### 数学代写|密码学作业代写Cryptography & Cryptanalysis代考|Electronic Voting System Security

statistics-lab™ 为您的留学生涯保驾护航 在代写密码学Cryptography & Cryptanalysis方面已经树立了自己的口碑, 保证靠谱, 高质且原创的统计Statistics代写服务。我们的专家在代写密码学Cryptography & Cryptanalysis代写方面经验极为丰富，各种代写密码学Cryptography & Cryptanalysis相关的作业也就用不着说。

• Statistical Inference 统计推断
• Statistical Computing 统计计算
• (Generalized) Linear Models 广义线性模型
• Statistical Machine Learning 统计机器学习
• Longitudinal Data Analysis 纵向数据分析
• Foundations of Data Science 数据科学基础

## 数学代写|密码学作业代写Cryptography & Cryptanalysis代考|Electronic Voting System Security

For online voting, voting by participants not living in a neighboring region, attackers may use phishing attack (a fake voting website) to collect personal confidential information. To prevent such an attack, the login password for the legal voting website is split into two shares. One share is sent to the voter’s email address, and the other share is stored within the voting website. To log into the voting website, the voter needs to provide his user name and the first share. From the user name, the website will find the second share in its database. After stacking the two shares, the password will reveal itself [36].

To prevent multiple voting, each voter is provided with a unique voting ID card. He/She can execute voting only after his/her identity is verified. Naidu et al. proposed using visual cryptography to design such a mechanism [33]. Each user is identified by his/her fingerprint. During enrollment process, the voter’s fingerprint is taken and split into two shares. One share is stored in a voting ID card (a smart card), and the other share is stored in the voting sever. This can ensure that if either the voting ID card is lost or the databased is atlack, no information about the user’s privacy is leaked. During voting process, the two shares are gathered in a voting station and stacked to produce a fingerprint image. This fingerprint is compared with the live fingerprint taken at the voting station.

In a similar scenario as $[33]$, Chaum used VC to design a mechanism such that the voter will get a receipt after voting $[6,7]$. Using this receipt, he/she can ensure that his/her voting is counted. But this receipt should not reveal which candidate the voter has voted.

## 数学代写|密码学作业代写Cryptography & Cryptanalysis代考|E-Commerce Security

An E-commerce system may have a built-in deposit account and is usually protected by login username-password pair. This database of password is usually the target of attacks since it contains hash value of the login information. To secure this password, Yang et al. proposed a system using VC and optical character recognition (OCR) [55]. Only one share is stored in the database of the website, the other share is hold by the user. To log into the website, the user provides his/her share that will be stacked with the share stored in the database. An OCR system then can be used to recognize the password from the stacking result.

One major concern of online shopping is fake commodity. For example, cellphone is usually assigned with a unique serial number (SN), so that after receiving the cellphone, the buyer may verify the SN printed at the back of the cover from the manufacturer’s website. But this SN number is in plain text and can be easily copied to fake cellphone. In [57], Yang et al. designed an anti-counterfeiting mechanism for cellphone. The SN image is split into two shares. One share is printed within the cellphone, and the other share is stored in the manufacturer’s database. To verify his cellphone, the user upload his share to verification website and the staking result is sent back to the user’s cellphone. This stacking result reveals the true SN number, and can be compared to the one printed on the cellphone cover.

As a secret sharing mechanism, visual cryptography is suitable for applications involving splitting one secret into multiple shares and distributing to multiple participants. Furthermore, decoding involves collaboration between these participants and no key is needed. This is different from encryption, where a key is needed for encryption and decryption.

We end this subsection by noting that in some of these applications, either the secret image or the cover images are grayscale images. For applications involving recognition on the stacking result, the image quality must be good enough. For example, in the application where one needs to do face recognition, fingerprint recognition or OCR on stacking result, the stacking result must retain high fidelity with the original secret image. This motivates our focus in this book: improving image quality in visual cryptography.

## 数学代写|密码学作业代写Cryptography & Cryptanalysis代考|Classification of Visual Cryptography Algorithms

Considering the diverse types of VC algorithms developed over the last thirty years, it is difficult to classify a VC algorithm into just one type. As discussed above, there are three important factors to consider when designing a VC algorithm: pixel expansion, perceptual quality, and security. So the $\mathrm{VC}$ algorithms can be classified according to the combination of the above properties.

Based on the way the basis matrices are used and pixel expansion, one can classify the VC algorithms to deterministic, probabilistic or random grid. The deterministic

VC uses all columns of a basis matrix so it has pixel expansion. The probabilistic and random grid approach have no pixel expansion.

Based on the type of ‘stacking’ operation, we may classify the algorithms as based on ‘OR’ operation or ‘XOR’ operation.

Based on the type of the secret image, one may classify the VC algorithms as designed for binary secret image, halftone secret image, grayscale secret image or color secret image.

Based on the whether the shares are meaningful, one may classify a VC algorithm as ordinary VC having meaningless shares, or extended VC having meaningful shares.

## 数学代写|密码学作业代写Cryptography & Cryptanalysis代考|Classification of Visual Cryptography Algorithms

VC 使用基矩阵的所有列，因此它具有像素扩展。概率和随机网格方法没有像素扩展。

## 有限元方法代写

tatistics-lab作为专业的留学生服务机构，多年来已为美国、英国、加拿大、澳洲等留学热门地的学生提供专业的学术服务，包括但不限于Essay代写，Assignment代写，Dissertation代写，Report代写，小组作业代写，Proposal代写，Paper代写，Presentation代写，计算机作业代写，论文修改和润色，网课代做，exam代考等等。写作范围涵盖高中，本科，研究生等海外留学全阶段，辐射金融，经济学，会计学，审计学，管理学等全球99%专业科目。写作团队既有专业英语母语作者，也有海外名校硕博留学生，每位写作老师都拥有过硬的语言能力，专业的学科背景和学术写作经验。我们承诺100%原创，100%专业，100%准时，100%满意。

## MATLAB代写

MATLAB 是一种用于技术计算的高性能语言。它将计算、可视化和编程集成在一个易于使用的环境中，其中问题和解决方案以熟悉的数学符号表示。典型用途包括：数学和计算算法开发建模、仿真和原型制作数据分析、探索和可视化科学和工程图形应用程序开发，包括图形用户界面构建MATLAB 是一个交互式系统，其基本数据元素是一个不需要维度的数组。这使您可以解决许多技术计算问题，尤其是那些具有矩阵和向量公式的问题，而只需用 C 或 Fortran 等标量非交互式语言编写程序所需的时间的一小部分。MATLAB 名称代表矩阵实验室。MATLAB 最初的编写目的是提供对由 LINPACK 和 EISPACK 项目开发的矩阵软件的轻松访问，这两个项目共同代表了矩阵计算软件的最新技术。MATLAB 经过多年的发展，得到了许多用户的投入。在大学环境中，它是数学、工程和科学入门和高级课程的标准教学工具。在工业领域，MATLAB 是高效研究、开发和分析的首选工具。MATLAB 具有一系列称为工具箱的特定于应用程序的解决方案。对于大多数 MATLAB 用户来说非常重要，工具箱允许您学习应用专业技术。工具箱是 MATLAB 函数（M 文件）的综合集合，可扩展 MATLAB 环境以解决特定类别的问题。可用工具箱的领域包括信号处理、控制系统、神经网络、模糊逻辑、小波、仿真等。