15 research outputs found
Yet Another Pseudorandom Number Generator
We propose a novel pseudorandom number generator based on R\"ossler attractor
and bent Boolean function. We estimated the output bits properties by number of
statistical tests. The results of the cryptanalysis show that the new
pseudorandom number generation scheme provides a high level of data security.Comment: 5 pages, 7 figures; to be published in International Journal of
Electronics and Telecommunications, vol.63, no.
Least Significant Bit Steganography using Hitzl-Zele Chaotic Map
We propose a novel least significant bit steganography algorithm based on a Hitzl-Zele chaotic function. Exact study has been provided on the novel scheme using visual inspection, peak signal-to-noise ratio, and histogram analysis. The experimental data show excellent performance of the novel stego technique
Video steganography with steganalysis
This paper presents steganographic algorithm, for hiding secret text in raw video files. The implementing and extraction method are described and empirical tests are performed to evaluate the security of the proposed algorithm. The steganographic analysis includes files comparison, histogram analysis, Peak to signal noise ratio and Chi-square analysis
A Novel Pseudorandom Bit Generator Based on Chirikov Standard Map Filtered with Shrinking Rule
This communication proposes a simplified model of pseudorandom bit generator, based on two Chirikov standard maps filtered with shrinking rule. The study also demonstrates that the generated keystreams have excellent properties of randomness and resistance to statistical attacks, which is proven by using the NIST, ENT, and DIEHARD testing suites
Patient information software designed for medical specialists
The paper presents software designed for medical specialists for managing their patients information. This type of software products are needed for facilitating the work of doctors. By using this type of software products, the medical specialists are able to easily record, edit and maintain their patients information, which supports diagnosis and treatment of the patients
Applied Software for Managing a Small Business
In this paper we present software solution for managing a small business with fixed number of products, prices and quantities. The presented software application is developed on a dot NET platform using programming language C\# and it is designed for the most used operating system - Windows. The software application provides different functions for different types of uses
Using Circle Map for Audio Encryption Algorithm
In this paper we propose audio encryption algorithm based on standard circle map. The proposed scheme contains bit level sample permutation using pseudorandom generator. Provided cryptanalysis includes number of tests demonstrating the security of proposed encryption algorithm
Using Circle Map for Audio Encryption Algorithm
In this paper we propose audio encryption algorithm based on standard circle map. The proposed scheme contains bit level sample permutation using pseudorandom generator. Provided cryptanalysis includes number of tests demonstrating the security of proposed encryption algorithm
Applied Software for Managing a Small Business
In this paper we present software solution for managing a small business with fixed number of products, prices and quantities. The presented software application is developed on a dot NET platform using programming language C\# and it is designed for the most used operating system - Windows. The software application provides different functions for different types of uses
SHAH: Hash Function based on Irregularly Decimated Chaotic Map
In this paper, we propose a novel hash function based on irregularly
decimated chaotic map. The hash function called SHAH is based on two Tinkerbell
maps filtered with irregular decimation rule. Exact study has been provided on
the novel scheme using distribution analysis, sensitivity analysis, static
analysis of diffusion and confusion, and collision analysis. The experimental
data show that SHAH satisfied admirable level of security.Comment: accepted for publication in International Journal of Electronics and
Telecommunications, vol. 6