115 research outputs found

    Audio scrambling technique based on cellular automata

    Full text link
    The final publication is available at Springer via http://dx.doi.org/10.1007/s11042-012-1306-7Scrambling is a process that has proved to be very effective in increasing the quality of data hiding, watermarking, and encryption applications. Cellular automata are used in diverse and numerous applications because of their ability to obtain complex global behavior from simple and localized rules. In this paper we apply cellular automata in the field of audio scrambling because of the potential it holds in breaking the correlation between audio samples effectively. We also analyze the effect of using different cellular automata types on audio scrambling and we test different cellular automata rules with different Lambda values. The scrambling degree is measured and the relation between the robustness and the scrambling degree obtained is studied. Experimental results show that the proposed technique is robust to data loss attack where 1/3 of the data is lost and that the algorithm can be applied to music and speech files of different sizes.This work is partially supported by the Spanish Ministry of Science and Innovation under coordinated research projects TIN2011-28260-C03-00 and TIN2011-28260-C03-02 and by the Comunidad Autónoma de Madrid under research project e-madrid S2009/TIC-165

    Blind audio watermarking technique based on two dimensional cellular automata

    Full text link
    In this paper we propose a new method of digital audio watermarking based on two dimensional cellular automata; the method increases the dimension of the audio and uses cellular automata in generating the key of watermark embedding. The watermarking method is blind, and does not require the original host audio or any of its features to extract the watermark; the watermark can be easily extracted using the right key. The experimental results show that the watermarks are imperceptible; and show a high similarity between the original and the watermarked audio. Cosine similarity and peak signal-to-noise ratio were used to measure the similarity between the original audio and the watermarked audio

    Digital image scrambling using 2D cellular automata

    Full text link
    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. A. L. A. Dalhoum et al., "Digital Image Scrambling Using 2D Cellular Automata", IEEE MultiMedia, vol. 19, no. 4 pp. 28 – 36, oct-dec. 2012A digital image scrambling method based on a 2D cellular automaton, specifically the well-known Game of Life, produces an effective image encryption technique.This work has been partially sponsored by the Spanish MICINN project TIN2011-28260-C03-0

    Image Encryption Using Meitei Lock Sequence Generated from Hash Functions

    Get PDF
    Proposed here is a secure image encryption scheme based on generalized Vigenere cipher and Meitei Lock Sequence (MLS) generated from standard hash functions. MLS is a unique random sequence of any length greater than 2 generated from a non-negative array having two or more elements. It is unique in the sense that no two arrays can generate the same sequence however close or similar the two arrays are. In other words, when there is any slight change in any of the input array, the generated MLS’s are drastically different. Also, the length of the sequence can be as infinitely long. These properties make MLS a good key string for a secure encryption scheme. SHA(Secure Hashing Algorithm) or any hash code generator has desirable feature which can be used for generation of MLS. In a hash code generator, it produces unique fixed length sequence from any input string, if there is any slight change in the input, the generated output will be totally different. This feature is made used of  in generating an MLS of any desired length for use in the proposed image  encryption scheme. Experimental results show that the proposed encryption scheme is a secure encryption scheme. The correlation coefficient between the original image and encrypted images are negligibly small indicating that there is no trace of original image information in the encrypted image. Also, the correlation coefficients between the original image and decrypted images with wrong passwords which are close to the encryption password are also negligibly small. These show the tightness of the key system in the encryption scheme. 

    Facial image encryption for secure face recognition system

    Get PDF
    A biometric authentication system is more convenient and secure than graphical or textual passwords when accessing information systems. Unfortunately, biometric authentication systems have the disadvantage of being susceptible to spoofing attacks. Authentication schemes based on biometrics, including face recognition, are susceptible to spoofing. This paper proposes an image encryption scheme to counter spoofing attacks by integrating it into the pipeline of Linear Discriminant Analysis (LDA) based face recognition. The encryption scheme uses XOR pixels substitution and cellular automata for scrambling. A single key is used to encrypt the training and testing datasets in LDA face recognition system. For added security, the encryption step requires input images of faces to be encrypted with the correct key before the system can recognize the images. An LDA face recognition scheme based on random forest classifiers has achieved 96.25% accuracy on ORL dataset in classifying encrypted test face images. In a test where original test face images were not encrypted with keys used for encrypted feature databases, the system achieved 8.75% accuracy only showing it is capable of resisting spoofing attacks

    Applications of cellular automata in digital watermarking processes

    Get PDF
    Los grandes avances de la tecnología hoy en día han ayudado a la comunicación y distribución de todo tipo de material digital de manera instantánea. Este es uno de los grandes beneficios de las tecnologías de la información y comunicación, donde también existen diversas amenazas de infracciones relacionadas al derecho de autor o Copyright, falsificaciones de contenido, plagios, por mencionar algunas. Al pasar de los años se han desarrollado diferentes algoritmos computacionales para coadyuvar a la protección de datos en archivos de textos, audio y video, respectivamente. En este artículo se presenta un análisis del estado del arte sobre el uso de autómatas celulares dentro del campo de procesamiento de imágenes digitales en conjunto con la técnica de Marcado de Agua Digital (Digital Watermarking).The great advances in technology today have helped the communication and distribution of all kinds of digital material information instantly. This is one of the great benefits of information and communication technologies, where there are also various threats of infringements, violations related to copyright, falsification of content, and plagiarism, to name a few, etc. Over the years, different computational algorithms and methods have been developed to help protect data in texts, audios and videos files, respectively. In this article, an analysis of the state of the art on the use of cellular automata within the field of digital image processing is presented in conjunction with the technique of, such as the use Digital Watermark algorithm  etc

    An Adaptive Image Encryption Scheme Guided by Fuzzy Models

    Full text link
    A new image encryption scheme using the advanced encryption standard (AES), a chaotic map, a genetic operator, and a fuzzy inference system is proposed in this paper. In this work, plain images were used as input, and the required security level was achieved. Security criteria were computed after running a proposed encryption process. Then an adaptive fuzzy system decided whether to repeat the encryption process, terminate it, or run the next stage based on the achieved results and user demand. The SHA-512 hash function was employed to increase key sensitivity. Security analysis was conducted to evaluate the security of the proposed scheme, which showed it had high security and all the criteria necessary for a good and efficient encryption algorithm were met. Simulation results and the comparison of similar works showed the proposed encryptor had a pseudo-noise output and was strongly dependent upon the changing key and plain image.Comment: Iranian Journal of Fuzzy Systems (2023

    Recent Advancements on Symmetric Cryptography Techniques -A Comprehensive Case Study

    Get PDF
    Now a day2019;s Cryptography is one of the broad areas for researchers; because of the conventional block cipher has lost its potency due to the sophistication of modern systems that can break it by brute force. Due to its importance, several cryptography techniques and algorithms are adopted by many authors to secure the data, but still there is a scope to improve the previous approaches. For this necessity, we provide the comprehensive survey which will help the researchers to provide better techniques
    • …
    corecore