![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
Public Auditing of Log Integrity for Shared Cloud Storage Systems via Blockchain
Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...
-
Chapter and Conference Paper
Reversible Data Hiding Based on Bidirectional Generalized Integer Transform
This paper proposes a high capacity reversible data hiding (RDH) scheme by extending the unidirectional generalized integer transform (UGIT) to bidirectional GIT (BGIT). For non-embeddable blocks in UGIT based...
-
Article
Open AccessNetwork abnormal traffic detection method based on fusion of chord similarity and multiple loss encoder
Fog computing, as a new distributed computing framework, extends the tasks originally done in the cloud data center to the edge of the network and brings more serious security challenges while providing conven...
-
Article
Open AccessSKDStream: a dynamic clustering algorithm on time-decaying data stream
Data stream is a type of data that continue to grow over time. For example, network security data stream will constantly be generated in the field of data security, and encrypted data stream will be generated ...
-
Article
Open AccessABOS: an attention-based one-stage framework for person search
Person search is of great significance to public safety research, such as crime surveillance, video surveillance and security. Person search is a method of locating and identifying the queried person from a co...
-
Article
Open AccessMFVT: an anomaly traffic detection method merging feature fusion network and vision transformer architecture
Network intrusion detection, which takes the extraction and analysis of network traffic features as the main method, plays a vital role in network security protection. The current network traffic feature extra...
-
Article
Open AccessA blockchain-based secure storage scheme for medical information
Medical data involves a large amount of personal information and is highly privacy sensitive. In the age of big data, the increasing informatization of healthcare makes it vital that medical information is sto...
-
Article
Open AccessA two-stage detection method of copy-move forgery based on parallel feature fusion
The copy-move forgery refers to the copying and pasting of a region of the original image into the target region of the same image, which represents a typical tampering method with the characteristics of easy ...
-
Article
Public auditing of log integrity for shared cloud storage systems via blockchain
Cloud storage security has received widespread attention from industry and academia. When cloud data is damaged and tampered by various types of security attacks, it is one of the most common methods to track ...
-
Chapter and Conference Paper
A Survey of Data Hiding Based on Vector Quantization
With the development of computers and networks, digital data can be transmitted quickly to anywhere in the world. Information security has become the focus of research for several researchers as it is essentia...
-
Chapter and Conference Paper
Aesthetic QR Code Authentication Based on Directed Periodic Texture Pattern
More and more people use mobile phones to buy goods through scanning the printed aesthetic QR code. QR code has become an important payment tool in today’s business. However, there is an inevitable risk in pa...
-
Article
A Biometric-Based Authenticated Key Agreement Protocol for User-to-User Communications in Mobile Satellite Networks
Satellite systems have been integrating into worldwide networks to improve the quality of services, including mobility, reliability, and coverage. Such systems offer tremendous advantages to end users at any t...
-
Article
Public audit for operation behavior logs with error locating in cloud storage
To ensure the creditability of audit for operation behaviors in cloud storage scenarios, it is indispensable to verify the integrity of log files prior to forensic analysis. Thus, in this paper, we mainly focu...
-
Article
Untraceable biometric-based three-party authenticated key exchange for dynamic systems
An authenticated key exchange (AKE) between two end-users is a crucial procedure to ensure data integrity and confidentiality while they communicate through a public channel. The existing three-party AKE schem...
-
Chapter and Conference Paper
A New Aesthetic QR Code Algorithm Based on Salient Region Detection and SPBVM
Many aesthetic QR code algorithms have been proposed. In this paper, a new aesthetic QR code algorithm, based on salient region detection and Selectable Positive Basis Vector Matrix (SPBVM), is proposed. First...
-
Chapter and Conference Paper
Face Detection in a Complex Background Using Cascaded Conventional Networks
Although significant achievements have been achieved in the field of face detection recently, face detection under complex background is still a challenge issue. Especially, face detection has wide applicatio...
-
Chapter and Conference Paper
VQ Compression Enhancer with Huffman Coding
Vector quantization (VQ) is an effective and important compression technique with high compression efficiency and widely used in many multimedia applications. VQ compression is a fixed-length algorithm for ima...
-
Article
Security Issues in Ultralightweight RFID Authentication Protocols
Ultralightweight RFID authentication protocols have attracted much attention from both fields of science and industry in recent years due to their high efficiencies and extensive applicab...
-
Article
Enabling public auditability for operation behaviors in cloud storage
In this paper, we focus on auditing for users’ operation behaviors, which is significant for the avoidance of potential crimes in the cloud and equitable accountability determination in the forensic. We first ...
-
Chapter and Conference Paper
A Revisit to LSB Substitution Based Data Hiding for Embedding More Information
Steganography is a widely used approach to embed tremendous amount of secret message while maintaining satisfactory visual quality. Least-significant-bit (LSB) substitution is one of the famous techniques appl...