购买云解压PDF图书

基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用
  • 作 者:周晓谊著
  • 出 版 社:北京:知识产权出版社
  • 出版年份:2017
  • ISBN:9787513045100
  • 注意:在使用云解压之前,请认真核对实际PDF页数与内容!

在线云解压

价格(点数)

购买连接

说明

转为PDF格式

8

立即购买

(在线云解压服务)

云解压服务说明

1、本站所有的云解压默认都是转为PDF格式,该格式图书只能阅读和打印,不能再次编辑。

云解压下载及付费说明

1、所有的电子图书云解压均转换为PDF格式,支持电脑、手机、平板等各类电子设备阅读;可以任意拷贝文件到不同的阅读设备里进行阅读。

2、云解压在提交订单后一般半小时内处理完成,最晚48小时内处理完成。(非工作日购买会延迟)

CHAPTER 1 INTRODUCTION 1

Section 1.1 Motivations:Security Based on Temporal Order 2

Section 1.1.1 Formal Characterization of Time-series 2

Section 1.1.2 BMQE System 3

Section 1.1.3 Temporal Ordered Image Cryptography 4

Section 1.1.4 Temporal Ordered Image Hiding 5

Section 1.2 Objectives:Information Security Usmg Temporal Theory 6

Section 1.3 Outlines of the Main Contributions 8

Section 1.4 Book Structure 10

CHAPTER 2 LITERATURE REVIEW 12

Section 2.1 Temporal Basis 12

Section 2.1.1 Point-based Systems 12

Section 2.1.2 Interval-based Systems 14

Section 2.1.3 A point&Interval-based Theory 15

Section 2.1.4 Notion of Time-series 18

Section 2.2 Ergodic Matrix 22

Section 2.2.1 Finite Fields 22

Section 2.2.2 Definitions and Related Theorems of the EM 24

Section 2.2.3 Security Analysis of a Question Based on EM 27

Section 2.3 Cryptography 29

Section 2.3.1 History of Cryptography and Cryptanalysis 30

Section 2.3.2 Symmetric Cryptography vs.Asymmetric Cryptography 34

Section 2.3.3 Multivariate Quadratic Polynomials 37

Section 2.4 Information Hiding 41

Section 2.4.1 History of Information Hiding 42

Section 2.4.2 Steganography vs.Watermarking 46

Section 2.4.3 Data Hiding Technologies in Images 48

Section 2.5 Conclusions 53

CHAPTER 3 BMQE SYSTEM 54

Section 3.1 Important Characteristics of EM for BMQE System 54

Section 3.2 BMQE Based on Ergodic Matrix 56

Section 3.2.1 BMQE Problem 56

Section 3.2.2 BMQE is NP-Complete 57

Section 3.3 Cryptanalysis of BMQE 59

Section 3.3.1 Methods Used in Solving MQ-problems 59

Section 3.3.2 Fixing Variables 61

Section 3.3.3 Relinearization 64

Section 3.4 Conclusions 74

CHAPTER 4 IMAGE CRYPTOGRAPHY 75

Section 4.1 Review of Image Cryptography 75

Section 4.1.1 Characteristics of Image Cryptography 75

Section 4.1.2 Image Cryptography Algorithms 77

Section 4.2 Hybrid-key Based Image Cryptography 79

Section 4.2.1 Encryption/Decryption and Authentication Process 80

Section 4.2.2 Image Confusion 82

Section 4.2.3 Image Diffusion 84

Section 4.3 Security Analysis 85

Section 4.3.1 Key Space Analysis 86

Section 4.3.2 Statistical Analysis 87

Section 4.3.3 Sensitivity-based Attack 90

Section 4.4 Performance Evaluation 94

Section 4.5 Conclusions 96

CHAPTER 5 IMAGE HIDING 98

Section 5.1 Related Results 98

Section 5.1.1 GA-based Watermarking 99

Section 5.1.2 SVM-based Watermarking 101

Section 5.2 Design Idea 103

Section 5.2.1 Motivation 104

Section 5.2.2 Embedding Strength with SVM 104

Section 5.2.3 Embedding Position with Optimized GA 108

Section 5.3 Algorithm SOGA:Watermarking Based on SVM and Optimized-GA 110

Section 5.3.1 Communication Procedure 110

Section 5.3.2 Embedding Procedure 110

Section 5.3.3 Extracting Procedure 112

Section 5.4 Experimental Results 113

Section 5.4.1 Evaluation Criterion in System Performance 113

Section 5.4.2 Results by Different Iteration Numbers 114

Section 5.4.3 Robustness Against Various Attacks 117

Section 5.5 Conclusions 121

CHAPTER 6 TEMPORAL APPLICATIONS 122

Section 6.1 Formal Characterization of Time-series 122

Section 6.1.1 Why Choosing Temporal 122

Section 6.1.2 Formalize the Characterization of Time-series 124

Section 6.2 Temporal-based Image Cryptosystem 127

Section 6.2.1 Encryption-decryption Process Using Temporal Logic 127

Section 6.2.2 Expand the Key Size 129

Section 6.2.3 Adjust the Images 129

Section 6.2.4 Security Analysis 130

Section 6.3 Temporal-based Image Hiding 136

Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic 137

Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic 138

Section 6.4 Conclusions 149

CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS 150

Section 7.1 Development of RFID Anti-counterfeit Technology 150

Section 7.2 An Anti-counterfeiting Scheme for Agricultural RFID 153

Section 7.3 BMQE for RFID Anti-Counterfeiting 154

Section 7.3.1 Key Generation 155

Section 7.3.2 Encryption Procedure 155

Section 7.3.3 Decryption Procedure 157

Section 7.4 SOGA for RFID Tampering Detection 157

Section 7.5 Conclusions 160

CHAPTER 8 CONCLUSIONS AND FUTURE WORK 161

Section 8.1 Conclusions 161

Section 8.2 Future Work Discussion 163

Reference 165

购买PDF格式(8分)
返回顶部