3 research outputs found

    Explore the potential of deep learning and hyperchaotic map in the meaningful visual image encryption scheme

    No full text
    Abstract In recent years, meaningful visual image encryption schemes that the plain image is compressed and encrypted and then hidden into the carrier image have received increasing attention. This paper proposes a new meaningful visual image encryption scheme, which consists of three stages: compression (compression network)—encryption (2D‐SLC hyperchaotic map)—hiding (matrix encoding). First, the advantages of deep learning are explored. It can compress the width, height, channel, and pixel values of the plain image simultaneously. Second, a new 2D‐SLC hyperchaotic map is designed to ensure security. It has a larger chaotic space and better randomness. Finally, to obtain a high‐quality cipher image, the secure secret image is hidden in the grey carrier image by matrix encoding. The scheme can compress and encrypt the grey or colour plain image and then hide it in a grey carrier image. In addition, the theoretical peak signal‐to‐noise ratio (PSNR) between the cipher image and the carrier image is improved from 40.9292 to 42.1785 dB. The total running time is only about 0.35, 0.87 and 3.1 s for a 256 × 256, 512 × 512 and 1024 × 1024 grey or colour plain image, respectively

    From Replay to Regeneration: Recovery of UDP Flood Network Attack Scenario Based on SDN

    No full text
    In recent years, various network attacks have emerged. These attacks are often recorded in the form of Pcap data, which contains many attack details and characteristics that cannot be analyzed through traditional methods alone. Therefore, restoring the network attack scenario through scene reconstruction to achieve data regeneration has become an important entry point for detecting and defending against network attacks. However, current network attack scenarios mainly reproduce the attacker’s attack steps by building a sequence collection of attack scenarios, constructing an attack behavior diagram, or simply replaying the captured network traffic. These methods still have shortcomings in terms of traffic regeneration. To address this limitation, this paper proposes an SDN-based network attack scenario recovery method. By parsing Pcap data and utilizing network topology reconstruction, probability, and packet sequence models, network traffic data can be regenerated. The experimental results show that the proposed method is closer to the real network, with a higher similarity between the reconstructed and actual attack scenarios. Additionally, this method allows for adjusting the intensity of the network attack and the generated topology nodes, which helps network defenders better understand the attackers’ posture and analyze and formulate corresponding security strategies
    corecore