Publish in OALib Journal

ISSN: 2333-9721

APC: Only $99


Any time

2019 ( 6 )

2018 ( 66 )

2017 ( 59 )

2016 ( 55 )

Custom range...

Search Results: 1 - 10 of 5014 matches for " Shiguo Lian "
All listed articles are free for downloading (OA Articles)
Page 1 /5014
Display every page Item
Image Authentication Based on Neural Networks
Shiguo Lian
Computer Science , 2007,
Abstract: Neural network has been attracting more and more researchers since the past decades. The properties, such as parameter sensitivity, random similarity, learning ability, etc., make it suitable for information protection, such as data encryption, data authentication, intrusion detection, etc. In this paper, by investigating neural networks' properties, the low-cost authentication method based on neural networks is proposed and used to authenticate images or videos. The authentication method can detect whether the images or videos are modified maliciously. Firstly, this chapter introduces neural networks' properties, such as parameter sensitivity, random similarity, diffusion property, confusion property, one-way property, etc. Secondly, the chapter gives an introduction to neural network based protection methods. Thirdly, an image or video authentication scheme based on neural networks is presented, and its performances, including security, robustness and efficiency, are analyzed. Finally, conclusions are drawn, and some open issues in this field are presented.
On the Robustness of the Delay-Based Fingerprint Embedding Scheme
Shiguo Lian
Computer Science , 2008,
Abstract: The delay-based fingerprint embedding was recently proposed to support more users in secure media distribution scenario. In this embedding scheme, some users are assigned the same fingerprint code with only different embedding delay. The algorithm's robustness against collusion attacks is investigated. However, its robustness against common desynchronization attacks, e.g., cropping and time shifting, is not considered. In this paper, desynchronization attacks are used to break the delay-based fingerprint embedding algorithm. To improve the robustness, two means are proposed to keep the embedded fingerprint codes synchronized, i.e., adding a synchronization fingerprint and adopting the relative delay to detect users. Analyses and experiments are given to show the improvements.
Secure Fractal Image Coding
Shiguo Lian
Computer Science , 2007,
Abstract: In recent work, various fractal image coding methods are reported, which adopt the self-similarity of images to compress the size of images. However, till now, no solutions for the security of fractal encoded images have been provided. In this paper, a secure fractal image coding scheme is proposed and evaluated, which encrypts some of the fractal parameters during fractal encoding, and thus, produces the encrypted and encoded image. The encrypted image can only be recovered by the correct key. To keep secure and efficient, only the suitable parameters are selected and encrypted through in-vestigating the properties of various fractal parameters, including parameter space, parameter distribu-tion and parameter sensitivity. The encryption process does not change the file format, keeps secure in perception, and costs little time or computational resources. These properties make it suitable for secure image encoding or transmission.
On the Collusion-Resistance of the Fingerprinting Algorithm Based on Additive Watermarking
Xi Chen,Shiguo Lian
Journal of Multimedia , 2011, DOI: 10.4304/jmm.6.4.369-375
Abstract: Digital fingerprinting is the technique used for traitor tracing in multimedia content distribution. It embeds unique customer information (e.g., customer ID) into multimedia content and generates different copies for different customers. The unique customer information can be extracted from the illegal copy and used to tell the traitor who re-distributes his copy to other unauthorized customers. Till now, there exist some fingerprint embedding algorithms, such as additive embedding, multiplicative embedding, quantization embedding, etc. However, the ability to resist collusion attacks is not studied. Collusion attack is the biggest threat to fingerprinting algorithms, which combines several copies together to produce a new copy without customer information. In this paper, the fingerprinting algorithm based on additive embedding is considered, its robustness against various collusion attacks are analyzed. The theoretical results are given, together with some simulation results. As is shown, the considered fingerprinting algorithm is robust against some of the collusion attacks, while becomes fragile to some other collusion attacks with the rise of the number of colluders. It is expected to provide some advices to design or analyze fingerprinting algorithms.
On the DCT Based Joint Fingerprint Embedding and Decryption Scheme
Xi Chen,Shiguo Lian
Journal of Multimedia , 2010, DOI: 10.4304/jmm.5.5.473-480
Abstract: Till now, some Joint Fingerprinting and Decryption (JFD) schemes have been reported, while few works have been done to analyze their performances. In this paper, the security of the JFD scheme proposed by Kundur et al. is analyzed and improved. The analyses include the compliance with general compression codecs, the security against cryptographic attacks, the security in perception, the relationship between security and robustness, and the relationship between security and imperceptibility. Additionally, some means are proposed to improve the scheme's performances. The encryption in block based DCT is introduced to make it compliant with such compression codec as JPEG or MPEG2. The multi-key encryption is presented to improve the security against cryptographic attacks. The DC encryption is proposed to strengthen the perceptual security against ciphertext-only attacks. These analysis methods can also be used to evaluate some other JFD schemes, and are expected to provide valuable information to design JFD schemes.
Security Analysis of A Chaos-based Image Encryption Algorithm
Shiguo Lian,Jinsheng Sun,Zhiquan Wang
Computer Science , 2006,
Abstract: The security of Fridrich Image Encryption Algorithm against brute-force attack, statistical attack, known-plaintext attack and select-plaintext attack is analyzed by investigating the properties of the involved chaotic maps and diffusion functions. Based on the given analyses, some means are proposed to strengthen the overall performance of the focused cryptosystem.
One-way Hash Function Based on Neural Network
Shiguo Lian,Jinsheng Sun,Zhiquan Wang
Computer Science , 2007,
Abstract: A hash function is constructed based on a three-layer neural network. The three neuron-layers are used to realize data confusion, diffusion and compression respectively, and the multi-block hash mode is presented to support the plaintext with variable length. Theoretical analysis and experimental results show that this hash function is one-way, with high key sensitivity and plaintext sensitivity, and secure against birthday attacks or meet-in-the-middle attacks. Additionally, the neural network's property makes it practical to realize in a parallel way. These properties make it a suitable choice for data signature or authentication.
Guest Editorial
Shiguo Lian,Zhu Li,Stefanos Gritzalis,Xi Chen
Journal of Multimedia , 2011, DOI: 10.4304/jmm.6.4.317-319
Abstract: 1 Introduction With the development of multimedia technology and network technology, multimedia services become more and more popular. In nowadays, multimedia information refers to not only text, image, video or audio but also graphics, flash, web, 3D data, etc. Multimedia information is networked in various modes, e.g., fixed network, wireless network, mobile network, etc. Multimedia information may be generated, processed, transmitted, retrievaled, consumed or shared in various environments. Additionally, security becomes an important issue for information networking. During the past decades, many works have been done in multimedia information networking and security. This special issue aims to expose the readership to the latest research results on Multimedia Information Networking and Security, demonstrate pioneer work, investigate novel solutions and discuss the future trends in this field. It is composed of 8 papers, most of which are selected from best papers recommended by international conference - MINES2010, covering the topics of multimedia computing, intelligence, communication, copyright protection, and security. Additionally, all these submissions have been reviewed by at least two reviewers for each paper. 2 The papers in this special issue The first paper, "Code Syntax-Comparison Algorithm based on Type-Redefinition-Preprocessing and Rehash Classification" by B. Cui et al., proposes code comparison technologies for large-scale software plagiarism detection. The first technology is based on type redefinition plagiarism detection, which could detect the level of simple type redefinition, repeating pattern redefinition, and the redefinition of type with pointer. Another one is based on rehash classification, which enhances the node storage structure of the syntax tree, and greatly improves the efficiency. The technologies can be used for software security protection and plagiarism detection. In the second paper, "Software Watermarking Through Obfuscated Interpretation: Implementation and Analysis" by Y. Zeng et al., a software watermarking scheme robust against various attacks including collusion attacks is proposed based on obfuscated interpretation. This scheme spreads the watermark over the entire program by modifying instruction frequencies, in which, the obfuscated interpretation technique is adopted to hide the functionality of a given program and provide an alternative simple way to manipulate the instruction frequencies. Some experimental results are given to show the proposed watermark scheme’s robustness against various attacks. Th
Improved LSB-matching Steganography for Preserving Second-order Statistics
Guangjie Liu,Zhan Zhang,Yuewei Dai,Shiguo Lian
Journal of Multimedia , 2010, DOI: 10.4304/jmm.5.5.458-463
Abstract: In the paper, for enhancing the security of the traditional LSB matching, two improved LSB-matching methods are proposed. In the steganograhical procedure, the Markov chain distance based on the second-order statistics is chosen as the security metric to control the modification directions of ±1 embedding. The first method is based on stochastic modification, which directly determines the modification directions by the empirical Markov transition matrix of a cover image and the pseudorandom number generated by a pseudorandom number generator. The second one is based on genetic algorithm, which is used to find the optimum matching vector to make the security metric as small as possible. Experiments show the proposed algorithms outperform LSB matching and LSB replacement in a sense of the firstorder and second-order security metrics. And the adjacent calibrated COM-HCF steganalytical tests also show that the two algorithms are more secure than the traditional ones.
A Speed-Adaptive Media Encryption Scheme for Real-Time Recording and Playback System
Xiao Chen,Lian Shiguo,Wang Lifeng,Ma Shilong
EURASIP Journal on Wireless Communications and Networking , 2010,
Abstract: The recording and playback system (RPS) in video conference system needs to store mass of media data real-timely. Considering the security issue, media data should be encrypted before storing. Traditional full encryption and partial encryption algorithms are not applicable to RPS because they could not adjust their speed to meet the throughput variation of media data in real-time RPS. In this paper, a novel lightweight speed-adaptive media-data encryption (SAME) scheme is proposed firstly. Secondly, the SAME is improved to a packet-based algorithm according to the implementation of data storage in RPS system. Thirdly, an RPS oriented queue theory-based autoadaptive speed control mechanism for SAME is designed. Finally, these schemes are integrated into the practical system, that is, AdmireRPS, an RPS of a heterogeneous wireless network-(HWN-) oriented video conference system. Theoretical analysis and experimental results show the SAME is effective enough to support real-time applications. In addition, the proposed schemes also can be used in video surveillance and other video recording systems.
Page 1 /5014
Display every page Item

Copyright © 2008-2017 Open Access Library. All rights reserved.