网站首页 软件下载 游戏下载 翻译软件 电子书下载 电影下载 电视剧下载 教程攻略
书名 | 基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用 |
分类 | |
作者 | 周晓谊 |
出版社 | 知识产权出版社 |
下载 | ![]() |
简介 | 内容推荐 量子密码和数字水印时近年来信息安全领域的新兴学科。作为靠前靠前部关于基于时态序列和遍历矩阵的信息安全,本书主要包括以下内容:时态序列、遍历矩阵以及加密和隐藏的基础知识,基于遍历矩阵构建多元二次多项式方程组、基于遍历矩阵的图像加密以及在此基础上的图像隐藏算法,并提出了基于时态序列的图像加密和图像水印系统原理及应用。 作者简介 周晓谊,现为海南大学信息科学与技术学院副教授。硕士就读期间,跟随吉林大学计算机学院赵永哲教授研究密码学。后于英国格林尼治大学(UNIVERSITY OFGREENWICH)师从DR.JIXIN MA教授禾日DR.MILTOS PETRIDIS教授攻读博士学位,课题方向为信息安全与人工智能。至今主持或参与项目10余项,在图像处理、信息安全等领域的靠前会议和靠前外期刊发表学术论文20余篇,其中EI收录近10篇。 目录 CHAPTER 1 INTRODUCTION Section 1.1 Motivations: Security Based on Temporal Order Section 1.1.1 Formal Characterization of Time-series Section 1.1.2 BMQE System Section 1.1.3 Temporal Ordered Image Cryptography Section 1.1.4 Temporal Ordered Image Hiding Section 1.2 Objectives: Information Security Using Temporal Theory Section 1.3 Outlines of the Main Contributions Section 1.4 Book Structure CHAPTER 2 LITERATURE REVIEW Section 2.1 Temporal Basis Section 2.1.1 Point-based Systems Section 2.1.2 Interval-based Systems Section 7.1.3 A point & Interval-based Theory Section 2.1.4 Notion of Time-series Section 2.2 Ergodic Matrix Section 2.2.1 Finite Fields Section 2.2.2 Definitions and Related Theorems of the EM Section 2.2.3 Security Analysis of a Question Based on EM Section 2.3 Cryptography Section 2.3.1 History of Cryptography and Cryptanalysis Section 2.3.2 Symmetric Cryptography vs. Asymmetric Cryptography Section 2.3.3 Multivariate Quadratic Polynomials Section 2.4 Information Hiding Section 2.4.1 History of Information Hiding Section 2.4.2 Steganography vs. Watermarking Section 2.4.3 Data Hiding Technologies in Images Section 2.5 Conclusions CHAPTER 3 BMQE SYSTEM Section 3.1 Important Characteristics of EM for BMQE System Section 3.2 BMQE Based on Ergodic Matrix Section 3.2.1 BMQE Problem Section 3.2.2 BMQE is NP-Complete Section 3.3 Cryptanalysis of BMQE Section 3.3.1 Methods Used in Solving MQ-problems Section 3.3.2 Fixing Variables Section 3.3.3 Relinearization Section 3.4 Conclusions CHAPTER 4 IMAGE CRYPTOGRAPHY Section 4.1 Review of Image Cryptography Section 4.1.1 Characteristics of Image Cryptography Section 4.1.2 Image Cryptography Algorithms Section 4.2 Hybrid-key Based Image Cryptography Section 4.2.1 Encryption/Decryption and Authentication Process Section 4.2.2 Image Confusion Section 4.2.3 Image Diffusion Section 4.3 Security Analysis Section 4.3.1 Key Space Analysis Section 4.3.2 Statistical Analysis Section 4.3.3 Sensitivity-based Attack Section 4.4 Performance Evaluation Section 4.5 Conclusions CHAPTER 5 IMAGE HIDING Section 5.1 Related Results Section 5.1.1 GA-based Watermarking Section 5.1.2 SVM-based Watermarking Section 5.2 Design Idea Section 5.2.1 Motivation Section 5.2.2 Embedding Strength with SVM Section 5.2.3 Embedding Position with Optimized GA Section 5.3 Algorithm SOGA: Watermarking Based on SVM and Optimized-GA Section 5.3.1 Communication Procedure Section 5.3.2 Embedding Procedure Section 5.3.3 Extracting Procedure Section 5.4 Experimental Results Section 5.4.1 Evaluation Criterion in System Performance Section 5. d. 2 Results by Different Iteration Numbers Section 5.4.3 Robustness Against Various Attacks Section 5.5 Conclusion CHAPTER 6 TEMPORAL APPLICATIONS Section 6.1 Formal Characterization of Time-series Section 6.1.1 Why Choosing Temporal Section 6.1.2 Formalize the Characterization of Time-series Section 6.2 Temporal-based Image Cryptosystem Section 6.2.1 Eneryption-deeryption Process Using Temporal Logic Section 6.2.2 Expand the Key Size Section 6.2.3 Adjust the Images Section 6.2.4 Security Analysis Section 6.3 Temporal-based Image Hiding Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic Section 6.4 Conclusions CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS Section 7.1 Development of RFID Anti-counterfeit Technology Section 7.2 An Anti.counterfeiting Scheme for Agricultural RFID Section 7.3 BMQE for RFID Anti.Counterfeiting Section 7.3.1 Key Generation Section 7.3.2 Encryption Procedure Section 7.3.3 Decryption Procedure Section 7.4 SOGA for RFID Tampering Detection Section 7.5 Conclusions CHAPTER 8 CONCLUSIONS AND FUTURE WORK Section 8.1 Conclusions Section 8.2 Future Work Discussion Reference |
随便看 |
|
霍普软件下载网电子书栏目提供海量电子书在线免费阅读及下载。