Current Issue : April - June Volume : 2018 Issue Number : 2 Articles : 5 Articles
The existing password-based encryption (PBE)methods that are used to protect private data are vulnerable to brute-force attacks.\nThe reason is that, for a wrongly guessed key, the decryption process yields an invalid-looking plaintext message, confirming\nthe invalidity of the key, while for the correct key it outputs a valid-looking plaintext message, confirming the correctness of the\nguessed key. Honey encryption helps to minimise this vulnerability. In this paper, we design and implement the honey encryption\nmechanisms and apply it to three types of private data including Chinese identification numbers, mobile phone numbers, and debit\ncard passwords. We evaluate the performance of our mechanism and propose an enhancement to address the overhead issue. We\nalso show lessons learned from designing, implementing, and evaluating the honey encryption mechanism....
By analyzing multi-sensor information fusion system and hall for workshop of meta-synthetic engineering (HWME)\nessentially, a universal information fusion system of HWME based on multi-sensor is put forward. Analyzing the fault\ndiagnosis framework of complex system based on information fusion technique, together with the research on the\ngeneral process of information fusion synthesis fault diagnosis, a fault diagnosis system framework of HWME based\non information fusion is set up, which is all-purposed and runs through the whole process of synthetic fault\ndiagnosis. By this method, a new approach to multi-sensor information fusion synthesis fault diagnosis has been\nfound....
Information transmission is an important part of the wellbore trajectory automatic control system. Combined with\nthe characteristics of the guided drilling system, drilling fluid pulse is selected as a tool for trajectory control. Negative\npulse transmission of drilling fluid is one of the key technologies to realize wellbore trajectory automatic control. In this\npaper, the working principle of negative pulse propagation of drilling fluid is introduced. The characteristics of negative\npulse propagation and signal pretreatment of drilling fluid are analyzed emphatically. Signal correlation analysis\nmethod is proposed for signal transmission of drilling fluid negative impulse well. In this paper, the propagation\ncharacteristics of drilling fluid pressure pulsed downward transmission system are studied deeply. The influence\nof various drilling parameters on the drilling fluid pressure pulse is analyzed, and the model of drilling fluid pressure\npulse is presented. Experimental results show that the proposed method can effectively separate useful signals from\ninterfering signals. It is verified by field experiment that the success rate of information decode system designed by\nthis method is high, which can meet the requirement of well trajectory precise control....
In modern times, people have paid more attention to their private information. The data confidentiality is very important\nin many economic aspects. In this paper, we proposed a secure auction system, in which the bids will not be revealed,\nand no one can fake the winning identity and the winner cannot change the winning bid. The communication cost of\nour scheme is low; only two rounds communication are needed between the bidders and the auctioneer. And we show\nthat our scheme achieves the desired security requirements....
Forensic research community keeps proposing new techniques to analyze digital images and videos. However, the\nperformance of proposed tools are usually tested on data that are far from reality in terms of resolution, source device,\nand processing history. Remarkably, in the latest years, portable devices became the preferred means to capture\nimages and videos, and contents are commonly shared through social media platforms (SMPs, for example, Facebook,\nYouTube, etc.). These facts pose new challenges to the forensic community: for example, most modern cameras feature\ndigital stabilization, that is proved to severely hinder the performance of video source identification technologies;\nmoreover, the strong re-compression enforced by SMPs during upload threatens the reliability of multimedia forensic\ntools. On the other hand, portable devices capture both images and videos with the same sensor, opening new\nforensic opportunities. The goal of this paper is to propose the VISION dataset as a contribution to the development\nof multimedia forensics. The VISION dataset is currently composed by 34,427 images and 1914 videos, both in the\nnative format and in their social version (Facebook, YouTube, and WhatsApp are considered), from 35 portable\ndevices of 11 major brands. VISION can be exploited as benchmark for the exhaustive evaluation of several image and\nvideo forensic tools....
Loading....