- Full text PDF available (0)
With the development of modern steganography technologies, steganalysis has been a new research topic in the field of information security. Since JPEG images have been widely used in our daily life, the steganalysis for JPEG images becomes very important and significant. This paper propose a new steganalysis method based on sparse representation, intending… (More)
This paper proposes a new architecture for the secure application of robust perceptual hashing. Protocols based on architecture of four parties are designed to ensure that no party can get the knowledge that may break the security of the hashing. A commutative hashing and encryption method that can generate multi-media hash on encryption domain is proposed… (More)
MDA, which is with the main-line of models conversion, not only lowered the mismatch of problem domain with solve domain, but also lowered dependence to technology. That makes developers be able to focus on the problems themselves. This paper mainly discusses the information platform development based on MDA. Associated MDA with Web application, it analyzed… (More)
The microgrid technology provides a desirable way and an opportunity to reduce the burning of fossil fuels. It also has important significance for utilizing and developing new energy. In this paper, the distribution generation is considered to provide electrical energy in a microgrid and the distribution generation devices mainly include the photovoltaic… (More)
The use of EDI(Electronic Data Interchange) in developed countries has been more common. It is successful in bringing business partners together and leveraged the Internet. As the basis of e-commerce, the function and types of EDI is introduced. Furthermore, cost-benefit analysis and swot analysis are designed.