Search results for "ENCR"

showing 10 items of 121 documents

Optical encryption with compressive ghost imaging

2011

Ghost imaging (GI) is a novel technique where the optical information of an object is encoded in the correlation of the intensity fluctuations of a light source. Computational GI (CGI) is a variant of the standard procedure that uses a single bucket detector. Recently, we proposed to use CGI to encrypt and transmit the object information to a remote party [1]. The optical encryption scheme shows compressibility and robustness to eavesdropping attacks. The reconstruction algorithm provides a relative low quality images and requires high acquisitions times. A procedure to overcome such limitations is to combine CGI with compressive sampling (CS), an advanced signal processing theory that expl…

Signal processingLight intensityCompressed sensingbusiness.industryComputer scienceComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISIONImage processingReconstruction algorithmIterative reconstructionGhost imagingEncryptionbusinessAlgorithm2011 Conference on Lasers and Electro-Optics Europe and 12th European Quantum Electronics Conference (CLEO EUROPE/EQEC)
researchProduct

Progressive transmission of secured images with authentication using decompositions into monovariate functions

2014

International audience; We propose a progressive transmission approach of an image authenticated using an overlapping subimage that can be removed to restore the original image. Our approach is different from most visible water- marking approaches that allow one to later remove the watermark, because the mark is not directly introduced in the two-dimensional image space. Instead, it is rather applied to an equivalent monovariate representation of the image. Precisely, the approach is based on our progressive transmission approach that relies on a modified Kolmogorov spline network, and therefore inherits its advantages: resilience to packet losses during transmis- sion and support of hetero…

Signal processing[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image ProcessingComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION02 engineering and technology[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processing01 natural sciencesImage encryption010309 optics[INFO.INFO-TS]Computer Science [cs]/Signal and Image Processing0103 physical sciences0202 electrical engineering electronic engineering information engineeringComputer visionElectrical and Electronic EngineeringDigital watermarkingImage resolutionMathematicsSignal processingAuthenticationNetwork packetbusiness.industryWatermarkAtomic and Molecular Physics and OpticsComputer Science ApplicationsSpline (mathematics)Binary dataKolmogorov superposition theorem020201 artificial intelligence & image processingArtificial intelligencebusinessVisible watermarking[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processing
researchProduct

Optoelectronic Information Encryption with Incoherent Light

2005

Speckle patternOpticsComputer sciencebusiness.industryPhase maskOptoelectronicsbusinessEncryptionDigital holography
researchProduct

Traceable hierarchical attribute-based authentication for the cloud

2015

When data owners store their data on cloud servers, they may want to define the access requirements themselves, where attribute-based authentication (ABA) can be a good choice for the solution. In this paper, we propose a traceable hierarchical ABA (HABA) solution which fits two situations in the cloud. The first situation is when cloud users are organized in groups of a hierarchical structure and the access allowance can only be granted to users in a specific group. The second situation is that attributes are organized in a hierarchical structure with different priorities, such that only users who own the required attributes of a specific priority can be authenticated and access the data. …

Structure (mathematical logic)HierarchyAuthenticationDatabasebusiness.industryComputer scienceAllowance (money)Cloud computingComputer securitycomputer.software_genreEncryptionbusinessCloud servercomputer2015 IEEE Conference on Communications and Network Security (CNS)
researchProduct

On the Cryptanalysis of Two Cryptographic Algorithms That Utilize Chaotic Neural Networks

2015

This paper deals with the security and efficiency issues of two cipher algorithms which utilize the principles of Chaotic Neural Networks (CNNs). The two algorithms that we consider are (1) the CNN-Hash, which is a one-way hash function based on the Piece-Wise Linear Chaotic Map (PWLCM) and the One-Way Coupled Map Lattice (OCML), and (2) the Delayed CNN-Based Encryption (DCBE), which is an encryption algorithm based on the delayed CNN. Although both of these cipher algorithms have their own salient characteristics, our analysis shows that, unfortunately, the CNN-Hash is not secure because it is neither Second-Preimage resistant nor collision resistant. Indeed, one can find a collision with …

Theoretical computer scienceArticle SubjectComputer sciencebusiness.industryGeneral Mathematicslcsh:MathematicsHash functionGeneral EngineeringPlaintextCryptographyEncryptionlcsh:QA1-939law.inventionCipherMalleabilitySymmetric-key algorithmlawlcsh:TA1-2040Known-plaintext attackCiphertextCryptanalysisbusinesslcsh:Engineering (General). Civil engineering (General)AlgorithmMathematical Problems in Engineering
researchProduct

HOW SMART DOES AN AGENT NEED TO BE?

2005

The classic distributed computation is done by atoms, molecules or spins in vast numbers, each equipped with nothing more than the knowledge of their immediate neighborhood and the rules of statistical mechanics. These agents, 1023 or more, are able to form liquids and solids from gases, realize extremely complex ordered states, such as liquid crystals, and even decode encrypted messages. We will describe a study done for a sensor-array "challenge problem" in which we have based our approach on old-fashioned simulated annealing to accomplish target acquisition and tracking under the rules of statistical mechanics. We believe the many additional constraints that occur in the real problem ca…

Theoretical computer scienceComputer sciencebusiness.industryComputationDistributed computingMulti-agent systemGeneral Physics and AstronomyStatistical and Nonlinear PhysicsStatistical mechanicsEncryptionTarget acquisitionComputer Science ApplicationsNetwork managementComputational Theory and MathematicsSimulated annealingStochastic optimizationbusinessMathematical PhysicsInternational Journal of Modern Physics C
researchProduct

A Logical Key Hierarchy Based approach to preserve content privacy in Decentralized Online Social Networks

2020

Distributed Online Social Networks (DOSNs) have been proposed to shift the control over user data from a unique entity, the online social network provider, to the users of the DOSN themselves. In this paper we focus on the problem of preserving the privacy of the contents shared to large groups of users. In general, content privacy is enforced by encrypting the content, having only authorized parties being able to decrypt it. When efficiency has to be taken into account, new solutions have to be devised that: i) minimize the re-encryption of the contents published in a group when the composition of the group changes; and, ii) enable a fast distribution of the cryptographic keys to all the m…

Theoretical computer scienceFacebookComputer scienceInformation privacyCyber SecurityGroup communicationJoinsEncryptionEncryptioncomputer.software_genreKey managementSet (abstract data type)Peer-to-peer computingElectrical and Electronic EngineeringFocus (computing)VegetationSocial networkSettore INF/01 - Informaticabusiness.industryGroup (mathematics)Composition (combinatorics)Decentralized Online Social NetworksDecentralized Online Social Networks; Encryption; Facebook; Group communication; Information privacy; Key management; Peer-to-peer computing; Privacy; Vegetation; Electrical and Electronic EngineeringPrivacyContent (measure theory)Decentralized online social networkData miningbusinesscomputerData privacy
researchProduct

New Representations for Multidimensional Functions Based on Kolmogorov Superposition Theorem. Applications on Image Processing

2012

Mastering the sorting of the data in signal (nD) can lead to multiple applications like new compression, transmission, watermarking, encryption methods and even new processing methods for image. Some authors in the past decades have proposed to use these approaches for image compression, indexing, median filtering, mathematical morphology, encryption. A mathematical rigorous way for doing such a study has been introduced by Andrei Nikolaievitch Kolmogorov (1903-1987) in 1957 and recent results have provided constructive ways and practical algorithms for implementing the Kolmogorov theorem. We propose in this paper to present those algorithms and some preliminary results obtained by our team…

Theoretical computer science[ INFO.INFO-TS ] Computer Science [cs]/Signal and Image Processingbusiness.industry[INFO.INFO-TS] Computer Science [cs]/Signal and Image ProcessingSortingimage progressive transmissionImage processingimage encryption[ SPI.SIGNAL ] Engineering Sciences [physics]/Signal and Image processingMathematical morphologyEncryptionimage watermarkingimage compressionImage (mathematics)multi-variables function representation[INFO.INFO-TS]Computer Science [cs]/Signal and Image ProcessingKolmogorov superposition theoremMedian filterbusinessDigital watermarkingAlgorithm[SPI.SIGNAL]Engineering Sciences [physics]/Signal and Image processingImage compressionMathematics[SPI.SIGNAL] Engineering Sciences [physics]/Signal and Image processing
researchProduct

Robust light field watermarking with high spatial and angular fidelity

2021

El término ocultación de información se refiere típicamente a la inserción secreta de datos en una señal anfitriona. La señal anfitriona puede ser una imagen, un archivo de audio, un video,... Las técnicas de ocultación de información se dividen generalmente en marca de agua digital, esteganografía y criptografía. Si la propia existencia del mensaje secreto incrustado debe permanecer en secreto, entonces el método de ocultación de información se conoce como esteganografía. Por el contrario, en la marca de agua digital, el usuario es consciente de la existencia del mensaje secreto. A diferencia de la esteganografía y la marca de agua, existe otra categoría de ocultación de información que ci…

UNESCO::FÍSICA::Ópticaprocesado digital de imágenesfotografía 3Dencriptado:FÍSICA::Óptica [UNESCO]UNESCO::FÍSICA::Óptica ::Fotografía:FÍSICA::Óptica ::Fotografía [UNESCO]óptica:FÍSICA::Óptica ::Tratamiento digital. Imágenes [UNESCO]UNESCO::FÍSICA::Óptica ::Tratamiento digital. Imágenes
researchProduct

Evaluation of a hash-compress-encrypt pipeline for storage system applications

2015

Great efforts are made to store data in a secure, reliable, and authentic way in large storage systems. Specialized, system specific clients help to achieve these goals. Nevertheless, often standard tools for hashing, compressing, and encrypting data are arranged in transparent pipelines. We analyze the potential of Unix shell pipelines with several high-speed and high-compression algorithms that can be used to achieve data security, reduction, and authenticity. Furthermore, we compare the pipelines of standard tools against a house made pipeline implemented in C++ and show that there is great potential for performance improvement.

UnixDatabaseComputer sciencebusiness.industryHash functionData securityCryptographycomputer.software_genreEncryptionPipeline (software)Pipeline transportEmbedded systemComputer data storagebusinesscomputer2015 IEEE International Conference on Networking, Architecture and Storage (NAS)
researchProduct