Resource Type

Journal Article 14

Year

2023 2

2022 1

2021 1

2017 3

2014 1

2007 2

2006 1

2001 3

open ︾

Keywords

Adaptive most significant bit (MSB) prediction 1

Adaptive quadtree partitioning 1

Blind image quality assessment 1

CDMA 1

CMA 1

Certificateless aggregate signcryption 1

Certificateless cryptosystem 1

Chamber blasting 1

Channel impulse response 1

Cloud-fog cooperation 1

Cognitive radio network 1

Data hiding 1

Deep learning 1

Eddy current field 1

Elliptic curve 1

Encrypted image 1

High embedding capacity 1

Hybrid signcryption 1

Image recovery 1

open ︾

Search scope:

排序: Display mode:

Post-quantum blind signcryption scheme from lattice Research Articles

Huifang Yu, Lu Bai,yuhuifang@xupt.edu.cn

Frontiers of Information Technology & Electronic Engineering 2021, Volume 22, Issue 6,   Pages 891-901 doi: 10.1631/FITEE.2000099

Abstract: (BSC) can guarantee the blindness and untrackability of signcrypted messages, and moreover, it provides simultaneous unforgeability and confidentiality. Most traditional BSC schemes are based on the number theory. However, with the rapid development of quantum computing, traditional BSC systems are faced with severe security threats. As promising candidate cryptosystems with the ability to resist attacks from quantum computing, s have attracted increasing attention in academic fields. In this paper, a post-quantum scheme from lattice (PQ-LBSCS) is devised by applying BSC to s. PQ-LBSCS inherits the advantages of the and technique. PQ-LBSCS is provably secure under the hard assumptions of the learning with error problem and small integer solution problem in the standard model. Simulations are carried out using the Matlab tool to analyze the computational efficiency, and the simulation results show that PQ-LBSCS is more efficient than previous schemes. PQ-LBSCS has extensive application prospects in e-commerce, mobile communication, and smart cards.

Keywords: 格密码系统;盲签密;抗量子计算;带错误学习问题;最短向量问题    

High-payload completely reversible data hiding in encrypted images by an interpolation technique Article

Di XIAO, Ying WANG, Tao XIANG, Sen BAI

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 11,   Pages 1732-1743 doi: 10.1631/FITEE.1601067

Abstract: We present a new high-payload joint reversible data-hiding scheme for encrypted images. Instead of embedding data in the encrypted image directly, the content owner first uses an interpolation technique to estimate whether the location can be used for embedding and generates a location map before encryption. Next, the data hider embeds the additional data through flipping the most significant bits (MSBs) of the encrypted image according to the location map. At the receiver side, before extracting the additional data and reconstructing the image, the receiver decrypts the image first. Experimental results demonstrate that the proposed method can achieve real reversibility, which means data extraction and image recovery are free of error. Moreover, our scheme can embed more payloads than most existing reversible data hiding schemes in encrypted images.

Keywords: Encrypted image     Data hiding     Image recovery     Real reversibility     Interpolation    

Low-computation certificateless hybrid signcryption scheme Article

Hui-fang YU, Bo YANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 7,   Pages 928-940 doi: 10.1631/FITEE.1601054

Abstract: Hybrid signcryption is an important technique signcrypting bulk data using symmetric encryption. In this paper, we apply the technique of certificateless hybrid signcryption to an elliptic-curve cryptosystem, and construct a low-computation certificateless hybrid signcryption scheme. In the random oracle model, this scheme is proven to have indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the elliptic-curve computation Diffie-Hellman assumption. Also, it has a strong existential unforgeability against adaptive chosen-message attacks (sUF-CMA) under the elliptic-curve discrete logarithm assumption. Analysis shows that the cryptographic algorithm does not rely on pairing operations and is much more efficient than other algorithms. In addition, it suits well to applications in environments where resources are constrained, such as wireless sensor networks and ad hoc networks.

Keywords: Hybrid signcryption     Scalar multiplication     Certificateless cryptosystem     Provable security    

Blind Multi-user Detection Based on Simplified LSCMA in STBC Coded MC-CDMA Systems

Xiong Yilan,Li Guangzeng

Strategic Study of CAE 2007, Volume 9, Issue 5,   Pages 42-45

Abstract:

Utilizing the orthogonal feature of space time block coding ( STBC) ,  a simple and feasible algorithm based on constant modulus (CM) criterion is proposed for blind multi-user detection in STBC MC - CDMA systems. The algorithm proposed in the paper as a simplified version of the algorithm based on the least square constant modulus algorithm(LSCMA) has the advantage of half taps and therefore considerable reduced computation at the cost of a certain loss in performance.

Keywords: space time block code     MC-CDMA     constant modulus algorithm     blind multi_user detection    

DE-CMA:An Improved Blind Equalization Algorithm Used in3G Connection Systems

Wang Ji,Hu Aiqun,Song Yubo

Strategic Study of CAE 2007, Volume 9, Issue 2,   Pages 54-57

Abstract:

The convergence of the Constant-modulus algorithm widely used in DVB system is a complex problem.Firstly,some influencing factors such as cost function,iterative equation and filter coefficients are considered;then,in this paper,an ameliorative algorithm with time-delay estimate is proposed,which can avoid converging to the ill solution by correcting the position of main path.Simulation results demonstrate the proposed algorithm can highly improve the convergence performance of the primary one.Besides,its simplicity and efficiency make it feasible in the high-rate 3G connection application.

Keywords: blind equalization     CMA     ill-convergence     time-delay-estimate    

Amultimodal dense convolution network for blind image quality assessment Research Article

Nandhini CHOCKALINGAM, Brindha MURUGAN

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 11,   Pages 1601-1615 doi: 10.1631/FITEE.2200534

Abstract: Technological advancements continue to expand the communications industry’s potential. Images, which are an important component in strengthening communication, are widely available. Therefore, image quality assessment (IQA) is critical in improving content delivered to end users. Convolutional neural networks (CNNs) used in IQA face two common challenges. One issue is that these methods fail to provide the best representation of the image. The other issue is that the models have a large number of parameters, which easily leads to overfitting. To address these issues, the dense convolution network (DSC-Net), a model with fewer parameters, is proposed for . Moreover, it is obvious that the use of multimodal data for has improved the performance of applications. As a result, fuses the texture features extracted using the gray-level co-occurrence matrix (GLCM) method and spatial features extracted using DSC-Net and predicts the image quality. The performance of the proposed framework on the benchmark synthetic datasets LIVE, TID2013, and KADID-10k demonstrates that the MDSC-Net approach achieves good performance over state-of-the-art methods for the NR-IQA task.

Keywords: No-reference image quality assessment (NR-IQA)     Blind image quality assessment     Multimodal dense convolution network (MDSC-Net)     Deep learning     Visual quality     Perceptual quality    

Feasibility study of the transient electromagnetic method for chamber blasting misfire detection and recognition

Liu Liansheng,Liang Longhua,Wu Jiyang, Jiao Yongbin,Lu Zhexiang

Strategic Study of CAE 2014, Volume 16, Issue 11,   Pages 107-112

Abstract:

Application of transient electromagnetic method, carries on the cavern blasting blind detection and recognition of feasibility study. Test to establish the electromagnetic background field, and then in the cavern preset benign conductor and measured after eliminating the background field, in the electromagnetic field transient to do the electromagnetic measurement again after blasting. Benign comparison before and after blasting preset the change of the conductive body eddy current field, realizes the cavern blasting blind shot detection and identification of purpose. The test results show that the target when the aluminum box buried depth of no more than 30 m, transient electromagnetic method can clearly identify the position of the aluminum box; When the aluminum box buried depth after more than 30 m, aluminum box formation of the secondary vortex field level, not sure the deep buried depth and position of the aluminum box.

Keywords: Transient electromagnetic methods     Chamber blasting     Misfire detection and identification     Eddy current field     Target。    

High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction Research Article

Kaili QI, Minqing ZHANG, Fuqiang DI, Yongjun KONG,1804480181@qq.com

Frontiers of Information Technology & Electronic Engineering 2023, Volume 24, Issue 8,   Pages 1156-1168 doi: 10.1631/FITEE.2200501

Abstract: To improve the embedding capacity of , a new RDH-EI scheme is proposed based on and most significant bit (MSB) prediction. First, according to the smoothness of the image, the image is partitioned into blocks based on , and then blocks of different sizes are encrypted and scrambled at the block level to resist the analysis of the encrypted images. In the data embedding stage, the adaptive MSB prediction method proposed by Wang and He (2022) is improved by taking the upper-left pixel in the block as the target pixel, to predict other pixels to free up more embedding space. To the best of our knowledge, quadtree partitioning is first applied to RDH-EI. Simulation results show that the proposed method is reversible and separable, and that its average embedding capacity is improved. For gray images with a size of 512×512, the average embedding capacity is increased by 25 565 bits. For all smooth images with improved embedding capacity, the average embedding capacity is increased by about 35 530 bits.

Keywords: Adaptive quadtree partitioning     Adaptive most significant bit (MSB) prediction     Reversible data hiding in encrypted images (RDH-EI)     High embedding capacity    

Space-frequency Joint Blind Multi-user Detection Algorithm in Smart Antenna MC-CDMA System

Fu Hongliang,Feng Guangzeng

Strategic Study of CAE 2006, Volume 8, Issue 2,   Pages 34-38

Abstract:

A space-frequency joint blind multi-user adaptive detection algorithm in smart antenna MC-CDMA system is proposed in this paper. It combines the receiving beam-forming in space-domain with combinational detection in frequency-domain and optimizes the detector simultaneously in two dimensions. It can enhance the performance of detection of the system. The bit error probability of the proposed algorithm is also analyzed in this paper. The proposed algorithm is simulated and compared with the two-step algorithm in which the adaptive beam-forming is used first and then the combination in frequency-domain is carried out. Simulation results show that the proposed algorithm is superior to the latter.

Keywords: smart antenna     multi-carrier     CDMA     joint detection    

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Strategic Study of CAE 2001, Volume 3, Issue 6,   Pages 75-80

Abstract:

In this paper, it is pointed out that the block cipher proposed in “Design of Block Cipher substitution network on chaos” can be broken by attack with known plaintext and attack with ciphertext only, and the key of this cipher can be found by the divide-and-conquer attack with the encipher transformation. Furthermore, the mutual restriction between the successive values of the chaos sequences based on the Logistic mapping, and the property that the frontal values of the chaos sequences are not sensitive to the bits on the lower po-sitions of the initial value are also pointed out.

Keywords: chaos sequence     block cipher     transposition cipher     attack with known plaintext     attack with ciphertext only     divide-and-conquer attack    

A power resource dispatching framework with a privacy protection function in the Power Internet of Things Research Article

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Frontiers of Information Technology & Electronic Engineering 2022, Volume 23, Issue 9,   Pages 1354-1368 doi: 10.1631/FITEE.2100518

Abstract: Smart meters in the generate a large amount of power data. However, data privacy in the process of calculation, storage, and transmission is an urgent problem to be solved. Therefore, in this paper we propose a power resource dispatching framework (PRDF) with a privacy protection function, which uses a scheme based on . Using pseudonyms and aggregating users’ power data, PRDF not only protects users’ privacy, but also reduces the computing cost and communication overhead under traditional cloud computing. In addition, if the control center finds that a user has submitted abnormal data, it can send a request to the user management center to track the real identity of the user. Our scheme satisfies security requirements based on the , including confidentiality and unforgeability. Furthermore, we compare our scheme with other schemes by simulations. Simulation results show that compared with traditional methods, our method performs better in terms of the computation cost.

Keywords: Power Internet of Things     Cloud-fog cooperation     Elliptic curve     Random oracle model     Certificateless aggregate signcryption    

Study on Intelligent Decision - making Support System for Water Saving Irrigation Management

Wang Zhinong,Lü Hongxing,Wang Mixia,Xiong Yunzhang,Ma Xiaoyi

Strategic Study of CAE 2001, Volume 3, Issue 7,   Pages 48-53

Abstract:

By using the techniques of expert system of artificial intelligence, three different water saving irrigation management decision-making support systems have been developed and integrated, namely Irrigation forecast and decision making of water saving irrigation, planning water use and water distribution in an irrigation district, and management system reform in irrigation district. Meanwhile, the theoretic basis, systems structures and practica applications and the crop drought decision making in Shanxi Province are introduced. The research, development, spread and application of water saving irrigation management intelligent decision-making support system will promote the transfer of the traditional agriculture to modern one, and open a new way for sending the high and advanced agricultural technology to hundreds of millions of farmers.

Keywords: irrigation forecast     water saving irrigation     irrigation management     intelligent decision-making support system    

The Discussion and Research on the Technologies of Afforestation and Salt Draining Engineering in Coastal Wasteland

Zhang Wanjun,Guo Yuwen,Wang Doutian,Zhang Minsheng,Huang Mingyong

Strategic Study of CAE 2001, Volume 3, Issue 5,   Pages 79-85

Abstract:

Considering the conditions that TEDA used to be hungriness area without vegetation and without agriculture, forestry, livestock farming, etc. , to rely on, the new conception “allowable depth”, established in coastal area of TEDA with shallow groundwater and silt soft foundation, and the new techniques on water drainage by “shallow-dense type” underground level pipes were introduced. Technical constituent, advantage and implementation of the new techniques were discussed. From the view of sustainable development of afforestation ,technical measures for comprehensive tackling and control of the wilderness areas such as salt affected soils and their application in practice were introduced.

Keywords: saltern     shallow groundwater and silt soft foundation     level underground pipe draining     critical depth     allowable depth     shallow-dense type    

On detecting primary user emulation attack using channel impulse response in the cognitive radio network Article

Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG

Frontiers of Information Technology & Electronic Engineering 2017, Volume 18, Issue 10,   Pages 1665-1676 doi: 10.1631/FITEE.1700203

Abstract: Cognitive radio is an effective technology to alleviate the spectrum resource scarcity problem by opportunistically allocating the spare spectrum to unauthorized users. However, a serious denial-of-service (DoS) attack, named the ‘primary user emulation attack (PUEA)’, exists in the network to deteriorate the system performance. In this paper, we propose a PUEA detection method that exploits the radio channel information to detect the PUEA in the cognitive radio network. In the proposed method, the uniqueness of the channel impulse response (CIR) between the secondary user (SU) and the signal source is used to determine whether the received signal is transmitted by the primary user (PU) or the primary user emulator (PUE). The closed-form expressions for the false-alarm probability and the detection probability of the proposed PUEA detection method are derived. In addition, a modified subspace-based blind channel estimation method is presented to estimate the CIR, in order for the proposed PUEA detection method to work in the scenario where the SU has no prior knowledge about the structure and content of the PU signal. Numerical results show that the proposed PUEA detection method performs well although the difference in channel characteristics between the PU and PUE is small.

Keywords: Cognitive radio network     Primary user emulation attack     Subspace-based blind channel estimation     Channel impulse response    

Title Author Date Type Operation

Post-quantum blind signcryption scheme from lattice

Huifang Yu, Lu Bai,yuhuifang@xupt.edu.cn

Journal Article

High-payload completely reversible data hiding in encrypted images by an interpolation technique

Di XIAO, Ying WANG, Tao XIANG, Sen BAI

Journal Article

Low-computation certificateless hybrid signcryption scheme

Hui-fang YU, Bo YANG

Journal Article

Blind Multi-user Detection Based on Simplified LSCMA in STBC Coded MC-CDMA Systems

Xiong Yilan,Li Guangzeng

Journal Article

DE-CMA:An Improved Blind Equalization Algorithm Used in3G Connection Systems

Wang Ji,Hu Aiqun,Song Yubo

Journal Article

Amultimodal dense convolution network for blind image quality assessment

Nandhini CHOCKALINGAM, Brindha MURUGAN

Journal Article

Feasibility study of the transient electromagnetic method for chamber blasting misfire detection and recognition

Liu Liansheng,Liang Longhua,Wu Jiyang, Jiao Yongbin,Lu Zhexiang

Journal Article

High capacity reversible data hiding in encrypted images based on adaptive quadtree partitioning and MSB prediction

Kaili QI, Minqing ZHANG, Fuqiang DI, Yongjun KONG,1804480181@qq.com

Journal Article

Space-frequency Joint Blind Multi-user Detection Algorithm in Smart Antenna MC-CDMA System

Fu Hongliang,Feng Guangzeng

Journal Article

Analysis of A Block Cipher Based on Chaos

Jin Chenhui

Journal Article

A power resource dispatching framework with a privacy protection function in the Power Internet of Things

Shuanggen LIU, Shuangzi ZHENG, Wenbo ZHANG, Runsheng FU

Journal Article

Study on Intelligent Decision - making Support System for Water Saving Irrigation Management

Wang Zhinong,Lü Hongxing,Wang Mixia,Xiong Yunzhang,Ma Xiaoyi

Journal Article

The Discussion and Research on the Technologies of Afforestation and Salt Draining Engineering in Coastal Wasteland

Zhang Wanjun,Guo Yuwen,Wang Doutian,Zhang Minsheng,Huang Mingyong

Journal Article

On detecting primary user emulation attack using channel impulse response in the cognitive radio network

Qiao-mu JIANG, Hui-fang CHEN, Lei XIE, Kuang WANG

Journal Article