Information security analysis of deterministic encryption and chaotic encryption in spatial domain and frequency domain

Author(s):  
Zhengmao Ye ◽  
Hang Yin ◽  
Yongmao Ye
2015 ◽  
Vol 8 (25) ◽  
Author(s):  
Joon Tae Ahn ◽  
Soonsuk Kim ◽  
Junghan Lee ◽  
Myung Gon Kim ◽  
Gil Hong Park ◽  
...  

Author(s):  
H. G. Kim ◽  
J. H. Son ◽  
T. Kim

In general, image mosaicking is a useful and important processing for handling images with narrow field of view. It is being used widely for images from commercial cameras as well as from aerial and satellite cameras. For mosaicking images with geometric distortion, geometric correction of each image should be performed before combining images. However, automated mosaicking images with geometric distortion is not a trivial task. The goal of this paper is the development of automated mosaicking techniques applicable to handle GOCI images. In this paper, we try to extract tie-points by using spatial domain and frequency domain matching and perform the mosaicking of GOCI. The method includes five steps. First, we classify GOCI image slots according to the existence of shorelines by spatial domain matching. Second, we perform precise geometric correction on the slots with shorelines. Third, we perform initial sensor modelling for the slots without shorelines and apply geometric correction based on the initial model. Fourth, the relative relationship between the slots without shorelines and the slots with shorelines is estimated through frequency domain matching. Lastly, mosaicking of geometrically corrected all 16 image slots is performed. The proposed method was verified by applying to real GOCI images. The proposed method was able to perform automated mosaicking even for images without shorelines, and its accuracy and processing time were satisfactory. For future research, we will improve frequency matching to generate multiple tie-points and to analyse the applicability of precise sensor modelling directly from frequency matching. It is expected that the proposed method can be applied to the follow-up sensor of the GOCI, GOCI-II, and other ocean satellite images.


Teknika ◽  
2013 ◽  
Vol 2 (1) ◽  
pp. 46-58
Author(s):  
Timothy John Pattiasina

Steganografi adalah seni dan ilmu menulis atau menyemhunyikan pesan tersembunyi dengan suatu cara sehingga selain si pengirim dan si penerima, tidak ada seorangpun yang mengetahui atau menyadari bahwa ada suatu pesan rahasia. lstilah steganografi termasuk penyemhunyian data digital dalam komputer Ada beberapa metode steganografi, salah satunya adalah metode Algorithms and Transformation. Metode menyembunyikan data dalam fungsi matematika yang disebut algoritma compression. Dua fungsi tersebut adalah Discrete Cosine Transformation (DCT) dan Wavelet Transformation. Fungsi DCT dan Wavelet yaitu untuk mentransformasikan data dari satu tempat (domain) ke tempat (domain) yang lain. Fungsi DCT yaitu mentransformasi data dari tempat spatial (spatial domain) ke tempat fiekuensi (frequency domain).


Author(s):  
Yushi Shen ◽  
Yale Li ◽  
Ling Wu ◽  
Shaofeng Liu ◽  
Qian Wen

This chapter is about guidance and implementation prepared by the Cloud Security Alliance (CSA) Security as a Service (SecaaS) workgroup, which is made up of users and practitioners in the field of information security. In preparing this implementation guide, input has been sought from experts throughout Europe, the Middle East, and the United States. A lot of professional judgment and experience are applied in the architecture, engineering, and implementation of a Security Information and Event Management (SIEM) guide to ensure that it logs the information necessary to successfully increase visibility and remove ambiguity, surrounding the security events and risks that an organization faces. By providing SIEM as a service under SecaaS, the provider has to be able to accept log and event information, customer information and event feeds, and conduct information security analysis, correlation, and support incident response. By providing flexible real-time access to SIEM information, it allows the party consuming the SIEM service to identify threats acting against their environment cloud. This identification then allows for the appropriate action and response to be taken to protect or mitigate the threat. The simple step of increasing visibility and removing ambiguity is a powerful tool to understanding the information security risks that an organization is facing.


Author(s):  
Thekra Abbas ◽  
Zou Beiji ◽  
Maan Younus Abdullah

Author(s):  
Daqian He ◽  
Dahai Zhang ◽  
Congying Wang ◽  
Xirui Peng

Abstract Broadband underwater acoustic signal direction of arrival (DOA) estimation method is an important part of underwater array signal processing. The commonly used array signal DOA estimation algorithms due to the restriction of algorithm principles, are unable to process broadband array signal effectively, at the case of the arriving signals have strong correlation, small sampling snapshots or small arrival angle. Therefore, we need a new efficient algorithm to meet the increasing demand of broadband under water acoustic signal processing method. This paper makes use of the broadband acoustic signal similarity of joint sparsity in signal spatial domain received by underwater sonar arrays, establishes the whole space grid covering all broadband frequency domain slices. On the basis, the global sparsity of each frequency domain slice is combined with sparse element extraction class algorithm. By integrating the energy of signal on each slice, the spatial sparsity of each slice is obtained, from which we can get the directions of the arriving broadband wave signals. Through the simulation analysis and experimental verification on lake, we can be see that: The SDJS algorithm improves the performance and signal processing capability of the algorithm compared with the traditional algorithms. Therefore SDJS algorithm has a widely range of research value and application space.


Sign in / Sign up

Export Citation Format

Share Document