Computer Standards & Interfaces最新文献

筛选
英文 中文
Append-only Authenticated Data Sets based on RSA accumulators for transparent log system 透明日志系统中基于RSA累加器的仅追加认证数据集
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-02-06 DOI: 10.1016/j.csi.2025.103978
Qiang Tong, Long Yin, Yulong Liu, Jian Xu
{"title":"Append-only Authenticated Data Sets based on RSA accumulators for transparent log system","authors":"Qiang Tong,&nbsp;Long Yin,&nbsp;Yulong Liu,&nbsp;Jian Xu","doi":"10.1016/j.csi.2025.103978","DOIUrl":"10.1016/j.csi.2025.103978","url":null,"abstract":"<div><div>Authenticated Data Structures (ADS) play a vital role in ensuring data authenticity in cloud computing environments, particularly in Public Key Infrastructure (PKI). Despite their importance, significant concerns remain about cloud computing security, such as the risk of hijacking certification authorities to issue fraudulent certificates or tampering with log entries. While Certificate Transparency (CT) improves server certificate credibility, CT log servers remain vulnerable, risking data integrity and trust. This paper proposes the Append-only Authenticated Data Sets (AADS) model, which enhances cloud computing security by supporting append-only properties and fork consistency in transparent logs, preventing malicious modifications and preserving divergent log views. Formally defined using RSA accumulators, the model includes efficient algorithms for initialization, data addition, search, and evidence verification, ensuring security under strong RSA and adaptive root assumptions while reducing space complexity. Additionally, Append-only Authenticated Dictionaries (AAD) offer better space and communication efficiency. A prototype transparent log system demonstrates how these structures mitigate identity authentication risks caused by missing append-only features and fork consistency. Key challenges remain, including scalability, cryptographic weaknesses, and coordinated attacks by compromised log servers and malicious entities.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103978"},"PeriodicalIF":4.1,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143377471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption S-box采用分数阶4D超混沌系统及其在基于RSA密码系统的彩色图像加密中的应用
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-02-06 DOI: 10.1016/j.csi.2025.103980
Saeed Ullah , Xinge Liu , Adil Waheed , Shuailei Zhang
{"title":"S-box using fractional-order 4D hyperchaotic system and its application to RSA cryptosystem-based color image encryption","authors":"Saeed Ullah ,&nbsp;Xinge Liu ,&nbsp;Adil Waheed ,&nbsp;Shuailei Zhang","doi":"10.1016/j.csi.2025.103980","DOIUrl":"10.1016/j.csi.2025.103980","url":null,"abstract":"<div><div>An algorithm for substitution box (S-box) construction is proposed by using fractional-order (FO) 4D hyperchaotic system in this paper. Based on hyperchaotic sequences generated by the FO 4D hyperchaotic system, exclusive-or (XOR) operations, and permutation the S-box is constructed. A comprehensive evaluation based on various algebraic criteria demonstrates that the proposed S-box exhibits favorable performance in terms of strict avalanche criterion (SAC), differential approximation probability (DP), nonlinearity (NL), bit independence criterion (BIC), linear approximation probability (LP), fixed point (FP), reverse fixed point (FPr), and correlation immunity (CI). The proposed S-box exhibits excellent NL of 112, comparable to that of the Advanced Encryption Standard (AES) S-box. Furthermore, a novel color image encryption technique is developed to ensure the privacy of color images. The proposed color image encryption algorithm combines Arnold Cat map (ACM), a high-performance generated S-box, Rivest–Shamir–Adleman (RSA) algorithm with 2D Henon chaotic map (HCM). Through rigorous testing, analysis, and comparison with recently reported image encryption algorithms, the suggested algorithm demonstrates its security, efficiency, and resistance to different standard attacks. Notably, the suggested algorithm for color image encryption offers a substantial key space and achieves an approximate correlation of 0 between adjacent pixels. Additionally, the entropy approaches the ideal value of 8.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103980"},"PeriodicalIF":4.1,"publicationDate":"2025-02-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143387205","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques 基于交叉层和DNA编码技术的延迟混沌图像加密算法
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-01-31 DOI: 10.1016/j.csi.2025.103974
Chaofeng Zhao , Zhibo Zhai , Bo Zeng
{"title":"Delayed chaotic image encryption algorithm using cross-layer and DNA coding techniques","authors":"Chaofeng Zhao ,&nbsp;Zhibo Zhai ,&nbsp;Bo Zeng","doi":"10.1016/j.csi.2025.103974","DOIUrl":"10.1016/j.csi.2025.103974","url":null,"abstract":"<div><div>This work presents a grayscale image encryption algorithm based on delayed chaotic system, and DNA coding with cross-layer techniques, which mainly includes random sequences generation, DNA encoding and decoding, DNA cross-layer confusion operations, pixels cross-layer diffusion. Concrete, firstly, information entropy and the correlation values of original images are combined as the initial value of the delay chaotic system, establishing the relationship between original images and the delayed chaotic system and enhance the relationship between the encrypted images and original images to resist chosen-plaintext and known-plaintext attacks. Secondly, after coding the pixels of images by DNA rules, cross-layer techniques are designed to rearrange the positions of all DNA coding elements using the corresponding the delayed chaotic sequence matrices to achieve confusion effects. Finally, the DNA decoded pixels are divided into four blocks (layers), combining with the state sequences of the delayed chaotic system for cross-layer diffusion operations to complete the final image encryption. The presented image encryption algorithm using cross-layer and DNA coding techniques has considerable advantages compared with the same type of DNA chaotic encryption algorithms, such as key space and sensitivity, information entropy, UPCR and UACI values, efficiency, etc., thus verifying that the delayed chaotic system is conducive to the improvement of information security.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103974"},"PeriodicalIF":4.1,"publicationDate":"2025-01-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143353837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
MetaPerceptron: A standardized framework for metaheuristic-driven multi-layer perceptron optimization 元感知器:用于元启发式驱动的多层感知器优化的标准化框架
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-01-30 DOI: 10.1016/j.csi.2025.103977
Nguyen Van Thieu , Seyedali Mirjalili , Harish Garg , Nguyen Thanh Hoang
{"title":"MetaPerceptron: A standardized framework for metaheuristic-driven multi-layer perceptron optimization","authors":"Nguyen Van Thieu ,&nbsp;Seyedali Mirjalili ,&nbsp;Harish Garg ,&nbsp;Nguyen Thanh Hoang","doi":"10.1016/j.csi.2025.103977","DOIUrl":"10.1016/j.csi.2025.103977","url":null,"abstract":"<div><div>The multi-layer perceptron (MLP) remains a foundational architecture within neural networks, widely recognized for its ability to model complex, non-linear relationships between inputs and outputs. Despite its success, MLP training processes often face challenges like susceptibility to local optima and overfitting when relying on traditional gradient descent optimization. Metaheuristic algorithms (MHAs) have recently emerged as robust alternatives for optimizing MLP training, yet no current package offers a comprehensive, standardized framework for MHA-MLP hybrid models. This paper introduces MetaPerceptron, an standardized open-source Python framework designed to integrate MHAs with MLPs seamlessly, supporting both regression and classification tasks. MetaPerceptron is built on top of PyTorch, Scikit-Learn, and Mealpy. Through this design, MetaPerceptron promotes standardization in MLP optimization, incorporating essential machine learning utilities such as model forecasting, feature selection, hyperparameter tuning, and pipeline creation. By offering over 200 MHAs, MetaPerceptron empowers users to experiment across a broad array of metaheuristic optimization techniques without reimplementation. This framework significantly enhances accessibility, adaptability, and consistency in metaheuristic-trained neural network research and applications, positioning it as a valuable resource for machine learning, data science, and computational optimization. The entire source code is freely available on Github: <span><span>https://github.com/thieu1995/MetaPerceptron</span><svg><path></path></svg></span></div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103977"},"PeriodicalIF":4.1,"publicationDate":"2025-01-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143299520","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An effective image annotation using self-attention based stacked bidirectional capsule network 基于自关注的堆叠双向胶囊网络的有效图像标注
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-01-25 DOI: 10.1016/j.csi.2025.103973
Vikas Palekar, Sathish Kumar L
{"title":"An effective image annotation using self-attention based stacked bidirectional capsule network","authors":"Vikas Palekar,&nbsp;Sathish Kumar L","doi":"10.1016/j.csi.2025.103973","DOIUrl":"10.1016/j.csi.2025.103973","url":null,"abstract":"<div><div>This paper provides an advanced hybrid deep learning (DL) system for accurate image annotation. The first step consists of input images being pre-processed using three techniques: i) cross-guided bilateral filtering, ii) image resizing and iii) colour conversion to the green channel. After pre-processing, key features such as shape, wavelet and texture are extracted using three models: the modified Walsh-Hadamard transform, the extended discrete wavelet transform and the grayscale run length matrix (GLRLM). Once the feature is extracted, the optimal features are selected using the Chaotic Coati Optimization (CCO) algorithm due to feature dimensionality issues. After selecting optimal features, image annotation is performed using the self-awareness-based Stacked Bidirectional Capsule Network (SA_SBiCapNet) model. The stacking Bidirectional long short term memory model (BiLSTM) approach with a capsule network is applied to annotate the given images. The accuracy rate of the proposed method is 0.99 %. Therefore, the proposed method uses a hybrid DL model to perform effective image annotation.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103973"},"PeriodicalIF":4.1,"publicationDate":"2025-01-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143169388","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Maintainable verifiable data streaming based on redactable blockchain 基于可读区块链的可维护的可验证数据流
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-01-24 DOI: 10.1016/j.csi.2025.103972
Meixia Miao , Mengchen Wang , Siqi Zhao , Fangguo Zhang , Jianghong Wei
{"title":"Maintainable verifiable data streaming based on redactable blockchain","authors":"Meixia Miao ,&nbsp;Mengchen Wang ,&nbsp;Siqi Zhao ,&nbsp;Fangguo Zhang ,&nbsp;Jianghong Wei","doi":"10.1016/j.csi.2025.103972","DOIUrl":"10.1016/j.csi.2025.103972","url":null,"abstract":"<div><div>The verifiable data streaming (VDS) protocol enables clients to delegate locally generated data items (i.e., data streaming) to a semi-honest cloud server in real time while maintaining data integrity. It is built upon a chameleon authentication tree (CAT) and digital signatures. That is, a user may confirm the retrieved data item’s integrity by recomputing the hash value on its underlying CAT root and further checking a signature of this value created by the data owner. However, many lightweight application scenarios may not deploy public-key infrastructure (PKI) to support the digital signatures. Moreover, in frequently updated application scenarios such as trend analysis and stock forecasting, many new digital signatures are generated, and malicious cloud servers might return old versions of a queried outsourced data item and the corresponding signature. Consequently, maintaining those previously created signatures becomes a challenge. In this paper, to overcome these issues, we put forth a novel construction framework of VDS by introducing a redactable blockchain. Specifically, we treat the root value of the CAT as a transaction and package it to a redactable blockchain. After that, the immutability of the underlying redactable blockchain ensures the integrity of outsourced data streaming and avoids using the digital signature. Also, as the data is updated, we can update the root value of the CAT by re-editing the corresponding block. We also put a concrete VDS construction in the new framework, and formally prove its security. Theoretical compression and experimental results indicate that the proposed VDS protocol has merits in functionality and practicality.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103972"},"PeriodicalIF":4.1,"publicationDate":"2025-01-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143169386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Validation of the UEQ+ Scales for Voice Quality 语音质量UEQ+标准的验证
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-01-12 DOI: 10.1016/j.csi.2024.103971
Andreas M. Klein , Jessica Kollmorgen , Andreas Hinderks , Martin Schrepp , Maria Rauschenberger , Maria-Jose Escalona
{"title":"Validation of the UEQ+ Scales for Voice Quality","authors":"Andreas M. Klein ,&nbsp;Jessica Kollmorgen ,&nbsp;Andreas Hinderks ,&nbsp;Martin Schrepp ,&nbsp;Maria Rauschenberger ,&nbsp;Maria-Jose Escalona","doi":"10.1016/j.csi.2024.103971","DOIUrl":"10.1016/j.csi.2024.103971","url":null,"abstract":"<div><div>User experience (UX) measurement is vital for evaluating interactive devices and systems such as voice user interfaces (VUIs), which are widely available in smart speakers and mobile phones (e.g., Alexa and Siri). The User Experience Questionnaire Plus (UEQ+) framework provides a flexible approach with three novel constructed voice scales that assess the UX quality of VUIs. The UEQ+ contains UX scales that measure distinct UX aspects such as <em>Efficiency</em>, <em>Stimulation</em> as well as the three voice scales <em>Response Behavior</em>, <em>Response Quality</em>, and <em>Comprehensibility</em>. These scales can be combined to easily create a product-related questionnaire for VUI assessment. In this paper, we focus on validating the UEQ+ voice scales by verifying their <em>reliability</em> and <em>validity</em>, which are fundamental UX scale quality criteria. We surveyed a total of 623 participants, asking about three popular VUIs in two growing consumer markets. Our validation study findings confirm the <em>reliability</em> and <em>factorial validity</em> of the three UEQ+ scales for voice quality.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103971"},"PeriodicalIF":4.1,"publicationDate":"2025-01-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143360781","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A blockchain-based multi-keyword rank search scheme for B+ tree inverted index 基于区块链的B+树倒排索引多关键字排序搜索方案
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-01-09 DOI: 10.1016/j.csi.2024.103968
Jin Sun, Nana Song, Lu Wang, Kexin Ye, Mengna Kang
{"title":"A blockchain-based multi-keyword rank search scheme for B+ tree inverted index","authors":"Jin Sun,&nbsp;Nana Song,&nbsp;Lu Wang,&nbsp;Kexin Ye,&nbsp;Mengna Kang","doi":"10.1016/j.csi.2024.103968","DOIUrl":"10.1016/j.csi.2024.103968","url":null,"abstract":"<div><div>In the cloud storage environment, data providers encrypt their data before transferring it to the cloud server to reduce storage pressure and facilitate internal sharing. However, most of the plans have certain drawbacks, such as: the search efficiency is low, the cloud server central problem is serious, and the ability to resist keyword guess attack is poor et al. To overcome these shortcomings, this paper presents a blockchain-based multi-keyword rank search scheme for B+ tree inverted index to improve the search accuracy and efficiency. First, we choose the top-<span><math><mi>k</mi></math></span> keywords with high weight to build a B+ tree inverted index. Then, the cloud server calculates the relevance score of ciphertext using the optimized TF-IDF formula and sends the top-<span><math><mi>k</mi></math></span> ciphertexts to the user. In addition, verification and match contract on the blockchain to verify the identity of users and address the semi-trust and centralization of cloud server. We have deployed reward and punishment contracts on the blockchain to regulate the behavior of data providers and cloud server. Rigorous security certification shows that the scheme can resist choose keyword attack (CKA) and keyword guess attack (KGA). Through experiments, it is found that our scheme has good search efficiency and communication efficiency.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103968"},"PeriodicalIF":4.1,"publicationDate":"2025-01-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143170607","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A smart virtual keyboard to improve communication of locked-in patients 一种智能虚拟键盘,改善闭锁患者的交流
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-01-04 DOI: 10.1016/j.csi.2024.103963
Alessia Lucia Prete , Paolo Andreini , Simone Bonechi , Monica Bianchini
{"title":"A smart virtual keyboard to improve communication of locked-in patients","authors":"Alessia Lucia Prete ,&nbsp;Paolo Andreini ,&nbsp;Simone Bonechi ,&nbsp;Monica Bianchini","doi":"10.1016/j.csi.2024.103963","DOIUrl":"10.1016/j.csi.2024.103963","url":null,"abstract":"<div><div>Over the last decade, thanks to advances in sensor technology, imaging, and data analytics, the use of AI-based medical devices has seen an exponential increase, with massive adoption by hospitals and specialized laboratories. Among support devices for patients with limited or no residual mobility, and unable to interact to express their basic needs, artificial intelligence technologies offer promising solutions for augmentative and alternative communication (AAC), necessary for people with speech disorders, language impairment, and autism. This paper focuses on the development of a smart virtual keyboard for patients with reduced communication capabilities — specifically improving the AAC BrainControl Interface device, which uses an EEG helmet to detect users’ brain activity — to help them interact with the outside world. By leveraging machine learning techniques for language generation, particularly using recurrent networks and large language models, it is possible to accurately predict user intent and improve their typing experience. Experimental results show the average number of interactions reduced by a factor of 2.66 compared to the original sequential key scanning method, which is extremely significant for locked-in patients.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103963"},"PeriodicalIF":4.1,"publicationDate":"2025-01-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143169387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
DWTAT-DASIS: Fusion of discrete wavelet transform and access tree for distributed authentication in secret image sharing dwdat - dasis:融合离散小波变换和访问树的分布式认证秘密图像共享
IF 4.1 2区 计算机科学
Computer Standards & Interfaces Pub Date : 2025-01-02 DOI: 10.1016/j.csi.2024.103969
Chuanda Cai , Changgen Peng , Hanlin Tang , Bin Xiao , Weijie Tan
{"title":"DWTAT-DASIS: Fusion of discrete wavelet transform and access tree for distributed authentication in secret image sharing","authors":"Chuanda Cai ,&nbsp;Changgen Peng ,&nbsp;Hanlin Tang ,&nbsp;Bin Xiao ,&nbsp;Weijie Tan","doi":"10.1016/j.csi.2024.103969","DOIUrl":"10.1016/j.csi.2024.103969","url":null,"abstract":"<div><div>Secret sharing of distributed data in cloud environments prevents unauthorized and wanton access and misuse by malicious participants. However, when applying secret sharing to image formats, the fixed range of pixel values in images presents unique challenges for share recovery, often resulting in recovery algorithms that reconstruct images in a lossy manner. Moreover, one-way authentication methods for participants in cloud environments are insufficient to address the heightened security demands of high-trust scenarios. This paper presents a secret image-sharing scheme with distributed authentication (DWTAT-DASIS) designed for cloud storage environments. By leveraging Discrete Wavelet Transform and an Access Tree structure, the scheme addresses the limitations of existing approaches (such as compression-based secret sharing and visual cryptography), which fail to provide lossless image recovery and efficient performance. Additionally, DWTAT-DASIS enhances security through fine-grained access control and two-way authentication. Finally, security analysis and experiments were conducted on the proposed protocol, demonstrating its ability to resist common attack methods as well as some deeper-level attack methods, meeting the security requirements for image storage in cloud systems. Experimental analysis shows that compared with similar protocols, this protocol can ensure the integrity of image restoration and greatly reduce the probability of image transmission being attacked.</div></div>","PeriodicalId":50635,"journal":{"name":"Computer Standards & Interfaces","volume":"93 ","pages":"Article 103969"},"PeriodicalIF":4.1,"publicationDate":"2025-01-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143169390","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信