Computer Science ›› 2018, Vol. 45 ›› Issue (11A): 342-343.
• Information Security • Previous Articles Next Articles
GE Ya-jing, ZHAO Li-feng
CLC Number:
[1]FU M S,AU O C.Self-conjugate watermarking technique for halftone image[J].Electronics Letters,2003,39(4):356-358. [2]郑东,李祥学,黄征.密码学:密码算法与协议[M].北京:电子工业出版社,2009. [3]任勇金.基于Rijndeal和异或运算的QR二维码双重加密研究[J].华章,2012(29):338. [4]刘彦伟,王根英,刘云.QR码信息加密的研究与实现[J].推广与应用,2012,21(11):37-41. [5]李东.基于加密和解密的二维条形码的实现[J].科学传播,2010(7):114-115. [6]FU M S,AU O C.Self-conjugate watermarking technique for halftoneimages[J].Electronics Letters,2003,39(4):356-358. [7]杨康,袁海东,郭渊博.基于属性加密的二维码分级加密研究[J].计算机工程,2018,44(6):136-140. [8]张新文,李华康,杨一涛,等.基于二维码技术的个人信息隐私保护物流系统[J].计算机应用研究,2016,33(11):3455-3459. [9]龙强,刘小华.基于非对称密码体制的二维码加密算法[J].重庆师范大学学报(自然科学版),2017,34(3):91-95. [10]肖本海,郑莹娜,龙建明,等.基于SHA512哈希函数和Rijndael加密算法QR二维码信息安全设计[J].计算机系统应用,2015,24(7):149-154. [11]王尧哲.基于奇异值分解的水印算法与RSA公钥密码的结合应用[D].长沙:湖南师范大学,2008. |
[1] | LYU You, WU Wen-yuan. Privacy-preserving Linear Regression Scheme and Its Application [J]. Computer Science, 2022, 49(9): 318-325. |
[2] | WANG Lei, LI Xiao-yu. LBS Mobile Privacy Protection Scheme Based on Random Onion Routing [J]. Computer Science, 2022, 49(9): 347-354. |
[3] | ZHOU Lian-bing, ZHOU Xiang-zhen, CUI Xue-rong. Compressed Image Encryption Scheme Based on Dual Two Dimensional Chaotic Map [J]. Computer Science, 2022, 49(8): 344-349. |
[4] | LI Li, HE Xin, HAN Zhi-jie. Review of Privacy-preserving Mechanisms in Crowdsensing [J]. Computer Science, 2022, 49(5): 303-310. |
[5] | QIN Xiao-yue, HUANG Ru-wei, YANG Bo. NTRU Type Fully Homomorphic Encryption Scheme over Prime Power Cyclotomic Rings [J]. Computer Science, 2022, 49(5): 341-346. |
[6] | SONG Tao, LI Xiu-hua, LI Hui, WEN Jun-hao, XIONG Qing-yu, CHEN Jie. Overview of Research on Security Encryption Authentication Technology of IoV in Big Data Era [J]. Computer Science, 2022, 49(4): 340-353. |
[7] | REN Hua, NIU Shao-zhang, WANG Mao-sen, YUE Zhen, REN Ru-yong. Homomorphic and Commutative Fragile Zero-watermarking Based on SVD [J]. Computer Science, 2022, 49(3): 70-76. |
[8] | GAO Shi-yao, CHEN Yan-li, XU Yu-lan. Expressive Attribute-based Searchable Encryption Scheme in Cloud Computing [J]. Computer Science, 2022, 49(3): 313-321. |
[9] | LYU You, WU Wen-yuan. Linear System Solving Scheme Based on Homomorphic Encryption [J]. Computer Science, 2022, 49(3): 338-345. |
[10] | JIN Hua, ZHU Jing-yu, WANG Chang-da. Review on Video Privacy Protection [J]. Computer Science, 2022, 49(1): 306-313. |
[11] | LIANG Jian, HE Jun-hui. H.264/AVC Video Encryption Based on Adaptive Permutation of Macroblock Coding Information [J]. Computer Science, 2022, 49(1): 314-320. |
[12] | ZHANG Sai-nan, LI Qian-mu. Color Image Encryption Algorithm Based on Logistic-Sine-Cosine Mapping [J]. Computer Science, 2022, 49(1): 353-358. |
[13] | ZHANG Xiao-yan, LI Qin-wei, FU Fu-jie. Secret Verification Method of Blockchain Transaction Amount Based on Digital Commitment [J]. Computer Science, 2021, 48(9): 324-329. |
[14] | TANG Fei, CHEN Yun-long, FENG Zhuo. Electronic Prescription Sharing Scheme Based on Blockchain and Proxy Re-encryption [J]. Computer Science, 2021, 48(6A): 498-503. |
[15] | QIAN Xin-yuan, WU Wen-yuan. Identity-based Encryption Scheme Based on R-SIS/R-LWE [J]. Computer Science, 2021, 48(6): 315-323. |
|