The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As it often happens in cryptography, a visual cryptographic method serves as primitive for more evolved file encryption algorithm. During the development and evaluation process of the pixel sieve method, several weaknesses popped out. In the attempt of solving these weaknesses a possibility to transform the method from pixel based graphical cryptographic method to a bit based file cryptographic method...
Researched and developed the software system of Information Management and Decision Support System of the hidden danger troubleshooting of Coal Mine. By using the technology of collaborative software to realize fast circulation of information, dynamic tracking, rapid feedback, and closed-loop management of transaction processing for the hidden danger, and by applying the technology of data mining,...
Nowadays, online social networks host more and more applications in order to provide their users with the possibility of finding everything they need on a single platform. The number and diversity of interactions that take place over time between users and applications within these platforms make these environments very good candidates for learning various types of information about users' interests...
Pixel-value-differencing (PVD) based steganographic methods, which take into account the characteristic of human visual system, usually lead to large embedding capacity and good visual imperceptibility. In this paper, a recently proposed PVD-based steganography is further studied. First, by deriving a sufficient condition for data embedding/extraction, we show that the method can be generalized, and...
The bit-plane complexity segmentation (BPCS) steganography has good visual imperceptibility and high data embedding capacity, but the original BPCS method is vulnerable to the statistical analysis of complexity histogram. A modified BPCS method was proposed to enhance the security, but the deficiency still exists. Basing on the analysis of the original and modified BPCS method, an improved BPCS algorithm...
In recent years, digital watermarking technologies are considered to be important means to protect digital image copyrights. In this paper, we combine a non-invertible watermark scheme with an HVS model adaptive watermark. The application of adaptive watermarks improves visual imperceptibility. However, we find that an adversary is able to apply ambiguity attacks on the non-invertible watermark scheme...
Security in Wireless Sensor Networks (WSNs) is especially challenging and quite different from traditional network security mechanisms. There are two major reasons. Firstly, there are severe constraints on these devices namely their minimal energy, computational and communicational capabilities. Secondly, there is an additional risk of physical attacks such as node capture and tampering. Moreover,...
Recent work by the `CombeChem' project together with the UK National Crystallography Service (NCS) has integrated the NCS into an e-Science environment. The existing high-throughput crystallography facility is enhanced by on-line feedback with the ability to monitor and steer diffraction experiments remotely. Security mechanisms are used to determine authorisation attributes and hence to allow user...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.