Identity Authentication in RFID Based Logistics-Customs Clearance Service Platform
暂无分享,去创建一个
In this paper, we propose a multiple objective GA scheme to promote watermarking robustness as well as imperceptibility. In contrast with the existing GA based approaches utilizing single objective optimization, we treat the image watermarking as a multiple objective optimization problem. Based on this new perspective, the inherent conflict existing in image watermarking can be objectively handled. The experimental study shows that our method indeed outperform the conventional GA-based approach in both robustness and imperceptibility.
[1] John J. Trinckes. Information Security Overview , 2009 .
[2] John T. Kohl,et al. The Kerberos Network Authentication Service (V5 , 2004 .
[3] William J. Leighton,et al. Information security: An overview , 1988, AT&T Technical Journal.
[4] Zhang Hong. ANALYSIS AND IMPROVEMENT OF AUTHENTICATION PROTOCOL NAMED KERBEROS , 2002 .
[5] Theodore Y. Ts'o,et al. Kerberos: an authentication service for computer networks , 1994, IEEE Communications Magazine.