Query:
学者姓名:蔡永泉
Refining:
Year
Type
Indexed by
Source
Complex
Co-Author
Language
Clean All
Abstract :
Steganography is a fundamental and foremost approach that is used to ensure confidentiality of secret data. It is an art, which ensures invisible communication by concealing secret information in cover media through scientific techniques. The text steganography has a great challenge of security, robustness and size of stego text. In current studies, an improved, lightweight, secure, robust and size efficient technique is proposed for text steganography that also enhances the performance of existing approaches. To achieve the objectives, algorithm applies a conditional bit-complement function on binary value of confidential information. Moreover, start and end bits are also inserted during embedding secret information in cover text and confirms the integrity and confidentiality of secret data. Experimental results revealed that projected approach is more robust and secure without any stego key overhead. Furthermore, it has successfully achieved a size efficient stego text. Therefore, the secret information exhibits harder to track © 2019 IEEE.
Keyword :
Steganography Steganography Cryptography Cryptography
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar et al. A secure and size efficient approach to enhance the performance of text steganographic algorithm [C] . 2019 : 402-407 . |
MLA | Azeem, Muhammad et al. "A secure and size efficient approach to enhance the performance of text steganographic algorithm" . (2019) : 402-407 . |
APA | Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar , Shaukat, Zeeshan , Ditta, Allah . A secure and size efficient approach to enhance the performance of text steganographic algorithm . (2019) : 402-407 . |
Export to | NoteExpress RIS BibTex |
Abstract :
The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large, and the policy attribute revocation or restore is not flexible. This paper proposes an efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage system. The fine-grained access control can be achieved by re-encryption mechanism which takes the minimum shared re-encryption key for policy attribute set. And then the access structure tree is expanded by creating a corresponding virtual attribute for each leaf node attribute. The analysis results of the scheme indicate that the efficient and flexibility of the attribute change is not only improved, but also the system cost is reduced. Copyright © 2019 Inderscience Enterprises Ltd.
Keyword :
Access control Access control Cost benefit analysis Cost benefit analysis Cryptography Cryptography
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Ye, Tao , Cai, Yongquan , Zhao, Xu et al. An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems [J]. | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) : 41-49 . |
MLA | Ye, Tao et al. "An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems" . | International Journal of Wireless and Mobile Computing 16 . 1 (2019) : 41-49 . |
APA | Ye, Tao , Cai, Yongquan , Zhao, Xu , Yang, Yongli , Wang, Wei , Zhu, Yi . An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems . | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) , 41-49 . |
Export to | NoteExpress RIS BibTex |
Abstract :
As an essential component of cloud computing, cloud storage provides flexible data storage services for individuals and organizations. By storing multiple replicas of data in servers, cloud storage providers (CSPs) can improve availability and stability of the cloud storage service. To ensure that all data replicas of a cloud user are intact and completely stored in the CSP, many multi-replica cloud auditing schemes have been proposed. However, such schemes are predominantly based on the public key infrastructure (PKI), which incurs complex certificate management. In addition, existing schemes do not consider support for sector-level dynamic auditing. In this paper, we propose a fine-grained dynamic multi-replica data auditing scheme that has the following features: (1) it uses ID-based cryptography to eliminate the cost of certificate management, (2) it supports efficient sector-level dynamic operations on cloud user data, and (3) it optimizes the challenge algorithm to reduce the computational cost of the third party auditor (TPA). We show that the proposed scheme is provably secure based on a random oracle model. The performance analysis and experiments show the efficiency of the proposed scheme.
Keyword :
dynamic operation dynamic operation ID-based cryptography ID-based cryptography replicated data auditing replicated data auditing data integrity data integrity
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. et al. ID-based dynamic replicated data auditing for the cloud [J]. | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) . |
MLA | Yu, Haiyang et al. "ID-based dynamic replicated data auditing for the cloud" . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 31 . 11 (2019) . |
APA | Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. , Yang, Zhen . ID-based dynamic replicated data auditing for the cloud . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) . |
Export to | NoteExpress RIS BibTex |
Abstract :
More and more people become conscious of the recommendation system to make good use of the data through their inherent advantages faced with the large amount of data on the Internet. The collaborative filtering recommendation algorithm cannot avoid the bottleneck of computing performance problems in the recommendation process. In this paper, we propose a parallel collaborative filtering recommendation algorithm RLPSO-KM-CF which is implemented based on Spark. Firstly, the RLPSO (reverse-learning and local-learning PSO) algorithm is used to find the optimal solution of particle swarm and output the optimised clustering centre. Then, the RLPSO-KM algorithm is used to cluster the user information. Finally, make effective recommendations to the target user by combining the traditional user-based collaborative filtering algorithm with the RLPSO-KM clustering algorithm. The experimental results show that the RLPSO-KM-CF algorithm has a significant improvement in the recommendation accuracy and has a higher speed-up and stability. Copyright © 2018 Inderscience Enterprises Ltd.
Keyword :
Particle swarm optimization (PSO) Particle swarm optimization (PSO) Electric sparks Electric sparks Collaborative filtering Collaborative filtering K-means clustering K-means clustering
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Yang, Yongli , Ning, Zhenhu , Cai, Yongquan et al. Research on parallelisation of collaborative filtering recommendation algorithm based on Spark [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (4) : 312-319 . |
MLA | Yang, Yongli et al. "Research on parallelisation of collaborative filtering recommendation algorithm based on Spark" . | International Journal of Wireless and Mobile Computing 14 . 4 (2018) : 312-319 . |
APA | Yang, Yongli , Ning, Zhenhu , Cai, Yongquan , Liang, Peng , Liu, Haifeng . Research on parallelisation of collaborative filtering recommendation algorithm based on Spark . | International Journal of Wireless and Mobile Computing , 2018 , 14 (4) , 312-319 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.
Keyword :
Authentication Authentication Stars Stars Network routing Network routing Gravitation Gravitation Cryptography Cryptography Routing protocols Routing protocols Ad hoc networks Ad hoc networks Network security Network security
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad et al. Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 16-24 . |
MLA | Rana, Khurram Gulzar et al. "Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 16-24 . |
APA | Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad , Ditta, Allah , Yu, Haiyang , Khuhro, Sijjad Ali . Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 16-24 . |
Export to | NoteExpress RIS BibTex |
Abstract :
With the emergence of the cloud computing paradigm in scientific and business applications, computation outsourcing to the cloud has become a popular application in the age of cloud computing. However, this computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. In this paper we use similar transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix multiplication calculation. Compared with those existing outsourcing protocols, our protocol has obvious improvement concerning both efficiency and security. In order to check the correctness of the result returned from the cloud, an efficient verification algorithm is employed. Computational complexity analysis shows that our protocol is highly efficient. © 2018 Inderscience Enterprises Ltd.
Keyword :
Verification Verification Cloud computing Cloud computing Outsourcing Outsourcing Linear transformations Linear transformations Matrix algebra Matrix algebra
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Kong, Shanshan , Cai, Yongquan , Xue, Fei et al. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 90-96 . |
MLA | Kong, Shanshan et al. "Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 90-96 . |
APA | Kong, Shanshan , Cai, Yongquan , Xue, Fei , Yu, Haiyang , Ditta, Allah . Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 90-96 . |
Export to | NoteExpress RIS BibTex |
Abstract :
A severe contest for seamless roaming between inter-domain Wireless Fidelity technologies is to build a trust model in a milieu of several WLAN service providers with varying charging or billing options and authentication mechanisms. This study implements a comprehensive single sign-on prototype for the unification of various WLAN service providers. Users choose the suitable single sign-on verification scheme from the authentication abilities existing on the WLAN service providers that prevent the exposure of their information from illegitimate users while roaming. A composite layer 2 and web-based authentication method intended to ensure secure transmission of cryptographic keys while maintaining the prevailing WLAN charging options. The study deployed RADIUS and liberty based protocols to control unauthorized access to the WLAN network resources. In this paper, RADIUS simulation performed shows how authentication, authorization and accounting standards can be used to allow only the legitimate client to access the network while averting unauthorized users. In addition, the performance of the confederated Wi-Fi networks was shown by performing an experiment for the negotiation based authentication protocol with policy engine and authentication framework via the web-based protocol. The proposed mechanism revealed low latencies results which are suitable to support seamless user experience.
Keyword :
Seamless user experience Seamless user experience Identity provider Identity provider Service provider Service provider Authentication delay Authentication delay Security association Security association Web authentication Web authentication Policy engine Policy engine
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Tsitaitse, Tahadray Jean , Cai, Yongquan , Suntu, Shaldon Leparan . SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS [J]. | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL , 2018 , 14 (6) : 2221-2243 . |
MLA | Tsitaitse, Tahadray Jean et al. "SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS" . | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 14 . 6 (2018) : 2221-2243 . |
APA | Tsitaitse, Tahadray Jean , Cai, Yongquan , Suntu, Shaldon Leparan . SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS . | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL , 2018 , 14 (6) , 2221-2243 . |
Export to | NoteExpress RIS BibTex |
Abstract :
From centuries, information security has been an attractive topic for security officials, intruders, hackers and other communication sectors throughout the world. Cryptography and steganography are widely practiced for secure communication over the internet. In steganography, data hiding capacity has been a great challenge for the research community and security officials. In this research, a novel algorithm is elaborated to conceal secret data with higher cover text capacity by using three different unicode characters such as zero width joiner, zero width non-joiner and zero width character. English text is taken as a message carrier. Before embedding a secret message into cover text, one's complement is applied on binary value of specific characters in secret message. Furthermore, 'Steger' is developed for the practical implementation of designed algorithm. The results revealed that newly designed algorithm reported higher data hiding capacity with security and size efficiency. This is an astonishing increase in data hiding capacity of carrier text. The unicode approach was efficiently and effectively used to reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.
Keyword :
Steganography Steganography Personal computing Personal computing
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Azeem, Muhammad , Yongquan, Cai , Ditta, Allah et al. Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters [J]. | International Journal of Information and Computer Security , 2018 , 10 (4) : 437-453 . |
MLA | Azeem, Muhammad et al. "Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters" . | International Journal of Information and Computer Security 10 . 4 (2018) : 437-453 . |
APA | Azeem, Muhammad , Yongquan, Cai , Ditta, Allah , Rana, Khurram Gulzar , Rajpoot, Faheem Akhtar . Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters . | International Journal of Information and Computer Security , 2018 , 10 (4) , 437-453 . |
Export to | NoteExpress RIS BibTex |
Abstract :
In recent years, information security has become a very important topic for researchers as well as military and government officials. For secure communication, it is necessary to develop novel ways to hide information. For this purpose, steganography is commonly used to send secret information to its destination using different techniques. In this article, our main focus is on text-based steganography. Hidden information in text files is difficult to discover as text data has low redundancy in comparison to other mediums of steganography. Hence, we use Arabic text to hide secret information using a combination of Unicode character's zero-width-character and zero-width-joiner in our proposed algorithm. The experimental results show hidden data capacity per word is significantly increased in comparison to the recently proposed algorithms. The major advantage of our proposed algorithm over previous research is the high visual similarity in both cover and stego-text that can reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.
Keyword :
Information use Information use Steganography Steganography Security of data Security of data
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Ditta, Allah , Yongquan, Cai , Azeem, Muhammad et al. Information hiding: Arabic text steganography by using Unicode characters to hide secret data [J]. | International Journal of Electronic Security and Digital Forensics , 2018 , 10 (1) : 61-78 . |
MLA | Ditta, Allah et al. "Information hiding: Arabic text steganography by using Unicode characters to hide secret data" . | International Journal of Electronic Security and Digital Forensics 10 . 1 (2018) : 61-78 . |
APA | Ditta, Allah , Yongquan, Cai , Azeem, Muhammad , Rana, Khurram Gulzar , Yu, Haiyang , Memon, Muhammad Qasim . Information hiding: Arabic text steganography by using Unicode characters to hide secret data . | International Journal of Electronic Security and Digital Forensics , 2018 , 10 (1) , 61-78 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Quantum image processing is the intersection of quantum computation and image processing. Due to it is a newly emerging thing, researchers are facing not only great opportunities but also many challenges to develop more efficient and practicable services. We provide a comprehensive survey on quantum image processing to gather the current mainstream and discuss the advances made in the area, including quantum image representations, processing algorithms, and image measurement. Moreover, some open challenges and future directions are pointed out to attract continued research efforts.
Keyword :
Quantum information Quantum information Quantum computation Quantum computation Quantum image representation Quantum image representation Measurement Measurement Quantum image processing Quantum image processing Quantum image compression Quantum image compression
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Cai Yongquan , Lu Xiaowei , Jiang Nan . A Survey on Quantum Image Processing [J]. | CHINESE JOURNAL OF ELECTRONICS , 2018 , 27 (4) : 718-727 . |
MLA | Cai Yongquan et al. "A Survey on Quantum Image Processing" . | CHINESE JOURNAL OF ELECTRONICS 27 . 4 (2018) : 718-727 . |
APA | Cai Yongquan , Lu Xiaowei , Jiang Nan . A Survey on Quantum Image Processing . | CHINESE JOURNAL OF ELECTRONICS , 2018 , 27 (4) , 718-727 . |
Export to | NoteExpress RIS BibTex |
Export
Results: |
Selected to |
Format: |