Professional Documents
Culture Documents
A R T I C L E I N F O A B S T R A C T
Keywords: Corporate accounting information is a measure of the company’s accounting and external reporting systems. It is
Corporate accounting information routinely disclosed, which is quantitative data on its financial position and performance audit. The corporate
Neural network (NN) accounting information system contains confidential information that needs to be secured. The consequences of
FPGA
unauthorized access are data loss from identity theft issues. To solve the problem, encrypt and decrypt the
Authorized person
Unauthorized person
sensitive corporate accounting information and product the data using the proposed algorithm Neural Network
Encryption (NN) and Field Programmable Gate Array (FPGA) is used to classify the corporate accounting information
Decryption authorized person and unauthorized person. When one authorized user accesses the corporate account infor
mation, it generates the secret critical process. The proposed algorithm unauthorized person cannot access the
information is not allowed for stealing. Encryption is the process of converting to something as random and
meaningless as direct text data. Decryption is the process of restoring the ciphertext plaintext.
https://doi.org/10.1016/j.micpro.2021.103973
Received 15 December 2020; Received in revised form 5 January 2021; Accepted 11 January 2021
Available online 12 January 2021
0141-9331/© 2021 Elsevier B.V. All rights reserved.
X. Zhang Microprocessors and Microsystems 83 (2021) 103973
2
X. Zhang Microprocessors and Microsystems 83 (2021) 103973
The encrypted image is reconstructed and restored to the image to encrypt data for security purposes. Neural Network classifies the
network’s original image decrypted image [19]. To facilitate the authorized person or unauthorized person, and authorized persons
exploitation of data directly from the privacy protection of the envi decrypt the accounting information.
ronment, the region of interest mining network has to extract the
encrypted image made things interesting.
3.1. Corporate accounting information disclosure
Selective encryption is Data Stream Manager (DSM) methods,
confidentiality, ensuring multiple atmospheric sensed data streams meet
Management of corporate accounting information is related to the
the data integrity [20]. The method is based on two essential concepts:
implementation of control responsibilities, the relationship between
the shared key is re-initialized without re-transmission, the shared key is
accountability, shareholders, board members, and managers to achieve
updated using the DSM, encryption within the uninterrupted data its target company’s internal facilities. Corporate accounting informa
stream, it will be a seamless critical refresh process of
tion management is a company guidance and management system.
encoding/decoding. Challenges in corporate management, treatment of accountability
trading rights and the shareholders, the Board of Directors, and infor
3. Materials and methods mation disclosure are shareholders’ roles.
3
X. Zhang Microprocessors and Microsystems 83 (2021) 103973
3.3. Decryption
With the flexibility of Neural Networks, it is possible to analyse the Fig. 4. Analysis of encryption and decryption performance.
incomplete data, an advantage that - will be added. The nonlinear flow
of data in a communication network is another aspect that affects this 4. Result and discussion
selection. Because they represent the Neural Network’s output as a
probability, the NN’s output can work as a prediction. So, the Neural This section describes the proposed implementation process of the
Network (NN) classifies corporate accounting information as an autho proposed algorithm Neural Network (NN), compared to other existing
rized person or unauthorized person. The proposed algorithm of unau Data Stream Manager (DSM) and Support Vector Machine (SVM).
thorized persons cannot access the information and is not allowed for This Fig. 3 describes the design and digital modulation scheme and
stealing. implemented on the FPGA. The simulation system in MATLAB Simulink
Fig. 2 shows Field Programmable Gate Array (FPGA) also stores a environment and System Generator, FPGA design tools to be made.
plurality of bitstreams in the external flash memory. Then, you can Table 1 shows the simulation parameters using a visual studio with
choose between tracks and provides multiple functions. Master Serial SQL proposed algorithm compared to other existing methods.
Peripheral Interface (SPI) and Bits per inch mode are supported, multi-
boot, to FPGA re-configuration, will start by using the internal program
command.
4
X. Zhang Microprocessors and Microsystems 83 (2021) 103973
Acknowledgement
Reference
5
X. Zhang Microprocessors and Microsystems 83 (2021) 103973
International Joint Conference on Neural Networks (IJCNN), Rio de Janeiro, 2018, [18] D. Puthal, X. Wu, N. Surya, R. Ranjan, J. Chen, SEEN: a selective encryption
pp. 1–8, https://doi.org/10.1109/IJCNN.2018.8489381. method to ensure confidentiality for big sensing data streams, IEEE Trans. Big Data
[12] L.D.M. and K. Anton I, Neural network development for IT-users requests 5 (3) (2019) 379–392, https://doi.org/10.1109/TBDATA.2017.2702172, 1 Sept.
processing, in: 2020 IEEE Conference of Russian Young Researchers in Electrical [19] Chunhui Li, Biodiversity assessment based on artificial intelligence and neural
and Electronic Engineering (EIConRus), St. Petersburg and Moscow, Russia, 2020, network algorithms, Microprocess. Microsyst. 79 (2020), 103321. ISSN 0141-9331.
pp. 743–745, https://doi.org/10.1109/EIConRus49466.2020.9039326. [20] Xiaolu Wang, Yao Chen, Music teaching platform based on FPGA and neural
[13] A. Chaudhary, H. Mittal, A. Arora, Anomaly detection using graph neural network, Microprocess. Microsyst. (2020), 103337. ISSN 0141-9331.
networks, in: 2019 International Conference on Machine Learning, Big Data, Cloud
and Parallel Computing (COMITCon), Faridabad, India, 2019, pp. 346–350,
https://doi.org/10.1109/COMITCon.2019.8862186.
[14] Y. He, G.P. Liu, D. Rees, M. Wu, Stability analysis for neural networks with time- Xingfu Zhang, associate professor, graduated from school of
business administration, Anhui University. The main research
varying interval delay, IEEE Trans. Neural Netw. 18 (6) (2007) 1850–1854,
https://doi.org/10.1109/TNN.2007.903147. Nov. directions include enterprise management, financial manage
ment, financial accounting theory and practice. In recent years,
[15] D. Zhang, X. Zhang, Information security forecast based on artificial neural
networks and grey set pare analysis, in: The Proceedings of 2011 9th International he has published more than 10 papers of various types,
Conference on Reliability, Maintainability and Safety, Guiyang, 2011, participated in the compilation of 3 professional textbooks, and
pp. 473–476, https://doi.org/10.1109/ICRMS.2011.5979346. presided over more than 5 provincial teaching and research
[16] A.M. Samad, A.M. Zain, I. Maarof, K.A. Hashim, R. Adnan, Utilization of artificial projects.
neural network and GIS for property market valuation, in: 2011 IEEE 7th
International Colloquium on Signal Processing and its Applications, Penang, 2011,
pp. 325–331, https://doi.org/10.1109/CSPA.2011.5759897.
[17] Y. Ding, et al., DeepEDN: a deep learning-based image encryption and decryption
network for the internet of medical things, IEEE Internet Things J. (2000), https://
doi.org/10.1109/JIOT.2020.3012452.