搜索结果: 1-15 共查到“军事学 Image”相关记录17条 . 查询时间(0.046 秒)
Balancing Image Privacy and Usability with Thumbnail-Preserving Encryption
Thumbnail-preserving image encryption Format-preserving encryption Image privacy
2019/3/21
In this paper, we motivate the need for image encryption techniques that preserve certain visual features in images and hide all other information, to balance privacy and usability in the context of c...
AuthCropper: Authenticated Image Cropper for Privacy Preserving Surveillance Systems
Privacy Authentication Forward-secure signature
2018/12/19
As surveillance systems are popular, the privacy of the recorded video becomes more important. On the other hand, the authenticity of video images should be guaranteed when used as evidence in court. ...
PICS: Private Image Classification with SVM
multiparty computation machine learning support vector machines
2017/12/13
The advent of Machine Learning as a Service (MLaaS) makes it possible to outsource a visual object recognition task to an external (e.g. cloud) provider. However, out- sourcing such an image classific...
Image Classification using non-linear Support Vector Machines on Encrypted Data
cryptographic protocols SHE
2017/9/13
In image processing, algorithms for object classification are typically based around machine learning. From the algorithm developer's perspective, these can involve a considerable amount of effort and...
Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3
quantum cryptanalysis hash functions cost models
2016/12/8
We investigate the cost of Grover's quantum search algorithm when used in the context of pre-image attacks on the SHA-2 and SHA-3 families of hash functions. Our cost model assumes that the attack is ...
Bounded Pre-Image Awareness and the Security of Hash-Tree Keyless Signatures
hash functions Pre-image awareness time-stamping
2016/1/7
We present a new tighter security proof for unbounded hash tree keyless signature (timestamping)
schemes that use Merkle-Damgⅹard (MD) hash functions with Preimage Aware (PrA) compression
functions....
Cryptanalysis Of An Authenticated Image Encryption Scheme Based On Chaotic Maps And Memory Cellular Automata
Image encryption Cryptanalysis Chosen plain-text attack
2015/12/31
Recently an image encryption scheme based on chaotic maps and memory cellular
automata has been proposed. In this paper, the security of the scheme is evaluated
and it is demonstrated that the schem...
Privacy-Preserving Content-Based Image Retrieval in the Cloud (Extended Version)
Content-Based Image Retrieval (CBIR) Searchable Symmetric Encryption (SSE) Encrypted Data Processing
2015/12/24
Storage requirements for visual data have been increasing in recent years, following the emergence of many new
highly interactive multimedia services and applications for both personal and corporate ...
A (k; n) threshold secret image sharing scheme, abbreviated as (k; n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret ima...
Efficient chaotic permutations for image encryption algorithms
Efficient chaotic permutations image encryption algorithms
2010/2/1
Permutation is widely used in cryptographic algorithm. Recently, a number of candidate instructions have been proposed to efficient compute arbitrary bit permutations. Among these, we present the most...
A New Chaotic Image Encryption Algorithm using a New Way of Permutation Methods
Chaos-based cryptosystem NIST perturbed technique
2010/2/1
This paper presents a novel chaos-based cryptosystem for secure transmitted images. In the proposed block encryption/decryption algorithm, two chaotic permutation methods (key-dependant shift approach...
Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves
Elliptic Curves Function Fields Hash Functions
2010/2/1
Let E be a non-supersingular elliptic curve over a finite field
Fq. At CRYPTO 2009, Icart [5] introduced a deterministic function Fq
E(Fq) which can be computed eciently, and allowed him and Coron
...
A Second Pre-image Attack Against Elliptic Curve Only Hash(ECOH)
Second Pre-image Attack Elliptic Curve Only Hash ECOH
2009/6/12
We present a second pre-image attack on ECOH. Our attack requires 2143
time for ECOH-224 and ECOH-256, 2206 time for ECOH-384, and 2287 time
for ECOH-512. The attack sets the checksum block to a fix...
Image Encryption by Pixel Property Separation
Pixel Property Separation Image Encryption Cryptanalytic Error Avalanche Effect
2009/6/11
Pixels in an image are essentially constituted of two properties, position and colour. Pixel Property Separation, a radically different
approach for Symmetric-key image encryption, separates these pr...
Cryptanalysis of RCES/RSES Image Encryption Scheme
Cryptanalysis RCES/RSES Image Encryption Scheme
2009/4/3
Recently, a chaos-based image encryption scheme called RCES (also called RSES) was proposed. This paper
analyzes the security of RCES, and points out that it is insecure against the known/chosen-plai...