您的位置: 专家智库 > >

国家自然科学基金(61370145)

作品数:8 被引量:30H指数:3
相关作者:王兴元张继明鲍蓉孙天凯赵仲祥更多>>
相关机构:大连理工大学徐州工程学院更多>>
发文基金:国家自然科学基金中央高校基本科研业务费专项资金国家教育部博士点基金更多>>
相关领域:理学自动化与计算机技术更多>>

文献类型

  • 8篇中文期刊文章

领域

  • 5篇自动化与计算...
  • 5篇理学

主题

  • 2篇云端
  • 2篇数字图像
  • 2篇图像
  • 2篇图像认证
  • 2篇图像修复
  • 2篇混沌
  • 2篇篡改
  • 2篇篡改检测
  • 1篇抖动
  • 1篇依赖度
  • 1篇社团结构
  • 1篇数据分析
  • 1篇索引
  • 1篇屏蔽
  • 1篇屏蔽方法
  • 1篇网络
  • 1篇密文
  • 1篇密文索引
  • 1篇明码
  • 1篇汉明码

机构

  • 4篇大连理工大学
  • 2篇徐州工程学院

作者

  • 3篇王兴元
  • 2篇孙天凯
  • 2篇张继明
  • 2篇鲍蓉
  • 1篇赵仲祥
  • 1篇姜代红
  • 1篇王奎

传媒

  • 3篇物理学报
  • 3篇Chines...
  • 1篇计算机科学与...
  • 1篇软件工程与应...

年份

  • 1篇2019
  • 2篇2018
  • 2篇2015
  • 3篇2014
8 条 记 录,以下是 1-8
排序方式:
一种基于混沌和汉明码的数字图像篡改检测及修复算法被引量:6
2014年
提出了一种基于混沌映射和汉明码的数字图像篡改检测及修复算法.该算法采用了目前在信道编码中广泛使用的编组码汉明码,将差错控制应用于图像认证和修复,并使用混沌映射保证算法的有效性和安全性.分析及实验表明:该算法在保证良好的视觉效果,嵌入较少认证信息的前提下,可以有效地进行数字图像篡改检测,并能够完成一定程度的图像修复.
王兴元张继明
关键词:图像认证图像修复汉明码混沌
基于深度学习的云端大数据安全防护技术被引量:1
2015年
云端海量大数据是数据分析的基础,数据本身的安全性和准确性,对数据分析的结果有重要影响。针对云端大数据的特性,融合Hadoop的海量大数据处理以及数字水印相关技术,提出了一种以深度信念网络(DBN)作为智能分类的机制,通过对数据进行多层的训练和调整,对云端海量数据进行计算,得到其分布式表示,进而获取数据的篡改和判断的依据。实验表明,Hadoop和AI的结合,很好的实现了云端海量大数据的安全防护。
孙天凯鲍蓉姜代红王奎
关键词:DBN数据分析HADOOP
云端信息密文域内检索机制的研究
2015年
云端作为第三方的存储平台,用户的核心信息以密文形式存储。信息的密文状态与明文相比缺少了信息内部的结构化特征,增加了密文检索的难度。在现有全文索引和数据库索引的基础上,利用Luene设计了一套高效的密文全文索引机制。一系列的实验分析表明,该密文索引机制,具有较好的安全性、保密性。具有较高的实际实用价值。
孙天凯鲍蓉陈尧
关键词:密文索引
A novel pseudo-random coupled LP spatiotemporal chaos and its application in image encryption被引量:2
2018年
In this paper, first, we investigate a novel one-dimensional logistic-PWLCM(LP) modulation map which is derived from the logistic and PWLCM maps. Second, we propose a novel PCLML spatiotemporal chaos in pseudo-random coupling method that can accelerate the system behavior of the fully spatial chaos. Here, because the better chaotic properties include a wide range of parameter settings and better ergodicity than a logistic map, the LP is used in PCLML as f(x). The Kolmogorov–Sinai entropy density and universality and the bifurcation diagram are employed to investigate the chaotic behaviors of the proposed PCLML model. Finally, we apply the LP and PCLML chaotic systems to image encryption to improve the effectiveness and security of the encryption scheme. By combining self-generating matrix model M and dynamic substitution box(S-Box) methods, we design a new image encryption algorithm. Numerical simulations and security analysis have been carried out to demonstrate that the proposed algorithm has a high security level and can efficiently encrypt several different kinds of images into random-like images.
王兴元王宇王思伟张盈谦武相军
New chaotical image encryption algorithm based on Fisher–Yatess scrambling and DNA coding被引量:7
2019年
Based on the Fisher–Yatess scrambling and DNA coding technology, a chaotical image encryption method is proposed. First, the SHA-3 algorithm is used to calculate the hash value of the initial password, which is used as the initial value of the chaotic system. Second, the chaotic sequence and Fisher–Yatess scrambling are used to scramble the plaintext,and a sorting scrambling algorithm is used for secondary scrambling. Then, the chaotic sequence and DNA coding rules are used to change the plaintext pixel values, which makes the ciphertext more random and resistant to attacks, and thus ensures that the encrypted ciphertext is more secure. Finally, we add plaintext statistics for pixel-level diffusion to ensure plaintext sensitivity. The experimental results and security analysis show that the new algorithm has a good encryption effect and speed, and can also resist common attacks.
王兴元张钧荐张付臣曹光辉
关键词:SCRAMBLINGCHAOTICDNACODINGENCRYPTION
一种基于抖动和混沌技术的数字图像篡改检测及修复算法被引量:2
2014年
本文提出了一种基于抖动和混沌技术的数字图像篡改检测及修复算法.该算法使用小波变换后的低频子图和抖动技术生成图像的认证及修复信息,在有效减少水印数据量的同时,将水印嵌入小波变换后的高频子图,从而达到水印的不可见性.运用混沌技术完成水印的嵌入和加密,并结合中国余数定理,进一步减少水印嵌入对图像质量的影响.实验证明,该算法兼顾了水印的不可见性和鲁棒性,并且能够一定程度修复篡改图像,在图像认证和修复方面具有较高的实用意义.
王兴元张继明
关键词:图像认证图像修复抖动混沌
Detecting overlapping communities based on vital nodes in complex networks被引量:2
2018年
Detection of community structures in the complex networks is significant to understand the network structures and analyze the network properties. However, it is still a problem on how to select initial seeds as well as to determine the number of communities. In this paper, we proposed the detecting overlapping communities based on vital nodes algorithm(DOCBVA), an algorithm based on vital nodes and initial seeds to detect overlapping communities. First, through some screening method, we find the vital nodes and then the seed communities through the pretreatment of vital nodes. This process differs from most existing methods, and the speed is faster. Then the seeds will be extended. We also adopt a new parameter of attribution degree to extend the seeds and find the overlapping communities. Finally, the remaining nodes that have not been processed in the first two steps will be reprocessed. The number of communities is likely to change until the end of algorithm. The experimental results using some real-world network data and artificial network data are satisfactory and can prove the superiority of the DOCBVA algorithm.
王兴元王宇秦小蒙李睿Justine Eustace
关键词:屏蔽方法
基于节点间依赖度的社团结构划分方法被引量:11
2014年
本文提出了一种基于节点间依赖度的在复杂网络中划分社团结构的算法,定义了节点对其邻居的依赖度以及节点对社团的依赖度和条件依赖度.算法的基本要点是优先将最大依赖度不小于其他节点且有惟一依赖节点的节点划分到社团,并将对社团的依赖度或条件依赖度达到一定值的节点吸收进社团,直到所有节点都得到准确的社团划分.本算法在几个实际网络的测试上,都成功地划分出了满足条件的社团,并且对社团结构已知的网络的划分结果符合实际情况.
王兴元赵仲祥
关键词:复杂网络社团结构依赖度
共1页<1>
聚类工具0