1,330 research outputs found
Chosen-plaintext attack of an image encryption scheme based on modified permutation-diffusion structure
Since the first appearance in Fridrich's design, the usage of
permutation-diffusion structure for designing digital image cryptosystem has
been receiving increasing research attention in the field of chaos-based
cryptography. Recently, a novel chaotic Image Cipher using one round Modified
Permutation-Diffusion pattern (ICMPD) was proposed. Unlike traditional
permutation-diffusion structure, the permutation is operated on bit level
instead of pixel level and the diffusion is operated on masked pixels, which
are obtained by carrying out the classical affine cipher, instead of plain
pixels in ICMPD. Following a \textit{divide-and-conquer strategy}, this paper
reports that ICMPD can be compromised by a chosen-plaintext attack efficiently
and the involved data complexity is linear to the size of the plain-image.
Moreover, the relationship between the cryptographic kernel at the diffusion
stage of ICMPD and modulo addition then XORing is explored thoroughly
CyberLiveApp: a secure sharing and migration approach for live virtual desktop applications in a cloud environment
In recent years we have witnessed the rapid advent of cloud computing, in which the remote software is delivered as a service and accessed by users using a thin client over the Internet. In particular, the traditional desktop application can execute in the remote virtual machines without re-architecture providing a personal desktop experience to users through remote display technologies. However, existing cloud desktop applications mainly achieve isolation environments using virtual machines (VMs), which cannot adequately support application-oriented collaborations between multiple users and VMs. In this paper, we propose a flexible collaboration approach, named CyberLiveApp, to enable live virtual desktop applications sharing based on a cloud and virtualization infrastructure. The CyberLiveApp supports secure application sharing and on-demand migration among multiple users or equipment. To support VM desktop sharing among multiple users, a secure access mechanism is developed to distinguish view privileges allowing window operation events to be tracked to compute hidden window areas in real time. A proxy-based window filtering mechanism is also proposed to deliver desktops to different users. To support application sharing and migration between VMs, we use the presentation streaming redirection mechanism and VM cloning service. These approaches have been preliminary evaluated on an extended MetaVNC. Results of evaluations have verified that these approaches are effective and useful
Sex Ratio and Sexual Size Dimorphism in a Toad-headed Lizard, Phrynocephalus guinanensis
Phrynocephalus guinanensis has sexual dimorphism in abdominal coloration, but its ontogenetic development of sexual size dimorphism (SSD) is unknown. Using mark-recapture data during four days each year from August from 2014 to 2016, we investigated the development of sex ratios, SSD, sex-specific survivorship and growth rates in a population of P. guinanensis. Our results indicated that the sex ratio of males to females was 1:2.8. Males had a lower survival rate (6%) than females (14%) across the age range from hatchling to adult, which supported the discovered female-biased sex ratio potentially associated with the low survival rate of males between hatchlings and juveniles. Male-biased SSD in tail length and head width existed in adults rather than in hatchling or juvenile lizards. The growth rates in body dimensions were undistinguishable between the sexes during the age from hatchling to juvenile, but the growth rate in head length from juvenile to adult was significantly larger in males than females. Average growth rate of all morphological measurements from hatchling to juvenile were larger compared with corresponding measurements from juvenile to adult, but only being significant in tail length, head width, abdomen length in females and snout-vent length in males. We provided a case study to strengthen our understanding of the important life history traits on how a viviparous lizard population can survive and develop their morphology in cold climates
Deep Contrastive One-Class Time Series Anomaly Detection
The accumulation of time-series data and the absence of labels make
time-series Anomaly Detection (AD) a self-supervised deep learning task.
Single-normality-assumption-based methods, which reveal only a certain aspect
of the whole normality, are incapable of tasks involved with a large number of
anomalies. Specifically, Contrastive Learning (CL) methods distance negative
pairs, many of which consist of both normal samples, thus reducing the AD
performance. Existing multi-normality-assumption-based methods are usually
two-staged, firstly pre-training through certain tasks whose target may differ
from AD, limiting their performance. To overcome the shortcomings, a deep
Contrastive One-Class Anomaly detection method of time series (COCA) is
proposed by authors, following the normality assumptions of CL and one-class
classification. It treats the origin and reconstructed representations as the
positive pair of negative-samples-free CL, namely "sequence contrast". Next,
invariance terms and variance terms compose a contrastive one-class loss
function in which the loss of the assumptions is optimized by invariance terms
simultaneously and the ``hypersphere collapse'' is prevented by variance terms.
In addition, extensive experiments on two real-world time-series datasets show
the superior performance of the proposed method achieves state-of-the-art
CyberGuarder: a virtualization security assurance architecture for green cloud computing
Cloud Computing, Green Computing, Virtualization, Virtual Security Appliance, Security Isolation
A chaotic image encryption scheme owning temp-value feedback
This paper presents a novel efficient chaotic image encryption scheme, in
which the temp-value feedback mechanism is introduced to the permutation and
diffusion procedures. Firstly, a simple trick is played to map the plain-image
pixels to the initial condition of the Logistic map. Then, a pseudorandom
number sequence (PRNS) is obtained from iterating the map. The permutation
procedure is carried out by a permutation sequence which is generated by
comparing the PRNS and its sorted version. The diffusion procedure is composed
of two reversely executed rounds. During each round, the current plain-image
pixel and the last cipher-image pixel are used to produce the current
cipher-image pixel with the help of the Logistic map and a pseudorandom number
generated by the Chen system. To enhance the efficiency, only expanded XOR
operation and modulo 256 addition are employed during diffusion. Experimental
results show that the new scheme owns a large key space and can resist the
differential attack. It is also efficient.Comment: 10 pages, 4 figure
The contribution of pre-symptomatic infection to the transmission dynamics of COVID-2019.
Background: Pre-symptomatic transmission can be a key determinant of the effectiveness of containment and mitigation strategies for infectious diseases, particularly if interventions rely on syndromic case finding. For COVID-19, infections in the absence of apparent symptoms have been reported frequently alongside circumstantial evidence for asymptomatic or pre-symptomatic transmission. We estimated the potential contribution of pre-symptomatic cases to COVID-19 transmission. Methods: Using the probability for symptom onset on a given day inferred from the incubation period, we attributed the serial interval reported from Shenzen, China, into likely pre-symptomatic and symptomatic transmission. We used the serial interval derived for cases isolated more than 6 days after symptom onset as the no active case finding scenario and the unrestricted serial interval as the active case finding scenario. We reported the estimate assuming no correlation between the incubation period and the serial interval alongside a range indicating alternative assumptions of positive and negative correlation. Results: We estimated that 23% (range accounting for correlation: 12 - 28%) of transmissions in Shenzen may have originated from pre-symptomatic infections. Through accelerated case isolation following symptom onset, this percentage increased to 46% (21 - 46%), implying that about 35% of secondary infections among symptomatic cases have been prevented. These results were robust to using reported incubation periods and serial intervals from other settings. Conclusions: Pre-symptomatic transmission may be essential to consider for containment and mitigation strategies for COVID-19
- …