图书介绍

基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用pdf电子书版本下载

基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用
  • 周晓谊著 著
  • 出版社: 北京:知识产权出版社
  • ISBN:9787513045100
  • 出版时间:2017
  • 标注页数:180页
  • 文件大小:18MB
  • 文件页数:194页
  • 主题词:信息安全-安全技术-研究-英文;无线射频识别-应用-研究-英文

PDF下载


点此进入-本书在线PDF格式电子书下载【推荐-云解压-方便快捷】直接下载PDF格式图书。移动端-PC端通用
种子下载[BT下载速度快] 温馨提示:(请使用BT下载软件FDM进行下载)软件下载地址页 直链下载[便捷但速度慢]   [在线试读本书]   [在线获取解压码]

下载说明

基于遍历矩阵和时序的信息安全及其在农产品RFID的防伪和篡改检测的应用PDF格式电子书版下载

下载的文件为RAR压缩包。需要使用解压软件进行解压得到PDF格式图书。

建议使用BT下载工具Free Download Manager进行下载,简称FDM(免费,没有广告,支持多平台)。本站资源全部打包为BT种子。所以需要使用专业的BT下载软件进行下载。如 BitComet qBittorrent uTorrent等BT下载工具。迅雷目前由于本站不是热门资源。不推荐使用!后期资源热门了。安装了迅雷也可以迅雷进行下载!

(文件页数 要大于 标注页数,上中下等多册电子书除外)

注意:本站所有压缩包均有解压码: 点击下载压缩包解压工具

图书目录

CHAPTER 1 INTRODUCTION 1

Section 1.1 Motivations:Security Based on Temporal Order 2

Section 1.1.1 Formal Characterization of Time-series 2

Section 1.1.2 BMQE System 3

Section 1.1.3 Temporal Ordered Image Cryptography 4

Section 1.1.4 Temporal Ordered Image Hiding 5

Section 1.2 Objectives:Information Security Usmg Temporal Theory 6

Section 1.3 Outlines of the Main Contributions 8

Section 1.4 Book Structure 10

CHAPTER 2 LITERATURE REVIEW 12

Section 2.1 Temporal Basis 12

Section 2.1.1 Point-based Systems 12

Section 2.1.2 Interval-based Systems 14

Section 2.1.3 A point&Interval-based Theory 15

Section 2.1.4 Notion of Time-series 18

Section 2.2 Ergodic Matrix 22

Section 2.2.1 Finite Fields 22

Section 2.2.2 Definitions and Related Theorems of the EM 24

Section 2.2.3 Security Analysis of a Question Based on EM 27

Section 2.3 Cryptography 29

Section 2.3.1 History of Cryptography and Cryptanalysis 30

Section 2.3.2 Symmetric Cryptography vs.Asymmetric Cryptography 34

Section 2.3.3 Multivariate Quadratic Polynomials 37

Section 2.4 Information Hiding 41

Section 2.4.1 History of Information Hiding 42

Section 2.4.2 Steganography vs.Watermarking 46

Section 2.4.3 Data Hiding Technologies in Images 48

Section 2.5 Conclusions 53

CHAPTER 3 BMQE SYSTEM 54

Section 3.1 Important Characteristics of EM for BMQE System 54

Section 3.2 BMQE Based on Ergodic Matrix 56

Section 3.2.1 BMQE Problem 56

Section 3.2.2 BMQE is NP-Complete 57

Section 3.3 Cryptanalysis of BMQE 59

Section 3.3.1 Methods Used in Solving MQ-problems 59

Section 3.3.2 Fixing Variables 61

Section 3.3.3 Relinearization 64

Section 3.4 Conclusions 74

CHAPTER 4 IMAGE CRYPTOGRAPHY 75

Section 4.1 Review of Image Cryptography 75

Section 4.1.1 Characteristics of Image Cryptography 75

Section 4.1.2 Image Cryptography Algorithms 77

Section 4.2 Hybrid-key Based Image Cryptography 79

Section 4.2.1 Encryption/Decryption and Authentication Process 80

Section 4.2.2 Image Confusion 82

Section 4.2.3 Image Diffusion 84

Section 4.3 Security Analysis 85

Section 4.3.1 Key Space Analysis 86

Section 4.3.2 Statistical Analysis 87

Section 4.3.3 Sensitivity-based Attack 90

Section 4.4 Performance Evaluation 94

Section 4.5 Conclusions 96

CHAPTER 5 IMAGE HIDING 98

Section 5.1 Related Results 98

Section 5.1.1 GA-based Watermarking 99

Section 5.1.2 SVM-based Watermarking 101

Section 5.2 Design Idea 103

Section 5.2.1 Motivation 104

Section 5.2.2 Embedding Strength with SVM 104

Section 5.2.3 Embedding Position with Optimized GA 108

Section 5.3 Algorithm SOGA:Watermarking Based on SVM and Optimized-GA 110

Section 5.3.1 Communication Procedure 110

Section 5.3.2 Embedding Procedure 110

Section 5.3.3 Extracting Procedure 112

Section 5.4 Experimental Results 113

Section 5.4.1 Evaluation Criterion in System Performance 113

Section 5.4.2 Results by Different Iteration Numbers 114

Section 5.4.3 Robustness Against Various Attacks 117

Section 5.5 Conclusions 121

CHAPTER 6 TEMPORAL APPLICATIONS 122

Section 6.1 Formal Characterization of Time-series 122

Section 6.1.1 Why Choosing Temporal 122

Section 6.1.2 Formalize the Characterization of Time-series 124

Section 6.2 Temporal-based Image Cryptosystem 127

Section 6.2.1 Encryption-decryption Process Using Temporal Logic 127

Section 6.2.2 Expand the Key Size 129

Section 6.2.3 Adjust the Images 129

Section 6.2.4 Security Analysis 130

Section 6.3 Temporal-based Image Hiding 136

Section 6.3.1 Static Multiple Digital Watermarking with Temporal Logic 137

Section 6.3.2 Dynamic Multiple Digital Watermarking Considering Temporal Logic 138

Section 6.4 Conclusions 149

CHAPTER 7 APPLICATIONS IN RFID FOR AGRICULTURAL PRODUCTS 150

Section 7.1 Development of RFID Anti-counterfeit Technology 150

Section 7.2 An Anti-counterfeiting Scheme for Agricultural RFID 153

Section 7.3 BMQE for RFID Anti-Counterfeiting 154

Section 7.3.1 Key Generation 155

Section 7.3.2 Encryption Procedure 155

Section 7.3.3 Decryption Procedure 157

Section 7.4 SOGA for RFID Tampering Detection 157

Section 7.5 Conclusions 160

CHAPTER 8 CONCLUSIONS AND FUTURE WORK 161

Section 8.1 Conclusions 161

Section 8.2 Future Work Discussion 163

Reference 165

精品推荐