20 research outputs found

    A new approach in cryptographic systems using fractal image coding

    Get PDF
    Problem statement: With the rapid development in the communications and information transmissions there is a growing demand for new approaches that increase the security of cryptographic systems. Approach: Therefore some emerging theories, such as fractals, can be adopted to provide a contribution toward this goal. In this study we proposed a new cryptographic system utilizing fractal theories; this approach exploited the main feature of fractals generated by IFS techniques. Results: Double enciphering and double deciphering methods performed to enhance the security of the system. The encrypted date represented the attractor generated by the IFS transformation, collage theorem was used to find the IFSM for decrypting data. Conclusion/Recommendations: The proposed method gave the possibility to hide maximum amount of data in an image that represent the attractor of the IFS without degrading its quality and to make the hidden data robust enough to withstand known cryptographic attacks and image processing techniques which did not change the appearance of image

    A new idea in zero knowledge protocols based on iterated function systems

    Get PDF
    A secure method of identification is crucial to avoid computer deception dynamics. This could be attained by using zero-knowledge protocols. Zero-knowledge protocols are cryptographic protocols that have been proven to provide secure entity authentication without revealing any knowledge to any entity or to any eavesdropper and used to build effective communication tools and ensure their privacy. Many schemes have been proposed since 1984. Among them are those that rely on factoring and discrete log which are practical schemes based on NP- hard problems. Our aim is to provide techniques and tools which may be useful towards developing those systems. Fractal code was proven as a NP-hard problem, which means it cannot be solved in a practical amount of time. In this paper a new zero-knowledge scheme is proposed based on iterated function systems and the fractal features are used to improve this system. The proposed scheme is a generalization of the Guillou-Quisquater identification scheme. The two schemes are implemented and compared to prove their efficiency and security. From the implementation results, we conclude that zero knowledge systems based on IFS transformation perform more efficiently than GQ system in terms of key size and key space

    A new 2D Hénon-logistic map for producing hyperchaotic behavior

    Get PDF
    Derived from the two-dimensional (2D) Hénon map and the one-dimensional (1D) Logistic map, this paper proposes a new 2D hyperchaotic map, called the 2D Hénon-Logistic map (2D-HLM). The dynamics of the 2D-HLM are investigated by means of equilibria, stability analysis, trajectory, Lyapunov exponent, and bifurcation diagram. Mathematical analysis reveals that the 2D-HLM has four unstable equilibria. Besides that, it has wide chaotic and hyperchaotic behaviors with very limited periodic windows. To evaluate the complexity performance of the 2D-HLM, Approximate entropy is used to analyze its time series. Consequently, the 2D-HLM exhibits extremely complex nonlinear behavior. With all of these attributes, the 2D-HLM would be very appropriate to produce a pseudo-random number generator that can be used in chaos-based cryptographic applications

    Complexity and dynamic characteristics of a new discrete-time hyperchaotic model

    Get PDF
    Based on two of the existing one-dimensional chaotic maps and the two-dimensional Hénon map, a new two-dimensional Hénon-Gaussian-Sine model (2D-HGSM) is proposed. Basic dynamic characteristics of the 2D-HGSM are studied from the following three aspects: trajectory, bifurcation diagram and Lyapunov exponents. The complexity of 2D-HGSM is investigated by means of Approximate entropy. Performance evaluations show that the 2D-HGSM has higher complexity level, better ergodicity, wider chaotic and hyperchaotic region than different chaotic maps. Furthermore, the 2D-HGSM exhibits a qualitatively different chaotic behavior with respect to the variation of its corresponding parameters. Therefore, the 2D-HGSM has good application prospects in secure communication

    Perfect secret sharing scheme based on vertex domination set

    Get PDF
    Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secret K among a finite set of participants, in such a way that only predefined subset of participant is enabled to reconstruct a secret from their shares. A secret sharing scheme realizing uniform access structure described by a graph has received a considerable attention. In this scheme, each vertex represents a participant and each edge represents a minimum authorized subset. In this paper, an independent dominating set of vertices in a graph G is introduced and applied as a novel idea to construct a secret sharing scheme such that the vertices of the graph represent the participants and the dominating set of vertices in G represents the minimal authorized set. While most of the previous schemes were based on the principle of adjacent vertices, the proposed scheme is based upon the principle of non-adjacent vertices. We prove that the scheme is perfect, and the lower bound of the information rate of this new construction is improved when compared to some well-known previous constructions. We include an experiment involving security threats to demonstrate the effectiveness of the proposed scheme

    The Effects of Lime Addition and Fineness of Grinded Clinker on Properties of Portland Cement

    No full text
    Two types of Portland Cement Clinker “PCC” were used in this study: high fineness grinded and low fineness grinded , and after grinding of PCC, hydrated lime was used in 5%,10% and 15%; by weight, as a replacement of the blend cement with a constant 3% addition of gypsum by the blend weight. The importance of this study is to show the influences of different fineness on the physical properties of the blended cement, and to find the probability of using hydrated lime (that could be a by-product) in cement and declare its effects on the blend, so the solid waste “lime” and air pollutant of cement factories will reduce. In this research, the low fineness blend exhibited about 87% from compressive strength of high fineness blend at 28 days age. The results show that the using of hydrated lime up to 10%; by weight, as a replacement of cement will give good compressive strength and workability, and will reduce moderately the setting time, but the use of hydrated lime by more than 10% will reduce the compressive strength and increase the unsoundness of the blend (from 3mm expansion at 10% hydrated lime to 29mm expansion at 15% hydrated lime)

    The Effects of Lime Addition and Fineness of Grinded Clinker on Properties of Portland Cement

    No full text
    Two types of Portland Cement Clinker "PCC" were used in this study: high fineness grinded and low fineness grinded , and after grinding of PCC, hydrated lime was used in 5%,10% and 15%; by weight, as a replacement of the blend cement  with a constant 3% addition of gypsum by the blend weight. The importance of this study is to show the influences of different fineness on the physical properties of the blended cement, and to find the probability of using hydrated lime (that could be a by-product) in cement and declare its effects on the blend, so the solid waste "lime" and air pollutant of cement factories will reduce. In this research, the low fineness blend exhibited about 87% from compressive strength of high fineness blend at 28 days age. The results show that the using of hydrated lime up to 10%; by weight, as a replacement of cement will give good compressive strength and workability, and will reduce moderately the setting time, but the use of hydrated lime by more than 10% will reduce the compressive strength and increase the unsoundness of the blend (from 3mm expansion at 10% hydrated lime to 29mm expansion at 15% hydrated lime)

    Environmental pollution and its relationship to the media and the law: Awareness of the dialectics of the complementary relationship

    No full text
    The purpose of the study was to determine the level of public awareness regarding environmental pollution, its causes, and the role that the media—particularly environmental media—plays in informing the public about environmental culture and the dangers it poses to their social, health, and developmental well-being. The role that civil law plays in establishing the guilt of the offender, making him pay, and addressing the consequences of pollution within the context of environmental pollution damage civil liability, particularly in light of the challenges associated with establishing the legal foundation for this duty regarding error and damage. The research employed a stratified random sampling technique. Based on the study’s findings, the population in Iraq is not well-informed about environmental culture or pollution by the country’s media. Proposals and recommendations were made in light of the study’s findings. These included the following: educating children about the risks posed by environmental pollution at home; creating environmental education curricula for all educational levels; disseminating environmental messages in the media; and streamlining these messages so that everyone in society can understand them.

    A generalized fractal dimension as an image feature

    No full text
    In the real life, many phenomenon cannot be described by the traditional geometry; fractal objects are one of these phenomenon. They have irregular shapes and complex structures. The concept of fractal dimension (FD)is used as an indicator of the complexity and irregularity of these objects. Texture analysis plays an important role in image processing. Fractal dimension is utilized in texture segmentation and classification and has proved to be an interesting parameter to characterize image roughness and extract image features. But, in some complex and irregular scenes, it becomes ineffective for feature extraction and classification. Therefore, a more general approach known as fuzzy fractal dimension can be used to model such types of scenes effectively. A new fuzzy fractal dimension method is proposed in this paper. It is verified by the experiment on a set of natural texture images to show its efficiency and accuracy, and a satisfactory result is found. It also offers promising performance when it is tested on some types of noises to show a good robustness to them
    corecore