20,053 research outputs found
Image Encryption Based on Diffusion and Multiple Chaotic Maps
In the recent world, security is a prime important issue, and encryption is
one of the best alternative way to ensure security. More over, there are many
image encryption schemes have been proposed, each one of them has its own
strength and weakness. This paper presents a new algorithm for the image
encryption/decryption scheme. This paper is devoted to provide a secured image
encryption technique using multiple chaotic based circular mapping. In this
paper, first, a pair of sub keys is given by using chaotic logistic maps.
Second, the image is encrypted using logistic map sub key and in its
transformation leads to diffusion process. Third, sub keys are generated by
four different chaotic maps. Based on the initial conditions, each map may
produce various random numbers from various orbits of the maps. Among those
random numbers, a particular number and from a particular orbit are selected as
a key for the encryption algorithm. Based on the key, a binary sequence is
generated to control the encryption algorithm. The input image of 2-D is
transformed into a 1- D array by using two different scanning pattern (raster
and Zigzag) and then divided into various sub blocks. Then the position
permutation and value permutation is applied to each binary matrix based on
multiple chaos maps. Finally the receiver uses the same sub keys to decrypt the
encrypted images. The salient features of the proposed image encryption method
are loss-less, good peak signal-to-noise ratio (PSNR), Symmetric key
encryption, less cross correlation, very large number of secret keys, and
key-dependent pixel value replacement.Comment: 14 pages,9 figures and 5 tables;
http://airccse.org/journal/jnsa11_current.html, 201
Yet Another Pseudorandom Number Generator
We propose a novel pseudorandom number generator based on R\"ossler attractor
and bent Boolean function. We estimated the output bits properties by number of
statistical tests. The results of the cryptanalysis show that the new
pseudorandom number generation scheme provides a high level of data security.Comment: 5 pages, 7 figures; to be published in International Journal of
Electronics and Telecommunications, vol.63, no.
A hybrid CFGTSA based approach for scheduling problem: a case study of an automobile industry
In the global competitive world swift, reliable and cost effective production subject to uncertain situations, through an appropriate management of the available resources, has turned out to be the necessity for surviving in the market. This inspired the development of the more efficient and robust methods to counteract the existing complexities prevailing in the market. The present paper proposes a hybrid CFGTSA algorithm inheriting the salient features of GA, TS, SA, and chaotic theory to solve the complex scheduling problems commonly faced by most of the manufacturing industries. The proposed CFGTSA algorithm has been tested on a scheduling problem of an automobile industry, and its efficacy has been shown by comparing the results with GA, SA, TS, GTS, and hybrid TSA algorithms
Theory of Interacting Neural Networks
In this contribution we give an overview over recent work on the theory of
interacting neural networks. The model is defined in Section 2. The typical
teacher/student scenario is considered in Section 3. A static teacher network
is presenting training examples for an adaptive student network. In the case of
multilayer networks, the student shows a transition from a symmetric state to
specialisation. Neural networks can also generate a time series. Training on
time series and predicting it are studied in Section 4. When a network is
trained on its own output, it is interacting with itself. Such a scenario has
implications on the theory of prediction algorithms, as discussed in Section 5.
When a system of networks is trained on its minority decisions, it may be
considered as a model for competition in closed markets, see Section 6. In
Section 7 we consider two mutually interacting networks. A novel phenomenon is
observed: synchronisation by mutual learning. In Section 8 it is shown, how
this phenomenon can be applied to cryptography: Generation of a secret key over
a public channel.Comment: Contribution to Networks, ed. by H.G. Schuster and S. Bornholdt, to
be published by Wiley VC
Recommendations and illustrations for the evaluation of photonic random number generators
The never-ending quest to improve the security of digital information
combined with recent improvements in hardware technology has caused the field
of random number generation to undergo a fundamental shift from relying solely
on pseudo-random algorithms to employing optical entropy sources. Despite these
significant advances on the hardware side, commonly used statistical measures
and evaluation practices remain ill-suited to understand or quantify the
optical entropy that underlies physical random number generation. We review the
state of the art in the evaluation of optical random number generation and
recommend a new paradigm: quantifying entropy generation and understanding the
physical limits of the optical sources of randomness. In order to do this, we
advocate for the separation of the physical entropy source from deterministic
post-processing in the evaluation of random number generators and for the
explicit consideration of the impact of the measurement and digitization
process on the rate of entropy production. We present the Cohen-Procaccia
estimate of the entropy rate as one way to do this. In order
to provide an illustration of our recommendations, we apply the Cohen-Procaccia
estimate as well as the entropy estimates from the new NIST draft standards for
physical random number generators to evaluate and compare three common optical
entropy sources: single photon time-of-arrival detection, chaotic lasers, and
amplified spontaneous emission
- …