15 research outputs found

    Yet Another Pseudorandom Number Generator

    Get PDF
    We propose a novel pseudorandom number generator based on R\"ossler attractor and bent Boolean function. We estimated the output bits properties by number of statistical tests. The results of the cryptanalysis show that the new pseudorandom number generation scheme provides a high level of data security.Comment: 5 pages, 7 figures; to be published in International Journal of Electronics and Telecommunications, vol.63, no.

    Least Significant Bit Steganography using Hitzl-Zele Chaotic Map

    Get PDF
    We propose a novel least significant bit steganography algorithm based on a Hitzl-Zele chaotic function. Exact study has been provided on the novel scheme using visual inspection, peak signal-to-noise ratio, and histogram analysis. The experimental data show excellent performance of the novel stego technique

    Video steganography with steganalysis

    Get PDF
    This paper presents steganographic algorithm, for hiding secret text in raw video files. The implementing and extraction method are described and empirical tests are performed to evaluate the security of the proposed algorithm. The steganographic analysis includes files comparison, histogram analysis, Peak to signal noise ratio and Chi-square analysis

    A Novel Pseudorandom Bit Generator Based on Chirikov Standard Map Filtered with Shrinking Rule

    Get PDF
    This communication proposes a simplified model of pseudorandom bit generator, based on two Chirikov standard maps filtered with shrinking rule. The study also demonstrates that the generated keystreams have excellent properties of randomness and resistance to statistical attacks, which is proven by using the NIST, ENT, and DIEHARD testing suites

    Patient information software designed for medical specialists

    Get PDF
    The paper presents software designed for medical specialists for managing their patients information. This type of software products are needed for facilitating the work of doctors. By using this type of software products, the medical specialists are able to easily record, edit and maintain their patients information, which supports diagnosis and treatment of the patients

    Applied Software for Managing a Small Business

    Get PDF
    In this paper we present software solution for managing a small business with fixed number of products, prices and quantities. The presented software application is developed on a dot NET platform using programming language C\# and it is designed for the most used operating system - Windows. The software application provides different functions for different types of uses

    Using Circle Map for Audio Encryption Algorithm

    Get PDF
    In this paper we propose audio encryption algorithm based on standard circle map. The proposed scheme contains bit level sample permutation using pseudorandom generator. Provided cryptanalysis includes number of tests demonstrating the security of proposed encryption algorithm

    Applied Software for Managing a Small Business

    Get PDF
    In this paper we present software solution for managing a small business with fixed number of products, prices and quantities. The presented software application is developed on a dot NET platform using programming language C\# and it is designed for the most used operating system - Windows. The software application provides different functions for different types of uses

    Using Circle Map for Audio Encryption Algorithm

    Get PDF
    In this paper we propose audio encryption algorithm based on standard circle map. The proposed scheme contains bit level sample permutation using pseudorandom generator. Provided cryptanalysis includes number of tests demonstrating the security of proposed encryption algorithm

    SHAH: Hash Function based on Irregularly Decimated Chaotic Map

    Get PDF
    In this paper, we propose a novel hash function based on irregularly decimated chaotic map. The hash function called SHAH is based on two Tinkerbell maps filtered with irregular decimation rule. Exact study has been provided on the novel scheme using distribution analysis, sensitivity analysis, static analysis of diffusion and confusion, and collision analysis. The experimental data show that SHAH satisfied admirable level of security.Comment: accepted for publication in International Journal of Electronics and Telecommunications, vol. 6
    corecore