当前位置:首页 > 工业技术
基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用
基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用

基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用PDF电子书下载

工业技术

  • 电子书积分:9 积分如何计算积分?
  • 作 者:周晓谊著
  • 出 版 社:北京:知识产权出版社
  • 出版年份:2017
  • ISBN:9787513045100
  • 页数:180 页
图书介绍:本书着重提出构建多元二次多项式方程组并提出了一种基于该方程组的密码系统、一种基于遍历矩阵和混合密钥的图像加密/认证方案,经过统计分析和基于敏感度的实验结果表明,相比现有的基于混沌的图像加密系统,该方案为图像加密传输提供了更安全的方式。然而,可见的加密图像很容易引起怀疑。因此,提出了一种基于改进遗传水印-SVM和遍历矩阵混合的图像水印方案。相比其他的水印算法,该算法对于JPEG压缩、中值滤波、直方图均衡化、裁剪、高斯噪声等图像攻击下表现出显著的透明性和鲁棒性,因此用于身份识别和版权保护是有效的。
《基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用》目录

CHAPTER 1 INTRODUCTION 1

Section 1.1 Motivations:Security Based on Temporal Order 2

Section 1.1.1 Formal Characterization of Time-series 2

Section 1.1.2 BMQE System 3

Section 1.1.3 Temporal Ordered Image Cryptography 4

Section 1.1.4 Temporal Ordered Image Hiding 5

Section 1.2 Objectives:Information Security Usmg Temporal Theory 6

Section 1.3 Outlines of the Main Contributions 8

Section 1.4 Book Structure 10

CHAPTER 2 LITERATURE REVIEW 12

Section 2.1 Temporal Basis 12

Section 2.1.1 Point-based Systems 12

Section 2.1.2 Interval-based Systems 14

Section 2.1.3 A point&Interval-based Theory 15

Section 2.1.4 Notion of Time-series 18

Section 2.2 Ergodic Matrix 22

Section 2.2.1 Finite Fields 22

Section 2.2.2 Definitions and Related Theorems of the EM 24

Section 2.2.3 Security Analysis of a Question Based on EM 27

Section 2.3 Cryptography 29

Section 2.3.1 History of Cryptography and Cryptanalysis 30

Section 2.3.2 Symmetric Cryptography vs.Asymmetric Cryptography 34

Section 2.3.3 Multivariate Quadratic Polynomials 37

Section 2.4 Information Hiding 41

Section 2.4.1 History of Information Hiding 42

Section 2.4.2 Steganography vs.Watermarking 46

Section 2.4.3 Data Hiding Technologies in Images 48

Section 2.5 Conclusions 53

CHAPTER 3 BMQE SYSTEM 54

Section 3.1 Important Characteristics of EM for BMQE System 54

Section 3.2 BMQE Based on Ergodic Matrix 56

Section 3.2.1 BMQE Problem 56

Section 3.2.2 BMQE is NP-Complete 57

Section 3.3 Cryptanalysis of BMQE 59

Section 3.3.1 Methods Used in Solving MQ-problems 59

Section 3.3.2 Fixing Variables 61

Section 3.3.3 Relinearization 64

Section 3.4 Conclusions 74

CHAPTER 4 IMAGE CRYPTOGRAPHY 75

Section 4.1 Review of Image Cryptography 75

Section 4.1.1 Characteristics of Image Cryptography 75

Section 4.1.2 Image Cryptography Algorithms 77

Section 4.2 Hybrid-key Based Image Cryptography 79

Section 4.2.1 Encryption/Decryption and Authentication Process 80

Section 4.2.2 Image Confusion 82

Section 4.2.3 Image Diffusion 84

Section 4.3 Security Analysis 85

Section 4.3.1 Key Space Analysis 86

Section 4.3.2 Statistical Analysis 87

Section 4.3.3 Sensitivity-based Attack 90

Section 4.4 Performance Evaluation 94

Section 4.5 Conclusions 96

CHAPTER 5 IMAGE HIDING 98

Section 5.1 Related Results 98

Section 5.1.1 GA-based Watermarking 99

Section 5.1.2 SVM-based Watermarking 101

Section 5.2 Design Idea 103

Section 5.2.1 Motivation 104

Section 5.2.2 Embedding Strength with SVM 104

Section 5.2.3 Embedding Position with Optimized GA 108

Section 5.3 Algorithm SOGA:Watermarking Based on SVM and Optimized-GA 110

Section 5.3.1 Communication Procedure 110

Section 5.3.2 Embedding Procedure 110

Section 5.3.3 Extracting Procedure 112

Section 5.4 Experimental Results 113

Section 5.4.1 Evaluation Criterion in System Performance 113

Section 5.4.2 Results by Different Iteration Numbers 114

Section 5.4.3 Robustness Against Various Attacks 117

Section 5.5 Conclusions 121

CHAPTER 6 TEMPORAL APPLICATIONS 122

Section 6.1 Formal Characterization of Time-series 122

Section 6.1.1 Why Choosing Temporal 122

Section 6.1.2 Formalize the Characterization of Time-series 124

Section 6.2 Temporal-based Image Cryptosystem 127

Section 6.2.1 Encryption-decryption Process Using Temporal Logic 127

Section 6.2.2 Expand the Key Size 129

Section 6.2.3 Adjust the Images 129

Section 6.2.4 Security Analysis 130

Section 6.3 Temporal-based Image Hiding 136

Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic 137

Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic 138

Section 6.4 Conclusions 149

CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS 150

Section 7.1 Development of RFID Anti-counterfeit Technology 150

Section 7.2 An Anti-counterfeiting Scheme for Agricultural RFID 153

Section 7.3 BMQE for RFID Anti-Counterfeiting 154

Section 7.3.1 Key Generation 155

Section 7.3.2 Encryption Procedure 155

Section 7.3.3 Decryption Procedure 157

Section 7.4 SOGA for RFID Tampering Detection 157

Section 7.5 Conclusions 160

CHAPTER 8 CONCLUSIONS AND FUTURE WORK 161

Section 8.1 Conclusions 161

Section 8.2 Future Work Discussion 163

Reference 165

返回顶部