SCAN-CA Based Image Security System
|
|
|
- Dwain McDaniel
- 10 years ago
- Views:
Transcription
1 SCAN-CA Based Image Security System Bhagyashree.S.Anantwar 1, S.P.Sonavane 2 Student, Department of Computer Science and Engg, Walchand College of Engg, Sanli, India 1 Asso. Professor, Department of Information Technology, Walchand College of Engg, Sangli, India 2 Abstract: This paper presents a new methodology for image encryption. The SCAN-CA based image security system belongs to the stream cipher. Its encryption is based on permutations of image pixels and replacement of pixel values. The permutation is done with SCAN pattern generated by the SCAN methodology. SCAN patterns are developed based on the encryption specific SCAN language, which has production rule to generate a different SCAN grammar. The SCAN grammar produces a variable length scan key which is used for image encryption with CA substitution. Image pixel values are replaced using the recursive Cellular Automata substitution. Cellular Automata are dynamical systems in which time and space are discrete. The proposed image encryption method is lossless and it uses a very large number of secret keys. The pixel value permutation is key dependent. Thus, this encryption system finds a great scope in the field of security in terms of, grammar based key generation, large key space with time and space. Keywords: Image security, Stream Cipher, SCAN methodology, Encryption and Decryption, Cellular Automata I. INTRODUCTION With the rapid growth in communication and computer technology, there is a huge data transaction in mobile, internet, TV, teleconferencing, telemedicine and military application. Image encryption schemes have been increasingly developed to meet the requirements for secure transmission over the communication channel. Encryption is an effective mean for reliable security. Numerous image encryption methods are available. They include SCAN- Based methods [2], chaos-based methods, tree structurebased methods and other sophisticated methods. Each method has its strengths and limitation in terms of security, speed and resulting stream size metrics. Each method has discussed above have limitation over a length of security keys. The advantage of the encryption method is with variable length security keys and its corresponding flexible encryption complexity. Therefore, this encryption method can be used by then, when users can choose a suitable security key, according to their requirement for preventing attacks. This image security method belongs to synchronous stream cipher whose encryption method is based on the permutation of image pixel and replacement of image pixel values. Permutation of image pixel is done by scanning patterns that are generated by the SCAN approach. The pixel values are replaced using a recursive cellular Automata substitution with a generated sequence of Cellular Automata from the Cellular evolution rules. The Scan pattern generated from SCAN approach described in [4] is used because it produces a large number of Scan patterns. Some of the CA advantages are: (1) CA has been successfully applied to several physical systems, processes and scientific problems that involve local II. SCAN approach and Cellular Automata (CA) A. Scanning Definition. A scanning of two dimensional array is an order, where each element of an array is accessed exactly once. Scanning of a 2-D array is the permutation of the interactions as in image processing, data encryption, byte error correcting code. (2) It has also been used in pseudorandom number generators for VLSI built-in selftest. (3) Number of CA evolution rules are very large. Hence, many techniques are available for producing a sequence of CA data for encrypting and decrypting images. (4) Recursive CA substitution only requires integer arithmetic and/or logic operations that simplifying the computation. The security system discussed in this paper is different from the other that are described in [7]. In this work, hybrid 2-D Von Neumann CA was used to generate a highquality random sequence as a key - stream, with recursive CA substitution in the encryption and decryption schemes such that the image security system was secure. The cipher systems in the cited study [7] are affine and based on 1-D CA and the encryption and the decryption schemes in [7] are non recursive. Another study [8] showed that affine cipher systems are insecure. The proposed SCAN-CA image security system is an extended and improved version of that presented in the cited study [9], because this system used SCAN techniques and four groups of CAbased recursive substitution to make the exhaustive searching attack much harder and to enhance the performance of the system. The rest of this paper is organized as follows: Section II provides the key background in SCAN approach and CA. Section III discusses the proposed image security method. Section IV presents the possible secret keys. Section V gives simulation results. The Conclusion is finally drawn in the last section. array elements. Thus scanning of the 2-D array is a F M N = {if (i, j): 0 i M-1, 0 j N-1} is a mapping function from to the set of {g (l): 0 l (M N-1)}. M N array has (M N)! scanning paths. The SCAN is a formal language-based two-dimensional spatial-accessing methodology which can represent and generate a large Copyright to IJARCCE DOI /IJARCCE
2 number of wide variety of scanning paths easily. The SCAN is a family of formal languages such as Simple SCAN, Extended SCAN and Generalized SCAN, each of which can represent and generate a specific set of scanning paths. Fig 1. Shows an array and two different scanning of that array. One of the scanning path shown is the most widely used is raster scanning. V : Partition with a partition pattern B or Z or X respectively. T : Basic eight transformations use of scanning and partitioning. Eight transformations encoded as three digit binary numbers. I 0W: Store the original image of the region. Prefix 0 indicates storing an original image region. W Binary string of length 2 2n means, store the image of the region. B. Cellular automata (CA) Cellular Automata provides a convenient way to represent many kinds of systems in which the values of cells in an array are updated in discrete steps according to a local rule. The cells are arranged in a regular lattice structure, have a finite number of states. These states are updated in a synchronous manner according to a specified local rule of neighbourhood interaction. The neighbourhood of a cell refers to the cell and some or all of its immediate neighbours. Fig 2 shows Von Neumann and Moore neighbourhood. Fig 1. (a) 4 4 array, (b) Scan pattern 1 (c) Scan pattern 2 [2] Each SCAN language is defined by the grammar. Each language has a set of basic scan patterns, a set of transformation of scan patterns and a set of rules to recursively compose simple scan patterns to obtain complex scan patterns. There are 8 different transformations of scan patterns. They are identity, horizontal reflection, vertical reflection, rotation by 90, 180, 270 and composition of these transformations [2]. In the proposed encryption method, the scanning patterns are used as the encryption keys to rearrange the pixels of the image. The scanning patterns are generated by an encryption-specific SCAN language. This SCAN language uses four basic scan patterns. They are continuous orthogonal O and Spiral S. Each basic pattern has eight transformations numbered from 0 to 7. For each basic scan pattern, the transformations 1, 3, 5, 7 are the reverse of transformations 0, 2, 4, 6, respectively. The scanning is formally defined by the grammar H= (Γ, Α,Π, Σ) where, Γ= {A,S,P,U,V,T,I,W} are non-terminal symbols, Σ= {0,1} are terminal symbols, A is the start symbol and production rule Π are given by A S P I: Process the region by a scan S or a partition P or storing image I. S 10UT: means scan the region with basic scan pattern U and transformation T. Prefix 10 indicates basic scanning. P 11VT(A A A A): Partition the region with partition pattern V and transformation T and process each of the four sub-regions in partition order using As from the left to the right. Prefix 11 used indicates the partitioning. U : Scan with a specific scan pattern C or D or O or S respectively. Copyright to IJARCCE DOI /IJARCCE (a) (b) Fig 2. (a) Von Neumann Neighbourhood (b) Moore Neighbourhood [3] The Von Neumann neighbourhood, which considers the set V N ={(0,0), (-1,0), (0,1), (1,0), (0,-1)} and then V N (i,j) = {(i,j), (i-1,j), (i,j+1), (i+1,j), (i,j-1)}, i.e. the neighbourhood of a cell are the cell itself and the four cells placed in the North, South, East and West positions. The Moore neighbourhood is defined by the set: V M ={ (0,0), (-1,0), (-1,1), (0,1), (1,1), (1,0), (1,-1), (0,-1), (-1,-1) } So that each cell has nine neighbours: the cell itself, North, North-East, East, South-East, South, South-West, West and North-West. Using a specified rule of neighbourhood, the states are updated synchronously in discrete time steps
3 for all cells. For a k-state CA each cell can take any of the integer values between 0 and (k-1). The state of each cell in a 2-D, k-state, Von Neumann neighbourhood CA, is given by the Boolean variable a = a(i, j, t), 0 i, j, t N-1. The quantity of a(i, j, t) represents the state of the (i, j)th cell at discrete time t, whose four neighbours are in the states a(i-1, j, t), a(i+1, j, t), a(i, j-1, t) and a(i, j+1, t). For a 2-D Von Neumann 2-state CA, each cell has (2 2 ) 5 possible CA evolution, which can be expressed as key and a sequence of N-bit encrypted data are required. The image can be decrypted by applying reverse CA substitution key,inverse scan key. The final decrypted image is same in the dimension as the N*N original image because the given image security system is lossless. The selection of scan pattern is independent of image size, but the selection of 2-D cellular automata is dependent on image size. a(i, j, t+1) = f B (a(i-1, j, t), a(i+1, j, t), a(i, t), a(i, j-1, t), a(i,j+1,t))...(1) Here f B (.) is a Boolean function defining the rule. Different cells apply different rules, making the CA hybrid. Since the evolution of the (i,j)th cell can be represented as a combinational logic. 2 a(i, j, t+1) = C 0 (C 1. a(i-1, j, t) C 2. a(i, j-1, t) C 3. a(i, j, t) C 4. a(i, j+1, t) C 5. a(i-1,j,t)...(2) III. The proposed image security system The proposed SCAN-CA based image security system belongs to the stream cipher. A stream cipher is a symmetric key cipher where the plaintext is combined with pseudorandom cipher. In a stream cipher each plaintext is encrypted one at a time with the corresponding number or text of the key stream, to give a digit or the text of the ciphertext stream. The idea of the system is: a) Rearrange the pixels of the image using Scan keys b) Pixel values are changed by CA substitution. For 2-D N*N-cell dual state (0,1) Von Neumann Cellular Automata runs over T time steps. It has 2 32*(N*N) rules, 2 N*N initial conditions, 2 4N boundary conditions. The CA key is of variable length according to the size of 2-D CA and the number of time steps. Fig. 3 shows the SCAN-CA based image security system. Keys are used for various purposes, such as for encryption and decryption consisting two keys those are scan key and the cellular automata substitution key. Secret keys used for encryption and decryption process are randomly selected according to the requirement of the desired security strength and which are both known to the sender and receiver, before the communication of the encrypted image. The scan key is represented by the encryption-specific scan language and it is used for assigning the typical scanning pattern to the image to rearrange the pixel of the given input image. A(k,l), 0 k, l N-1. CA key used for CA substitution consist of rule selection bits, initial or seed condition bits, boundary condition bits used to encrypt F(i), 0 i L1-1 a sequence of N-bit input data.on the sender side, suppose a single pixel is changed in A(k,l), 0 k, l N-1 then the corresponding pixel value at some location j in B(j), 0 j (N*(N-1)) has also changed. CA key generates an N bit sequence E(i), 0 j L-1, encrypted data. On the receiver side, a scan key, CA Fig(3) SCAN-CA based image security system IV. Possible secret keys Let T(n) be the different scan patterns of an 2 dimensional 2 n * 2 n array generated by the specific SCAN key defined by the encryption-specific SCAN language. For a 2 n * 2 n where n 2 images, there are eight different basic scan patterns each with eight transformations resulting in 64 basic scan-transformation patterns. When n 3, there are additionally 24 ways to partition the image into four subregions of size 2 n-1 *2 n-1 each having T(n-1) recursive scan patterns. This results in T(2)=64 and T(n)=64+24(T(n-1)) 4, n 3. However, only a portion of scan patterns with a finite number of scan iterations shall achieve a good dispersion, the length of scan key was thus carefully determined as 46bits, meaning that only 246 scan patterns shall be used in the simulation. This method uses specified secret key to generate a keystream used to encrypt the image. The length of the keystream can be as equal as the length of original image to match the goal of security. The relationship between the image size and the minimum size of a suitable 2-D CA is described as follows. If an image with size of 2 n1 *2 n2 want to be encrypted, then the minimum size of a suitable 2-D CA is with size of n1 + n2 + 3 n1 + n2 + 3 for n1 + n2 + 3< 8 or n1 + n2 + 4 n1 + n2 + 4 for n1 + n The length of a CA state cycle is very important in determining the suitability of the CA as a generator of random numbers. The average cycle length for 2-D N*N cell dual-state Von Neumann CA increases exponentially and is on the order of 2 N*N. Most cycle length of 2-D 8 8 cell-dual state Von Neumann CA will be longer than Copyright to IJARCCE DOI /IJARCCE
4 IV. Experiment The software implementation of the proposed SCAN-CAbased image security system was performed using Matlab The image used for the experiment is gray scale Lena image which was used to evaluate the performance of this SCAN-CA-based image security system. Various scan keys with number of scan iterations are used to rearrange the pixels of these tested images. Fig(4) shows and original Lena image. Fig(5) shows simple spiral scan pattern using the scan grammar S5 and the corresponding scan key shown in Table I. Similarly, Fig(6) shows continuous raster scan pattern C2 and Fig(7) shows continuous diagonal scan D7 of the original image. Fig(8) shows partitioned image using scan grammar B3(S5 C2). Image is partitioned into two halfs with partition pattern B and transformation 3 and each half is then scanned using two different scanning patterns. First half scans using spiral pattern S with transformation 5 and the other half is scan using continuous raster scan pattern with transformation 2. Similarly, Fig(9) shows partitioned image using scan grammar B0(C2 S5 D7 I). The generation of grammar is based on the production rule. Table I shows the basic scan grammar and the scan key generated from the scan grammar. Fig (8) partitioned image using scan pattern B3(S5 C2) Fig(4) Original Image Fig(5) Spiral Scan Fig(9) partitioned image using scan pattern B0(C2S5D7I) Different Scan patterns are applied for permutations of the image pixels and the same CA rule is applied to all scanned images for encryption. Decrypted image has same entropy value as that of the original image as shown in Fig(10) and its PSNR value come out to be infinity. Fig(6)RasterScan Fig(7) Diagonal Scan Table I SCAN GRAMMAR AND SCAN KEY Sr.no SCAN Grammar SCAN key 1 Basic spiral pattern S with transformation 5 (S5) Basic continuous raster pattern C with transformation 2 (C2) Basic continuous diagonal pattern D with transformation 7 (D7) Partition grammar1 B3(S5 C2) Partition grammar2 B0(C2 S5 D7 I) Copyright to IJARCCE DOI /IJARCCE
5 V. CONCLUSION The image security system based on SCAN methodology and Cellular Automata have following advantages : (1) Large number of key space. (2) Dynamic choice CA rule to increase cryptcomplexity. (3) Choosing a suitable size for the 2-D CA, according to the size of the image, enables the system to withstand the cropping-and-replacement attack. REFERENCES [1] Rong-Jian Chen, Shi-Jinn Horng Novel SCAN-CA-based image security system using SCAN and 2-D Von Neumann cellular automata,the Journal of Signal Processing :Image Communication 25(2010) [2] S.S. Maniccam, N.G. Bourbakis,,"Lossless Image compression and encryption using SCAN patterns", Pattern Recognition 35(2001) [3] Saisubha V, Priyanka U, Remya K R & Reenu R "Image Encryption Using SCAN Pattern", Proceedings of AECE-IRAJ International Conference, 14th July 2013, Tirupati, India, ISBN: [4] R.J. Chen, J.L. Lai," Image security system using recursive cellular automata substitution", Pattern Recognition 40 (5) (2007) [5] Franciszek Seredynski, Pascal Bouvry, Albert Y, Zomaya," Cellular automata computations and secret key cryptography", Parallel Computing International Conference 2004 Published by Elsevier B.V. doi: /j.parco [6] A. Martin del Rey, G.Rodriguez Sanchez, A.del la Villa Cuenca, "Encrypting Digital Image using cellular Automata", E. Corchado et al. (Eds.): HAIS 2012, part II, LNCS 7209,pp 78-88,2012 Springer- Verlag Berlin Heidelberg [7] Rosin P L, "Training Cellular Automata for Image Processing ", IEEE transaction Image Processing 15 (7) (2006), pp , ISSN Copyright to IJARCCE DOI /IJARCCE
Colour Image Encryption and Decryption by using Scan Approach
Colour Image Encryption and Decryption by using Scan Approach, Rinkee Gupta,Master of Engineering Scholar, Email: [email protected] Jaipal Bisht, Asst. Professor Radharaman Institute Of Technology
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach
Bit-Level Encryption and Decryption of Images Using Genetic Algorithm: A New Approach Gamil R. S. Qaid 1, Sanjay N. Talbar 2 1 Research Student, Electronics & Telecommunications Dept.,S.G.G.S. institute
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm
Programmable Cellular Automata Based Efficient Parallel AES Encryption Algorithm Debasis Das 1, Rajiv Misra 2 Department of Computer Science and Engineering, Indian Institute of Technology, Patna Patna-800013,
A New Digital Encryption Scheme: Binary Matrix Rotations Encryption Algorithm
International Journal of Research Studies in Computer Science and Engineering (IJRSCSE) Volume 2, Issue 2, February 2015, PP 18-27 ISSN 2349-4840 (Print) & ISSN 2349-4859 (Online) www.arcjournals.org A
Mathematical Model Based Total Security System with Qualitative and Quantitative Data of Human
Int Jr of Mathematics Sciences & Applications Vol3, No1, January-June 2013 Copyright Mind Reader Publications ISSN No: 2230-9888 wwwjournalshubcom Mathematical Model Based Total Security System with Qualitative
Network Security: Cryptography CS/SS G513 S.K. Sahay
Network Security: Cryptography CS/SS G513 S.K. Sahay BITS-Pilani, K.K. Birla Goa Campus, Goa S.K. Sahay Network Security: Cryptography 1 Introduction Network security: measure to protect data/information
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection
Secure Key Exchange for Cloud Environment Using Cellular Automata with Triple-DES and Error-Detection Govinda.K 1, Sathiyamoorthy.E *2, Surbhit Agarwal 3 # SCSE,VIT University Vellore,India 1 [email protected]
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
First Semester Examinations 2011/12 INTERNET PRINCIPLES
PAPER CODE NO. EXAMINER : Martin Gairing COMP211 DEPARTMENT : Computer Science Tel. No. 0151 795 4264 First Semester Examinations 2011/12 INTERNET PRINCIPLES TIME ALLOWED : Two Hours INSTRUCTIONS TO CANDIDATES
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
AStudyofEncryptionAlgorithmsAESDESandRSAforSecurity
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 15 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Diffusion and Data compression for data security. A.J. Han Vinck University of Duisburg/Essen April 2013 [email protected]
Diffusion and Data compression for data security A.J. Han Vinck University of Duisburg/Essen April 203 [email protected] content Why diffusion is important? Why data compression is important? Unicity
Block encryption. CS-4920: Lecture 7 Secret key cryptography. Determining the plaintext ciphertext mapping. CS4920-Lecture 7 4/1/2015
CS-4920: Lecture 7 Secret key cryptography Reading Chapter 3 (pp. 59-75, 92-93) Today s Outcomes Discuss block and key length issues related to secret key cryptography Define several terms related to secret
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
Cyber Security Workshop Encryption Reference Manual
Cyber Security Workshop Encryption Reference Manual May 2015 Basic Concepts in Encoding and Encryption Binary Encoding Examples Encryption Cipher Examples 1 P a g e Encoding Concepts Binary Encoding Basics
Implementation of Full -Parallelism AES Encryption and Decryption
Implementation of Full -Parallelism AES Encryption and Decryption M.Anto Merline M.E-Commuication Systems, ECE Department K.Ramakrishnan College of Engineering-Samayapuram, Trichy. Abstract-Advanced Encryption
Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V
International Journal of Scientific & Engineering Research, Volume 6, Issue 4, April-2015 965 OPTIMIZATION OF AES ALGORITHM USING HARDWARE AND SOFTWARE Pavithra.S, Vaishnavi.M, Vinothini.M, Umadevi.V Abstract-In
A STUDY OF DES ALGORITHM WITH CELLULAR AUTOMATA
International Journal of Innovative Management, Information & Production ISME International c2013 ISSN 2185-5439 Volume 4, Number 1, June 2013 PP. 10-16 A STUDY OF DES ALGORITHM WITH CELLULAR AUTOMATA
Advanced Cryptography
Family Name:... First Name:... Section:... Advanced Cryptography Final Exam July 18 th, 2006 Start at 9:15, End at 12:00 This document consists of 12 pages. Instructions Electronic devices are not allowed.
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
The Misuse of RC4 in Microsoft Word and Excel
The Misuse of RC4 in Microsoft Word and Excel Hongjun Wu Institute for Infocomm Research, Singapore [email protected] Abstract. In this report, we point out a serious security flaw in Microsoft
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
How To Encrypt With A 64 Bit Block Cipher
The Data Encryption Standard (DES) As mentioned earlier there are two main types of cryptography in use today - symmetric or secret key cryptography and asymmetric or public key cryptography. Symmetric
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
Design and Implementation of Asymmetric Cryptography Using AES Algorithm
Design and Implementation of Asymmetric Cryptography Using AES Algorithm Madhuri B. Shinde Student, Electronics & Telecommunication Department, Matoshri College of Engineering and Research Centre, Nashik,
Error oracle attacks and CBC encryption. Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm
Error oracle attacks and CBC encryption Chris Mitchell ISG, RHUL http://www.isg.rhul.ac.uk/~cjm Agenda 1. Introduction 2. CBC mode 3. Error oracles 4. Example 1 5. Example 2 6. Example 3 7. Stream ciphers
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
Lecture 18: Applications of Dynamic Programming Steven Skiena. Department of Computer Science State University of New York Stony Brook, NY 11794 4400
Lecture 18: Applications of Dynamic Programming Steven Skiena Department of Computer Science State University of New York Stony Brook, NY 11794 4400 http://www.cs.sunysb.edu/ skiena Problem of the Day
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Evaluation of the RC4 Algorithm for Data Encryption
Evaluation of the RC4 Algorithm for Data Encryption Allam Mousa (1) and Ahmad Hamad (2) (1) Electrical Engineering Department An-Najah University, Nablus, Palestine (2) Systems Engineer PalTel Company,
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding
An Efficient Compression of Strongly Encrypted Images using Error Prediction, AES and Run Length Coding Stebin Sunny 1, Chinju Jacob 2, Justin Jose T 3 1 Final Year M. Tech. (Cyber Security), KMP College
Encryption Quality Analysis and Security Evaluation of CAST-128 Algorithm and its Modified Version using Digital Images
Encryption Quality Analysis and Security Evaluation CAST-128 Algorithm and its Modified Version using Digital s Krishnamurthy G N, Dr. V Ramaswamy Abstract this paper demonstrates analysis well known block
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science
Ky Vu DeVry University, Atlanta Georgia College of Arts & Science Table of Contents - Objective - Cryptography: An Overview - Symmetric Key - Asymmetric Key - Transparent Key: A Paradigm Shift - Security
Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010
CS 494/594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2010 1 Introduction to Cryptography What is cryptography?
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2
HIGH DENSITY DATA STORAGE IN DNA USING AN EFFICIENT MESSAGE ENCODING SCHEME Rahul Vishwakarma 1 and Newsha Amiri 2 1 Tata Consultancy Services, India [email protected] 2 Bangalore University, India ABSTRACT
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm
An Efficient Data Security in Cloud Computing Using the RSA Encryption Process Algorithm V.Masthanamma 1,G.Lakshmi Preya 2 UG Scholar, Department of Information Technology, Saveetha School of Engineering
Hybrid Lossless Compression Method For Binary Images
M.F. TALU AND İ. TÜRKOĞLU/ IU-JEEE Vol. 11(2), (2011), 1399-1405 Hybrid Lossless Compression Method For Binary Images M. Fatih TALU, İbrahim TÜRKOĞLU Inonu University, Dept. of Computer Engineering, Engineering
Data Storage. Chapter 3. Objectives. 3-1 Data Types. Data Inside the Computer. After studying this chapter, students should be able to:
Chapter 3 Data Storage Objectives After studying this chapter, students should be able to: List five different data types used in a computer. Describe how integers are stored in a computer. Describe how
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Chapter 6 CDMA/802.11i
Chapter 6 CDMA/802.11i IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 Some material copyright 1996-2012 J.F Kurose and K.W. Ross,
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay
Information Theory and Coding Prof. S. N. Merchant Department of Electrical Engineering Indian Institute of Technology, Bombay Lecture - 17 Shannon-Fano-Elias Coding and Introduction to Arithmetic Coding
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
1 Data Encryption Algorithm
Date: Monday, September 23, 2002 Prof.: Dr Jean-Yves Chouinard Design of Secure Computer Systems CSI4138/CEG4394 Notes on the Data Encryption Standard (DES) The Data Encryption Standard (DES) has been
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
A PPENDIX G S IMPLIFIED DES
A PPENDIX G S IMPLIFIED DES William Stallings opyright 2010 G.1 OVERVIEW...2! G.2 S-DES KEY GENERATION...3! G.3 S-DES ENRYPTION...4! Initial and Final Permutations...4! The Function f K...5! The Switch
Implementation and Design of AES S-Box on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar
(C) Global Journal of Engineering Science and Research Management
DEPENDABLE STORAGE FOR VEHICLE INSURANCE MANAGEMENT THROUGH SECURED ENCRYPTION IN CLOUD COMPUTING Prof.Abhijeet A.Chincholkar *1, Ms.Najuka Todekar 2 *1 M.E. Digital Electronics, JCOET Yavatmal, India.
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
Data Storage 3.1. Foundations of Computer Science Cengage Learning
3 Data Storage 3.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: List five different data types used in a computer. Describe how
INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6
Technology Overview CONTENTS INTRODUCTION... 3 FREQUENCY HOPPING SPREAD SPECTRUM... 4 FULL TWO-WAY SYNCHRONIZED TDMA COMMUNICATION... 5 SECURED WIRELESS COMMUNICATION WITH AES ENCRYPTION... 6 UNMATCHED
159.334 Computer Networks. Network Security 1. Professor Richard Harris School of Engineering and Advanced Technology
Network Security 1 Professor Richard Harris School of Engineering and Advanced Technology Presentation Outline Overview of Identification and Authentication The importance of identification and Authentication
Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
How To Fix Out Of Focus And Blur Images With A Dynamic Template Matching Algorithm
IJSTE - International Journal of Science Technology & Engineering Volume 1 Issue 10 April 2015 ISSN (online): 2349-784X Image Estimation Algorithm for Out of Focus and Blur Images to Retrieve the Barcode
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA
A NEW APPROACH FOR COMPLEX ENCRYPTING AND DECRYPTING DATA ABSTRACT Obaida Mohammad Awad Al-Hazaimeh Department of Information Technology, Al-balqa Applied University, AL-Huson University College, Irbid,
Secure Network Communication Based on Text-to-Image Encryption
Secure Network Communication Based on Text-to-Image Encryption Ahmad Abusukhon 1, Mohamad Talib 2, Issa Ottoum 3 1 IT Faculty, - Computer Network Department Al-Zaytoonah University of Jordan Amman, JORDAN
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
A NEW LOSSLESS METHOD OF IMAGE COMPRESSION AND DECOMPRESSION USING HUFFMAN CODING TECHNIQUES
A NEW LOSSLESS METHOD OF IMAGE COMPRESSION AND DECOMPRESSION USING HUFFMAN CODING TECHNIQUES 1 JAGADISH H. PUJAR, 2 LOHIT M. KADLASKAR 1 Faculty, Department of EEE, B V B College of Engg. & Tech., Hubli,
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve
Secure and Efficient Data Retrieval Process based on Hilbert Space Filling Curve N.S. Jeya karthikka PG Scholar Sri Ramakrishna Engg Collg S.Bhaggiaraj Assistant Professor Sri Ramakrishna Engg Collg V.Sumathy
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding
Lossless Grey-scale Image Compression using Source Symbols Reduction and Huffman Coding C. SARAVANAN [email protected] Assistant Professor, Computer Centre, National Institute of Technology, Durgapur,WestBengal,
Keywords : complexity, dictionary, compression, frequency, retrieval, occurrence, coded file. GJCST-C Classification : E.3
Global Journal of Computer Science and Technology Software & Data Engineering Volume 13 Issue 4 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE
SURVEY ON INFORMATION HIDING TECHNIQUES USING QR BARCODE Manoj S. Rewatkar 1 and Shital A. Raut 2 1,2 Department of Computer Science and Engineering, Visvesvaraya National Institute of Technology, Nagpur,
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
CS 758: Cryptography / Network Security
CS 758: Cryptography / Network Security offered in the Fall Semester, 2003, by Doug Stinson my office: DC 3122 my email address: [email protected] my web page: http://cacr.math.uwaterloo.ca/~dstinson/index.html
Network Security. Security. Security Services. Crytographic algorithms. privacy authenticity Message integrity. Public key (RSA) Message digest (MD5)
Network Security Security Crytographic algorithms Security Services Secret key (DES) Public key (RSA) Message digest (MD5) privacy authenticity Message integrity Secret Key Encryption Plain text Plain
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
How To Understand And Understand The History Of Cryptography
CSE497b Introduction to Computer and Network Security - Spring 2007 - Professors Jaeger Lecture 5 - Cryptography CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography
Kommunikationssysteme (KSy) - Block 8 Secure Network Communication Part II II Public Key Cryptography Dr. Andreas Steffen 2000-2001 A. Steffen, 28.03.2001, KSy_RSA.ppt 1 Secure Key Distribution Problem
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Symmetric Key cryptosystem
SFWR C03: Computer Networks and Computer Security Mar 8-11 200 Lecturer: Kartik Krishnan Lectures 22-2 Symmetric Key cryptosystem Symmetric encryption, also referred to as conventional encryption or single
How To Use Pretty Good Privacy (Pgp) For A Secure Communication
Cryptographic process for Cyber Safeguard by using PGP Bharatratna P. Gaikwad 1 Department of Computer Science and IT, Dr. Babasaheb Ambedkar Marathwada University Aurangabad, India 1 ABSTRACT: Data security
Cryptosystems. Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K.
Cryptosystems Bob wants to send a message M to Alice. Symmetric ciphers: Bob and Alice both share a secret key, K. C= E(M, K), Bob sends C Alice receives C, M=D(C,K) Use the same key to decrypt. Public
Barcode Based Automated Parking Management System
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 03, 2014 ISSN (online): 2321-0613 Barcode Based Automated Parking Management System Parth Rajeshbhai Zalawadia 1 Jasmin
Enhance data security of private cloud using encryption scheme with RBAC
Enhance data security of private cloud using encryption scheme with RBAC Dimpi Rani 1, Rajiv Kumar Ranjan 2 M.Tech (CSE) Student, Arni University, Indora, Kangra, India 1 Assistant Professor, Dept. of
Performance Analysis of medical Image Using Fractal Image Compression
Performance Analysis of medical Image Using Fractal Image Compression Akhil Singal 1, Rajni 2 1 M.Tech Scholar, ECE, D.C.R.U.S.T, Murthal, Sonepat, Haryana, India 2 Assistant Professor, ECE, D.C.R.U.S.T,
IJESRT. [Padama, 2(5): May, 2013] ISSN: 2277-9655
IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY Design and Verification of VLSI Based AES Crypto Core Processor Using Verilog HDL Dr.K.Padama Priya *1, N. Deepthi Priya 2 *1,2
Message Authentication Codes
2 MAC Message Authentication Codes : and Cryptography Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 28 October 2013 css322y13s2l08, Steve/Courses/2013/s2/css322/lectures/mac.tex,
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC
An Efficient and Secure Key Management Scheme for Hierarchical Access Control Based on ECC Laxminath Tripathy 1 Nayan Ranjan Paul 2 1Department of Information technology, Eastern Academy of Science and
Network Security. Abusayeed Saifullah. CS 5600 Computer Networks. These slides are adapted from Kurose and Ross 8-1
Network Security Abusayeed Saifullah CS 5600 Computer Networks These slides are adapted from Kurose and Ross 8-1 Goals v understand principles of network security: cryptography and its many uses beyond
A Triple Key 3-d Chaotic Image EncryptionMethod using Double Chaotic Neural Networks
A Triple Key 3-d Chaotic Image EncryptionMethod using Double Chaotic Neural Networks Neethu Subash 1, Meera Vijayan 2, Dr. Varghese Paul 3 MTech Student, CSE, AdiShankara Institute of Engineering and Technology,
Genetic Algorithm Evolution of Cellular Automata Rules for Complex Binary Sequence Prediction
Brill Academic Publishers P.O. Box 9000, 2300 PA Leiden, The Netherlands Lecture Series on Computer and Computational Sciences Volume 1, 2005, pp. 1-6 Genetic Algorithm Evolution of Cellular Automata Rules
Software Puzzle Counterstrike for Denial of Service Attack
Software Puzzle Counterstrike for Denial of Service Attack Deepu. S. D, Dr. Ramakrishna. M.V 4th Sem M.Tech Student, Department of ISE, SJBIT, Bangalore, India Professor, Department of ISE, SJBIT, Bangalore,
The enhancement of the operating speed of the algorithm of adaptive compression of binary bitmap images
The enhancement of the operating speed of the algorithm of adaptive compression of binary bitmap images Borusyak A.V. Research Institute of Applied Mathematics and Cybernetics Lobachevsky Nizhni Novgorod
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Hardware Implementation of AES Encryption and Decryption System Based on FPGA
Send Orders for Reprints to [email protected] The Open Cybernetics & Systemics Journal, 2015, 9, 1373-1377 1373 Open Access Hardware Implementation of AES Encryption and Decryption System Based
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION
A NOVEL STRATEGY TO PROVIDE SECURE CHANNEL OVER WIRELESS TO WIRE COMMUNICATION Prof. Dr. Alaa Hussain Al- Hamami, Amman Arab University for Graduate Studies [email protected] Dr. Mohammad Alaa Al-
Recommendation for Cryptographic Key Generation
NIST Special Publication 800-133 Recommendation for Cryptographic Key Generation Elaine Barker Allen Roginsky http://dx.doi.org/10.6028/nist.sp.800-133 C O M P U T E R S E C U R I T Y NIST Special Publication
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
How To Use Neural Networks In Data Mining
International Journal of Electronics and Computer Science Engineering 1449 Available Online at www.ijecse.org ISSN- 2277-1956 Neural Networks in Data Mining Priyanka Gaur Department of Information and
A Comparative Study Of Two Symmetric Encryption Algorithms Across Different Platforms.
A Comparative Study Of Two Symmetric Algorithms Across Different Platforms. Dr. S.A.M Rizvi 1,Dr. Syed Zeeshan Hussain 2 and Neeta Wadhwa 3 Deptt. of Computer Science, Jamia Millia Islamia, New Delhi,
