Query:
学者姓名:蔡永泉
Refining:
Year
Type
Indexed by
Source
Complex
Co-Author
Language
Clean All
Abstract :
Steganography is a fundamental and foremost approach that is used to ensure confidentiality of secret data. It is an art, which ensures invisible communication by concealing secret information in cover media through scientific techniques. The text steganography has a great challenge of security, robustness and size of stego text. In current studies, an improved, lightweight, secure, robust and size efficient technique is proposed for text steganography that also enhances the performance of existing approaches. To achieve the objectives, algorithm applies a conditional bit-complement function on binary value of confidential information. Moreover, start and end bits are also inserted during embedding secret information in cover text and confirms the integrity and confidentiality of secret data. Experimental results revealed that projected approach is more robust and secure without any stego key overhead. Furthermore, it has successfully achieved a size efficient stego text. Therefore, the secret information exhibits harder to track © 2019 IEEE.
Keyword :
Steganography Steganography Cryptography Cryptography
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar et al. A secure and size efficient approach to enhance the performance of text steganographic algorithm [C] . 2019 : 402-407 . |
MLA | Azeem, Muhammad et al. "A secure and size efficient approach to enhance the performance of text steganographic algorithm" . (2019) : 402-407 . |
APA | Azeem, Muhammad , Cai, Yongquan , Rana, Khurram Gulzar , Shaukat, Zeeshan , Ditta, Allah . A secure and size efficient approach to enhance the performance of text steganographic algorithm . (2019) : 402-407 . |
Export to | NoteExpress RIS BibTex |
Abstract :
The CP-ABE-based access control scheme, which can better realise the access control of many-to-multi-ciphertext shared in the cloud storage architecture, is still facing the problems that the system cost is too large, and the policy attribute revocation or restore is not flexible. This paper proposes an efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage system. The fine-grained access control can be achieved by re-encryption mechanism which takes the minimum shared re-encryption key for policy attribute set. And then the access structure tree is expanded by creating a corresponding virtual attribute for each leaf node attribute. The analysis results of the scheme indicate that the efficient and flexibility of the attribute change is not only improved, but also the system cost is reduced. Copyright © 2019 Inderscience Enterprises Ltd.
Keyword :
Access control Access control Cost benefit analysis Cost benefit analysis Cryptography Cryptography
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Ye, Tao , Cai, Yongquan , Zhao, Xu et al. An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems [J]. | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) : 41-49 . |
MLA | Ye, Tao et al. "An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems" . | International Journal of Wireless and Mobile Computing 16 . 1 (2019) : 41-49 . |
APA | Ye, Tao , Cai, Yongquan , Zhao, Xu , Yang, Yongli , Wang, Wei , Zhu, Yi . An efficient access control scheme based on CP-ABE with supporting attribute change in cloud storage systems . | International Journal of Wireless and Mobile Computing , 2019 , 16 (1) , 41-49 . |
Export to | NoteExpress RIS BibTex |
Abstract :
As an essential component of cloud computing, cloud storage provides flexible data storage services for individuals and organizations. By storing multiple replicas of data in servers, cloud storage providers (CSPs) can improve availability and stability of the cloud storage service. To ensure that all data replicas of a cloud user are intact and completely stored in the CSP, many multi-replica cloud auditing schemes have been proposed. However, such schemes are predominantly based on the public key infrastructure (PKI), which incurs complex certificate management. In addition, existing schemes do not consider support for sector-level dynamic auditing. In this paper, we propose a fine-grained dynamic multi-replica data auditing scheme that has the following features: (1) it uses ID-based cryptography to eliminate the cost of certificate management, (2) it supports efficient sector-level dynamic operations on cloud user data, and (3) it optimizes the challenge algorithm to reduce the computational cost of the third party auditor (TPA). We show that the proposed scheme is provably secure based on a random oracle model. The performance analysis and experiments show the efficiency of the proposed scheme.
Keyword :
dynamic operation dynamic operation ID-based cryptography ID-based cryptography replicated data auditing replicated data auditing data integrity data integrity
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. et al. ID-based dynamic replicated data auditing for the cloud [J]. | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) . |
MLA | Yu, Haiyang et al. "ID-based dynamic replicated data auditing for the cloud" . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE 31 . 11 (2019) . |
APA | Yu, Haiyang , Cai, Yongquan , Sinnott, Richard O. , Yang, Zhen . ID-based dynamic replicated data auditing for the cloud . | CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE , 2019 , 31 (11) . |
Export to | NoteExpress RIS BibTex |
Abstract :
Ad hoc networks are vulnerable to routing attacks owing to their wireless unsecure communication, dynamic topology and resource constrained capabilities. Ad hoc networks suffer from variety of routing attacks. Ad Hoc On-Demand Distance Vector (AODV) routing protocol exhibits gutless defence against black hole attacks that disrupt its normal functionality and compromise data transmission. In current research, a novel solution AODV black hole detection and removal (AODV-BDR) is proposed. AODV-BDR detects and removes black hole attack by using neighbour-based authentication technique. According to suggested solution, every intermediate node that claims that it upholds a fresh route to destination sends its Next Hop Node (NHN) address to source in route reply packet. Source sends validation packet to NHN. On receiving validation packet, NHN generates validation reply having information about Previous Hop Node (PHN) and send to the source. On receiving validation reply, source declares malicious or normal behaviour of PHN. Results revealed that projected scheme detects malicious node with great accuracy. Moreover, AODV-BDR is very useful because it carries no overhead of encryption and hashing. © 2018 Inderscience Enterprises Ltd.
Keyword :
Authentication Authentication Stars Stars Network routing Network routing Gravitation Gravitation Cryptography Cryptography Routing protocols Routing protocols Ad hoc networks Ad hoc networks Network security Network security
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad et al. Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 16-24 . |
MLA | Rana, Khurram Gulzar et al. "Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 16-24 . |
APA | Rana, Khurram Gulzar , Yongquan, Cai , Azeem, Muhammad , Ditta, Allah , Yu, Haiyang , Khuhro, Sijjad Ali . Wireless ad hoc network: Detection of malicious node by using neighbour-based authentication approach . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 16-24 . |
Export to | NoteExpress RIS BibTex |
Abstract :
A severe contest for seamless roaming between inter-domain Wireless Fidelity technologies is to build a trust model in a milieu of several WLAN service providers with varying charging or billing options and authentication mechanisms. This study implements a comprehensive single sign-on prototype for the unification of various WLAN service providers. Users choose the suitable single sign-on verification scheme from the authentication abilities existing on the WLAN service providers that prevent the exposure of their information from illegitimate users while roaming. A composite layer 2 and web-based authentication method intended to ensure secure transmission of cryptographic keys while maintaining the prevailing WLAN charging options. The study deployed RADIUS and liberty based protocols to control unauthorized access to the WLAN network resources. In this paper, RADIUS simulation performed shows how authentication, authorization and accounting standards can be used to allow only the legitimate client to access the network while averting unauthorized users. In addition, the performance of the confederated Wi-Fi networks was shown by performing an experiment for the negotiation based authentication protocol with policy engine and authentication framework via the web-based protocol. The proposed mechanism revealed low latencies results which are suitable to support seamless user experience.
Keyword :
Seamless user experience Seamless user experience Identity provider Identity provider Service provider Service provider Authentication delay Authentication delay Security association Security association Web authentication Web authentication Policy engine Policy engine
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Tsitaitse, Tahadray Jean , Cai, Yongquan , Suntu, Shaldon Leparan . SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS [J]. | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL , 2018 , 14 (6) : 2221-2243 . |
MLA | Tsitaitse, Tahadray Jean et al. "SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS" . | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL 14 . 6 (2018) : 2221-2243 . |
APA | Tsitaitse, Tahadray Jean , Cai, Yongquan , Suntu, Shaldon Leparan . SECURE ROAMING AUTHENTICATION MECHANISM FOR WI-FI BASED NETWORKS . | INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL , 2018 , 14 (6) , 2221-2243 . |
Export to | NoteExpress RIS BibTex |
Abstract :
From centuries, information security has been an attractive topic for security officials, intruders, hackers and other communication sectors throughout the world. Cryptography and steganography are widely practiced for secure communication over the internet. In steganography, data hiding capacity has been a great challenge for the research community and security officials. In this research, a novel algorithm is elaborated to conceal secret data with higher cover text capacity by using three different unicode characters such as zero width joiner, zero width non-joiner and zero width character. English text is taken as a message carrier. Before embedding a secret message into cover text, one's complement is applied on binary value of specific characters in secret message. Furthermore, 'Steger' is developed for the practical implementation of designed algorithm. The results revealed that newly designed algorithm reported higher data hiding capacity with security and size efficiency. This is an astonishing increase in data hiding capacity of carrier text. The unicode approach was efficiently and effectively used to reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.
Keyword :
Steganography Steganography Personal computing Personal computing
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Azeem, Muhammad , Yongquan, Cai , Ditta, Allah et al. Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters [J]. | International Journal of Information and Computer Security , 2018 , 10 (4) : 437-453 . |
MLA | Azeem, Muhammad et al. "Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters" . | International Journal of Information and Computer Security 10 . 4 (2018) : 437-453 . |
APA | Azeem, Muhammad , Yongquan, Cai , Ditta, Allah , Rana, Khurram Gulzar , Rajpoot, Faheem Akhtar . Information hiding: A novel algorithm for enhancement of cover text capacity by using unicode characters . | International Journal of Information and Computer Security , 2018 , 10 (4) , 437-453 . |
Export to | NoteExpress RIS BibTex |
Abstract :
In recent years, information security has become a very important topic for researchers as well as military and government officials. For secure communication, it is necessary to develop novel ways to hide information. For this purpose, steganography is commonly used to send secret information to its destination using different techniques. In this article, our main focus is on text-based steganography. Hidden information in text files is difficult to discover as text data has low redundancy in comparison to other mediums of steganography. Hence, we use Arabic text to hide secret information using a combination of Unicode character's zero-width-character and zero-width-joiner in our proposed algorithm. The experimental results show hidden data capacity per word is significantly increased in comparison to the recently proposed algorithms. The major advantage of our proposed algorithm over previous research is the high visual similarity in both cover and stego-text that can reduce the attention of intruders. © 2018 Inderscience Enterprises Ltd.
Keyword :
Information use Information use Steganography Steganography Security of data Security of data
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Ditta, Allah , Yongquan, Cai , Azeem, Muhammad et al. Information hiding: Arabic text steganography by using Unicode characters to hide secret data [J]. | International Journal of Electronic Security and Digital Forensics , 2018 , 10 (1) : 61-78 . |
MLA | Ditta, Allah et al. "Information hiding: Arabic text steganography by using Unicode characters to hide secret data" . | International Journal of Electronic Security and Digital Forensics 10 . 1 (2018) : 61-78 . |
APA | Ditta, Allah , Yongquan, Cai , Azeem, Muhammad , Rana, Khurram Gulzar , Yu, Haiyang , Memon, Muhammad Qasim . Information hiding: Arabic text steganography by using Unicode characters to hide secret data . | International Journal of Electronic Security and Digital Forensics , 2018 , 10 (1) , 61-78 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Smart grid has a great advantage over the traditional power grid and it is a critical condition in people's daily life. The security of data communication in smart grid is important and needs to be efficiently guaranteed. The supervisory control and data acquisition (SCADA) systems is in charge of supervising the sensitive process. In SCADA systems, the secure communication between control center and remote terminal units can be achieved by the key distribution mechanism. However, the remote terminal units are resource-constrained and sometimes are not available so that they cannot receive the session key updating broadcast. Self-healing is an efficient mechanism to calculate missing session keys by using later broadcast messages. In this paper, we propose an efficient self-healing group key distribution scheme for SCADA systems. The security analysis illustrates that our scheme satisfy the basic security properties defined in security model. According to the performance evaluation from storage and communication cost viewpoints, the proposed scheme is efficient.
Keyword :
Key distribution Key distribution Self-healing Self-healing SCADA systems SCADA systems Security Security
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Tsitaitse, Tahadray Jean , Cai, Yongquan , Ditta, Allah . Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid [J]. | WIRELESS PERSONAL COMMUNICATIONS , 2018 , 101 (3) : 1749-1763 . |
MLA | Tsitaitse, Tahadray Jean et al. "Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid" . | WIRELESS PERSONAL COMMUNICATIONS 101 . 3 (2018) : 1749-1763 . |
APA | Tsitaitse, Tahadray Jean , Cai, Yongquan , Ditta, Allah . Secure Self-healing Group Key Distribution Scheme with Constant Storage for SCADA Systems in Smart Grid . | WIRELESS PERSONAL COMMUNICATIONS , 2018 , 101 (3) , 1749-1763 . |
Export to | NoteExpress RIS BibTex |
Abstract :
With the emergence of the cloud computing paradigm in scientific and business applications, computation outsourcing to the cloud has become a popular application in the age of cloud computing. However, this computing paradigm brings in some new security concerns and challenges, such as input/output privacy and result verifiability. In this paper we use similar transformation of matrix to design secure verifiable and practical outsourcing protocol for matrix multiplication calculation. Compared with those existing outsourcing protocols, our protocol has obvious improvement concerning both efficiency and security. In order to check the correctness of the result returned from the cloud, an efficient verification algorithm is employed. Computational complexity analysis shows that our protocol is highly efficient. © 2018 Inderscience Enterprises Ltd.
Keyword :
Verification Verification Cloud computing Cloud computing Outsourcing Outsourcing Linear transformations Linear transformations Matrix algebra Matrix algebra
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Kong, Shanshan , Cai, Yongquan , Xue, Fei et al. Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation [J]. | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) : 90-96 . |
MLA | Kong, Shanshan et al. "Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation" . | International Journal of Wireless and Mobile Computing 14 . 1 (2018) : 90-96 . |
APA | Kong, Shanshan , Cai, Yongquan , Xue, Fei , Yu, Haiyang , Ditta, Allah . Cloud outsourcing computing security protocol of matrix multiplication computation based on similarity transformation . | International Journal of Wireless and Mobile Computing , 2018 , 14 (1) , 90-96 . |
Export to | NoteExpress RIS BibTex |
Abstract :
Quantum image processing has been a hot topic. The first step of it is to store an image into qubits, which is called quantum image preparation. Different quantum image representations may have different preparation methods. In this paper, we use GQIR (the generalized quantum image representation) to represent an image, and try to decrease the operations used in preparation, which is also known as quantum image compression. Our compression scheme is based on JPEG (named from its inventor: the Joint Photographic Experts Group) - the most widely used method for still image compression in classical computers. We input the quantized JPEG coefficients into qubits and then convert them into pixel values. Theoretical analysis and experimental results show that the compression ratio of our scheme is obviously higher than that of the previous compression method.
Keyword :
Quantum image processing Quantum image processing Quantum image compression Quantum image compression Quantum computation Quantum computation Quantum image preparation Quantum image preparation JPEG compression JPEG compression
Cite:
Copy from the list or Export to your reference management。
GB/T 7714 | Jiang, Nan , Lu, Xiaowei , Hu, Hao et al. A Novel Quantum Image Compression Method Based on JPEG [J]. | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS , 2018 , 57 (3) : 611-636 . |
MLA | Jiang, Nan et al. "A Novel Quantum Image Compression Method Based on JPEG" . | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS 57 . 3 (2018) : 611-636 . |
APA | Jiang, Nan , Lu, Xiaowei , Hu, Hao , Dang, Yijie , Cai, Yongquan . A Novel Quantum Image Compression Method Based on JPEG . | INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS , 2018 , 57 (3) , 611-636 . |
Export to | NoteExpress RIS BibTex |
Export
Results: |
Selected to |
Format: |