Cryptography最新文献

筛选
英文 中文
Chaotic Function Based ECG Encryption System 基于混沌函数的心电加密系统
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-0920-2.CH013
B. P. Singh, Manjit Singh, Dixit Sharma
{"title":"Chaotic Function Based ECG Encryption System","authors":"B. P. Singh, Manjit Singh, Dixit Sharma","doi":"10.4018/978-1-5225-0920-2.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-0920-2.CH013","url":null,"abstract":"Remote health-care monitoring systems communicate biomedical information (e.g. Electrocardiogram (ECG)) over insecure networks. Protection of the integrity, authentication and confidentiality of the medical data is a challenging issue. This chapter proposed an encryption process having a 4-round five steps -encryption structure includes: the random pixel insertion, row separation, substitution of each separated row, row combination and rotation. Accuracy and security analysis of proposed method for 2D ECG encryption is evaluated on MIT-BIH arrhythmia database.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70431386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Video Saliency Detection for Visual Cryptography-Based Watermarking 基于视觉密码的视频显著性水印检测
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-4666-8723-3.CH006
Adrita Barari, S. Dhavale
{"title":"Video Saliency Detection for Visual Cryptography-Based Watermarking","authors":"Adrita Barari, S. Dhavale","doi":"10.4018/978-1-4666-8723-3.CH006","DOIUrl":"https://doi.org/10.4018/978-1-4666-8723-3.CH006","url":null,"abstract":"The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also highlighted in the context of Visual Cryptography based watermarking systems for videos. All schemes in literature related to Visual cryptography based video watermarking, have been brought together with special attention on the role of saliency feature extraction in each of these schemes. Further a novel approach for VC based video watermarking using motion vectors (MVP Algorithm) as a salient feature is suggested. Experimental results show the robustness of proposed MVP Algorithm against various video processing attacks. Also, compression scale invariance is achieved.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70429273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Contemplator on Topical Image Encryption Measures 局部图像加密措施的思考
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-5225-2296-6.CH009
J. Mondal, Debabala Swain
{"title":"A Contemplator on Topical Image Encryption Measures","authors":"J. Mondal, Debabala Swain","doi":"10.4018/978-1-5225-2296-6.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-2296-6.CH009","url":null,"abstract":"Images unduly assist digital communication in this aeon of multimedia. During times a person transmits confidential images over a flabby communication network, sheer protection is an accost contention to preserve the privacy of images. Encryption is one of the practice to clutch the reticence of images. Image encryption contributes a preeminent bite to charter security for secure sight data communication over the internet. Our work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70432339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Provable Security for Public Key Cryptosystems 公钥密码系统的可证明安全性
IF 1.6
Cryptography Pub Date : 2020-01-01 DOI: 10.4018/978-1-7998-1763-5.ch013
Syed Taqi Ali
{"title":"Provable Security for Public Key Cryptosystems","authors":"Syed Taqi Ali","doi":"10.4018/978-1-7998-1763-5.ch013","DOIUrl":"https://doi.org/10.4018/978-1-7998-1763-5.ch013","url":null,"abstract":"In the early years after the invention of public key cryptography by Diffie and Hellman in 1976, the design and evaluation of public key cryptosystems has been done merely in ad-hoc manner based on trial and error. The public key cryptosystem said to be secure as long as there is no successful cryptanalytic attack on it. But due to various successful attacks on the cryptosystems after development, the cryptographic community understood that this ad-hoc approach might not be good enough. The paradigm of provable security is an attempt to get rid of ad hoc design. The goals of provable security are to define appropriate models of security on the one hand, and to develop cryptographic designs that can be proven to be secure within the defined models on the other. There are two general approaches for structuring the security proof. One is reductionist approach and other is game-based approach. In these approaches, the security proofs reduce a well known problem (such as discrete logarithm, RSA) to an attack against a proposed cryptosystem. With this approach, the security of public key cryptosystem can be proved formally under the various models viz. random oracle model, generic group model and standard model. In this chapter, we will briefly explain these approaches along with the security proofs of well known public key cryptosystems under the appropriate model.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70443023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Shannon’s Theory, Perfect Secrecy, and the One-Time Pad 香农理论,完全保密,一次性笔记本
IF 1.6
Cryptography Pub Date : 2018-08-14 DOI: 10.1201/9781315282497-3
Douglas R Stinson, Maura B. Paterson
{"title":"Shannon’s Theory, Perfect Secrecy, and the One-Time Pad","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-3","DOIUrl":"https://doi.org/10.1201/9781315282497-3","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41600937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Signature Schemes 签名方案
IF 1.6
Cryptography Pub Date : 2018-08-14 DOI: 10.1201/9781315282497-8
Douglas R Stinson, Maura B. Paterson
{"title":"Signature Schemes","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-8","DOIUrl":"https://doi.org/10.1201/9781315282497-8","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43326320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Post-Quantum Cryptography Post-Quantum密码学
IF 1.6
Cryptography Pub Date : 2018-08-14 DOI: 10.1007/978-3-319-79063-3
Douglas R Stinson, Maura B. Paterson
{"title":"Post-Quantum Cryptography","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1007/978-3-319-79063-3","DOIUrl":"https://doi.org/10.1007/978-3-319-79063-3","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/978-3-319-79063-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43765201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Miscellaneous Topics 各种各样的话题
IF 1.6
Cryptography Pub Date : 2018-08-14 DOI: 10.1201/9781315282497-13
Douglas R Stinson, Maura B. Paterson
{"title":"Miscellaneous Topics","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-13","DOIUrl":"https://doi.org/10.1201/9781315282497-13","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48373778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Key Distribution 密钥分发
IF 1.6
Cryptography Pub Date : 2018-08-14 DOI: 10.1201/9781315282497-11
Douglas R Stinson, Maura B. Paterson
{"title":"Key Distribution","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-11","DOIUrl":"https://doi.org/10.1201/9781315282497-11","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43290600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Hash Functions and Message Authentication 哈希函数和消息认证
IF 1.6
Cryptography Pub Date : 2018-08-14 DOI: 10.1201/9781315282497-5
Douglas R Stinson, Maura B. Paterson
{"title":"Hash Functions and Message Authentication","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-5","DOIUrl":"https://doi.org/10.1201/9781315282497-5","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44143854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信