您的位置: 专家智库 > >

国家自然科学基金(61070163)

作品数:9 被引量:41H指数:3
相关作者:王连海冷璐张家树顾卫东武鲁更多>>
相关机构:西南交通大学山东省计算机网络重点实验室南昌航空大学更多>>
发文基金:国家自然科学基金国家教育部博士点基金山东省优秀中青年科学家科研奖励基金更多>>
相关领域:自动化与计算机技术电子电信理学更多>>

文献类型

  • 9篇中文期刊文章

领域

  • 6篇自动化与计算...
  • 5篇电子电信
  • 2篇理学

主题

  • 2篇掌纹
  • 2篇计算机
  • 2篇QUANTU...
  • 2篇STEGAN...
  • 1篇代价函数
  • 1篇信标
  • 1篇云计算
  • 1篇掌纹识别
  • 1篇软构件
  • 1篇软件平台
  • 1篇图像
  • 1篇图像安全
  • 1篇图像加密
  • 1篇蓝牙
  • 1篇混沌
  • 1篇混沌加密
  • 1篇计算机取证
  • 1篇计算机应用
  • 1篇加密
  • 1篇OPERAT...

机构

  • 2篇西南交通大学
  • 1篇南昌航空大学
  • 1篇山东省计算机...
  • 1篇山东省计算中...

作者

  • 2篇张家树
  • 2篇冷璐
  • 2篇王连海
  • 1篇武鲁
  • 1篇李恒建
  • 1篇顾卫东

传媒

  • 3篇China ...
  • 2篇计算机科学
  • 1篇电子测量与仪...
  • 1篇Chines...
  • 1篇吉林大学学报...
  • 1篇Scienc...

年份

  • 1篇2019
  • 3篇2013
  • 2篇2012
  • 3篇2010
9 条 记 录,以下是 1-9
排序方式:
基于JPEG-LS的高效掌纹图像安全编码算法被引量:3
2013年
提出一种基于JPEG-LS的对掌纹图像压缩的加密算法,它将JPEG-LS编码系统进行改进,增加了基于前馈反馈非线性动力学滤波器(FFNDF)的安全系统,即针对图像压缩编码最后的熵编码阶段,引入混沌系统,去除图像的空间冗余和相关冗余,以尽可能地降低图像加密对压缩的影响。对算法进行了安全性分析。与其它混沌压缩编码加密算法进行比较的实验结果表明,提出的压缩加密算法不仅具有较高的加密效率和安全性,且计算复杂度低,对压缩性能没有影响。
李恒建王连海张家树
关键词:图像加密混沌加密JPEG-LS
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
2013年
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency.
徐淑奖陈秀波钮心忻杨义先
High-efficiency quantum steganography based on the tensor product of Bell states被引量:6
2013年
In this paper,we first propose a hidden rule among the secure message,the initial tensor product of two Bell states and the final tensor product when respectively applying local unitary transformations to the first particle of the two initial Bell states,and then present a high-efficiency quantum steganography protocol under the control of the hidden rule.In the proposed quantum steganography scheme,a hidden channel is established to transfer a secret message within any quantum secure direct communication(QSDC) scheme that is based on 2-level quantum states and unitary transformations.The secret message hiding/unhiding process is linked with the QSDC process only by unitary transformations.To accurately describe the capacity of a steganography scheme,a quantitative measure,named embedding efficiency,is introduced in this paper.The performance analysis shows that the proposed steganography scheme achieves a high efficiency as well as a good imperceptibility.Moreover,it is shown that this scheme can resist all serious attacks including the intercept-resend attack,measurement-resend attack,auxiliary particle attack and even the Denial of Service attack.To improve the efficiency of the proposed scheme,the hidden rule is extended based on the tensor product of multiple Bell states.
XU ShuJiangCHEN XiuBoNIU XinXinYANG YiXian
基于图优化的蓝牙信标室内定位方法被引量:12
2019年
两种基于蓝牙信标的定位方式,包含基于距离的定位与基于信号指纹的定位,都需要蓝牙信标的位置或是信号指纹地图作为先验信息。为了获取这些信息需要大量在室内进行位置的测量,消耗大量的时间和人力,在实际应用中较难实现。提出一种基于图优化的估计蓝牙信标位置和信号指纹地图的方法,该方法仅要求人员在室内环境中行走采集惯性数据与蓝牙信号强度信息,其中惯性数据信息可用于生成轨迹中相邻位姿之间的代价项,信号强度信息可通过信号指纹匹配建立对应位姿的代价项,信号强度信息同样可建立蓝牙信标与对应位姿之间的距离代价项。这些代价项可以产生总体的代价函数模型,并通过图优化最小化该函数,得到最小二乘意义下的最佳蓝牙信标位置和信号指纹地图估计。尽管利用估计结果进行定位的精度略低于真实的测量得到的定位精度(误差增加了1. 3 m),但是该估计方法免除了传统方法中的需要专业测量设备费时费力的室内位置测量,大大降低了定位的必须条件,适合推广。
张俞冷璐
关键词:代价函数
A Method on Extracting Network Connection Information from 64- bit Windows 7 Memory Images被引量:3
2010年
Memory analysis gains a weight in the area of computer live forensics.How to get network connection information is one of the challenges in memory analysis and plays an important role in identifying sources of malicious cyber attack. It is more difficult to fred the drivers and get network connections information from a 64-bit windows 7 memory image file than from a 32-bit operating system memory image f'de. In this paper, an approach to fred drivers and get network connection information from 64-bit windows 7 memory images is given. The method is verified on 64-bit windows 7 version 6.1.7600 and proved reliable and efficient.
Wang Lianhai Xu Lijuan Zhang Shuhui
基于云的计算机取证系统研究被引量:15
2012年
云计算是目前最流行的互联网计算模式,它具有弹性计算、资源虚拟化、按需服务等特点。在云计算的环境中,云计算中心直接提供由基础设施、平台、应用等组成的各种服务,用户不再拥有自己的基础设施、软件和数据,而是共享整个云基础架构。这种方式直接影响了云计算环境的安全性和可用性,给云计算带来了巨大的隐患。在分析和研究云计算环境下的安全缺陷和安全威胁的前提下,提出了一种基于云的计算机取证系统的设计方案———利用计算机取证技术解决云计算环境的安全问题,同时利用云计算技术和超算技术满足传统取证对高性能计算的需求。
武鲁王连海顾卫东
关键词:云计算计算机取证
基于软构件的掌纹识别软件平台的开发与集成被引量:1
2012年
针对现阶段掌纹识别相关软件开发中的问题,采用基于构件的软件开发技术,结合掌纹识别各类算法的特点,集成实现了软件平台,并分析了平台中各类相关构件的获取、分类和组装方法。本软件平台采用可复用软构件技术,实用价值高,而且该平台有效缩短了系统开发周期,并降低了软件维护难度。
冷璐张家树
关键词:计算机应用掌纹识别软件平台
Acquisition of Network Connection Status Information from Physical Memory on Windows Vista Operating System
2010年
A method to extract information of network connection status information from physical memory on Windows Vista operating system is proposed. Using this method, a forensic examiner can extract accurately the information of current TCP/ IP network connection information, including IDs of processes which established connections, establishing time, local address, local port, remote address, remote port, etc., from a physical memory on Windows Xflsta operating system. This method is reliable and efficient. It is verified on Windows Vista, Windows Vista SP1, Windows Vista SP2.
Xu Lijuan Wang Lianhai Zhang Lei Kong Zhigang
Live Memory Acquisition through FireWire被引量:2
2010年
Although FireWire-based memory acquisition method has been introduced for several years, the methodologies are not discussed in detail and still lack of practical tools. Besides, the existing method is not working stably when dealing with different versions of Windows. In this paper, we try to compare different memory acquisition methods and discuss their virtues and disadvantages. Then, the methodologies of FireWire-based memory acquisition are discussed. Finally, we give a practical implementation of FireWire-based acquisition tool that can work well with different versions of Windows without causing BSoD problems.
Zhang Lei Wang Lianhai Zhang Ruichao Zhang Shubui Zhou Yang
关键词:FIREWIRE
共1页<1>
聚类工具0