Please wait a minute...

����Ŀ¼

    15 September 2016, Volume 2 Issue 9
    Overview
    Research on cyberspace surveying and mapping technology
    Fan ZHAO,Xiang-yang LUO,Fen-lin LIU
    2016, 2(9):  1-11.  doi:10.11959/j.issn.2096-109x.2016.00097
    Asbtract ( 1249 )   HTML ( 117)   PDF (483KB) ( 3139 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Cyberspace surveying and mapping technology is a network common foundation and application technology.The research progress of cyberspace surveying and mapping technology was reviewed and discussed.Firstly,the con-notation and principle framework of cyberspace surveying and mapping technology was described.Secondly,relevant technologies were introduced in probing layer,mapping layer and drawing layer.Finally,some open problems in this field were discussed,and some interesting directions that may be worth researching in the future were indicated.

    academic paper
    Software watermarking scheme with cloud computing constraints
    Guang SUN,Xiao-ping FAN,Wang-dong JIANG,Hang-jun ZHOU,Sheng-zong LIU,Chun-hong GONG,Jing ZHU
    2016, 2(9):  12-21.  doi:10.11959/j.issn.2096-109x.2016.00083
    Asbtract ( 157 )   HTML ( 3)   PDF (1029KB) ( 75 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A non-equivalent semantic obfuscation-based software watermarking,scheme was introduced to satisfy the demands of software intellectual property breaches in cloud.Via obfuscated source codes,part of semantics was cut into a recovery module to make the source code unavailable.Watermarks map to transform rules were embedded concurrently into these obfuscated codes.The recovery module was a recognizer to prove the watermarks when the original program was recovering.Experimental results,using Java decompliers,indicate that the code become ob-fuscated,is difficult to reverse engineering,thereby mabe the watermarks robust.

    Robust image hiding algorithm for secure multimodal biometrics
    Yu-qiang CAO,Wei-guo GONG,Sen BAI
    2016, 2(9):  22-29.  doi:10.11959/j.issn.2096-109x.2016.00093
    Asbtract ( 109 )   HTML ( 1)   PDF (1552KB) ( 71 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to solve the bio-template secure transmission in multimode biometric authentication,a novel al-gorithm was presented that hiding face watermarks in fingerprint carrier image to improve security and recognition accuracy.RST invariant embedding region was obtained by carrier image normalization and the core point detection.Multiple embedding based on SVD in the region and watermark optimizations in extraction process were presented in hiding scheme.The security of the proposed algorithm and its robustness against different kinds of attacks were verified by simulations.

    HEVC information hiding approach based on intra prediction modes modulation
    Jie YANG,Song-bin LI,Hao-jiang DENG
    2016, 2(9):  30-39.  doi:10.11959/j.issn.2096-109x.2016.00098
    Asbtract ( 133 )   HTML ( 3)   PDF (2049KB) ( 160 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    For further improving the embedding efficiency in the processing of HEVC information hiding,a method for HEVC information hiding based on intra prediction models modulation was proposed.The space lattice dimen-sion N(N = 2,3,4)of each CTU was generated according to the key.The selection rule of intra prediction mode was utilized to select N modes which were located at vertex angle.The N modes were mapped to the value F through the space lattice mapping algorithm.Then N bits secret information were read from the bit file and converted to a deci-mal number D.In this way,N secret information bits were embedded in N intra prediction modes by modifying at most one mode.The experimental results approve that the proposed method has high embedding efficiency,small rate increase and minimal influence on the video quality and the anti-steganalysis experiment confirms that the pro-posed method has high concealment.

    Image generation classification method based on convolution neural network
    Qiao-ling LI,Qing-xiao GUAN,Xian-feng ZHAO
    2016, 2(9):  40-48.  doi:10.11959/j.issn.2096-109x.2016.00096
    Asbtract ( 190 )   HTML ( 0)   PDF (4219KB) ( 192 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Using convolution neural network which though convolution and pooling extracting features of high dis-tinguish ability and then make fusion for classification of natural images and scanned documents.Experimental re-sults show that the classification accuracy of the proposed classification method is more than 93% on the SKL image database.The model is highly robust to font sizes and image formats.Through contrast experiment validated that preprocessing of image has a positive effect on the accuracy of the model and the time cost on training.

    Asymmetric proxy re-encryption system achievable for office user to securely sharing outsourcing data of mobile terminal
    Wei HAO,Xu-an WANG,Xiao-yuan YANG,Li-qiang WU
    2016, 2(9):  49-56.  doi:10.11959/j.issn.2096-109x.2016.00099
    Asbtract ( 169 )   HTML ( 2)   PDF (1005KB) ( 183 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    In order to realize the office users securely share encrypted data of the mobile terminal,an asymmetric cross-cryptosystem proxy re-encryption system is proposed.In this system,mobile terminals who have the limited computing power use relatively simple identity-based encryption system,while the server and office users use more complex identity-based broadcast encryption system.This system is based on the ciphertext conversion mechanism,which enables the simple IBE ciphertext of mobile terminal to be converted into the complex IBBE ciphertext by proxy while the proxy know nothing of the plaintext.The security of this scheme can be reduced to the safety of the IBE and IBBE scheme.Theoretical and experimental analysis indicate that the scheme is useful for the mobile ter-minal to consume less resources to make the fixed users share the data encrypted by mobile terminal,and it is more practical.

    Succinct scheme of DCT coefficient selection towards enhanced security of JPEG image steganography
    Kang WANG,Bei-bei LIU,Shuo-wei LIU,Yong-jian HU
    2016, 2(9):  57-64.  doi:10.11959/j.issn.2096-109x.2016.00094
    Asbtract ( 183 )   HTML ( 7)   PDF (1414KB) ( 299 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Based on the characteristics of JPEG compression,a succinct and effective scheme of DCT coefficients selection was proposed,in which not only the non-zero AC coefficients but also part of the zero coefficients were exploited.Moreover,the scheme embedded messages in a different order than the conventional practice and gave priority to the low frequency coefficients so as to achieve enhanced security.The embedding manners of two typical steganographic algorithms(EPES and APPM)were extended from the spatial to the compression domain and the proposed scheme was applied to them for coefficient selection and embedding.Experimental results showed that larger capacity and better security were achieved compare to three classical steganographic algorithms(JSteg,F5 and nsF5)and one current steganographic algorithm based on STC framework(LPD).The proposed coefficient se-lection and embedding scheme can effectively improved the performance of some classic DCT domain steg-anographic methods in terms of capacity and security.The scheme was general and could be easily applied to dif-ferent steganography methods.

    Performance evaluation for JPEG compression on model-based source camera identification
    Bo WANG,Jian-feng YIN,Ya-bin LI
    2016, 2(9):  65-71.  doi:10.11959/j.issn.2096-109x.2016.00100
    Asbtract ( 137 )   HTML ( 1)   PDF (815KB) ( 92 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    Focusing on JPEG images transferred by social platform and network media from actual forensic cases,quantities of simulation experiments were carried out to evaluate the performance of three typical methods of model-based source camera identification.The methods are based on the feature of interpolation coefficients of color filter array(CFA),local binary pattern(LBP),and image quality measurement(IQM)with high-order wavelet statis-tic features.The experiments demonstrate that the accuracy decreases rapidly with the compression quality of im-ages decreasing.As a result,methods of model-based source camera identification currently used are demanded bet-ter performance in practical scenes.

    Robust digital watermark method based on PDF417 two-dimension code
    Cui-ling JIANG,Shuai HUANG,An-wen WU,Wen-xin YU,Zhou-mao KANG,Yong-qiang LI
    2016, 2(9):  72-81.  doi:10.11959/j.issn.2096-109x.2016.00095
    Asbtract ( 178 )   HTML ( 1)   PDF (889KB) ( 60 )   Knowledge map   
    Figures and Tables | References | Related Articles | Metrics

    A digital watermark method based on the bar-block-margin characteristics of PDF417 two-dimension code was presented.The proposed method prejudges the watermark information to choose the suitable embedding positions.According to the watermark,the information of the original PDF417 image was modified for embedding and extracting.The experimental results showed that,in comparison with the other methods in the spatial domain,the proposed method has a higher capacity and better watermarked image quality,as well as better robustness against JPEG compression,Gaussian noise and printing and scanning.

Copyright Information
Bimonthly, started in 2015
Authorized by:Ministry of Industry and Information Technology of the People's Republic of China
Sponsored by:Posts and Telecommunications Press
Co-sponsored by:Xidian University, Beihang University, Huazhong University of Science and Technology, Zhejiang University
Edited by:Editorial Board of Chinese Journal of Network and Information Security
Editor-in-Chief:FANG Bin-xing
Executive Editor-in-Chief:LI Feng-hua
Director:Xing Jianchun
Address:F2, Beiyang Chenguang Building, Shunbatiao No.1 Courtyard, Fengtai District, Beijing, China
Tel:010-53879136/53879138/53879139
Fax:+86-81055464
ISSN 2096-109X
CN 10-1366/TP
visited
Total visitors:
Visitors of today:
Now online: