Resource Type

Journal Article 145

Year

2023 12

2022 23

2021 8

2020 16

2019 16

2018 13

2017 10

2016 8

2015 6

2014 3

2013 1

2012 4

2011 3

2009 2

2008 2

2007 4

2006 4

2005 1

2004 3

2003 2

open ︾

Keywords

digital image correlation 7

Deep learning 4

Encryption 4

Attribute-based encryption 3

Cloud storage 3

Access control 2

Block cipher 2

Compressive sensing 2

Dictionary learning 2

Embedded security 2

Ensemble learning 2

Feature extraction 2

High-speed railway 2

Hypervelocity impact 2

Image segmentation 2

deep learning 2

heavy oil 2

3D imaging 1

3D printing 1

open ︾

Search scope:

排序: Display mode:

ImgFS: a transparent cryptography for stored images using a filesystem in userspace

Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1,   Pages 28-42 doi: 10.1631/FITEE.1400133

Abstract: Real-time encryption and decryption of digital images stored on end-user devices is a challenging taskTo overcome these limitations, the concept of transparent encryption has been proposed.This type of encryption mechanism can be implemented most efficiently with kernel file systems.operations for image files stored on the local disk without any interaction from the user.Experiments were carried out to measure the performance of ImgFS over image files’ read and write against

Keywords: Storage image security     Cryptographic file system     Filesystem in userspace (FUSE)     Transparent encryption    

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Strategic Study of CAE 2004, Volume 6, Issue 10,   Pages 32-38

Abstract:

As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.

Keywords: WLAN     encryption     WEP     rekey    

Turbidity-adaptive underwater image enhancement method using image fusion

Frontiers of Mechanical Engineering 2022, Volume 17, Issue 3, doi: 10.1007/s11465-021-0669-8

Abstract: In this paper, we propose a turbidity-adaptive underwater image enhancement method.Based on the detection result, different image enhancement strategies are designed to deal with the problemThe proposed method is verified by an underwater image dataset captured in real underwater environmentThe result is evaluated by image metrics including structure similarity index measure, underwater colorimage quality evaluation metric, and speeded-up robust features.

Keywords: turbidity     underwater image enhancement     image fusion     underwater robots     visibility    

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers

Mukti PADHYA, Devesh C. JINWALA

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12,   Pages 1717-1748 doi: 10.1631/FITEE.1800192

Abstract: Recent attempts at key-aggregate searchable encryption (KASE) combine the advantages of searching encrypted

Keywords: Searchable encryption     Cloud storage     Key-aggregate encryption     Data sharing    

TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion Research Article

Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1169-1180 doi: 10.1631/FITEE.2200498

Abstract: With the substantial increase in image transmission, the demand for image security is increasing.Noise-like images can be obtained by conventional encryption schemes, and although the security of theIn this paper, we introduce an efficient exact thumbnail preserving encryption scheme.First, blocking and bit-plane decomposition operations are performed on the plaintext image.difference in bit weights in each bit plane, a bit-level rule is established to generate an encrypted image

Keywords: Hidden Markov model     Weighted diffusion     Balance between usability and privacy     Image encryption    

Gradient-based compressive image fusion

Yang CHEN,Zheng QIN

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 3,   Pages 227-237 doi: 10.1631/FITEE.1400217

Abstract: We present a novel image fusion scheme based on gradient and scrambled block Hadamard ensemble (SBHE)In the fusion phase, the image gradient is calculated to reflect the abundance of its contour informationBy compositing the gradient of each image, gradient-based weights are obtained, with which compressiveFinally, inverse transformation is applied to the coefficients derived from fusion, and the fused imageIn addition, different image fusion application scenarios are applied to explore the scenario adaptability

Keywords: Compressive sensing (CS)     Image fusion     Gradient-based image fusion     CS-based image fusion    

A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations Research Article

Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6,   Pages 813-827 doi: 10.1631/FITEE.2200645

Abstract: In this paper, an efficient image encryption scheme based on a novel mixed linear–nonlinear coupled mapencryption.Our image cryptosystem adopts the architecture of scrambling, compression, and diffusion.An SHA-384 function is used to produce plaintext secret keys and thus makes the proposed encryption algorithmhighly sensitive to the original image.

Keywords: Compressive sensing     Coupled map lattice (CML)     DNA operations     Semi-tensor product    

Edge detection of steel plates at high temperature using image measurement

Qiong Zhou, Qi An

Frontiers of Mechanical Engineering 2009, Volume 4, Issue 1,   Pages 77-82 doi: 10.1007/s11465-009-0013-1

Abstract: An edge detection method for the measurement of steel plate’s thermal expansion is proposed in this paper, where the shrinkage of a steel plate is measured when temperature drops. First, images are picked up by an imaging system; a method of regional edge detection based on grayscales’ sudden change is then applied to detect the edges of the steel plate; finally, pixel coordinates of the edge position are transformed to physical coordinates through calibration parameters. The experiment shows that the real-time, high precision, and non-contact measurement of the steel plate’s edge position under high temperature can be realized using the imaging measurement method established in this paper.

Keywords: thermal expansion     image measurement     edge detection     image calibration    

Constructing pairing-free certificateless public key encryption with keyword search Research Articles

Yang LU, Ji-guo LI

Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8,   Pages 1049-1060 doi: 10.1631/FITEE.1700534

Abstract: Searchable public key encryption enables a storage server to retrieve the publicly encrypted data withoutMotivated by the appealing features of CLC, three certificateless encryption with keyword search (CLEKS

Keywords: Searchable public key encryption     Certificateless public key encryption with keyword search     Bilinear pairing    

Efficient hierarchical identity based encryption scheme in the standard model over lattices Article

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8,   Pages 781-791 doi: 10.1631/FITEE.1500219

Abstract: delegation in a fixed dimension, we propose an efficient lattice-based hierarchical identity based encryptionTo reduce the message-ciphertext expansion factor of the proposed scheme to log , the encryption algorithmof this scheme is built based on Gentry’s encryption scheme, by which m bits of plaintext are encryptedinto m log q bits of ciphertext by a one time encryption operation.

Keywords: Hierarchical identity based encryption scheme     Lattice-based cryptography     Standard model     Learning with    

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article

Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7,   Pages 1045-1061 doi: 10.1631/FITEE.2200372

Abstract: vision system’s (HVS) masking qualities of edge, texture, and color tone immediately from the color host image

Keywords: Color medical image     Quaternion     Adaptive watermarking     Encryption     Fractional transform     Three-dimensional    

BORON: an ultra-lightweight and low power encryption design for pervasive computing Article

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3,   Pages 317-331 doi: 10.1631/FITEE.1500415

Abstract: We propose an ultra-lightweight, compact, and low power block cipher BORON. BORON is a substitution and permutation based network, which operates on a 64-bit plain text and supports a key length of 128/80 bits. BORON has a compact structure which requires 1939 gate equivalents (GEs) for a 128-bit key and 1626 GEs for an 80-bit key. The BORON cipher includes shift operators, round permutation layers, and XOR operations. Its unique design helps generate a large number of active S-boxes in fewer rounds, which thwarts the linear and differential attacks on the cipher. BORON shows good performance on both hardware and software platforms. BORON consumes less power as compared to the lightweight cipher LED and it has a higher throughput as compared to other existing SP network ciphers. We also present the security analysis of BORON and its performance as an ultra-lightweight compact cipher. BORON is a well-suited cipher design for applications where both a small footprint area and low power dissipation play a crucial role.

Keywords: Lightweight cryptography     SP network     Block cipher     Internet of Things (IoT)     Encryption     Embedded security    

Deformable image registration with geometric changes

Yu LIU,Bo ZHU

Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 10,   Pages 829-837 doi: 10.1631/FITEE.1500045

Abstract: Geometric changes present a number of difficulties in deformable image registration.developed an innovative model which significantly reduces the side effects of geometric changes in imageWe show that the transformation estimated from our model is able to reconstruct the target image with

Keywords: Geometric changes     Image registration     Sparsity     Traumatic brain injury (TBI)    

A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network Research Articles

Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com

Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6,   Pages 809-962 doi: 10.1631/FITEE.1900709

Abstract: obtained with the secret key generated by a five-parameter external key and a hash code of the plain imageThis ensures a large secret key space and improves the algorithm sensitivity to the plain image.DNA encoding and diffusion are used to diffuse the image information.Finally, confusion II and XOR are used to ensure the security of the encryption.

Keywords: 分数阶离散系统;神经网络;DNA加密;彩色图像加密    

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Engineering 2021, Volume 7, Issue 6,   Pages 787-797 doi: 10.1016/j.eng.2021.03.011

Abstract: This paper presents a novel attribute-based encryption (ABE) approach for computer-aided design (CAD)The proposed encryption scheme is demonstrated to be secure under the standard assumption.

Keywords: Information security     Cloud-based design and manufacture     Co-design     CAD assembly models     Attribute-based encryption    

Title Author Date Type Operation

ImgFS: a transparent cryptography for stored images using a filesystem in userspace

Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN

Journal Article

The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN

Song Yubo,Hu Aiqun,Cai Tianyou

Journal Article

Turbidity-adaptive underwater image enhancement method using image fusion

Journal Article

MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data

Mukti PADHYA, Devesh C. JINWALA

Journal Article

TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion

Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn

Journal Article

Gradient-based compressive image fusion

Yang CHEN,Zheng QIN

Journal Article

A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations

Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn

Journal Article

Edge detection of steel plates at high temperature using image measurement

Qiong Zhou, Qi An

Journal Article

Constructing pairing-free certificateless public key encryption with keyword search

Yang LU, Ji-guo LI

Journal Article

Efficient hierarchical identity based encryption scheme in the standard model over lattices

Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU

Journal Article

A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services

Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com

Journal Article

BORON: an ultra-lightweight and low power encryption design for pervasive computing

Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL

Journal Article

Deformable image registration with geometric changes

Yu LIU,Bo ZHU

Journal Article

A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network

Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com

Journal Article

A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng

Journal Article