期刊文献+
共找到4,751篇文章
< 1 2 238 >
每页显示 20 50 100
A novel hybrid authentication protocol utilizing lattice-based cryptography for IoT devices in fog networks
1
作者 Kumar Sekhar Roy Subhrajyoti Deb Hemanta Kumar Kalita 《Digital Communications and Networks》 SCIE CSCD 2024年第4期989-1000,共12页
The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to secur... The Internet of Things(IoT)has taken the interconnected world by storm.Due to their immense applicability,IoT devices are being scaled at exponential proportions worldwide.But,very little focus has been given to securing such devices.As these devices are constrained in numerous aspects,it leaves network designers and administrators with no choice but to deploy them with minimal or no security at all.We have seen distributed denial-ofservice attacks being raised using such devices during the infamous Mirai botnet attack in 2016.Therefore we propose a lightweight authentication protocol to provide proper access to such devices.We have considered several aspects while designing our authentication protocol,such as scalability,movement,user registration,device registration,etc.To define the architecture we used a three-layered model consisting of cloud,fog,and edge devices.We have also proposed several pre-existing cipher suites based on post-quantum cryptography for evaluation and usage.We also provide a fail-safe mechanism for a situation where an authenticating server might fail,and the deployed IoT devices can self-organize to keep providing services with no human intervention.We find that our protocol works the fastest when using ring learning with errors.We prove the safety of our authentication protocol using the automated validation of Internet security protocols and applications tool.In conclusion,we propose a safe,hybrid,and fast authentication protocol for authenticating IoT devices in a fog computing environment. 展开更多
关键词 Internet of things AUTHENTICATION Post-quantum cryptography Lattice-based cryptography Cloud computing Fog computing FAIL-SAFE
下载PDF
Improving Smart Home Security via MQTT: Maximizing Data Privacy and Device Authentication Using Elliptic Curve Cryptography
2
作者 Zainatul Yushaniza Mohamed Yusoff Mohamad Khairi Ishak +1 位作者 Lukman A.B.Rahim Mohd Shahrimie Mohd Asaari 《Computer Systems Science & Engineering》 2024年第6期1669-1697,共29页
The rapid adoption of Internet of Things(IoT)technologies has introduced significant security challenges across the physical,network,and application layers,particularly with the widespread use of the Message Queue Tel... The rapid adoption of Internet of Things(IoT)technologies has introduced significant security challenges across the physical,network,and application layers,particularly with the widespread use of the Message Queue Telemetry Transport(MQTT)protocol,which,while efficient in bandwidth consumption,lacks inherent security features,making it vulnerable to various cyber threats.This research addresses these challenges by presenting a secure,lightweight communication proxy that enhances the scalability and security of MQTT-based Internet of Things(IoT)networks.The proposed solution builds upon the Dang-Scheme,a mutual authentication protocol designed explicitly for resource-constrained environments and enhances it using Elliptic Curve Cryptography(ECC).This integration significantly improves device authentication,data confidentiality,and energy efficiency,achieving an 87.68%increase in data confidentiality and up to 77.04%energy savings during publish/subscribe communications in smart homes.The Middleware Broker System dynamically manages transaction keys and session IDs,offering robust defences against common cyber threats like impersonation and brute-force attacks.Penetration testing with tools such as Hydra and Nmap further validated the system’s security,demonstrating its potential to significantly improve the security and efficiency of IoT networks while underscoring the need for ongoing research to combat emerging threats. 展开更多
关键词 Smart home CONFIDENTIALITY ECC SECURITY lightweight cryptography AUTHENTICATION integrity efficiency
下载PDF
Trusted Certified Auditor Using Cryptography for Secure Data Outsourcing and Privacy Preservation in Fog-Enabled VANETs
3
作者 Nagaraju Pacharla K.Srinivasa Reddy 《Computers, Materials & Continua》 SCIE EI 2024年第5期3089-3110,共22页
With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.Th... With the recent technological developments,massive vehicular ad hoc networks(VANETs)have been established,enabling numerous vehicles and their respective Road Side Unit(RSU)components to communicate with oneanother.The best way to enhance traffic flow for vehicles and traffic management departments is to share thedata they receive.There needs to be more protection for the VANET systems.An effective and safe methodof outsourcing is suggested,which reduces computation costs by achieving data security using a homomorphicmapping based on the conjugate operation of matrices.This research proposes a VANET-based data outsourcingsystem to fix the issues.To keep data outsourcing secure,the suggested model takes cryptography models intoaccount.Fog will keep the generated keys for the purpose of vehicle authentication.For controlling and overseeingthe outsourced data while preserving privacy,the suggested approach considers the Trusted Certified Auditor(TCA).Using the secret key,TCA can identify the genuine identity of VANETs when harmful messages aredetected.The proposed model develops a TCA-based unique static vehicle labeling system using cryptography(TCA-USVLC)for secure data outsourcing and privacy preservation in VANETs.The proposed model calculatesthe trust of vehicles in 16 ms for an average of 180 vehicles and achieves 98.6%accuracy for data encryption toprovide security.The proposedmodel achieved 98.5%accuracy in data outsourcing and 98.6%accuracy in privacypreservation in fog-enabled VANETs.Elliptical curve cryptography models can be applied in the future for betterencryption and decryption rates with lightweight cryptography operations. 展开更多
关键词 Vehicular ad-hoc networks data outsourcing privacy preservation cryptography keys trusted certified auditors data security
下载PDF
Utilizing Certificateless Cryptography for IoT Device Identity Authentication Protocols in Web3
4
作者 WU Zhihui HONG Yuxuan +2 位作者 ZHOU Enyuan LIU Lei PEI Qingqi 《ZTE Communications》 2024年第2期30-38,共9页
Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approac... Traditional methods of identity authentication often rely on centralized architectures,which poses risks of computational overload and single points of failure.We propose a protocol that offers a decentralized approach by distributing authentication services to edge authentication gateways and servers,facilitated by blockchain technology,thus aligning with the decentralized ethos of Web3 infrastructure.Additionally,we enhance device security against physical and cloning attacks by integrating physical unclonable functions with certificateless cryptography,bolstering the integrity of Internet of Thins(IoT)devices within the evolving landscape of the metaverse.To achieve dynamic anonymity and ensure privacy within Web3 environments,we employ fuzzy extractor technology,allowing for updates to pseudonymous identity identifiers while maintaining key consistency.The proposed protocol ensures continuous and secure identity authentication for IoT devices in practical applications,effectively addressing the pressing security concerns inherent in IoT network environments and contributing to the development of robust security infrastructure essential for the proliferation of IoT devices across diverse settings. 展开更多
关键词 blockchain certificateless cryptography identity authentication IOT
下载PDF
适用于智能医疗的匿名基于身份的认证密钥协商协议
5
作者 倪亮 刘笑颜 +3 位作者 谷兵珂 张亚伟 周恒昇 王念平 《计算机应用研究》 北大核心 2025年第1期282-287,共6页
在智能医疗场景中,病人需佩戴各种传感医疗设备,传感医疗设备会在检测过程中收集病人的心率、呼吸频率、脉搏等生理和医疗信息,并将这些医疗信息传输到云服务器,但日益增长的数据量在传输过程中必会带来额外的通信开销和传输时延,若发... 在智能医疗场景中,病人需佩戴各种传感医疗设备,传感医疗设备会在检测过程中收集病人的心率、呼吸频率、脉搏等生理和医疗信息,并将这些医疗信息传输到云服务器,但日益增长的数据量在传输过程中必会带来额外的通信开销和传输时延,若发生数据窃取和窜改,将会造成难以控制的后果。除此之外,近年来量子计算技术飞速发展,基于经典公钥密码体系的公共网络基础设施的安全性面临巨大挑战,保障量子安全已具有现实意义。由此,提出了一个能够抵抗量子计算攻击并适用于智能医疗的基于身份认证密钥协商协议,避免部署公钥基础设施(public key infrastructure,PKI),并证明其在改进的ID-BJM模型下是安全的,其安全性可以归约到环上带误差学习(ring learning with errors,RLWE)问题的难解性。所提协议通过两轮信息交互实现了隐式认证,且可保护自身设备的身份信息,并可抵抗信号泄露攻击,保证在数据传输过程中的安全性,与其他相关的格上基于身份认证密钥协商协议方案相比,在安全性或执行效率方面更具优势。 展开更多
关键词 基于身份密码 环上带误差学习 认证密钥协商协议 后量子密码 隐私保护 智能医疗
下载PDF
MECC法测定兔血浆落新妇苷浓度及其药代动力学研究 被引量:4
6
作者 李玉琪 余自成 +2 位作者 邓昌国 李玉莲 范芳芳 《解放军药学学报》 CAS 2013年第1期26-28,共3页
目的建立落新妇苷血药浓度测定方法,研究其在家兔体内的药代动力学。方法家兔耳缘静脉注射10 mg.kg-1落新妇苷,胶束电动毛细管电泳法测定血药浓度,3p97药动学软件分析药动学参数。结果落新妇苷血药浓度在2.05~24.6 mg.L-1范围内呈良好... 目的建立落新妇苷血药浓度测定方法,研究其在家兔体内的药代动力学。方法家兔耳缘静脉注射10 mg.kg-1落新妇苷,胶束电动毛细管电泳法测定血药浓度,3p97药动学软件分析药动学参数。结果落新妇苷血药浓度在2.05~24.6 mg.L-1范围内呈良好线性,r=0.9993,平均回收率为101.15%,日内、日间RSD均<6%。落新妇苷在家兔体内的药代动力学过程符合二室开放模型。结论本法简便、快速、准确、干扰小,适用于落新妇苷血药浓度测定,为研究其在人体药代动力学及制定给药方案提供方法学基础。 展开更多
关键词 落新妇苷 mecc 血药浓度 药代动力学
下载PDF
MECC法分离中药熊胆中磷脂主组分方法的建立 被引量:4
7
作者 董颖 卢学清 王智华 《中成药》 CAS CSCD 北大核心 2005年第6期713-718,共6页
目的:建立胶束电动毛细管电泳(MECC)分离分析中药熊胆中磷脂主组分的方法。方法:采用毛细管电泳(HPCE)方法,详细观察了各因素对分离的影响。所确定的操作条件为:缓冲液为35mMSDC、6mM硼砂、10mM磷酸二氢钠、30%(v/v)正丙醇,pH8.5:操作... 目的:建立胶束电动毛细管电泳(MECC)分离分析中药熊胆中磷脂主组分的方法。方法:采用毛细管电泳(HPCE)方法,详细观察了各因素对分离的影响。所确定的操作条件为:缓冲液为35mMSDC、6mM硼砂、10mM磷酸二氢钠、30%(v/v)正丙醇,pH8.5:操作电压为30kV;温度40°C;毛细管长度570mm,有效长度500mm;紫外检测波长200nm;进样压力50mbar×4秒。结果:6个熊胆样品中的磷脂主组分在最佳MECC操作条件下获得分离。结论:本法快速、高效,并与HPLC互补。 展开更多
关键词 熊胆 磷脂类化合物 mecc
下载PDF
有机溶剂对某些有机磷农药的MECC洗提影响的研究 被引量:4
8
作者 袁东星 邓永智 林玉晖 《分析测试学报》 CAS CSCD 1997年第1期5-9,共5页
以有机磷农药甲基对硫磷、对硫磷等为被试验物质,探讨了在十二烷基硫酸钠、硼砂电解液中加入甲醇、乙醇、异丙醇、乙腈等有机溶剂对某些有机磷农药的毛细管胶束电动色谱分离的影响。
关键词 有机磷 农药 有机溶剂 mecc 洗提 分离度
下载PDF
采用MECC在线堆积同步检测茶叶中七种残留农药 被引量:9
9
作者 马海乐 祝子坪 +3 位作者 刘姜 骆琳 何荣海 王振斌 《农业工程学报》 EI CAS CSCD 北大核心 2008年第8期157-161,共5页
为解决茶叶中的痕量农药残留的快速检测问题,建立了一种基于胶束毛细管电泳在线堆积技术的茶叶中7种拟除虫菊酯类农药痕量残留的一次进样同步检测方法。通过参数优化,得到最优的柱上在线堆积浓缩操作工艺:以15%异丙醇、20%乙腈、60mmol/... 为解决茶叶中的痕量农药残留的快速检测问题,建立了一种基于胶束毛细管电泳在线堆积技术的茶叶中7种拟除虫菊酯类农药痕量残留的一次进样同步检测方法。通过参数优化,得到最优的柱上在线堆积浓缩操作工艺:以15%异丙醇、20%乙腈、60mmol/L十二烷基硫酸钠(SDS)和50mmol/Ltris的混合物为背景缓冲溶液(BGS)。茶叶的浸提液经过固相萃取净化吹干后,用1mmol/LSDS溶解溶液残渣。进样100s后施加反向电压,进行农药反向在线堆积,当电流恢复至正常分离时的95%时改变电压方向,进行正常分离。经过在线堆积浓缩,7种拟除虫菊酯类农药痕量残留堆积因子均高于17,回收率在82%以上,检测下限分别达到:功夫菊酯0.05mg/kg、联苯菊酯0.05mg/kg、百树菊酯0.05mg/kg、高效氯氰菊酯0.05mg/kg、溴氰菊酯0.2mg/kg、二氯菊酯0.05mg/kg、氰戊菊酯0.05mg/kg,满足了2006年欧盟茶叶中拟除虫菊酯类农药残留的最低标准。 展开更多
关键词 胶束毛细管电泳 反向电压堆积 拟除虫菊酯 茶叶 残留农药 同步检测
下载PDF
MECC法测定玄参中哈帕酯苷和安格洛苷C的含量 被引量:8
10
作者 张道锦 王瑞 毕开顺 《沈阳药科大学学报》 CAS CSCD 2001年第3期189-191,共3页
用胶束电动毛细管色谱法以尼泊金丙酯为内标物测定玄参中哈帕酯苷和安格洛苷C的含量。色谱条件 :75 μm × 10 0cm毛细管柱 ;分离用缓冲液为 10 0mmol/L胆酸钠含 10 %乙腈和2 0mmol/L磷酸二氢钠 ,用 2 0mmol/L硼砂调节 pH 7 5 ;运... 用胶束电动毛细管色谱法以尼泊金丙酯为内标物测定玄参中哈帕酯苷和安格洛苷C的含量。色谱条件 :75 μm × 10 0cm毛细管柱 ;分离用缓冲液为 10 0mmol/L胆酸钠含 10 %乙腈和2 0mmol/L磷酸二氢钠 ,用 2 0mmol/L硼砂调节 pH 7 5 ;运行电压2 5kV ;温度 2 5℃ ;重力进样 ,时间5s ;检测波长 2 80nm。哈帕酯苷和安格洛苷C的平均回收率分别为 (10 2 5± 3 5 ) %和 (10 2 3±2 2 ) %。本法操作简便 。 展开更多
关键词 玄参 哈帕酯苷 安格洛苷C 高效毛细管电泳法 mecc 中药
下载PDF
国际经贸协定中密码技术产品保护规则新发展及中国因应
11
作者 赵丹 《科技与法律(中英文)》 2025年第1期103-112,共10页
数字经济时代,密码技术作为保障信息安全的核心技术,其重要性日益凸显。而密码技术的广泛运用也可能影响国家安全和公共利益。因此,密码技术的运用和规制一直寻求私权保护与执法需求、市场驱动与政府干预、贸易自由与国家规制之间的平... 数字经济时代,密码技术作为保障信息安全的核心技术,其重要性日益凸显。而密码技术的广泛运用也可能影响国家安全和公共利益。因此,密码技术的运用和规制一直寻求私权保护与执法需求、市场驱动与政府干预、贸易自由与国家规制之间的平衡。近年来,CPTPP和DEPA等高标准国际经贸协定相继纳入使用密码技术的ICT产品规则,一方面要求减少对使用密码技术的ICT产品不合理的贸易限制,强化数字知识产权保护;另一方面也尊重国家对密码技术的规制权,包括金融机构和市场例外、执法机关例外等限制性规则。中国在积极推进加入CPTPP和DEPA的过程中,应积极对接密码技术产品规则,大力发展商用密码技术,加强与CPTPP和DEPA成员国在密码技术和网络安全领域的合作与信息共享,并进一步完善密码技术管理的政策法规。 展开更多
关键词 密码技术 国际经贸协定 出口管制 CPTPP DEPA
下载PDF
胶束电动毛细管色谱(MECC)分离手性药物
12
作者 李小青 《国外分析仪器技术与应用》 1996年第4期17-23,共7页
关键词 mecc 毛细管 色谱 分离手性药物
下载PDF
Public Key Cryptography Based on Ergodic Matrices over Finite Field 被引量:8
13
作者 PEI Shihui ZHAO Hongwei ZHAO Yongzhe 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1525-1528,共4页
A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over fini... A new public key encryption scheme is proposed in this paper, which is based on a hard problem over ergodic matrices. The security of this scheme is equal to the MQ-problem: multivariate quadratic equations over finite fields. This problem has been shown to be NP-complete and can't be solved with polynomial time algorithm. 展开更多
关键词 ergodic matrix strong matrix public key cryptography
下载PDF
Secure and efficient elliptic curve cryptography resists side-channel attacks 被引量:8
14
作者 Zhang Tao Fan Mingyu Zheng Xiaoyu 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2009年第3期660-665,共6页
An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNA... An embedded cryptosystem needs higher reconfiguration capability and security. After analyzing the newly emerging side-channel attacks on elliptic curve cryptosystem (ECC), an efficient fractional width-w NAF (FWNAF) algorithm is proposed to secure ECC scalar multiplication from these attacks. This algorithm adopts the fractional window method and probabilistic SPA scheme to reconfigure the pre-computed table, and it allows designers to make a dynamic configuration on pre-computed table. And then, it is enhanced to resist SPA, DPA, RPA and ZPA attacks by using the random masking method. Compared with the WBRIP and EBRIP methods, our proposals has the lowest total computation cost and reduce the shake phenomenon due to sharp fluctuation on computation performance. 展开更多
关键词 elliptic curve cryptography side channel attack simple power attack differential power attack refined power analysis zero-point power analysis.
下载PDF
Security proof of counterfactual quantum cryptography against general intercept-resend attacks and its vulnerability 被引量:3
15
作者 张盛 王剑 唐朝京 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期33-40,共8页
Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-sp... Counterfactual quantum cryptography, recently proposed by Noh, is featured with no transmission of signal parti- cles. This exhibits evident security advantages, such as its immunity to the well-known photon-number-splitting attack. In this paper, the theoretical security of counterfactual quantum cryptography protocol against the general intercept- resend attacks is proved by bounding the information of an eavesdropper Eve more tightly than in Yin's proposal [Phys. Rev. A 82 042335 (2010)]. It is also shown that practical counterfactual quantum cryptography implementations may be vulnerable when equipped with imperfect apparatuses, by proving that a negative key rate can be achieved when Eve launches a time-shift attack based on imperfect detector efficiency. 展开更多
关键词 quantum cryptography quantum counterfactuality quantum information
下载PDF
RGB Based Multiple Share Creation in Visual Cryptography with Aid of Elliptic Curve Cryptography 被引量:1
16
作者 K.Shankar P.Eswaran 《China Communications》 SCIE CSCD 2017年第2期118-130,共13页
In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual ... In visual cryptography, many shares are generated which are illogical containing certain message within themselves. When all shares are piled jointly, they tend to expose the secret of the image. The notion of visual secret sharing scheme is to encrypt a secret image into n illogical share images. It is unable to reveal any data on the original image if at least one of the shares is not achieved. The original image, in fact, is realized by overlapping the entire shares directly, in order that the human visual system is competent to identify the collective secret image without employing any complicated computational tools. Therefore, they are communicated steadily as number of shares. The elliptic curve cryptography approach, in turn, is employed to augment the privacy and safety of the image. The new.fangled technique is utilized to generate the multiple shares which are subjected to encryption and decryption by means of the elliptic curve cryptography technique. The test outcomes have revealed the fact that the peak signal to noise ratio is 58.0025, Mean square error value is 0.1164 and the correlation coefficient is 1 for the decrypted image without any sort of distortion of the original image. 展开更多
关键词 visual cryptography PIXEL SHARES elliptic curve cryptography ENCRYPTION PSNR mean square error
下载PDF
金黄色葡萄球菌中耐甲氧西林抗性基因mecC的研究进展
17
作者 陈鑫 蒲万霞 +2 位作者 吴润 梁红雁 李昱辉 《中国预防兽医学报》 CAS CSCD 北大核心 2016年第8期672-674,共3页
近几年耐甲氧西林金黄色葡萄球菌(Methicillin-resistant Staphylococcus aureus,MRSA)的mec A同源基因mecALGA251在欧洲各地陆续出现报道,在2012年将该同源基因正式命名为mecC。作为一种新的耐药基因它与mecA基因在DNA水平上有69%的... 近几年耐甲氧西林金黄色葡萄球菌(Methicillin-resistant Staphylococcus aureus,MRSA)的mec A同源基因mecALGA251在欧洲各地陆续出现报道,在2012年将该同源基因正式命名为mecC。作为一种新的耐药基因它与mecA基因在DNA水平上有69%的同源性, 展开更多
关键词 耐甲氧西林金黄色葡萄球菌 mecc 抗性基因 同源基因 耐药基因 同源性 DNA
下载PDF
Quantum Cryptography for Internet of Things Security 被引量:1
18
作者 Alekha Parimal Bhatt Anand Sharma 《Journal of Electronic Science and Technology》 CAS CSCD 2019年第3期213-220,共8页
Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security thr... Internet of things (IoT) is a developing technology with a lot of scope in the future. It can ease various different tasks for us. On one hand, IoT is useful for us, on the other hand, it has many serious security threats, like data breaches, side-channel attacks, and virus and data authentication. Classical cryptographic algorithms, like the Rivest-Shamir-Adleman (RSA) algorithm, work well under the classical computers. But the technology is slowly shifting towards quantum computing, which has immense processing power and is more than enough to break the current cryptographic algorithms easily. So it is required that we have to design quantum cryptographic algorithms to prevent our systems from security breaches even before quantum computers come in the market for commercial uses. IoT will also be one of the disciplines, which needs to be secured to prevent any malicious activities. In this paper, we review the common security threats in IoT and the presently available solutions with their drawbacks. Then quantum cryptography is introduced with some of its variations. And finally, the analysis has been carried out in terms of the pros and cons of implementing quantum cryptography for IoT security. 展开更多
关键词 INTERNET of THINGS QUANTUM COMPUTING QUANTUM cryptography SECURITY
下载PDF
A Visual Cryptography Based Digital Image Copyright Protection 被引量:6
19
作者 Adel Hammad Abusitta 《Journal of Information Security》 2012年第2期96-104,共9页
A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selec... A method for creating digital image copyright protection is proposed in this paper. The proposed method in this paper is based on visual cryptography defined by Noor and Shamir. The proposed method is working on selection of random pixels from the original digital image instead of specific selection of pixels. The new method proposed does not require that the watermark pattern to be embedded in to the original digital image. Instead of that, verification information is generated which will be used to verify the ownership of the image. This leaves the marked image equal to the original image. The method is based on the relationship between randomly selected pixels and their 8-neighbors’ pixels. This relationship keeps the marked image coherent against diverse attacks even if the most significant bits of randomly selected pixels have been changed by attacker as we will see later in this paper. Experimental results show the proposed method can recover the watermark pattern from the marked image even if major changes are made to the original digital image. 展开更多
关键词 IMAGE WATERMARK PATTERN Visual cryptography Digital IMAGE COPYRIGHT
下载PDF
Construction of General (k, n) Probabilistic Visual Cryptography Scheme 被引量:1
20
作者 Ching-Nung Yang Chih-Cheng Wu Feng Liu 《Journal of Electronic Science and Technology》 CAS 2011年第4期317-324,共8页
Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS... Visual cryptography scheme (VCS) is a secure method that encrypts a secret image by subdividing it into shadow images. Due to the nature of encryption VCS is categorized into two types: the deterministic VCS (DVCS) and the probabilistie VCS (PVCS). For the DVCS, we use m (known as the pixel expansion) subpixels to represent a secret pixel. The PVCS uses only one subpixel to represent a secret pixel, while the quality of reconstructed image is degraded. A well-known construction of (k, n)-PVCS is obtained from the (k, n)-DVCS. In this paper, we show another construction of (k, n)-PVCS by extending the (k, k)-PVCS. 展开更多
关键词 Probabilistic visual cryptography visual cryptography visual secret sharing.
下载PDF
上一页 1 2 238 下一页 到第
使用帮助 返回顶部