With the continuous development of the blockchain technology and its applications, the demand for interoperability among blockchains is increasing. However, the isolation and closeness of blockchain as well as the heterogeneity among different blockchains cause the "island of value" effect of blockchain, which seriously hinder the widespread implementation and sound development of blockchain based integrated applications. Cross-chain technology of blockchain solves the problems of data circulation, value transfer and business collaboration among different blockchains, and is also an important approach to improve the scalability and interoperability of blockchains. According to the degrees of the implementation complexity and the function richness of cross-chain technology, the cross-chain technology of blockchain was summarized and then classified into three types: the basic cross-chain mechanisms, the cross-chain protocols based on these mechanisms, and the cross-chain applications with system architectures. Finally, the existing problems in cross-chain interoperations were summed up, thereby providing systematical and theoretical reference for the further research on cross-chain technology of blockchain.
Delay Tolerant Network (DTN) has characteristics of dynamic topology changes and limited node storage space. A DTN Epidemic Routing with Congestion Control strategy (ERC2) method was proposed. The method was based on a Dynamic Storage State Model (DSSM). According to sensing network conditions, the threshold of node's semi-congested state was dynamically adjusted to reduce the possibility of network congestion by nodes. The ACK index and message management queue were added to make node storage state change randomly with network load, dynamically update and actively delete redundant packages. Single or mixed mode was selected for message forwarding according to different congestion states combining with advantages of Epidemic and Prophet routing, so as to achieve the purpose of preventing, avoiding and canceling congestion, realizing adaptive buffer management of nodes and dynamically controlling congestion of network. Simulations were conducted on the ONE(Opportunistic Networking Environment) platform using Working Day Movement (WDM) model. In the simulation, ERC2 was 66.18% higher than Prophet in message delivery rate. The average latency of ERC2 was decreased by 48.36%, and the forwarding number was increased by 22.83%. The simulation results show that ERC2 has better network performance than Epidemic and Prophet routing algorithms in scenarios with different levels of congestion.
Splicing is the most universal image tampering operation, detection of which is effective for identifying image tamper. A blind splicing detection method was proposed. The method firstly analyzed the effects of different sub-bands on image splicing detection according to features of wavelet transform. High frequency sub-band was verified to be more appropriate for splicing detection both from theory analysis and experiment results. Secondly, the method conducted difference operation, rounded and made threshold to the coefficients as discrete Markov states, and calculated the state transition probabilities as splicing features. Finally, Support Vector Machine (SVM) was used as classifier, and the features were tested on Columbia image splicing detection evaluation datasets. The experimental results show that the proposed method performs better compared with other features and achieves a detection accuracy rate of 94.6% on the color dataset specially.