Currently computing information systems have entered a new stage and the security of systems is more and more serious, and the research on system security is developing in depth. This paper discusses neuro-computing a...Currently computing information systems have entered a new stage and the security of systems is more and more serious, and the research on system security is developing in depth. This paper discusses neuro-computing applications in security of network information systems.展开更多
The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information ...The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.展开更多
全球科技竞争背景下,国家科技安全已成为事关国家主权、安全与发展利益的战略基石。本研究以情报赋能国家科技安全为核心命题,系统探讨情报在国家科技安全领域的理论框架、方法体系与实践路径。首先,在把握时代背景与现实需求的基础上,...全球科技竞争背景下,国家科技安全已成为事关国家主权、安全与发展利益的战略基石。本研究以情报赋能国家科技安全为核心命题,系统探讨情报在国家科技安全领域的理论框架、方法体系与实践路径。首先,在把握时代背景与现实需求的基础上,阐释国家科技安全的概念、特征及其风险挑战,指出情报赋能在风险防控与战略竞争中的理论内涵;其次,构建“情报赋能国家科技安全”(information empowerment for national science and technology security,IE-NSTS)的逻辑框架,从功能模块、赋能机制、系统架构等方面进行解析,提出基于动态科技安全知识图谱、多模态知识表征与推理等数据与知识融合驱动的智能情报方法体系;最后,从风险体系与预警机制、态势感知与风险画像、风险研判与应对策略、博弈推演与竞争战略四个层次,提出情报赋能国家科技安全实现路径,激发和使能情报在国家科技安全领域的“耳目、尖兵、参谋”作用,以情报赋能我国科技领域高质量发展和高水平安全。展开更多
基金This project was supported by the Foundation of State Key Lab for Software Engineering at Wuhan University.
文摘Currently computing information systems have entered a new stage and the security of systems is more and more serious, and the research on system security is developing in depth. This paper discusses neuro-computing applications in security of network information systems.
文摘The evolution in communication techniques has created wide threats for crucial information transfer through a communication channel. Covert communication with steganography is a skill of concealing secret information within cover object and hence shields the data theft over rapidly growing network.Recently, diverse steganography techniques using edge identification have been proposed in literature.Numerous methods however utilize certain pixels in the cover image for inserting edge information,resulting in significant deformation. The conventional edge detection method limits the deployment of edge detection in steganography as concealing the information would introduce some variations to the cover image. Hence inserting data in pixel areas recognized by existing conventional edge detection techniques like canny cannot ensure the recognition of the exact edge locations for the cover and stego images. In this paper, an Adaptive steganography method based on novel fuzzy edge identification is proposed. The method proposed is proficient of estimating the precise edge areas of a cover image and also ensures the exact edge location after embedding the secret message. Experimental results reveal that the technique has attained good imperceptibility compared to the Hayat AI-Dmour and Ahmed AIAni Edge XOR method in spatial domain.
文摘全球科技竞争背景下,国家科技安全已成为事关国家主权、安全与发展利益的战略基石。本研究以情报赋能国家科技安全为核心命题,系统探讨情报在国家科技安全领域的理论框架、方法体系与实践路径。首先,在把握时代背景与现实需求的基础上,阐释国家科技安全的概念、特征及其风险挑战,指出情报赋能在风险防控与战略竞争中的理论内涵;其次,构建“情报赋能国家科技安全”(information empowerment for national science and technology security,IE-NSTS)的逻辑框架,从功能模块、赋能机制、系统架构等方面进行解析,提出基于动态科技安全知识图谱、多模态知识表征与推理等数据与知识融合驱动的智能情报方法体系;最后,从风险体系与预警机制、态势感知与风险画像、风险研判与应对策略、博弈推演与竞争战略四个层次,提出情报赋能国家科技安全实现路径,激发和使能情报在国家科技安全领域的“耳目、尖兵、参谋”作用,以情报赋能我国科技领域高质量发展和高水平安全。