图书介绍
基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用PDF|Epub|txt|kindle电子书版本网盘下载
- 周晓谊著 著
- 出版社: 北京:知识产权出版社
- ISBN:9787513045100
- 出版时间:2017
- 标注页数:180页
- 文件大小:18MB
- 文件页数:194页
- 主题词:信息安全-安全技术-研究-英文;无线射频识别-应用-研究-英文
PDF下载
下载说明
基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用PDF格式电子书版下载
下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!
(文件页数 要大于 标注页数,上中下等多册电子书除外)
注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具
图书目录
CHAPTER 1 INTRODUCTION1
Section 1.1 Motivations:Security Based on Temporal Order2
Section 1.1.1 Formal Characterization of Time-series2
Section 1.1.2 BMQE System3
Section 1.1.3 Temporal Ordered Image Cryptography4
Section 1.1.4 Temporal Ordered Image Hiding5
Section 1.2 Objectives:Information Security Usmg Temporal Theory6
Section 1.3 Outlines of the Main Contributions8
Section 1.4 Book Structure10
CHAPTER 2 LITERATURE REVIEW12
Section 2.1 Temporal Basis12
Section 2.1.1 Point-based Systems12
Section 2.1.2 Interval-based Systems14
Section 2.1.3 A point&Interval-based Theory15
Section 2.1.4 Notion of Time-series18
Section 2.2 Ergodic Matrix22
Section 2.2.1 Finite Fields22
Section 2.2.2 Definitions and Related Theorems of the EM24
Section 2.2.3 Security Analysis of a Question Based on EM27
Section 2.3 Cryptography29
Section 2.3.1 History of Cryptography and Cryptanalysis30
Section 2.3.2 Symmetric Cryptography vs.Asymmetric Cryptography34
Section 2.3.3 Multivariate Quadratic Polynomials37
Section 2.4 Information Hiding41
Section 2.4.1 History of Information Hiding42
Section 2.4.2 Steganography vs.Watermarking46
Section 2.4.3 Data Hiding Technologies in Images48
Section 2.5 Conclusions53
CHAPTER 3 BMQE SYSTEM54
Section 3.1 Important Characteristics of EM for BMQE System54
Section 3.2 BMQE Based on Ergodic Matrix56
Section 3.2.1 BMQE Problem56
Section 3.2.2 BMQE is NP-Complete57
Section 3.3 Cryptanalysis of BMQE59
Section 3.3.1 Methods Used in Solving MQ-problems59
Section 3.3.2 Fixing Variables61
Section 3.3.3 Relinearization64
Section 3.4 Conclusions74
CHAPTER 4 IMAGE CRYPTOGRAPHY75
Section 4.1 Review of Image Cryptography75
Section 4.1.1 Characteristics of Image Cryptography75
Section 4.1.2 Image Cryptography Algorithms77
Section 4.2 Hybrid-key Based Image Cryptography79
Section 4.2.1 Encryption/Decryption and Authentication Process80
Section 4.2.2 Image Confusion82
Section 4.2.3 Image Diffusion84
Section 4.3 Security Analysis85
Section 4.3.1 Key Space Analysis86
Section 4.3.2 Statistical Analysis87
Section 4.3.3 Sensitivity-based Attack90
Section 4.4 Performance Evaluation94
Section 4.5 Conclusions96
CHAPTER 5 IMAGE HIDING98
Section 5.1 Related Results98
Section 5.1.1 GA-based Watermarking99
Section 5.1.2 SVM-based Watermarking101
Section 5.2 Design Idea103
Section 5.2.1 Motivation104
Section 5.2.2 Embedding Strength with SVM104
Section 5.2.3 Embedding Position with Optimized GA108
Section 5.3 Algorithm SOGA:Watermarking Based on SVM and Optimized-GA110
Section 5.3.1 Communication Procedure110
Section 5.3.2 Embedding Procedure110
Section 5.3.3 Extracting Procedure112
Section 5.4 Experimental Results113
Section 5.4.1 Evaluation Criterion in System Performance113
Section 5.4.2 Results by Different Iteration Numbers114
Section 5.4.3 Robustness Against Various Attacks117
Section 5.5 Conclusions121
CHAPTER 6 TEMPORAL APPLICATIONS122
Section 6.1 Formal Characterization of Time-series122
Section 6.1.1 Why Choosing Temporal122
Section 6.1.2 Formalize the Characterization of Time-series124
Section 6.2 Temporal-based Image Cryptosystem127
Section 6.2.1 Encryption-decryption Process Using Temporal Logic127
Section 6.2.2 Expand the Key Size129
Section 6.2.3 Adjust the Images129
Section 6.2.4 Security Analysis130
Section 6.3 Temporal-based Image Hiding136
Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic137
Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic138
Section 6.4 Conclusions149
CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS150
Section 7.1 Development of RFID Anti-counterfeit Technology150
Section 7.2 An Anti-counterfeiting Scheme for Agricultural RFID153
Section 7.3 BMQE for RFID Anti-Counterfeiting154
Section 7.3.1 Key Generation155
Section 7.3.2 Encryption Procedure155
Section 7.3.3 Decryption Procedure157
Section 7.4 SOGA for RFID Tampering Detection157
Section 7.5 Conclusions160
CHAPTER 8 CONCLUSIONS AND FUTURE WORK161
Section 8.1 Conclusions161
Section 8.2 Future Work Discussion163
Reference165