CHAPTER 1 INTRODUCTION 1
Section 1.1 Motivations:Security Based on Temporal Order 2
Section 1.1.1 Formal Characterization of Time-series 2
Section 1.1.2 BMQE System 3
Section 1.1.3 Temporal Ordered Image Cryptography 4
Section 1.1.4 Temporal Ordered Image Hiding 5
Section 1.2 Objectives:Information Security Usmg Temporal Theory 6
Section 1.3 Outlines of the Main Contributions 8
Section 1.4 Book Structure 10
CHAPTER 2 LITERATURE REVIEW 12
Section 2.1 Temporal Basis 12
Section 2.1.1 Point-based Systems 12
Section 2.1.2 Interval-based Systems 14
Section 2.1.3 A point&Interval-based Theory 15
Section 2.1.4 Notion of Time-series 18
Section 2.2 Ergodic Matrix 22
Section 2.2.1 Finite Fields 22
Section 2.2.2 Definitions and Related Theorems of the EM 24
Section 2.2.3 Security Analysis of a Question Based on EM 27
Section 2.3 Cryptography 29
Section 2.3.1 History of Cryptography and Cryptanalysis 30
Section 2.3.2 Symmetric Cryptography vs.Asymmetric Cryptography 34
Section 2.3.3 Multivariate Quadratic Polynomials 37
Section 2.4 Information Hiding 41
Section 2.4.1 History of Information Hiding 42
Section 2.4.2 Steganography vs.Watermarking 46
Section 2.4.3 Data Hiding Technologies in Images 48
Section 2.5 Conclusions 53
CHAPTER 3 BMQE SYSTEM 54
Section 3.1 Important Characteristics of EM for BMQE System 54
Section 3.2 BMQE Based on Ergodic Matrix 56
Section 3.2.1 BMQE Problem 56
Section 3.2.2 BMQE is NP-Complete 57
Section 3.3 Cryptanalysis of BMQE 59
Section 3.3.1 Methods Used in Solving MQ-problems 59
Section 3.3.2 Fixing Variables 61
Section 3.3.3 Relinearization 64
Section 3.4 Conclusions 74
CHAPTER 4 IMAGE CRYPTOGRAPHY 75
Section 4.1 Review of Image Cryptography 75
Section 4.1.1 Characteristics of Image Cryptography 75
Section 4.1.2 Image Cryptography Algorithms 77
Section 4.2 Hybrid-key Based Image Cryptography 79
Section 4.2.1 Encryption/Decryption and Authentication Process 80
Section 4.2.2 Image Confusion 82
Section 4.2.3 Image Diffusion 84
Section 4.3 Security Analysis 85
Section 4.3.1 Key Space Analysis 86
Section 4.3.2 Statistical Analysis 87
Section 4.3.3 Sensitivity-based Attack 90
Section 4.4 Performance Evaluation 94
Section 4.5 Conclusions 96
CHAPTER 5 IMAGE HIDING 98
Section 5.1 Related Results 98
Section 5.1.1 GA-based Watermarking 99
Section 5.1.2 SVM-based Watermarking 101
Section 5.2 Design Idea 103
Section 5.2.1 Motivation 104
Section 5.2.2 Embedding Strength with SVM 104
Section 5.2.3 Embedding Position with Optimized GA 108
Section 5.3 Algorithm SOGA:Watermarking Based on SVM and Optimized-GA 110
Section 5.3.1 Communication Procedure 110
Section 5.3.2 Embedding Procedure 110
Section 5.3.3 Extracting Procedure 112
Section 5.4 Experimental Results 113
Section 5.4.1 Evaluation Criterion in System Performance 113
Section 5.4.2 Results by Different Iteration Numbers 114
Section 5.4.3 Robustness Against Various Attacks 117
Section 5.5 Conclusions 121
CHAPTER 6 TEMPORAL APPLICATIONS 122
Section 6.1 Formal Characterization of Time-series 122
Section 6.1.1 Why Choosing Temporal 122
Section 6.1.2 Formalize the Characterization of Time-series 124
Section 6.2 Temporal-based Image Cryptosystem 127
Section 6.2.1 Encryption-decryption Process Using Temporal Logic 127
Section 6.2.2 Expand the Key Size 129
Section 6.2.3 Adjust the Images 129
Section 6.2.4 Security Analysis 130
Section 6.3 Temporal-based Image Hiding 136
Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic 137
Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic 138
Section 6.4 Conclusions 149
CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS 150
Section 7.1 Development of RFID Anti-counterfeit Technology 150
Section 7.2 An Anti-counterfeiting Scheme for Agricultural RFID 153
Section 7.3 BMQE for RFID Anti-Counterfeiting 154
Section 7.3.1 Key Generation 155
Section 7.3.2 Encryption Procedure 155
Section 7.3.3 Decryption Procedure 157
Section 7.4 SOGA for RFID Tampering Detection 157
Section 7.5 Conclusions 160
CHAPTER 8 CONCLUSIONS AND FUTURE WORK 161
Section 8.1 Conclusions 161
Section 8.2 Future Work Discussion 163
Reference 165