Recently, a robust and secure image sharing scheme with personal identity information embedded was proposed based on Compressive Sensing, Secret Image Sharing and Diffie-Hellman Agreement. However, there exists a security flaw in this scheme. It cannot resist the man-in-the-middle attack in the authentication stage. Anyone can disguise himself as a legal person and get the information when exchanging the secret keys, which provides the possibility for information leakage, tampering, and other attacks. In this paper, we propose an image encryption and compression algorithm with identity authentication and blind signcryption based on Parallel Compressive Sensing (PCS), Secret Sharing(SS) and Elliptic Curve Cryptography (ECC). Firstly, Logistic-Tent system and PCS are employed to complete compression and lightweight encryption in the compression stage. Secondly, random sequences are generated based on Chebyshev map to construct four encryption matrices to perform the encryption process. Meanwhile, the participants' identity authentication and blind signcryption can be achieved by using ECC. Finally, we prove the efficiency and security of the blind signcryption, which can authenticate the participants' identity before restoring the original image. Experiments and security analysis demonstrate that the proposed scheme not only reduce the storage space and computational complexity effectively, but also has resistance against the man-in-the-middle attack, forgery attack and chosen-text attack.
We consider a 2nth-order nonlinear difference equation containing both many advances and retardations with p-Laplacian. Using the critical point theory, we obtain some new explicit criteria for the existence and multiplicity of periodic and subharmonic solutions. Our results generalize and improve some known related ones.
Based on that the computer will be infected by infected computer and exposed computer, and some of the computers which are in suscepitible status and exposed status can get immunity by antivirus ability, a novel coumputer virus model is established. The dynamic behaviors of this model are investigated. First, the basic reproduction numberR0, which is a threshold of the computer virus spreading in internet, is determined. Second, this model has a virus-free equilibriumP0, which means that the infected part of the computer disappears, and the virus dies out, andP0is a globally asymptotically stable equilibrium ifR0<1. Third, ifR0>1then this model has only one viral equilibriumP*, which means that the computer persists at a constant endemic level, andP*is also globally asymptotically stable. Finally, some numerical examples are given to demonstrate the analytical results.
This article proposes a novel fuzzy sliding-mode control scheme under an adaptive control strategy for energy management mechanism in electric vehicles that are subject to a regenerative braking system. The effectiveness of the fuzzy logic controller is to adjust the sliding mode parameters according to the slip ratio tracking error between the optimal slip ratio and the actual slip ratio. Specifically, the proposed torque distribution strategy can integrate the best battery condition and energy recovery efficiency under the practical constraints through this control method by fixing the pneumatic braking torque and motor torque.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.