An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems

Size: px
Start display at page:

Download "An Efficient Chaos-Based Feedback Stream cipher (ECBFSC) for Image Cryptosystems"

Transcription

1 An Effcent Chaos-Based Feedback Stream cpher (ECBFSC) for Image Cryptosystems Hossam El-dn H. Ahmed, Hamdy M. Kalash, and Osama S. Farag Allah Abstract. The chaos based cryptographc algorthms have suggested some new and effcent ways to develop secure mage encrypton technques. Towards ths drecton, ths paper presents an effcent chaos-based feedback stream cpher (ECBFSC) for mage cryptosystems. The proposed stream cpher s based on the use of a chaotc logstc map and an external secret key of 256-bt. The ntal condton for the chaotc logstc map s derved usng the external secret key by provdng weghtage to ts bts correspondng to ther poston n the key. Further, new features of the proposed stream cpher nclude the heavy use of data-dependent teratons, data-dependent nputs, and the ncluson of three ndependent feedback mechansms. These proposed features are verfed to provde hgh securty level. A complete specfcaton for the proposed ECBFSC s gven. Several test mages are used for nspectng the valdty of the proposed ECBFSC. The results of several expermental, key space analyss, statstcal analyss, and key senstvty tests show that the proposed ECBFSC provdes an effcent and secure way for real-tme mage encrypton and transmsson from the cryptographc vewpont. Keywords: Stream cpher, Chaos, Logstc map, and Securty analyss. Introducton Durng the last decade, the use of computer networks has grown spectacularly, and ths growth contnues unabated. Almost all networks are beng nstalled, nterconnected, and connected to the global nternet. Today more and more nformaton has been transmtted over the nternet. The nformaton s not only text, but also audo, mage, and other multmeda. Images have been wdely used n our daly lfe. However, the more extensvely we use the mages, the more mportant ther securty wll be. For example, t s mportant to protect the dagrams of army emplacements, the dagrams of bank buldng constructon, and the mportant data captured by mltary satelltes. In addton, the number of computer crmes has ncreased recently. Image securty has become an mportant topc n the current computer world. Many encrypton methods have been proposed n lterature, and the most common way to protect large multmeda fles s by usng conventonal encrypton technques. Implementatons of popular publc key encrypton methods, such as RSA or El-Gamal [] cannot provde sutable encrypton rates, whle securty of these algorthms reles on the dffculty of quckly factorzng large numbers or solvng the dscrete logarthm problem, topcs that are serously challenged by recent advances n number theory and dstrbuted computng. On the other hand, prvate key bulk encrypton algorthms, such as Trple DES or Blowfsh [2], are more sutable for transmsson of large amounts of data. However, due to the complexty of ther nternal structure, they are not partcularly fast n terms of executon speed and cannot be concsely and clearly explaned, so that to enable detecton of cryptanalytc vulnerabltes. Chaotc maps present many desred cryptographc qualtes such as smplcty of mplementaton that leads to hgh encrypton rates, and excellent securty. In ths paper we propose an effcent chaos-based feedback stream cpher (ECBFSC) for mage cryptosystems. The proposed ECBFSC works usng an teratve cpher mechansm that s based on a chaotc logstc functon. The encrypton module encrypts the mage pxel-by-pxel, takng nto consderaton, n each teraton, the values of the prevously encrypted pxels. Ths feedback property, combned wth the external secret key of 256-bt, makes our stream cpher robust aganst cryptanalytc attacks. Furthermore a smple mplementaton of ECBFSC acheves hgh encrypton rates on generalpurpose computers. The rest of ths paper s organzed as follows: Secton 2 surveys some related mage cryptosystems. We dscuss some characterstcs of an mage cryptosystem and research ssues of an mage cryptosystem n Sectons 3 and 4 respectvely. Secton 5 presents chaos and cryptography ncludng characterstcs and analyss of chaotc logstc map. Secton 6 examnes the step by step procedure of SITIS

2 encrypton/decrypton modules for the proposed ECBFSC. Secton 7 explores desgn Prncples of the ECBFSC. Test, verfcaton and effcency of the proposed ECBFSC are gven n Secton 8. Secton 9 dscusses the detaled securty analyss of the proposed ECBFSC ncludng key space analyss, statstcal analyss, and senstvty analyss wth respect to key and plantext. Performance evaluaton of the proposed ECBFSC s explored n Secton 0. Fnally, Secton concludes ths paper. 2 Related Image Cryptosystems Bourbaks and Alexopoulos [3] developed method to encrypt mages. Ths method converts a 2D mage nto a D lst, and employs a SCAN language [4] to descrbe the converted result. In ths language, there are several SCAN letters. Each SCAN letter represents one knd of scan order. Dfferent knds of combnatons of SCAN letters may generate dfferent knds of secret mages. After determnng the combnaton of SCAN letters, the scheme then generates a SCAN strng. Ths strng defnes the scan order of the orgnal mage. Next, ths method scans the orgnal mage n the determned order and, moreover, encrypts the SCAN strng by usng commercal cryptosystems. Snce the llegal users cannot obtan the correct SCAN strng, the orgnal mage s therefore secure. There s no mage compresson n ths method. Therefore, the sze of the mage s very large, and thus t s neffcent to encrypt or decrypt the mage drectly. Kuo proposed an encrypton method that referred to the mage dstorton [5]. Ths method obtans the encrypted mage by addng the phase spectra of the planmage wth those of another key mage. Snce the phase spectra of the orgnal mage are randomly changed, the cphermage s unrecognzable. Thus ths method s safe, but no mage compresson s consdered. Chang and Lou [6] proposed an encrypton method for mages. Ths method employs two technologes to acheve the compresson and encrypton purposes. They are the quadtree data structure and the SCAN language, respectvely. Ths method frst compresses the orgnal mage by usng a quadtree, and then encrypts the compressed data by SCAN. So, ths method can compress and encrypt mages concurrently. Quadtree s notably a lossless data compresson technology. Therefore, ths method s also lossless. Chn-Chen Chang, Mn-Shan Hwang, and Tung-Shou Chen [7] use one of the popular mage compresson technques, vector quantzaton to desgn an effcent cryptosystem for mages. The scheme s based on vector quantzaton (VQ), cryptography, and other number theorems. The mages are frst decomposed nto vectors and then sequentally encoded vector by vector. Frdrch [8] demonstrated the constructon of a symmetrc block encrypton technque based on two-dmensonal standard baker map. There are three basc steps n the method of Frdrch [8]: (a) choose a chaotc map and generalze t by ntroducng some parameter, (b) dscretze the chaotc map to a fnte square lattce of ponts that represent pxels, (c) extend the dscretzed map to threedmensons and further compose t wth a smple dffuson mechansm. Scharnger [9] desgned a chaotc Kolmogrov-flow-based mage encrypton technque, n whch whole mage s taken as a sngle block and whch s permuted through a key-controlled chaotc system. In addton, a shft regster pseudo random generator s also adopted to ntroduce the confuson n the data. Yen and Guo [0] proposed an encrypton method called BRIE based on chaotc logstc map. The basc prncple of BRIE s bt recrculaton of pxels, whch s controlled by a chaotc pseudo random bnary sequence. The secret key of BRIE conssts of two ntegers and an ntal condton of the logstc map. Yen and Guo [] also proposed an encrypton method called CKBA (Chaotc Key Based Algorthm) n whch a bnary sequence as a key s generated usng a chaotc system. The mage pxels are rearranged accordng to the generated bnary sequence and then XORed and XNORed wth the selected key. L et al. [2] have proposed a vdeo encrypton technque based on multple dgtal chaotc systems whch s known as CVES (Chaotc Vdeo Encrypton Scheme). In ths scheme, 2n chaotc maps are used to generate pseudo random sgnals to mask the vdeo and to perform pseudo random permutaton of the masked vdeo. Chen et al. [3] have proposed a symmetrc mage encrypton n whch a two-dmensonal chaotc map s generalzed to three-dmenson for desgnng a real tme secure mage encrypton scheme. Ths approach employs the three-dmensonal cat map to shuffle the postons of the mage pxels and uses another chaotc map to confuse the relatonshp between the encrypted and ts orgnal mage. - -

3 3 Characterstcs of an Image Cryptosystem A good nformaton securty system s able to not only protect confdental messages n the text form, but also n mage form. In general, there are three basc characterstcs n the nformaton securty feld: prvacy, ntegrty, and avalablty [4].. Prvacy: an unauthorzed user cannot dsclose a message. 2. Integrty: an unauthorzed user cannot modfy or corrupt a message. 3. Avalablty: messages are made avalable to authorzed users fathfully. A perfect mage cryptosystem s not only flexble n the securty mechansm, but also has hgh overall performance. Thus, besdes the above characterstcs, the mage securty also requres the followng characterstcs:. The encrypton system should be computatonally secure. It must requre an extremely long computaton tme to break, for example. Unauthorzed users should not be able to read prvleged mages. 2. Encrypton and decrypton should be fast enough not to degrade system performance. The algorthms for encrypton and decrypton must be smple enough to be done by users wth a personal computer. 3. The securty mechansm should be as wdespread as possble. It must be wdely acceptable to desgn a cryptosystem lke a commercal product. 4. The securty mechansm should be flexble. 5. There should not be a large expanson of the encrypted mage data. 4 Research Issues of an Image Cryptosystem Accordng to the analyses stated n Secton 2, there are forth research ssues on mage cryptosystems as follows: The frst ssue s to encrypt the mage data usng the same method as for text data. Images are usually represented as 2D arrays. They should be converted nto D arrays before encpherng. Varous encrypton technques can be used and appled on the D lsts such as n [3-5]. Snce the mage s large, t s neffcent to encrypt or decrypt the pcture drectly. Applyng compresson technques to mages and then encryptng the compressed mages s also a way to use standard text encrypton algorthms. The second ssue s to use the specal features of mages. The man feature of an mage s that t allows a bt of dstorton. Therefore, pcture data can be compressed before transmttng, and be lossy decompressed wth a small dstorton after recevng the mage compresson. There are many lossy compresson technques for mages. Ths ssue s to encrypt the compressed mage usng the same method as for the text data. Snce the sze of the compressed mage s usually larger than that of text data, t s also nvald to reduce the sze of the pcture by mage compresson before encpherng. Chang and Lou's mage cryptosystem [6] s n ths form. The thrd ssue depends on the use of vector quantzaton (VQ), cryptography, number theorems and compresson. The auxlary data s encrypted only by some encrypton algorthms such as n [7]. Snce the sze of the auxlary data s usually less than that of the compressed mage, the tme complexty for encpherng auxlary data s less than that of the above two ssues. The forth ssue depends on chaotc maps that are consdered as an effcent canddate for desgn of chaos based encrypton technques such as n [8-3]. The proposed ECBFSC belongs to ths ssue. 5 Chaos and Cryptography The close relatonshp between chaos and cryptography makes chaos based cryptographc algorthms as a natural canddate for secure communcaton and cryptography Chaos based encrypton technques are consdered good for practcal use as these technques provde a good combnaton of speed, hgh securty, complexty, reasonable computatonal overheads and computatonal power etc

4 5. characterstcs of the chaotc maps The characterstcs of the chaotc maps have attracted the attenton of cryptographers snce t has many fundamental propertes such as ergodcty, senstvty to ntal condton and system parameter, and mxng property, etc [5-6]. Most propertes are related to some requrements such as mxng and dffuson n the sense of cryptography. Therefore, chaotc cryptosystems have more useful and practcal applcatons. 5.2 The logstc map and ts analyss One of the smplest chaos functons that have been studed recently for cryptography applcatons s the logstc map. The logstc map functon s expressed as: X n+ = rx n ( X n ) () Where X takes values n the nterval [0,]. It s one of the smplest models that present chaotc n behavor [7]. The parameter r can be dvded nto three segments, whch can be examned by experments on followng condtons: X 0 = When r [0,3] as shown n Fg. (a), the calculaton results come to the same value after several teratons wthout any chaotc behavor. When r [3,3.57], the phase space concludes several ponts only, as showed n Fg. (b), the system appears perodcty. When r [3.57,4], t becomes a chaotc system wth perodcty dsappeared as shown n Fg. (c). So we can draw the followng conclusons: () For r [0,3.57], the ponts concentrate on several values and could not be used for mage cryptosystem. (2) For r [3.57,4], the logstc map exhbts chaotc behavor, and hence the property of senstve dependence [8]. So t can be used for mage cryptosystem. 6 The Proposed ECBFSC In ths secton, we dscuss the step by step procedure of the proposed ECBFSC for encrypton as well as decrypton process. The proposed ECBFSC conssts of two man modules, the encrypton and decrypton module. 6. The encrypton module An overvew of ECBFSC encrypton module s depcted n Fg. 2. the proposed ECBFSC s a smple block cpher wth block sze of 8-bt and 256-bt secret key. The key s used to generate a pad that s then merged wth the planmage a byte at a tme.. For the encrypton/decrypton, we dvde planmage/cphermage nto blocks of 8-bts. Plantext and cphertext of blocks can be represented as P = P P P P... (2) P C C = C C C C... (3) The proposed mage encrypton process utlzes an external secret key of 256-bt long. Further, the secret key s dvded nto blocks of 8-bt each, referred as sesson keys. K = K K 2 K 3K 4...K 64 (n hexadecmal) (4) Here, K 's are the alphanumerc characters (0 9 and A F) and each group of two alphanumerc characters represents a sesson key. Alternatvely, the secret key can be represented n ASCII mode as K = K K 2 K 3K 4...K 32 (n ASCII) (5) Here, each K represents one 8-bt block of the secret key.e. sesson key

5 3. The ntal condton ( X 0 ) for the chaotc map and the ntal code C 0 are generated from the sesson keys as: 32 (6) R = ( M[ ]) = K X = R R (7) 0 32 (8) C 0 = ( K ) mod 256 = here K,, and M are, respectvely, the nteger equvalent of the th sesson key, the floor functon, and mappng from the sesson, key space, all ntegers between 0 and 255, nto the doman of the logstc map, all real numbers n the nterval [0,]. 4. Read a byte from the mage fle (that represent a block of 8-bts) and load t as planmage pxel P. 5. Encrypton of each planmage pxel P to produce ts correspondng cphermage pxel be expressed mathematcally as: # C 2 ( ) = P + M rx X mod 256 (9) = Where X represents the current nput for logstc map and computed as: = M [ X + C K ] # s the number of teraton of logstc map for ts current nput # = + + C X + (0) X and calculated as: K () And M2 maps the doman of the logstc map, [0,], back nto the nterval [0,255]. 6. Repeat steps 4-5 untl the entre mage fle s exhausted. C can 6.2 The decrypton module Decrypton s very smple; the same pad s generated but ths tme un-merged wth the cphertext to retreve the plantext. The dagram of ECBFSC decrypton module s gven n Fg. 3. The decrypton module receves an encrypted mage (cphermage) and the 256-bt secret key and returns the orgnal mage (planmage). In partcular, the decrypton module works n the same way as the encrypton module but now the output of the logstc map s subtracted from the correspondng cphermage pxel C provdng the planmage pxel P. The output of the decrypton module s the orgnal mage (planmage). Decrypton of each cphermage pxel C to produce ts correspondng planmage pxel expressed mathematcally as: # P 2 ( ) = C M rx X mod 256 (2) = P can be 7 Desgn Prncples of the Proposed ECBFSC The basc concept s that the encrypton of each part of the planmage depends not only on the key, but also on the prevous cphermage. The use of feedback mechansm has two desrable benefts. The frst beneft s that there can be no smple perodcty n the encrypted mage (cphermage) because the encrypton of each planmage pxel depends not only on the encrypton key, but also on the prevous cphermage pxel. The second beneft s that any changes n the planmage are cascaded forward throughout the cphermage, whch - 4 -

6 means that two almost dentcal planmages wll encrypt to completely dfferent cphermages. Ths senstvty to the planmage s also a plus to the securty of the proposed ECBFSC. The proposed ECBFSC makes heavy use of data-dependent essentals. Ths appears for the current nput of logstc map, whch s data-dependent snce t s computed as a functon of the current sesson key K, prevous computed cpher pxel C and prevous logstc output. Also, the number of teratons # for the chaotc logstc map s data-dependent snce t s computed as a functon of current sesson key K + and prevous computed cpher pxel C. As we encrypt each new block, the counter used to keep track of the current sesson key, s ncremented. The output of the logstc map s then merged wth the planmage to gve the cphermage. 8 Test, Verfcaton and Effcency of ECBFSC Results of some experments are gven to prove ts effcency of applcaton to dgtal mages. We use the gray-scale mages--lena and Effel Tower, each of sze 256 x 256, gray-scale (0-255) as the orgnal mages (planmages) and the secret key (n ASCII) s used for encrypton whose sze s 256-bt. The encrypted mages are depcted n Fgs. 4(b)- 5(b). As shown, the encrypted mages (cphermages) regons are totally nvsble. The decrypton method takes as nput the encrypted mage (cphermage), together wth the same secret key (n ASCII). The decrypted mages are shown n Fgs. 4(c)-5(c). The vsual nspecton of Fgs. (4-5) shows the possblty of applyng the proposed ECBFSC successfully n both encrypton and decrypton. Also, t reveals ts effectveness n hdng the nformaton contaned n them. 9 Securty Analyss and Test Results A good encrypton procedure should be robust aganst all knds of cryptanalytc, statstcal and brute-force attacks. In ths secton, we dscuss the securty analyss of the proposed ECBFSC such as key space analyss, statstcal analyss, and senstvty analyss wth respect to the key and planmage to prove that the proposed ECBFSC s secure aganst the most common attacks [9-22]. 9. Key space Analyss For a secure mage cryptosystem, the key space should be large enough to make the brute force 256 attack nfeasble. The proposed ECBFSC has 2 dfferent combnatons of the secret key. An mage cpher wth such a long key space s suffcent for relable practcal use. In the proposed ECBFSC, a chaotc logstc map s employed whch s senstve on the ntal condton. The ntal condton for logstc map s calculated from the secret key. Addtonally the number of teratons supported by the logstc map module s between 0 and 767, as cpher pxels take values n the nterval [0,52] and the sesson keys take values n the nterval [0,255]. 9.2 Statstcal Analyss It s well known that many cphers have been successfully analyzed wth the help of statstcal analyss and several statstcal attacks have been devsed on them. Therefore, an deal cpher should be robust aganst any statstcal attack. To prove the robustness of the proposed ECBFSC, we have performed statstcal analyss by calculatng the hstograms and the correlatons of two adjacent pxels n the planmage/cphermage

7 9.2. Hstograms analyss To prevent the leakage of nformaton to an opponent, t s also advantageous f the cphermage bears lttle or no statstcal smlarty to the planmage. An mage-hstogram llustrates how pxels n an mage are dstrbuted by graphng the number of pxels at each color ntensty level. We have calculated and analyzed the hstograms of the several encrypted mages as well as ts orgnal mages that have wdely dfferent content. One typcal example among them s shown n Fg. 6(b). The hstogram of a planmage contans large spkes. These spkes correspond to color values that appear more often n the planmage. The hstogram of the cphermage as shown n Fg. 6(d), s more unform, sgnfcantly dfferent from that of the orgnal mage, and bears no statstcal resemblance to the planmage. It s clear that the hstogram of the encrypted mage s farly unform and sgnfcantly dfferent from the respectve hstograms of the orgnal mage and hence does not provde any clue to employ any statstcal attack on the proposed mage encrypton procedure Correlaton coeffcent analyss In addton to the hstogram analyss, we have also analyzed the correlaton between two vertcally adjacent pxels, two horzontally adjacent pxels and two dagonally adjacent pxels n planmage/cphermage respectvely. The procedure s as follows: Frst, randomly select 000 pars of two adjacent pxels from an mage. Then, calculate ther correlaton coeffcent usng the followng two formulas: cov( x, y) = E( x E( x))( y E( y)), (3) cov( x, y) r = (4), xy D( x) D( y) Where x and y are the values of two adjacent pxels n the mage. In numercal computatons, the followng dscrete formulas were used: N (5) E( x) = D( x) = x N = N N = cov( x, y) = ( x N N = E( x)) ( x 2, E( x))( y E( y)), Fg. 7 shows the correlaton dstrbuton of two horzontally adjacent pxels n planmage/cphermage for the proposed ECBFSC. The correlaton coeffcents are and respectvely for both planmage/cphermage. Smlar results for dagonal and vertcal drectons are obtaned as shown n Table. It s clear from the Fg. 7 and Table that there s neglgble correlaton between the two adjacent pxels n the cphermage. However, the two adjacent pxels n the planmage are hghly correlated. (6) (7) 9.3 Senstvty Analyss An deal mage encrypton procedure should be senstve wth respect to both the secret key and planmage. The change of a sngle bt n ether the secret key or planmage should produce a completely dfferent encrypted mage. To prove the robustness of the proposed ECBFSC, we wll perform senstvty analyss wth respect to both key and planmage Key senstvty analyss Hgh key senstvty s requred by secure mage cryptosystems, whch means that the cphermage cannot be decrypted correctly although there s only a slght dfference between encrypton or decrypton keys. Ths guarantees the securty of the proposed ECBFSC aganst brute-force attacks to some extent

8 For testng the key senstvty of the proposed mage encrypton procedure, we have performed the followng steps: (a) An orgnal mage n Fg. 8(a) s encrypted by usng the secret key (n ASCII) and the resultant mage s referred as encrypted mage A as shown n Fg. 8(b). (b) The same orgnal mage s encrypted by makng the slght modfcaton n the secret key.e (n ASCII) (the most sgnfcant bt s changed n the secret key) and the resultant mage s referred as encrypted mage B as shown n Fg. 8(c). (c) Agan, the same orgnal mage s encrypted by makng the slght modfcaton n the secret key.e. secret key (n ASCII) (the least sgnfcant bt s changed n the secret key) and the resultant mage s referred as encrypted mage C as shown n Fg. 8(d). (d) Fnally, the three encrypted mages A, B and C are compared. In Fg. 8, we have shown the orgnal mage as well as the three encrypted mages produced n the aforesad steps. It s not easy to compare the encrypted mages by smply observng these mages. So for comparson, we have calculated the correlaton between the correspondng pxels of the three encrypted mages. For ths calculaton, we have used the same formula as gven n Eq. (4) except that n ths case x and y are the values of correspondng pxels n the two encrypted mages to be compared. In Table 2, we have gven the results of the correlaton coeffcents between the correspondng pxels of the three encrypted mages A, B and C. It s clear from the table that no correlaton exsts among three encrypted mages even though these have been produced by usng slghtly dfferent secret keys. Key senstvty analyss shows that changng one bt n encrypton key wll result n a completely dfferent cphermage by more than 99% n terms of pxel gray scale values. Moreover, n Fg. 9, we have shown the results of some attempts to decrypt an encrypted mage wth slghtly dfferent secret keys than the one used for the encrypton of the orgnal mage. Partcularly, n Fg. 9(a) and Fg. 9(b) respectvely, the orgnal mage and the encrypted mage produced usng the secret key (n ASCII) are shown whereas n Fg. 9(c) and Fg. 9(d) respectvely, the mages after the decrypton of the encrypted mage (shown n Fg. 9(b)) wth the secret keys (n ASCII) and (n ASCII). It s clear that the decrypton wth a slghtly dfferent key fals completely and hence the proposed mage encrypton procedure s hghly key senstve Planmage senstvty analyss A desrable property for the proposed ECBFSC s that t s hghly senstve to small change n the planmage (sngle bt change n planmage). To test the nfluence of one-pxel change on the planmage, encrypted by the proposed ECBFSC, two common measures may be used: Number of Pxels Change Rate (NPCR) and Unfed Average Changng Intensty (UACI). Let two cphered mages, whose correspondng planmages have only one pxel dfference, be denoted by C and C2. Label the gray-scale values of the pxels at grd (,j) n C and C2 by C(,j) and C2(,j), respectvely. Defne a bpolar array, D, wth the same sze as mages C and C2. Then, D(,j) s determned by C(,j) and C2(,j), namely, f C(,j) = C2(,j) then D(,j) = ; otherwse, D(,j) = 0. The NPCR s defned as D(, j), j NPCR = 00%, (8) W H Where W and H are the wdth and heght of C or C2. The NPCR measures the percentage of dfferent pxel numbers between planmage and cphermage. The UACI s defned as UACI C(, j) C2 (, j) = 00%, W H 255 (9) j Ths measures the average ntensty of dfferences between the two mages. One performed test s on the one-pxel change nfluence on a 256 grey-level Lena mage of sze 256 x 256. Wth respect to NPCR estmaton. NPCR s obtaned usng the proposed ECBFSC and estmated to be over 99.62% showng thereby that the encrypton scheme s very senstve wth respect to small changes n the planmage

9 Wth respect to UACI estmaton. UACI s calculated to be %80.5 ndcatng that the rate of nfluence due to one pxel change s very large. Generally, these obtaned results for NPCR and UACI show that the proposed ECBFSC s very senstve wth respect to planmage (planmages have only one pxel dfference). 0 Performance Evaluaton Apart from the securty consderaton, some other ssues on mage encrypton are also mportant. These nclude the runnng speed for real-tme mage encrypton/decrypton. The smulator for the proposed ECBFSC s mplemented usng the compler n Borland C++ Development Sute 5.0. Performance was measured on a 2.4 GHz Pentum IV wth 256 Mbytes of RAM runnng Wndows XP. In addton, to mprove the accuracy of our tmng measurements, each set of the tmng tests shown n Table 3 was executed 0 tmes, and we report the average of the tmes thereby obtaned. Table 3 summarzes the encrypton/decrypton speeds for the proposed ECBFSC on mages of dfferent szes. The results emphass that the proposed ECBFSC. Smulaton results show that the average encrypton/decrypton speed s 7.46 MB/Sec for encrypton and 6.63 MB/Sec for decrypton. The peak speed can reach up to 7.6 MB/Sec for encrypton and 6.7 MB/Sec for decrypton. Conclusons In ths paper, a new way of mage encrypton scheme have been proposed whch utlzes a chaosbased feedback cryptographc scheme usng the logstc map and an external secret key of 256-bt. The robustness of the proposed ECBFSC s further renforced by a feedback mechansm, whch leads the cpher to a cyclc behavor so that the encrypton of each plan pxel depends on the key, the value of the prevous cpher pxel and the output of the logstc map. We have carred out key space analyss, statstcal analyss, and key senstvty analyss to demonstrate the securty of the new mage encrypton procedure. Accordng to the results of our securty analyss, we conclude that the proposed ECBFSC s expected to be useful for real-tme mage encrypton and transmsson applcatons. Furthermore, we have also dscussed the characterstcs of mage cryptosystems, chaos and cryptography ncludng characterstcs and analyss of chaotc logstc map, and research ssues related to mage cryptosystems. References. W. Stallngs., "Cryptography and Network Securty: Prncples and Practce," Prentce-Hall, New Jersey, Bruce Schneer, "Appled Cryptography Protocols, algorthms, and source code n C," John Wley & Sons, Inc., New York, second edton, N. Bourbaks and C. Alexopoulos, Pcture data encrypton usng SCAN patterns. Pattern Recognton 25 6 (992), pp Alexopoulos, C., 989. SCAN, A language for 2-D sequental data accessng. Ph.D. Thess, Unversty of Patras, Greece. 5. C.J. Kuo, Novel mage encrypton technque and ts applcaton n progressve transmsson. J. Electron. Imagng 24 (993), pp Chang, H.K., Lou, J.L., 994. An mage encrypton scheme based on quadtree compresson scheme. In: Proceedngs of the Internatonal Computer Symposum, Tawan, pp Chn-Chen Chang, Mn-Shan Hwang, Tung-Shou Chen, A new encrypton algorthm for mage cryptosystems, The Journal of Systems and Software 58 (200), Frdrch Jr, Symmetrc cphers based on two dmensonal chaotc maps, Int. J. Bfurcat Chaos 8 (998) (6), pp J. Scharnger, Fast encrypton of mage data usng chaotc Kolmogrov flow, J. Electronc Eng 7 (998) (2), pp J.C. Yen, J.I. Guo, A new mage encrypton algorthm and ts VLSI archtecture, n: Proceedngs of the IEEE workshop sgnal processng systems, 999, pp J.C. Yen, J.I. Guo, A new chaotc key based desgn for mage encrypton and decrypton, Proceedngs of the IEEE Internatonal Symposum Crcuts and Systems, vol. 4, 2000, pp

10 2. S. L, X. Zheng, X. Mou, Y. Ca, Chaotc encrypton scheme for real tme dgtal vdeo, Proceedngs of the SPIE on electronc magng, San Jose, CA, USA, G. Chen, Y. Mao and C.K. Chu, A symmetrc mage encrypton based on 3D chaotc maps, Chaos Soltons Fractals 2 (2004), pp W. Dffe and M.E. Hellman, New drectons n cryptography. IEEE Trans. Inf. Theory 22 (976), pp M. S. Baptsta, "Cryptography wth chaos". Phys. Lett. A, vol.240, pp.50-54, G. Jakmosk and L. Kocarev, "Chaos and Cryptography: Block Encrypton Cphers Based on Chaotc Maps," IEEE Transactons on Crcuts and Systems-I: Fundamental Theory and Applcatons, vol. 48, no. 2, February R. Devaney, "An Introducton to Chaotc Dynamcal Systems," 2nd ed. Redwood Cty, CA: Addson- Wesley, Steven Henry Strogatz, "Nonlnear dynamcs and chaos: Wth applcatons to physcs, bologym chemstry, and engneerng," frst ed., Addson-Wesley Publshng Company, Readng, Massachusetts, Shujun L, Guanrong Chen and Xuan Zheng, "Chaos-based encrypton for dgtal mages and vdeos," chapter 4 n Multmeda Securty Handbook, February Yaobn Mao and Guanrong Chen, "Chaos-based mage encrypton," n Eduardo Bayro-Corrochano, edtor, Handbook of Computatonal Geometry for Pattern Recognton, Computer Vson, Neural Computng and Robotcs. Sprnger-Verlag, Hedelberg, Aprl Yaobn Mao, Guanrong Chen, and Charles K. Chu, "A novel fast mage encrypton scheme based on 3D chaotc Baker maps," Int. J. Bfurcaton and Chaos n June Yaobn Mao, Guanrong Chen, and Shguo Lan, "A symmetrc mage encrypton scheme based on 3D chaotc Cat maps," Chaos, Soltons and Fractals 2, pages , a) teraton property when r = 2.8 b) teraton property when r = 3.2 c) teraton property when r = 3.8 Fg. Analyss of Logstc Map Orgnal mage K + K + M + X L # r =3.9 M2 P + C Encrypted mage Fg. 2 Dagram of Encrypton Module K + K + M + X L # r =3.9 M2 C - Encrypted mage P Orgnal mage Fg. 3 Dagram of Decrypton Module - 9 -

11 a) Orgnal mage b) Encrypted mage c) Decrypted mage Fg. 4 Applcaton of ECBFSC to Lena Planmage/Cphermage a) Orgnal mage b) Encrypted mage c) Decrypted mage Fg. 5 Applcaton of ECBFSC to Effel Tower Planmage/Cphermage a) Orgnal mage b) Hstogram of orgnal mage c) Encrypted mage d) Hstogram of encrypted mage Fg. 6 Hstograms of the planmage and the cphermage Fg. 7 Two horzontally adjacent pxels Correlaton n planmage/cphermage Orgnal mage Encrypted mage wth key " " Encrypted mage wth key " " Encrypted mage wth key " " Fg. 8 Key senstve test result wth ECBFSC

12 Orgnal mage Encrypted mage wth key " " Decrypted mage wth key " " Decrypted mage wth " " Fg. 9 Key senstve test result 2 wth ECBFSC Table. Correlaton coeffcents n planmage/cphermage Drecton of Adjacent pxels Planmage Cphermage Horzontal Vertcal Dagonal Table 2. Correlaton coeffcents between the correspondng pxels of the three dfferent encrypted mages obtaned by usng slghtly dfferent secret key of an mage shown n Fg. 8. Image Image Correlaton coeffcent Encrypted mage A Fg. 8(b) Encrypted mage B Fg. 8(c) Encrypted mage B Fg. 8(c) Encrypted mage C Fg. 8(d) Encrypted mage C Fg. 8(d) Encrypted mage A Fg. 8(b) Table 3 Encpherng/decpherng speed test results of the proposed ECBFSC Image sze (n pxels) Colors Encrypton n Sec. Decrypton n Sec. 256 x < < x < < x x x 52 2 < < x x x x x x x x x x x

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Hybrid Non-Blind Color Image Watermarking

Hybrid Non-Blind Color Image Watermarking Hybrd Non-Blnd Color Image Watermarkng Ms C.N.Sujatha 1, Dr. P. Satyanarayana 2 1 Assocate Professor, Dept. of ECE, SNIST, Yamnampet, Ghatkesar Hyderabad-501301, Telangana 2 Professor, Dept. of ECE, AITS,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Enhanced Watermarking Technique for Color Images using Visual Cryptography

Enhanced Watermarking Technique for Color Images using Visual Cryptography Informaton Assurance and Securty Letters 1 (2010) 024-028 Enhanced Watermarkng Technque for Color Images usng Vsual Cryptography Enas F. Al rawashdeh 1, Rawan I.Zaghloul 2 1 Balqa Appled Unversty, MIS

More information

A NOVEL CHAOTIC CIPHERING SYSTEM FOR COLOR DIGITAL IMAGES

A NOVEL CHAOTIC CIPHERING SYSTEM FOR COLOR DIGITAL IMAGES A NOVEL CHAOTIC CIPHERING SYSTEM FOR COLOR DIGITAL IMAGES K. M. FARAOUN Evolutonary Engneerng and Dstrbuted Informaton Systems Laboratory, EEDIS Département d nformatque Djllal Labès Unversty. Sd Bel Abbès

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Lecture - Data Encryption Standard 4

Lecture - Data Encryption Standard 4 The Data Encrypton Standard For an encrypton algorthm we requre: secrecy of the key and not of the algorthm tself s the only thng that s needed to ensure the prvacy of the data the best cryptographc algorthms

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting

High Payload Reversible Data Hiding Scheme Using Difference Segmentation and Histogram Shifting JOURNAL OF ELECTRONIC SCIENCE AND TECHNOLOGY, VOL. 11, NO. 1, MARCH 2013 9 Hgh Payload Reversble Data Hdng Scheme Usng Dfference Segmentaton and Hstogram Shftng Yung-Chen Chou and Huang-Chng L Abstract

More information

A Secured Method for Image Steganography Based On Pixel Values

A Secured Method for Image Steganography Based On Pixel Values A Secured Method for Image Steganography Based On Pxel Values Tarun Gulat #, Sanskrt Gupta * # Assocate Professor, Electroncs and Communcaton Engneerng Department, MMEC, M.M.U., Mullana, Ambala, Haryana,

More information

Edge Detection in Noisy Images Using the Support Vector Machines

Edge Detection in Noisy Images Using the Support Vector Machines Edge Detecton n Nosy Images Usng the Support Vector Machnes Hlaro Gómez-Moreno, Saturnno Maldonado-Bascón, Francsco López-Ferreras Sgnal Theory and Communcatons Department. Unversty of Alcalá Crta. Madrd-Barcelona

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach

Skew Angle Estimation and Correction of Hand Written, Textual and Large areas of Non-Textual Document Images: A Novel Approach Angle Estmaton and Correcton of Hand Wrtten, Textual and Large areas of Non-Textual Document Images: A Novel Approach D.R.Ramesh Babu Pyush M Kumat Mahesh D Dhannawat PES Insttute of Technology Research

More information

An Image Compression Algorithm based on Wavelet Transform and LZW

An Image Compression Algorithm based on Wavelet Transform and LZW An Image Compresson Algorthm based on Wavelet Transform and LZW Png Luo a, Janyong Yu b School of Chongqng Unversty of Posts and Telecommuncatons, Chongqng, 400065, Chna Abstract a cylpng@63.com, b y27769864@sna.cn

More information

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES

PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES PYTHON IMPLEMENTATION OF VISUAL SECRET SHARING SCHEMES Ruxandra Olmd Faculty of Mathematcs and Computer Scence, Unversty of Bucharest Emal: ruxandra.olmd@fm.unbuc.ro Abstract Vsual secret sharng schemes

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Local Quaternary Patterns and Feature Local Quaternary Patterns

Local Quaternary Patterns and Feature Local Quaternary Patterns Local Quaternary Patterns and Feature Local Quaternary Patterns Jayu Gu and Chengjun Lu The Department of Computer Scence, New Jersey Insttute of Technology, Newark, NJ 0102, USA Abstract - Ths paper presents

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

TN348: Openlab Module - Colocalization

TN348: Openlab Module - Colocalization TN348: Openlab Module - Colocalzaton Topc The Colocalzaton module provdes the faclty to vsualze and quantfy colocalzaton between pars of mages. The Colocalzaton wndow contans a prevew of the two mages

More information

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm

Cracking of the Merkle Hellman Cryptosystem Using Genetic Algorithm Crackng of the Merkle Hellman Cryptosystem Usng Genetc Algorthm Zurab Kochladze 1 * & Lal Besela 2 1 Ivane Javakhshvl Tbls State Unversty, 1, I.Chavchavadze av 1, 0128, Tbls, Georga 2 Sokhum State Unversty,

More information

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines

A Modified Median Filter for the Removal of Impulse Noise Based on the Support Vector Machines A Modfed Medan Flter for the Removal of Impulse Nose Based on the Support Vector Machnes H. GOMEZ-MORENO, S. MALDONADO-BASCON, F. LOPEZ-FERRERAS, M. UTRILLA- MANSO AND P. GIL-JIMENEZ Departamento de Teoría

More information

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics

NAG Fortran Library Chapter Introduction. G10 Smoothing in Statistics Introducton G10 NAG Fortran Lbrary Chapter Introducton G10 Smoothng n Statstcs Contents 1 Scope of the Chapter... 2 2 Background to the Problems... 2 2.1 Smoothng Methods... 2 2.2 Smoothng Splnes and Regresson

More information

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009.

Assignment # 2. Farrukh Jabeen Algorithms 510 Assignment #2 Due Date: June 15, 2009. Farrukh Jabeen Algorthms 51 Assgnment #2 Due Date: June 15, 29. Assgnment # 2 Chapter 3 Dscrete Fourer Transforms Implement the FFT for the DFT. Descrbed n sectons 3.1 and 3.2. Delverables: 1. Concse descrpton

More information

Array transposition in CUDA shared memory

Array transposition in CUDA shared memory Array transposton n CUDA shared memory Mke Gles February 19, 2014 Abstract Ths short note s nspred by some code wrtten by Jeremy Appleyard for the transposton of data through shared memory. I had some

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Specifications in 2001

Specifications in 2001 Specfcatons n 200 MISTY (updated : May 3, 2002) September 27, 200 Mtsubsh Electrc Corporaton Block Cpher Algorthm MISTY Ths document shows a complete descrpton of encrypton algorthm MISTY, whch are secret-key

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

S1 Note. Basis functions.

S1 Note. Basis functions. S1 Note. Bass functons. Contents Types of bass functons...1 The Fourer bass...2 B-splne bass...3 Power and type I error rates wth dfferent numbers of bass functons...4 Table S1. Smulaton results of type

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

An Image Fusion Approach Based on Segmentation Region

An Image Fusion Approach Based on Segmentation Region Rong Wang, L-Qun Gao, Shu Yang, Yu-Hua Cha, and Yan-Chun Lu An Image Fuson Approach Based On Segmentaton Regon An Image Fuson Approach Based on Segmentaton Regon Rong Wang, L-Qun Gao, Shu Yang 3, Yu-Hua

More information

Shape-adaptive DCT and Its Application in Region-based Image Coding

Shape-adaptive DCT and Its Application in Region-based Image Coding Internatonal Journal of Sgnal Processng, Image Processng and Pattern Recognton, pp.99-108 http://dx.do.org/10.14257/sp.2014.7.1.10 Shape-adaptve DCT and Its Applcaton n Regon-based Image Codng Yamn Zheng,

More information

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0

The stream cipher MICKEY-128 (version 1) Algorithm specification issue 1.0 The stream cpher MICKEY-128 (verson 1 Algorthm specfcaton ssue 1. Steve Babbage Vodafone Group R&D, Newbury, UK steve.babbage@vodafone.com Matthew Dodd Independent consultant matthew@mdodd.net www.mdodd.net

More information

Lecture 5: Multilayer Perceptrons

Lecture 5: Multilayer Perceptrons Lecture 5: Multlayer Perceptrons Roger Grosse 1 Introducton So far, we ve only talked about lnear models: lnear regresson and lnear bnary classfers. We noted that there are functons that can t be represented

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms

Course Introduction. Algorithm 8/31/2017. COSC 320 Advanced Data Structures and Algorithms. COSC 320 Advanced Data Structures and Algorithms Course Introducton Course Topcs Exams, abs, Proects A quc loo at a few algorthms 1 Advanced Data Structures and Algorthms Descrpton: We are gong to dscuss algorthm complexty analyss, algorthm desgn technques

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1

A New Feature of Uniformity of Image Texture Directions Coinciding with the Human Eyes Perception 1 A New Feature of Unformty of Image Texture Drectons Concdng wth the Human Eyes Percepton Xng-Jan He, De-Shuang Huang, Yue Zhang, Tat-Mng Lo 2, and Mchael R. Lyu 3 Intellgent Computng Lab, Insttute of Intellgent

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

A Lossless Watermarking Scheme for Halftone Image Authentication

A Lossless Watermarking Scheme for Halftone Image Authentication IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.6 No.2B, February 2006 147 A Lossless Watermarkng Scheme for Halftone Image Authentcaton Jeng-Shyang Pan, Hao Luo, and Zhe-Mng Lu,

More information

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity

Corner-Based Image Alignment using Pyramid Structure with Gradient Vector Similarity Journal of Sgnal and Informaton Processng, 013, 4, 114-119 do:10.436/jsp.013.43b00 Publshed Onlne August 013 (http://www.scrp.org/journal/jsp) Corner-Based Image Algnment usng Pyramd Structure wth Gradent

More information

CMPS 10 Introduction to Computer Science Lecture Notes

CMPS 10 Introduction to Computer Science Lecture Notes CPS 0 Introducton to Computer Scence Lecture Notes Chapter : Algorthm Desgn How should we present algorthms? Natural languages lke Englsh, Spansh, or French whch are rch n nterpretaton and meanng are not

More information

Problem Set 3 Solutions

Problem Set 3 Solutions Introducton to Algorthms October 4, 2002 Massachusetts Insttute of Technology 6046J/18410J Professors Erk Demane and Shaf Goldwasser Handout 14 Problem Set 3 Solutons (Exercses were not to be turned n,

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

Detection of an Object by using Principal Component Analysis

Detection of an Object by using Principal Component Analysis Detecton of an Object by usng Prncpal Component Analyss 1. G. Nagaven, 2. Dr. T. Sreenvasulu Reddy 1. M.Tech, Department of EEE, SVUCE, Trupath, Inda. 2. Assoc. Professor, Department of ECE, SVUCE, Trupath,

More information

An Optimized Pseudorandom Generator using Packed Matrices

An Optimized Pseudorandom Generator using Packed Matrices An Optmzed Pseudorandom Generator usng Packed Matrces JOSE-VICENTE AGUIRRE 1, RAFAEL ÁLVAREZ, LEANDRO TORTOSA 3, ANTONIO ZAMORA 4 Dpt. of Computer Scence and Artfcal Intellgence Unversty of Alcante Campus

More information

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation

Quality Improvement Algorithm for Tetrahedral Mesh Based on Optimal Delaunay Triangulation Intellgent Informaton Management, 013, 5, 191-195 Publshed Onlne November 013 (http://www.scrp.org/journal/m) http://dx.do.org/10.36/m.013.5601 Qualty Improvement Algorthm for Tetrahedral Mesh Based on

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Mallathahally, Bangalore, India 1 2

Mallathahally, Bangalore, India 1 2 7 IMPLEMENTATION OF HIGH PERFORMANCE BINARY SQUARER PRADEEP M C, RAMESH S, Department of Electroncs and Communcaton Engneerng, Dr. Ambedkar Insttute of Technology, Mallathahally, Bangalore, Inda pradeepmc@gmal.com,

More information

A new remote user authentication scheme for multi-server architecture

A new remote user authentication scheme for multi-server architecture Future Generaton Computer Systems 19 (2003) 13 22 A new remote user authentcaton scheme for mult-server archtecture Iuon-Chang Ln a, Mn-Shang Hwang b,, L-Hua L b a Department of Computer Scence and Informaton

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Enhanced AMBTC for Image Compression using Block Classification and Interpolation

Enhanced AMBTC for Image Compression using Block Classification and Interpolation Internatonal Journal of Computer Applcatons (0975 8887) Volume 5 No.0, August 0 Enhanced AMBTC for Image Compresson usng Block Classfcaton and Interpolaton S. Vmala Dept. of Comp. Scence Mother Teresa

More information

Research and Application of Fingerprint Recognition Based on MATLAB

Research and Application of Fingerprint Recognition Based on MATLAB Send Orders for Reprnts to reprnts@benthamscence.ae The Open Automaton and Control Systems Journal, 205, 7, 07-07 Open Access Research and Applcaton of Fngerprnt Recognton Based on MATLAB Nng Lu* Department

More information

Cordial and 3-Equitable Labeling for Some Star Related Graphs

Cordial and 3-Equitable Labeling for Some Star Related Graphs Internatonal Mathematcal Forum, 4, 009, no. 31, 1543-1553 Cordal and 3-Equtable Labelng for Some Star Related Graphs S. K. Vadya Department of Mathematcs, Saurashtra Unversty Rajkot - 360005, Gujarat,

More information

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method

An Accurate Evaluation of Integrals in Convex and Non convex Polygonal Domain by Twelve Node Quadrilateral Finite Element Method Internatonal Journal of Computatonal and Appled Mathematcs. ISSN 89-4966 Volume, Number (07), pp. 33-4 Research Inda Publcatons http://www.rpublcaton.com An Accurate Evaluaton of Integrals n Convex and

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

Machine Learning: Algorithms and Applications

Machine Learning: Algorithms and Applications 14/05/1 Machne Learnng: Algorthms and Applcatons Florano Zn Free Unversty of Bozen-Bolzano Faculty of Computer Scence Academc Year 011-01 Lecture 10: 14 May 01 Unsupervsed Learnng cont Sldes courtesy of

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity

Identify the Attack in Embedded Image with Steganalysis Detection Method by PSNR and RGB Intensity Internatonal Journal of Computer Systems (ISSN: 394-1065), Volume 03 Issue 07, July, 016 Avalable at http://www.jcsonlne.com/ Identfy the Attack n Embedded Image wth Steganalyss Detecton Method by PSNR

More information

Meta-heuristics for Multidimensional Knapsack Problems

Meta-heuristics for Multidimensional Knapsack Problems 2012 4th Internatonal Conference on Computer Research and Development IPCSIT vol.39 (2012) (2012) IACSIT Press, Sngapore Meta-heurstcs for Multdmensonal Knapsack Problems Zhbao Man + Computer Scence Department,

More information

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices

An Application of the Dulmage-Mendelsohn Decomposition to Sparse Null Space Bases of Full Row Rank Matrices Internatonal Mathematcal Forum, Vol 7, 2012, no 52, 2549-2554 An Applcaton of the Dulmage-Mendelsohn Decomposton to Sparse Null Space Bases of Full Row Rank Matrces Mostafa Khorramzadeh Department of Mathematcal

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

A fast algorithm for color image segmentation

A fast algorithm for color image segmentation Unersty of Wollongong Research Onlne Faculty of Informatcs - Papers (Arche) Faculty of Engneerng and Informaton Scences 006 A fast algorthm for color mage segmentaton L. Dong Unersty of Wollongong, lju@uow.edu.au

More information

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes

R s s f. m y s. SPH3UW Unit 7.3 Spherical Concave Mirrors Page 1 of 12. Notes SPH3UW Unt 7.3 Sphercal Concave Mrrors Page 1 of 1 Notes Physcs Tool box Concave Mrror If the reflectng surface takes place on the nner surface of the sphercal shape so that the centre of the mrror bulges

More information

Classifier Selection Based on Data Complexity Measures *

Classifier Selection Based on Data Complexity Measures * Classfer Selecton Based on Data Complexty Measures * Edth Hernández-Reyes, J.A. Carrasco-Ochoa, and J.Fco. Martínez-Trndad Natonal Insttute for Astrophyscs, Optcs and Electroncs, Lus Enrque Erro No.1 Sta.

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems

A Unified Framework for Semantics and Feature Based Relevance Feedback in Image Retrieval Systems A Unfed Framework for Semantcs and Feature Based Relevance Feedback n Image Retreval Systems Ye Lu *, Chunhu Hu 2, Xngquan Zhu 3*, HongJang Zhang 2, Qang Yang * School of Computng Scence Smon Fraser Unversty

More information

A Robust Webpage Information Hiding Method Based on the Slash of Tag

A Robust Webpage Information Hiding Method Based on the Slash of Tag Advanced Engneerng Forum Onlne: 2012-09-26 ISSN: 2234-991X, Vols. 6-7, pp 361-366 do:10.4028/www.scentfc.net/aef.6-7.361 2012 Trans Tech Publcatons, Swtzerland A Robust Webpage Informaton Hdng Method Based

More information

Key-Selective Patchwork Method for Audio Watermarking

Key-Selective Patchwork Method for Audio Watermarking Internatonal Journal of Dgtal Content Technology and ts Applcatons Volume 4, Number 4, July 2010 Key-Selectve Patchwork Method for Audo Watermarkng 1 Ch-Man Pun, 2 Jng-Jng Jang 1, Frst and Correspondng

More information

A Comparative Analysis of Encryption Algorithms for Better Utilization

A Comparative Analysis of Encryption Algorithms for Better Utilization A Comparatve Analyss of Encrypton Algorthms for Better Utlzaton Anuj Kumar M.tech(IT) Sapna Snha Astt. Professor Rahul Chaudhary M.tech(CSE) ABSTRACT Cryptographc algorthms provde securty aganst attacks

More information

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points;

Subspace clustering. Clustering. Fundamental to all clustering techniques is the choice of distance measure between data points; Subspace clusterng Clusterng Fundamental to all clusterng technques s the choce of dstance measure between data ponts; D q ( ) ( ) 2 x x = x x, j k = 1 k jk Squared Eucldean dstance Assumpton: All features

More information

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following.

Complex Numbers. Now we also saw that if a and b were both positive then ab = a b. For a second let s forget that restriction and do the following. Complex Numbers The last topc n ths secton s not really related to most of what we ve done n ths chapter, although t s somewhat related to the radcals secton as we wll see. We also won t need the materal

More information

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole

The Research of Ellipse Parameter Fitting Algorithm of Ultrasonic Imaging Logging in the Casing Hole Appled Mathematcs, 04, 5, 37-3 Publshed Onlne May 04 n ScRes. http://www.scrp.org/journal/am http://dx.do.org/0.436/am.04.584 The Research of Ellpse Parameter Fttng Algorthm of Ultrasonc Imagng Loggng

More information

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches

Fuzzy Filtering Algorithms for Image Processing: Performance Evaluation of Various Approaches Proceedngs of the Internatonal Conference on Cognton and Recognton Fuzzy Flterng Algorthms for Image Processng: Performance Evaluaton of Varous Approaches Rajoo Pandey and Umesh Ghanekar Department of

More information

Review of approximation techniques

Review of approximation techniques CHAPTER 2 Revew of appromaton technques 2. Introducton Optmzaton problems n engneerng desgn are characterzed by the followng assocated features: the objectve functon and constrants are mplct functons evaluated

More information

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters

Proper Choice of Data Used for the Estimation of Datum Transformation Parameters Proper Choce of Data Used for the Estmaton of Datum Transformaton Parameters Hakan S. KUTOGLU, Turkey Key words: Coordnate systems; transformaton; estmaton, relablty. SUMMARY Advances n technologes and

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

Improvement ofmanik et al. s remote user authentication scheme

Improvement ofmanik et al. s remote user authentication scheme Improvement ofmank et al. s remote user authentcaton scheme Abstract Jue-Sam Chou, a,yaln Chen b Jyun-Yu Ln c a Department of Informaton Management, Nanhua Unversty Chay, 622, Tawan schou@mal.nhu.edu.tw

More information

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images

Using Fuzzy Logic to Enhance the Large Size Remote Sensing Images Internatonal Journal of Informaton and Electroncs Engneerng Vol. 5 No. 6 November 015 Usng Fuzzy Logc to Enhance the Large Sze Remote Sensng Images Trung Nguyen Tu Huy Ngo Hoang and Thoa Vu Van Abstract

More information

COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL

COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL COMPLEX WAVELET TRANSFORM-BASED COLOR INDEXING FOR CONTENT-BASED IMAGE RETRIEVAL Nader Safavan and Shohreh Kasae Department of Computer Engneerng Sharf Unversty of Technology Tehran, Iran skasae@sharf.edu

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images

Semi-Fragile Watermarking Scheme for Authentication of JPEG Images Tamkang Journal of Scence and Engneerng, Vol. 10, No 1, pp. 5766 (2007) 57 Sem-Fragle Watermarkng Scheme for Authentcaton of JPEG Images Chh-Hung n 1 *, Tung-Shh Su 2 and Wen-Shyong Hseh 2,3 1 Department

More information