Open Access
ARTICLE
Yan Wang*, Zhangjie Fu, Xingming Sun
Journal of Cyber Security, Vol.2, No.3, pp. 115-121, 2020, DOI:10.32604/jcs.2020.012275
Abstract Nowadays, with the popularization of network technology, more and
more people are concerned about the problem of cyber security. Steganography,
a technique dedicated to protecting peoples’ private data, has become a hot topic
in the research field. However, there are still some problems in the current
research. For example, the visual quality of dense images generated by some
steganographic algorithms is not good enough; the security of the steganographic
algorithm is not high enough, which makes it easy to be attacked by others. In
this paper, we propose a novel high visual quality image steganographic neural
network based on encoder-decoder… More >
Open Access
ARTICLE
Xiangshu Ou1, Mingfang Jiang2,*, Shuai Li1, Yao Bai1
Journal of Cyber Security, Vol.2, No.3, pp. 123-130, 2020, DOI:10.32604/jcs.2020.09703
Abstract In smart environments, more and more teaching data sources are
uploaded to remote cloud centers which promote the development of the smart
campus. The outsourcing of massive teaching data can reduce storage burden and
computational cost, but causes some privacy concerns because those teaching
data (especially personal image data) may contain personal private information.
In this paper, a privacy-preserving image feature extraction algorithm is
proposed by using mean value features. Clients use block scrambling and chaotic
map to encrypt original images before uploading to the remote servers. Cloud
servers can directly extract image mean value features from encrypted images.
Experiments… More >
Open Access
ARTICLE
Yizhi Liu, Rutian Qing, Jianxun Liu*, Zhuhua Liao, Yijiang Zhao, Hong Ouyang
Journal of Cyber Security, Vol.2, No.3, pp. 131-140, 2020, DOI:10.32604/jcs.2020.010625
Abstract Road network extraction is vital to both vehicle navigation and road
planning. Existing approaches focus on mining urban trunk roads from GPS
trajectories of floating cars. However, path extraction, which plays an important role
in earthquake relief and village tour, is always ignored. Addressing this issue, we
propose a novel approach of extracting campus’ road network from walking GPS
trajectories. It consists of data preprocessing and road centerline generation. The
patrolling GPS trajectories, collected at Hunan University of Science and
Technology, were used as the experimental data. The experimental evaluation results
show that our approach is able to effectively and… More >
Open Access
ARTICLE
Li Li1,*, Yifei Wei1, Lianping Zhang2, Xiaojun Wang3
Journal of Cyber Security, Vol.2, No.3, pp. 141-150, 2020, DOI:10.32604/jcs.2020.010764
Abstract The rapid growth of Internet content, applications and services require
more computing and storage capacity and higher bandwidth. Traditionally,
internet services are provided from the cloud (i.e., from far away) and consumed
on increasingly smart devices. Edge computing and caching provides these
services from nearby smart devices. Blending both approaches should combine
the power of cloud services and the responsiveness of edge networks. This paper
investigates how to intelligently use the caching and computing capabilities of
edge nodes/cloudlets through the use of artificial intelligence-based policies. We
first analyze the scenarios of mobile edge networks with edge computing and
caching abilities,… More >
Open Access
ARTICLE
Yuyi Huo1, Shi Zhou3, Ruiguo Hu1, Yongjun Ren1,2,*, Jinyue Xia4
Journal of Cyber Security, Vol.2, No.3, pp. 151-156, 2020, DOI:10.32604/jcs.2020.010963
Abstract In the field of electronic record management, especially in the current
big data environment, data continuity has become a new topic that is as
important as security and needs to be studied. This paper decomposes the data
continuity guarantee of electronic record into a set of data protection
requirements consisting of data relevance, traceability and comprehensibility,
and proposes to use the associated data technology to provide an integrated
guarantee mechanism to meet the above three requirements. More >