-
321
Reversible data hiding algorithm in encrypted images based on prediction error and bitplane coding
Published 2023-12-01“…With the increasing use of cloud backup methods for storing important files, the demand for privacy protection has also grown.Reversible data hiding in encrypted images (RDHEI) is an important technology in the field of information security that allows embedding secret information in encrypted images while ensuring error-free extraction of the secret information and lossless recovery of the original plaintext image.This technology not only enhances image security but also enables efficient transmission of sensitive information over networks.Its application in cloud environments for user privacy protection has attracted significant attention from researchers.A reversible data hiding method in encrypted images based on prediction error and bitplane coding was proposed to improve the embedding rate of existing RDHEI algorithms.Different encoding methods were employed by the algorithm depending on the distribution of the bitplanes, resulting in the creation of additional space in the image.The image was rearranged to allocate the freed-up space to the lower-order planes.Following this, a random matrix was generated using a key to encrypt the image, ensuring image security.Finally, the information was embedded into the reserved space.The information can be extracted and the image recovered by the receiver using different keys.The proposed algorithm achieves a higher embedding rate compared to five state-of-the-art RDHEI algorithms.The average embedding rates on BOWS-2, BOSSBase, and UCID datasets are 3.769 bit/pixel, 3.874 bit/pixel, and 3.148 bit/pixel respectively, which represent an improvement of 12.5%, 6.9% and 8.6% compared to the best-performing algorithms in the same category.Experimental results demonstrate that the proposed algorithm effectively utilizes the redundancy of images and significantly improves the embedding rate.…”
Get full text
Article -
322
High speed national secret SM4 optical fiber communication system scheme based on FPGA
Published 2023-12-01“…With the increasing use of optical fiber communication technology in the Industrial Internet of Things, cryptographic algorithms play a crucial role in ensuring the security of data transmission in embedded device environments.The SM4 packet cipher algorithm, developed independently in our country, is widely applied to wireless LAN and Internet of Things data encryption.However, the software-based encryption and decryption processes are relatively slow, which hampers their application in scenarios requiring high real-time performance, especially for embedded devices.To address this issue, a high-performance and secure optical fiber communication system was designed based on the FPGA platform and the SM4 algorithm.The FPGA was used to implement the MAC layer interface for SM4 algorithm encryption and decryption, as well as data transmission.Besides, an optimization scheme for the hardware implementation architecture of the SM4 algorithm was proposed.The critical path was shortened by employing a pipeline method, thereby improving the system clock frequency.Additionally, parallel processing of S-box transformation was accelerated to enable efficient data replacement.To reduce data reading delays, a dual-cache processing method was combined to facilitate easier processing of cache data and significantly reduce packet loss rates.This scheme greatly enhanced system data throughput.Experimental results demonstrate that compared to similar designs, the throughput of the SM4 algorithm encryption and decryption module in this scheme reaches up to 25.6 Gbit/s, with minimal differences in resource consumption.Due to limitations imposed by the 10-gigabit SFP+ optical module, the throughput of the entire optical fiber communication system reaches 9.4 Gbit/s.For 128-bit data, the average encryption speed is 0.47 μs/bit and the average decryption speed is 0.28 μs/bit, which can be applied to a variety of secure communication scenarios in the internet of things.…”
Get full text
Article -
323
Design and performance analysis of dual-mode triple-dimensional index modulation differential chaos shift keying system
Published 2024-06-01“…Given the issues of low transmission rate and poor bit error performance in traditional differential chaos shift keying systems, a dual-mode three-dimensional index modulation differential chaos shift keying (DMTD-IM-DCSK) system was proposed. …”
Get full text
Article -
324
Design of a Vehicle Parking Management Information System in Tanjung Duren Central Park Area West Jakarta
Published 2025-01-01Get full text
Article -
325
Some results on value distribution concerning Hayman's alternative
Published 2025-02-01Get full text
Article -
326
High capacity reversible hiding in encrypted domain based on cipher-feedback secret sharing
Published 2023-09-01“…To improve the security, robustness and embedding rate of reversible hiding in encrypted domain in the distributed environment, a multiple embedding algorithm based on cipher-feedback secret sharing was proposed.Firstly, the additional data were embedded into the polynomial coefficients redundancy generated in the process of secret image sharing.Secondly, the extra secrets were embedded by using the additive homomorphism of secret sharing.Experimental results demonstrate that a better security and robustness has been obtained by improving the diffusion characteristic of secret sharing using the feedback mechanism.In the (3,4) and (3,5) threshold, the embedding rates can reach 6.00 bit per pixel and 4.80 bit per pixel respectively.The proposed algorithm can not only maintain the strong security and separability, but also obtain a better embedding capacity.Meanwhile, the embedding rate of the scheme is not affected by the carrier image and is only related to the selection of algorithm parameters.…”
Get full text
Article -
327
Adaptive Gain and Analog Wavelet Transform for Low-Power Infrared Image Sensors
Published 2012-01-01“…This allows to use only an 11-bit ADC, instead of a 13-bit one, and to save 15% of data transfer. …”
Get full text
Article -
328
Dynamic resource allocation scheme for multiuser OFDM–UWB systems based on user's rate
Published 2012-09-01“…According to original dynamic resource allocation algorithms,a new dynamic resource allocation algorithm for multiuser OFDM-UWB system based on users'rates was proposed to minimize the total transmitting power whil sa-tisfy requests for QoS and data rate of all users.Qual ty of the system was improved running the subcarrier allocation and bit allocation algorithms based on fairness of users.In subcarrier allocation process,rate impact factor was used to com-pare influence of different subcarriers to a user.In allocation process,bits were allocated to each user's subcarriers first,then bits on each subcarriers were adjusted according to rate request of each user.In or to reduce the complexity system of the furthermore,a subcarrier and bit allocation scheme is employed through subcarrier grouping.Simulation results indicate that the algorithm can lower power consume,BER and operation complexity.…”
Get full text
Article -
329
Semi-random and semi-algebraic structural design for IRA-LDPC codes
Published 2014-03-01“…A method of semi-random and semi-algebraic structure was presented for constructing the low-density parity-check matrix that corresponds to the information bits of the IRA codes.Compared with the existing structural LDPC codes,the distinct advantage of the presented compact structural array for information-bit-corresponding matrix is that the position coordinate of each 1 element in this matrix can be calculated by a determinate algebraic expression,which not only reduces the consumption of memory resource for the random parity-check matrix,but also provides the potential probability for designing low complexity hardware circuit of the LDPC encoder/decoder.In addition,compared with the existing practical LDPC codes in industrial standard,the presented IRA-LDPC code is also slight preponderance in the performance of simulation in bit error rate and signal noise ratio (BER-SNB).…”
Get full text
Article -
330
Optimal payload lengths of reliable multicast schemes
Published 2011-01-01“…Using total transmission time-the time needed to guarantee reliable data dissemination——as judgment criterion,the payload length selection problem was investigated for three multicast solutions which are based on simple feedback retransmission,Reed-Solomon codes,and LT fountain codes,respectively,with the consideration of packet overhead.A theoretical analysis method was proposed to determine the optimal payload lengths,which was verified by simulations.Analyses and simulations indicate,for variable packet overhead sizes and link bit error rates,each method considered has its optimal payload length.As link bit error rate increases,the performance gain brought by the selection of optimal pay-load lengths becomes more significant.Among the three solutions,the reliable multicast solution based on LT fountain codes has the most outstanding performance.…”
Get full text
Article -
331
Guess and determine attack on E<sub>0</sub>algorithm
Published 2012-11-01“…A guess and determine attack on E<sub>0</sub>was presented,the stream cipher that was used in the short-range wireless technology Bluetooth.In the attack,an ingenious assumption by linear approximation to diminish the number of values that have to be guessed was made.Futher more,a test equation to reduce the number of the guessed candidates was used.The guess and determine attack on E<sub>0</sub>with time complexity of O(2<sup>76</sup>)required about 988 keystream bit.Compared with long keystream attacks,short keystream attacks were more threatening to E<sub>0</sub>cipher which require less than 2 745 bit.This attack which belongs to short keystream attack was the fastest state recovery attack on E<sub>0</sub>so far compared with any other existed short keystream attacks.…”
Get full text
Article -
332
COMPRESSION OF HIGH DYNAMIC RANGE OF SAR IMAGES
Published 2018-06-01“…It was also concluded that after transformation 16-bit images, it is very difficult to estimate which image is better, and it is necessary to use no-reference image quality assessment measure.…”
Get full text
Article -
333
Design on the full-dimensional reconfiguration polymorphic network switching chip architecture
Published 2023-06-01“…At present, IP network has the problems of rigid structure, poor scalability and poor security.To solve these problems, the concept of polymorphic network has been proposed by researchers and gradually become a research hotspot.The programmable network switching chip is the basis of polymorphic network implementation.Therefore, a full-dimensional reconfigurable polymorphic network switching chip architecture was proposed.Based on eFPGA in the chip, the port-level and bit-level fine-grained reconfigurable polymorphic network was realized.Based on self-designed process element (PE), the coarse-grained reconfigurable network switching engine was realized.Thereby the full-dimensional reconfigurable polymorphic network switching chip was realized and laid the foundation for the data layer of polymorphic network.To improve the network switching performance, an improved bit vector algorithm was proposed, which could realize fast flow table lookup with a smaller resource consumption.The proposed algorithm has showed its practicability in the research.…”
Get full text
Article -
334
A Semi-Stochastic Propagation Model for the Study of Beam Tilting in Cellular Systems
Published 2008-01-01“…Furthermore, the effect of beam tilting on system downlink performance in terms of bit error rate and capacity is investigated.…”
Get full text
Article -
335
Cryptanalysis of hyperchaotic S-box generation and image encryption
Published 2024-12-01“…The dynamic S-boxes have average scores of nonlinearity, strict avalanche criteria(SAC), nonlinearity of Bit Independence Criteria (BIC Nonlinearity), SAC of Bit Independence Criteria (BIC SAC), Linear Approximation Probability (LAP) and Differential Approximation Probability (DAP) is 111.1025, 111.1022, 0.5014, 0.5024, 111.1082, 111.0964, 0.5024, 0.5022, 0.0726, 0.0729 and 0.0214, 0.0219, respectively. …”
Get full text
Article -
336
Measurements of Periodic Signals Phase Shifts with Application of Direct Digital Synthesis
Published 2019-06-01“…The development of new methods and high-bit instruments for measuring phase shifts of high-frequency periodic signals with high speed for radar and radionavigation tasks is an actual task. …”
Get full text
Article -
337
-
338
Design of Network Service Transmission with LDPC Coding in Space Laser Communication
Published 2024-12-01“…【Methods】Based on the LDPC (4 050, 2 700) encoding with a data bit width of 16 bit, this paper designs a gigabit network service transmission method. …”
Get full text
Article -
339
A novel signal detection algorithm of multiple-input multiple-output Vertical-Bell Laboratories Layered Space-Time for underwater acoustic networks based on the improved minimum me...
Published 2020-12-01“…Results indicate that our algorithm maintains bit error ratio and the processing delay to that of maximum likelihood Vertical-Bell Laboratories Layered Space-Time algorithm. …”
Get full text
Article -
340
Multiuser cyclic shift keying spread spectrum underwater acoustic communication
Published 2017-07-01“…Aiming at the problem of low data rate and high receiver complexity of existing direct sequence spread spectrum code division multiple access (DS-CDMA),a novel code division multiple access (CDMA) using cyclic shift keying (CSK) signaling,namely CSK-CDMA,was proposed for multiuser underwater acoustic communication.The proposed method used the cyclic correlation characteristic of spread spectrum signals with M-ary modulation to provide a higher data rate than conventional.Passive time reversal technology was employed to suppress inter-code interference between users and the co-channel interference.The quasi-orthogonality of spread spectrum code was used to improve the processing gain.Multiuser communications are demonstrated with lake experimental recorded data under the condition of 5.27 km distance and complex multipath interference.The data rate is 39 bit/s/user for 6 users with bit error rate around 10<sup>-2</sup>~10<sup>-4</sup>.…”
Get full text
Article