Search scope:
排序: Display mode:
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 1, Pages 28-42 doi: 10.1631/FITEE.1400133
Keywords: Storage image security Cryptographic file system Filesystem in userspace (FUSE) Transparent encryption
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Strategic Study of CAE 2004, Volume 6, Issue 10, Pages 32-38
As an expansion of LAN, the WLAN reduce the cost of building a network infrastructure, to enjoy the mobile, high-quality, multimedia services. The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, which is used to protect link-layer communications from eavesdropping and other attacks. Several serious security flaws in this protocol have been discovered and some solutions have been proposed to enhance WEP security. However, it is doubtful whether they can provide enough security as these solutions lack precisely security analysis. In this paper, concrete security analyses of various enhancing mechanisms are given. Results show that these mechanisms indeed increase security and bring significant, provable security gains in WLAN environment. The authors quantify the security as a function of the security of the primitives used, thereby enabling a user to decide how to construct an enhanced mechanism for desired demands.
Keywords: WLAN encryption WEP rekey
Turbidity-adaptive underwater image enhancement method using image fusion
Frontiers of Mechanical Engineering 2022, Volume 17, Issue 3, doi: 10.1007/s11465-021-0669-8
Keywords: turbidity underwater image enhancement image fusion underwater robots visibility
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data Regular Papers
Mukti PADHYA, Devesh C. JINWALA
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 12, Pages 1717-1748 doi: 10.1631/FITEE.1800192
Keywords: Searchable encryption Cloud storage Key-aggregate encryption Data sharing
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion Research Article
Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8, Pages 1169-1180 doi: 10.1631/FITEE.2200498
Keywords: Hidden Markov model Weighted diffusion Balance between usability and privacy Image encryption
Gradient-based compressive image fusion
Yang CHEN,Zheng QIN
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 3, Pages 227-237 doi: 10.1631/FITEE.1400217
Keywords: Compressive sensing (CS) Image fusion Gradient-based image fusion CS-based image fusion
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations Research Article
Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 6, Pages 813-827 doi: 10.1631/FITEE.2200645
Keywords: Compressive sensing Coupled map lattice (CML) DNA operations Semi-tensor product
Edge detection of steel plates at high temperature using image measurement
Qiong Zhou, Qi An
Frontiers of Mechanical Engineering 2009, Volume 4, Issue 1, Pages 77-82 doi: 10.1007/s11465-009-0013-1
Keywords: thermal expansion image measurement edge detection image calibration
Constructing pairing-free certificateless public key encryption with keyword search Research Articles
Yang LU, Ji-guo LI
Frontiers of Information Technology & Electronic Engineering 2019, Volume 20, Issue 8, Pages 1049-1060 doi: 10.1631/FITEE.1700534
Keywords: Searchable public key encryption Certificateless public key encryption with keyword search Bilinear pairing
Efficient hierarchical identity based encryption scheme in the standard model over lattices Article
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Frontiers of Information Technology & Electronic Engineering 2016, Volume 17, Issue 8, Pages 781-791 doi: 10.1631/FITEE.1500219
Keywords: Hierarchical identity based encryption scheme Lattice-based cryptography Standard model Learning with
A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services Research Article
Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com
Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 7, Pages 1045-1061 doi: 10.1631/FITEE.2200372
Keywords: Color medical image Quaternion Adaptive watermarking Encryption Fractional transform Three-dimensional
BORON: an ultra-lightweight and low power encryption design for pervasive computing Article
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 3, Pages 317-331 doi: 10.1631/FITEE.1500415
Keywords: Lightweight cryptography SP network Block cipher Internet of Things (IoT) Encryption Embedded security
Deformable image registration with geometric changes
Yu LIU,Bo ZHU
Frontiers of Information Technology & Electronic Engineering 2015, Volume 16, Issue 10, Pages 829-837 doi: 10.1631/FITEE.1500045
Keywords: Geometric changes Image registration Sparsity Traumatic brain injury (TBI)
A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network Research Articles
Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com
Frontiers of Information Technology & Electronic Engineering 2020, Volume 21, Issue 6, Pages 809-962 doi: 10.1631/FITEE.1900709
Keywords: 分数阶离散系统;神经网络;DNA加密;彩色图像加密
A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models Article
Yueting Yang, Fazhi He, Soonhung Han, Yaqian Liang, Yuan Cheng
Engineering 2021, Volume 7, Issue 6, Pages 787-797 doi: 10.1016/j.eng.2021.03.011
Keywords: Information security Cloud-based design and manufacture Co-design CAD assembly models Attribute-based encryption
Title Author Date Type Operation
ImgFS: a transparent cryptography for stored images using a filesystem in userspace
Osama A. KHASHAN,Abdullah M. ZIN,Elankovan A. SUNDARARAJAN
Journal Article
The Security Analysis for Enhanced Data Encryption Schemes in IEEE802.11/11b WLAN
Song Yubo,Hu Aiqun,Cai Tianyou
Journal Article
MULKASE: a novel approach for key-aggregate searchable encryption formulti-owner data
Mukti PADHYA, Devesh C. JINWALA
Journal Article
TPE-H2MWD: an exact thumbnail preserving encryption scheme with hidden Markov model and weighted diffusion
Xiuli CHAI, Xiuhui CHEN, Yakun MA, Fang ZUO, Zhihua GAN, Yushu ZHANG,chaixiuli@henu.edu.cn,2923105987@qq.com,1060734169@qq.com,zuofang@henu.edu.cn,gzh@henu.edu.cn,yushu@nuaa.edu.cn
Journal Article
A joint image compression and encryption scheme based on a novel coupled map lattice system and DNA operations
Yuanyuan LI, Xiaoqing YOU, Jianquan LU, Jungang LOU,jqluma@seu.edu.cn
Journal Article
Edge detection of steel plates at high temperature using image measurement
Qiong Zhou, Qi An
Journal Article
Constructing pairing-free certificateless public key encryption with keyword search
Yang LU, Ji-guo LI
Journal Article
Efficient hierarchical identity based encryption scheme in the standard model over lattices
Feng-he WANG,Chun-xiao WANG,Zhen-hua LIU
Journal Article
A novel hybrid cryptosystem based on DQFrFT watermarking and 3D-CLM encryption for healthcare services
Fatma KHALLAF, Walid EL-SHAFAI, El-Sayed M. EL-RABAIE, Naglaa F. SOLIMAN, Fathi E. Abd EL-SAMIE,fatma.mohammed333@gmail.com,eng.waled.elshafai@gmail.com,elsayedelrabaie@gmail.com,nfsoliman@pnu.edu.sa,fathi_sayed@yahoo.com
Journal Article
BORON: an ultra-lightweight and low power encryption design for pervasive computing
Gaurav BANSOD,Narayan PISHAROTY,Abhijit PATIL
Journal Article
A novel color image encryption algorithm based on a fractional-order discrete chaotic neural network
Li-ping Chen, Hao Yin, Li-guo Yuan, António M. Lopes, J. A. Tenreiro Machado, Ran-chao Wu,lip_chenhut@126.com
Journal Article