图书介绍

基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用PDF|Epub|txt|kindle电子书版本网盘下载

基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用
  • 周晓谊著 著
  • 出版社: 北京:知识产权出版社
  • ISBN:9787513045100
  • 出版时间:2017
  • 标注页数:180页
  • 文件大小:18MB
  • 文件页数:194页
  • 主题词:信息安全-安全技术-研究-英文;无线射频识别-应用-研究-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快]温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页直链下载[便捷但速度慢]  [在线试读本书]   [在线获取解压码]

下载说明

基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

CHAPTER 1 INTRODUCTION1

Section 1.1 Motivations:Security Based on Temporal Order2

Section 1.1.1 Formal Characterization of Time-series2

Section 1.1.2 BMQE System3

Section 1.1.3 Temporal Ordered Image Cryptography4

Section 1.1.4 Temporal Ordered Image Hiding5

Section 1.2 Objectives:Information Security Usmg Temporal Theory6

Section 1.3 Outlines of the Main Contributions8

Section 1.4 Book Structure10

CHAPTER 2 LITERATURE REVIEW12

Section 2.1 Temporal Basis12

Section 2.1.1 Point-based Systems12

Section 2.1.2 Interval-based Systems14

Section 2.1.3 A point&Interval-based Theory15

Section 2.1.4 Notion of Time-series18

Section 2.2 Ergodic Matrix22

Section 2.2.1 Finite Fields22

Section 2.2.2 Definitions and Related Theorems of the EM24

Section 2.2.3 Security Analysis of a Question Based on EM27

Section 2.3 Cryptography29

Section 2.3.1 History of Cryptography and Cryptanalysis30

Section 2.3.2 Symmetric Cryptography vs.Asymmetric Cryptography34

Section 2.3.3 Multivariate Quadratic Polynomials37

Section 2.4 Information Hiding41

Section 2.4.1 History of Information Hiding42

Section 2.4.2 Steganography vs.Watermarking46

Section 2.4.3 Data Hiding Technologies in Images48

Section 2.5 Conclusions53

CHAPTER 3 BMQE SYSTEM54

Section 3.1 Important Characteristics of EM for BMQE System54

Section 3.2 BMQE Based on Ergodic Matrix56

Section 3.2.1 BMQE Problem56

Section 3.2.2 BMQE is NP-Complete57

Section 3.3 Cryptanalysis of BMQE59

Section 3.3.1 Methods Used in Solving MQ-problems59

Section 3.3.2 Fixing Variables61

Section 3.3.3 Relinearization64

Section 3.4 Conclusions74

CHAPTER 4 IMAGE CRYPTOGRAPHY75

Section 4.1 Review of Image Cryptography75

Section 4.1.1 Characteristics of Image Cryptography75

Section 4.1.2 Image Cryptography Algorithms77

Section 4.2 Hybrid-key Based Image Cryptography79

Section 4.2.1 Encryption/Decryption and Authentication Process80

Section 4.2.2 Image Confusion82

Section 4.2.3 Image Diffusion84

Section 4.3 Security Analysis85

Section 4.3.1 Key Space Analysis86

Section 4.3.2 Statistical Analysis87

Section 4.3.3 Sensitivity-based Attack90

Section 4.4 Performance Evaluation94

Section 4.5 Conclusions96

CHAPTER 5 IMAGE HIDING98

Section 5.1 Related Results98

Section 5.1.1 GA-based Watermarking99

Section 5.1.2 SVM-based Watermarking101

Section 5.2 Design Idea103

Section 5.2.1 Motivation104

Section 5.2.2 Embedding Strength with SVM104

Section 5.2.3 Embedding Position with Optimized GA108

Section 5.3 Algorithm SOGA:Watermarking Based on SVM and Optimized-GA110

Section 5.3.1 Communication Procedure110

Section 5.3.2 Embedding Procedure110

Section 5.3.3 Extracting Procedure112

Section 5.4 Experimental Results113

Section 5.4.1 Evaluation Criterion in System Performance113

Section 5.4.2 Results by Different Iteration Numbers114

Section 5.4.3 Robustness Against Various Attacks117

Section 5.5 Conclusions121

CHAPTER 6 TEMPORAL APPLICATIONS122

Section 6.1 Formal Characterization of Time-series122

Section 6.1.1 Why Choosing Temporal122

Section 6.1.2 Formalize the Characterization of Time-series124

Section 6.2 Temporal-based Image Cryptosystem127

Section 6.2.1 Encryption-decryption Process Using Temporal Logic127

Section 6.2.2 Expand the Key Size129

Section 6.2.3 Adjust the Images129

Section 6.2.4 Security Analysis130

Section 6.3 Temporal-based Image Hiding136

Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic137

Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic138

Section 6.4 Conclusions149

CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS150

Section 7.1 Development of RFID Anti-counterfeit Technology150

Section 7.2 An Anti-counterfeiting Scheme for Agricultural RFID153

Section 7.3 BMQE for RFID Anti-Counterfeiting154

Section 7.3.1 Key Generation155

Section 7.3.2 Encryption Procedure155

Section 7.3.3 Decryption Procedure157

Section 7.4 SOGA for RFID Tampering Detection157

Section 7.5 Conclusions160

CHAPTER 8 CONCLUSIONS AND FUTURE WORK161

Section 8.1 Conclusions161

Section 8.2 Future Work Discussion163

Reference165

热门推荐