{"title":"Public Key Encryption with Ranked Multi-keyword Search","authors":"Chengyu Hu, Pengtao Liu","doi":"10.1109/INCoS.2013.24","DOIUrl":"https://doi.org/10.1109/INCoS.2013.24","url":null,"abstract":"It is necessary for the cloud server to allow multi-keyword query and provide result ranking to effectively retrieve data from the large number of encrypted data stored in the cloud storage. A related work that support privacy preserving ranked multi-keyword search over encrypted cloud data (MRSE) is not in public-key model. In this paper, the definition of an extension of PEKS called Public-Key Encryption with Ranked Multi-Keyword Search(PERMKS) is proposed, which means that the receiver could query any subset of keywords and the number of queried keywords appearing in the data can be provided which evaluate the similarity ranking of the data to the search query. Then, a construction of public-key encryption with ranked multikeyword search scheme with sub-linear cipher texts based on anonymous hierarchical identity-based encryption (AHIBE) is put forward and its security is analyzed.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"64 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131753032","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Research of Space Robot Autonomous Operation Architecture","authors":"Hang Yin, Yongming Gao, Guoqiang Zeng, Chao Wang","doi":"10.1109/INCoS.2013.45","DOIUrl":"https://doi.org/10.1109/INCoS.2013.45","url":null,"abstract":"Space robot has important economic and applied value, and the autonomous operation of the space robot is an important development direction in the application of the space robot. We proposed the multi-level architecture of autonomous operation for the space robot. Design the modeling language and frame in operation planning to make the autonomous control easier to implement. The various elements such as relationships, constraints and actions in the autonomous operation are described and modeled. The method of planning and scheduling is put up based on the case reasoning and planning scheduling of the object. So that to reduce the burden of the operator and reinforce the space robot operation task.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130704818","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Ultrahigh Speed AES Processor Method Based on FPGA","authors":"Xin Cai, Rong Sun, Jingwei Liu","doi":"10.1109/INCoS.2013.123","DOIUrl":"https://doi.org/10.1109/INCoS.2013.123","url":null,"abstract":"The realization of an ultrahigh speed AES processor based on FPGA is proposed in this paper, which can generate secure information at a constant rate of dozens of Gbps. Having compared with some other researches in terms of structure of the processor, speed and latency, we develop ultrahigh speed architectures for a reformulated version of AES algorithm, which shows a greater superiority than other ones currently. The merit comes that: Firstly, the processor is able to process 128 bits data during each clock period, only bringing 10 clock periods latency and saving 4K storage space. Secondly, we used a same and symmetric pipelining structure but different connection order and stored different initial keys in inner register when designing decryption module. Thus, the processor seems to be an asymmetrical system. Thirdly, the method that data involved in multiplication in Galois field was stored in ROM is used as the key to guarantee the safety of data and prohibit tampering.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130693343","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yuanyuan Cheng, Jin Zhang, Xiaowei Liu, Qingcheng Li, Zhenlu Chen
{"title":"Research on Polymorphism in Digital Text Watermarking","authors":"Yuanyuan Cheng, Jin Zhang, Xiaowei Liu, Qingcheng Li, Zhenlu Chen","doi":"10.1109/INCoS.2013.33","DOIUrl":"https://doi.org/10.1109/INCoS.2013.33","url":null,"abstract":"Nowadays, the issues such as the thin algorithm, attack sensitivity, narrow applications restrict the development of text watermark technology. This paper purposes to coordinate multi-watermarking algorithms to work collaboratively by polymorphism watermarking algorithm: on the one hand, this paper hopes to seek the positive direction of watermarking development by way of expanding the embedding space, on the other hand, this paper hopes to use polymorphism watermarking to enhance the robustness of the system. At first, we extract the relevant classification characteristics on the basis of summarizing the existing algorithms. Then we discuss the defining polymorphism watermarking algorithm, and focus on the cooperative relations of the watermark information. By algorithm design, implementation and verification, the polymorphism watermarking algorithm proves to be effective to solve the issues including both limitation of the watermark embedding space and the attack sensitivity of a single algorithm.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127897580","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Combined Predictor for Item-Based Collaborative Filtering","authors":"Zhonghuo Wu, Jun Zheng, Su Wang, Hongfeng Feng","doi":"10.1109/INCoS.2013.46","DOIUrl":"https://doi.org/10.1109/INCoS.2013.46","url":null,"abstract":"Collaborative filtering is one of most important technologies in the field of recommender systems, the process of making predictions about user preferences for products or services by learning known user-item relationships. In this paper, slope one and item-based nearest neighbor collaborative filtering algorithms are analyzed on the Movie Lens dataset. In order to obtain better accuracy and rationality, a new combined approach is proposed that takes advantages of slope one and item-based nearest neighbor model. In addition, simple gradient descent and bias effects are used further to improve performance. Finally, some experiments are implemented on the dataset, and the experimental results show that the proposed final solution achieves great improvement of prediction accuracy when compared to the method of using slope one or item-based nearest neighbor model alone.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117246298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Texture Image Denoising Algorithm Based on Structure Tensor and Total Variation","authors":"Caixia Li, Chanjuan Liu, Yilei Wang","doi":"10.1109/INCoS.2013.132","DOIUrl":"https://doi.org/10.1109/INCoS.2013.132","url":null,"abstract":"For the existing problems of staircase effect, edge blur and uncertainty of parameter selection in the process of image denoising and recovery of variational partial differential equations, a novel total variation restoration model based on image structure tensor(STTV) is proposed. We introduce image structure tensor to construct the image structure control function instead of using Lagrange multiplier and local structure information to control Diffusion process, which has the performance of adjusting the balance of regular item and fidelity item in TV model according to different local structure information and keeping better detail features. Theoretical analysis and experiment comparing with other methods illustrate that STTV model is able to describe the image edges, textures and smooth areas more accurately and subtly, which has overcome staircase and over-smoothing effects brought by other TV models and removed the noise while preserving significant image details and important characteristics. the value of peak signal to noise ratio(PSNR) is also improved.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"23 12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116183663","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proactive Secret Sharing without a Trusted Party","authors":"Xiuqun Wang, Changlu Lin, Yong Li","doi":"10.1109/INCoS.2013.96","DOIUrl":"https://doi.org/10.1109/INCoS.2013.96","url":null,"abstract":"A (t + 1, n) proactive secret sharing is to protect a secret in long-lived system by distributing it to a group of n participants and refreshing their shares periodically in this fixed group, while any t + 1 and more than t + 1 shares can reconstruct the secret. In this paper, we propose a proactive secret sharing scheme without a trusted party, who generates and distributes shares among the participants. Our scheme is uniformly efficient and tolerates t Byzantine faults in any single time interval, where the number of participants n>=3t + 1. We also prove that the proposed scheme is secure under the discrete logarithm intractability assumption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129633058","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Data Gathering in Intermittent Connected Mobile Sensor Networks","authors":"Yongping Xiong, Shizhong Wu, Zhang Tao, Yubo Deng, Shiwu Chen","doi":"10.1109/INCoS.2013.86","DOIUrl":"https://doi.org/10.1109/INCoS.2013.86","url":null,"abstract":"Intermittent Connected Mobile Sensor Networks (ICMSN) have emerged in recent studies, e.g. underwater sensor networks, wildlife tracking and human-oriented flu virus monitoring. In these networks, conventional routing protocols in WSN are not suitable for data gathering application in ICMSN since packets will be dropped when no complete route to the sink is available. In this paper, we propose an efficient data gathering scheme for ICMSN, which is composed of forwarding protocol and buffer management. Message forwarding makes decision on which sensors are qualified for next hop based on nodal delivery probability, which signifies the likelihood that the sensor can deliver the message to the sink successfully based on the nodal mobility pattern and residual energy. Buffer management consists of two related components: queuing mechanism and purging mechanism. The former determines priority of messages to transmit based on the importance factor, which indicates importance of the messages and QoS requirement of transmission. The latter utilizes a death vector generated by the sink to purge useless messages that have been delivered from the network. Our experimental results show that the proposed data gathering scheme supports the different transmission requirement of messages and achieves the good performance tradeoff between delivery ratio, delay and resource consumption.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130941207","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Real-Time Template Generation Algorithm to Identify RMB Crest Number","authors":"Gaoyu Zhang, Yingying Wang","doi":"10.1109/INCoS.2013.137","DOIUrl":"https://doi.org/10.1109/INCoS.2013.137","url":null,"abstract":"On the basis of reviewing the current RMB-banknote crest number identification research literature, a real-time template generation algorithm to identify crest number in high-speed RMB-banknote moving environment is proposed. Firstly enough complete RMB images should be collected in currency detector equipped with CIS, then the area of crest number should be dug out and processed with tilt correction, binarization, morphology processing, character segmentation and highly normalization. Secondly corresponding template set should be generated to each character bitmap and then according to the principle of maximum difference, five character bitmap should be jetted out from the templates set, forming final template simplified set. Finally, the data and analysis of the real-time identification effect applied with this template are provided.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"143 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127974688","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Anonymous Single Sign-On Schemes Transformed from Group Signatures","authors":"Jingquan Wang, Guilin Wang, W. Susilo","doi":"10.1109/INCoS.2013.104","DOIUrl":"https://doi.org/10.1109/INCoS.2013.104","url":null,"abstract":"Single Sign-on (SSO) allows a user to obtain a single credential from a Trusted Third Party (TTP) once and then authenticates himself/herself to different service providers by using the same credential. Though different SSO schemes have been obtained from various primitives, user anonymity has not yet been studied formally. Motivated by the fact that anonymity is a very essential security requirement in certain scenarios, in this paper we first formalize a security model of anonymous single-sign on (ASSO). Subsequently, we present a generic ASSO scheme which is transformed from group signatures. Formal proofs are provided to show that the proposed ASSO is secure under the assumption that the underlying group signature is secure according to Bell are et al.'s model introduced at CT-RSA 2005. Compared to existing SSO schemes, our transformation not only implements the user's anonymity, but also reduces the trust level in TTP.","PeriodicalId":353706,"journal":{"name":"2013 5th International Conference on Intelligent Networking and Collaborative Systems","volume":"117 10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2013-09-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126399906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}