映射系统的混沌特性,提出了一种基于分数阶循环移位彩色图像加密算法.该算法首先通过利用伪随机发生器产生随机的二进制序列与原彩色图像关联,产成各层随机的初始值参数,其次利用分数阶离散映射产生混沌序列,对彩色图像的红、绿、蓝通道分别进行循环移位置乱加密和扩散运算,最后利用产生的伪随机二进制序列和混沌序列控制对各层的加密矩阵进行矩阵变换,得到加密图像.仿真结果表明,相邻像素的相关性系数近似为0,信息熵、像素变化率和归一化像素灰度值平均改变强度的平均值分别为7.9978、99.609%和33.442%.该算法具有良好的可靠性和抗攻击能力,能够有效地提高图像的安全性. 展开更多
关键词 分数阶离散映射 图像加密 循环移位加密 矩阵变换
下载PDF
基于深度神经网络的网络信息数据传输自动加密算法研究
18
作者 宗满贵 任晓龙 《电子设计工程》 2024年第19期90-93,共4页
为更好地应对各种复杂和多变的安全威胁,提出基于深度神经网络的网络信息数据传输自动加密算法。利用级联Chebyshev映射,生成网络信息数据的伪随机混沌序列;通过生成对抗网络处理伪随机混沌序列,生成网络信息数据的置乱矩阵;通过长短期... 为更好地应对各种复杂和多变的安全威胁,提出基于深度神经网络的网络信息数据传输自动加密算法。利用级联Chebyshev映射,生成网络信息数据的伪随机混沌序列;通过生成对抗网络处理伪随机混沌序列,生成网络信息数据的置乱矩阵;通过长短期记忆网络处理混沌序列,生成网络信息数据的置乱矩阵;利用加权融合方式,融合两个网络生成的置乱矩阵;按照融合后的置乱矩阵置乱处理网络信息数据,完成网络信息数据传输自动加密。实验证明,在承受复杂网络攻击时,该算法具备较优的自愈性能,提升了网络信息数据传输的安全性。 展开更多
关键词 深度神经网络 网络信息 数据传输 自动加密 CHEBYSHEV映射 置乱矩阵
下载PDF
基于热带LP矩阵双边作用问题的混合加密方案
19
作者 潘戈洋 黄华伟 姜鑫 《嘉应学院学报》 2024年第3期1-8,共8页
近年来,随着量子计算机的发展,当前广泛使用的公钥密码体制面临严峻挑战.在后量子密码时代,探索新型公钥密码体制显得尤为重要.采用热带LP矩阵双边作用问题,提出一种Oracle双边热带矩阵作用假设.根据假设,设计了一种包含对称加密、消息... 近年来,随着量子计算机的发展,当前广泛使用的公钥密码体制面临严峻挑战.在后量子密码时代,探索新型公钥密码体制显得尤为重要.采用热带LP矩阵双边作用问题,提出一种Oracle双边热带矩阵作用假设.根据假设,设计了一种包含对称加密、消息认证码和哈希函数的混合加密方案.方案中的双边作用问题可以归约为求解热带多项式方程组,求解该方程组是一个NP困难问题.在标准模型下该混合加密方案具有在选择密文攻击下的不可区分性. 展开更多
关键词 公钥密码 混合加密 热带Linde-de-la Puente矩阵 热带代数半环
下载PDF
加密域灰度半色调图像的可逆信息隐藏
20
作者 孙玉霞 《数字通信世界》 2024年第2期63-65,共3页
文章提出一种针对半色调图像的可逆信息隐藏算法,鉴于半色调图像信息冗余少的缺点,在嵌入水印前将载体图像的像素复制到两个相同的图像中,人为增加冗余。通过使用校验子编码来改变图像中的像素,将水印嵌入到第一个载体图像中;通过位替换... 文章提出一种针对半色调图像的可逆信息隐藏算法,鉴于半色调图像信息冗余少的缺点,在嵌入水印前将载体图像的像素复制到两个相同的图像中,人为增加冗余。通过使用校验子编码来改变图像中的像素,将水印嵌入到第一个载体图像中;通过位替换,将水印嵌入到第二个载体图像中,得到两个隐秘图像。在提取阶段,先通过汉明码的校验矩阵处理第一个隐秘图像获得水印信息,并与第二个隐秘图像中的像素进行位替换,便可恢复载体图像。本方案适用于可逆性至关重要的数据隐藏应用场景,如印刷打印领域。 展开更多
关键词 图像加密 可逆信息隐藏 矩阵嵌入 双重图像
下载PDF
上一页 1 2 10 下一页 到第
使用帮助 返回顶部