图书 | 基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用 |
内容 | 内容推荐 量子密码和数字水印时近年来信息安全领域的新兴学科。作为靠前靠前部关于基于时态序列和遍历矩阵的信息安全,本书主要包括以下内容:时态序列、遍历矩阵以及加密和隐藏的基础知识,基于遍历矩阵构建多元二次多项式方程组、基于遍历矩阵的图像加密以及在此基础上的图像隐藏算法,并提出了基于时态序列的图像加密和图像水印系统原理及应用。 作者简介 周晓谊,现为海南大学信息科学与技术学院副教授。硕士就读期间,跟随吉林大学计算机学院赵永哲教授研究密码学。后于英国格林尼治大学(UNIVERSITY OFGREENWICH)师从DR.JIXIN MA教授禾日DR.MILTOS PETRIDIS教授攻读博士学位,课题方向为信息安全与人工智能。至今主持或参与项目10余项,在图像处理、信息安全等领域的靠前会议和靠前外期刊发表学术论文20余篇,其中EI收录近10篇。 目录 CHAPTER 1 INTRODUCTION Section 1.1 Motivations: Security Based on Temporal Order Section 1.1.1 Formal Characterization of Time-series Section 1.1.2 BMQE System Section 1.1.3 Temporal Ordered Image Cryptography Section 1.1.4 Temporal Ordered Image Hiding Section 1.2 Objectives: Information Security Using Temporal Theory Section 1.3 Outlines of the Main Contributions Section 1.4 Book Structure CHAPTER 2 LITERATURE REVIEW Section 2.1 Temporal Basis Section 2.1.1 Point-based Systems Section 2.1.2 Interval-based Systems Section 7.1.3 A point & Interval-based Theory Section 2.1.4 Notion of Time-series Section 2.2 Ergodic Matrix Section 2.2.1 Finite Fields Section 2.2.2 Definitions and Related Theorems of the EM Section 2.2.3 Security Analysis of a Question Based on EM Section 2.3 Cryptography Section 2.3.1 History of Cryptography and Cryptanalysis Section 2.3.2 Symmetric Cryptography vs. Asymmetric Cryptography Section 2.3.3 Multivariate Quadratic Polynomials Section 2.4 Information Hiding Section 2.4.1 History of Information Hiding Section 2.4.2 Steganography vs. Watermarking Section 2.4.3 Data Hiding Technologies in Images Section 2.5 Conclusions CHAPTER 3 BMQE SYSTEM Section 3.1 Important Characteristics of EM for BMQE System Section 3.2 BMQE Based on Ergodic Matrix Section 3.2.1 BMQE Problem Section 3.2.2 BMQE is NP-Complete Section 3.3 Cryptanalysis of BMQE Section 3.3.1 Methods Used in Solving MQ-problems Section 3.3.2 Fixing Variables Section 3.3.3 Relinearization Section 3.4 Conclusions CHAPTER 4 IMAGE CRYPTOGRAPHY Section 4.1 Review of Image Cryptography Section 4.1.1 Characteristics of Image Cryptography Section 4.1.2 Image Cryptography Algorithms Section 4.2 Hybrid-key Based Image Cryptography Section 4.2.1 Encryption/Decryption and Authentication Process Section 4.2.2 Image Confusion Section 4.2.3 Image Diffusion Section 4.3 Security Analysis Section 4.3.1 Key Space Analysis Section 4.3.2 Statistical Analysis Section 4.3.3 Sensitivity-based Attack Section 4.4 Performance Evaluation Section 4.5 Conclusions CHAPTER 5 IMAGE HIDING Section 5.1 Related Results Section 5.1.1 GA-based Watermarking Section 5.1.2 SVM-based Watermarking Section 5.2 Design Idea Section 5.2.1 Motivation Section 5.2.2 Embedding Strength with SVM Section 5.2.3 Embedding Position with Optimized GA Section 5.3 Algorithm SOGA: Watermarking Based on SVM and Optimized-GA Section 5.3.1 Communication Procedure Section 5.3.2 Embedding Procedure Section 5.3.3 Extracting Procedure Section 5.4 Experimental Results Section 5.4.1 Evaluation Criterion in System Performance Section 5. d. 2 Results by Different Iteration Numbers Section 5.4.3 Robustness Against Various Attacks Section 5.5 Conclusion CHAPTER 6 TEMPORAL APPLICATIONS Section 6.1 Formal Characterization of Time-series Section 6.1.1 Why Choosing Temporal Section 6.1.2 Formalize the Characterization of Time-series Section 6.2 Temporal-based Image Cryptosystem Section 6.2.1 Eneryption-deeryption Process Using Temporal Logic Section 6.2.2 Expand the Key Size Section 6.2.3 Adjust the Images Section 6.2.4 Security Analysis Section 6.3 Temporal-based Image Hiding Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic Section 6.4 Conclusions CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS Section 7.1 Development of RFID Anti-counterfeit Technology Section 7.2 An Anti.counterfeiting Scheme for Agricultural RFID Section 7.3 BMQE for RFID Anti.Counterfeiting Section 7.3.1 Key Generation Section 7.3.2 Encryption Procedure Section 7.3.3 Decryption Procedure Section 7.4 SOGA for RFID Tampering Detection Section 7.5 Conclusions CHAPTER 8 CONCLUSIONS AND FUTURE WORK Section 8.1 Conclusions Section 8.2 Future Work Discussion Reference |
标签 | |
缩略图 | ![]() |
书名 | 基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用 |
副书名 | |
原作名 | |
作者 | 周晓谊 |
译者 | |
编者 | |
绘者 | |
出版社 | 知识产权出版社 |
商品编码(ISBN) | 9787513045100 |
开本 | 16开 |
页数 | 180 |
版次 | 1 |
装订 | 平装 |
字数 | 188千字 |
出版时间 | 2017-07-01 |
首版时间 | 2017-07-01 |
印刷时间 | 2017-07-01 |
正文语种 | |
读者对象 | |
适用范围 | |
发行范围 | |
发行模式 | 实体书 |
首发网站 | |
连载网址 | |
图书大类 | |
图书小类 | |
重量 | |
CIP核字 | |
中图分类号 | TP309,TP391.4 |
丛书名 | |
印张 | |
印次 | 1 |
出版地 | |
长 | |
宽 | |
高 | |
整理 | |
媒质 | |
用纸 | |
是否注音 | |
影印版本 | |
出版商国别 | |
是否套装 | |
著作权合同登记号 | |
版权提供者 | |
定价 | |
印数 | |
出品方 | |
作品荣誉 | |
主角 | |
配角 | |
其他角色 | |
一句话简介 | |
立意 | |
作品视角 | |
所属系列 | |
文章进度 | |
内容简介 | |
作者简介 | |
目录 | |
文摘 | |
安全警示 | 适度休息有益身心健康,请勿长期沉迷于阅读小说。 |
随便看 |
|
兰台网图书档案馆全面收录古今中外各种图书,详细介绍图书的基本信息及目录、摘要等图书资料。