物联传媒 旗下网站
登录 注册
价格:待定
基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用
作  者:周晓谊
出 版 社:知识产权出版社
出版时间:2017年07月
字  数:250000
版  次:1
页  数:180
开  本:16
印  次:0
I S B N:9787513045100
书刊介绍

《基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用(英文版)》着重提出构建多元二次多项式方程组并提出了一种基于该方程组的密码系统、一种基于遍历矩阵和混合密钥的图像加密/认证方案,经过统计分析和基于敏感度的实验结果表明,相比现有的基于混沌的图像加密系统,该方案为图像加密传输提供了更安全的方式。然而,可见的加密图像很容易引起怀疑。因此,提出了一种基于改进遗传水印-SVM和遍历矩阵混合的图像水印方案。相比其他的水印算法,该算法对于JPEG压缩、中值滤波、直方图均衡化、裁剪、高斯噪声等图像攻击下表现出显著的透明性和鲁棒性,因此用于身份识别和版权保护是有效的。

CHAPTER 1 INTRODUCTION

Section 1.1 Motivations: Security Based on Temporal Order

Section 1.1.1 Formal Characterization of Time-series

Section 1.1.2 BMQE System

Section 1.1.3 Temporal Ordered Image Cryptography

Section 1.1.4 Temporal Ordered Image Hiding

Section 1.2 Objectives: Information Security Using Temporal

Theory

Section 1.3 Outlines of the Main Contributions

Section 1.4 Book Structure

CHAPTER 2 LITERATURE REVIEW

Section 2.1 Temporal Basis

Section 2.1.1 Point-based Systems

Section 2.1.2 Interval-based Systems

Section 7.1.3 A point & Interval-based Theory

Section 2.1.4 Notion of Time-series

Section 2.2 Ergodic Matrix

Section 2.2.1 Finite Fields

Section 2.2.2 Definitions and Related Theorems of the EM

Section 2.2.3 Security Analysis of a Question Based on EM

Section 2.3 Cryptography

Section 2.3.1 History of Cryptography and Cryptanalysis

Section 2.3.2 Symmetric Cryptography vs. Asymmetric

Cryptography

Section 2.3.3 Multivariate Quadratic Polynomials

Section 2.4 Information Hiding

Section 2.4.1 History of Information Hiding

Section 2.4.2 Steganography vs. Watermarking

Section 2.4.3 Data Hiding Technologies in Images

Section 2.5 Conclusions

CHAPTER 3 BMQE SYSTEM

Section 3.1 Important Characteristics of EM for BMQE System

Section 3.2 BMQE Based on Ergodic Matrix

Section 3.2.1 BMQE Problem

Section 3.2.2 BMQE is NP-Complete

Section 3.3 Cryptanalysis of BMQE

Section 3.3.1 Methods Used in Solving MQ-problems

Section 3.3.2 Fixing Variables

Section 3.3.3 Relinearization

Section 3.4 Conclusions

CHAPTER 4 IMAGE CRYPTOGRAPHY

Section 4.1 Review of Image Cryptography

Section 4.1.1 Characteristics of Image Cryptography

Section 4.1.2 Image Cryptography Algorithms

Section 4.2 Hybrid-key Based Image Cryptography

Section 4.2.1 Encryption/Decryption and Authentication Process

Section 4.2.2 Image Confusion

Section 4.2.3 Image Diffusion

Section 4.3 Security Analysis

Section 4.3.1 Key Space Analysis

Section 4.3.2 Statistical Analysis

Section 4.3.3 Sensitivity-based Attack

Section 4.4 Performance Evaluation

Section 4.5 Conclusions

CHAPTER 5 IMAGE HIDING

Section 5.1 Related Results

Section 5.1.1 GA-based Watermarking

Section 5.1.2 SVM-based Watermarking

Section 5.2 Design Idea

Section 5.2.1 Motivation

Section 5.2.2 Embedding Strength with SVM

Section 5.2.3 Embedding Position with Optimized GA

Section 5.3 Algorithm SOGA: Watermarking Based on SVM and

Optimized-GA

Section 5.3.1 Communication Procedure

Section 5.3.2 Embedding Procedure

Section 5.3.3 Extracting Procedure

Section 5.4 Experimental Results

Section 5.4.1 Evaluation Criterion in System Performance

Section 5. d. 2 Results by Different Iteration Numbers

Section 5.4.3 Robustness Against Various Attacks

Section 5.5 Conclusion

CHAPTER 6 TEMPORAL APPLICATIONS

Section 6.1 Formal Characterization of Time-series

Section 6.1.1 Why Choosing Temporal

Section 6.1.2 Formalize the Characterization of Time-series

Section 6.2 Temporal-based Image Cryptosystem

Section 6.2.1 Eneryption-deeryption Process Using Temporal

Logic

Section 6.2.2 Expand the Key Size

Section 6.2.3 Adjust the Images

Section 6.2.4 Security Analysis

Section 6.3 Temporal-based Image Hiding

Section 6.3.1 Static Multiple Digital Watermarking with Temporal

Logic

Section 6.3.2 Dynamic Multiple Digital Watermarking Considering

Temporal Logic

Section 6.4 Conclusions

CHAPTER 7 APPLICATIONS IN RFID FOR

AGRICULTURAL PRODUCTS

Section 7.1 Development of RFID Anti-counterfeit Technology

Section 7.2 An Anti.counterfeiting Scheme for Agricultural

RFID

Section 7.3 BMQE for RFID Anti.Counterfeiting

Section 7.3.1 Key Generation

Section 7.3.2 Encryption Procedure

Section 7.3.3 Decryption Procedure

Section 7.4 SOGA for RFID Tampering Detection

Section 7.5 Conclusions

CHAPTER 8 CONCLUSIONS AND FUTURE WORK

Section 8.1 Conclusions

Section 8.2 Future Work Discussion

Reference