Filters
total: 721
filtered: 224
Search results for: Encryption and Obfuscation
-
Hybrid Obfuscation of Encryption
Publication -
Code Obfuscation. Where is it Heading?
Publication -
Hybrid Obfuscation Technique for Reverse Engineering Problems
Publication -
Quaternion Encryption Method for Image and Video Transmission
PublicationQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
A New Quaternion Encryption Scheme for Image Transmission
PublicationQuaternions are hypercomplex number of rank 4. They are often applied to mechanics in three-dimensional space and considered as one of the best ways to represent rotations. In this paper a new encryption scheme, based on the rotation of data vector in three-dimensional space around another quaternion (key) is proposed. A computer-based simulation was created to analyze the potential of the proposed encryption technique.
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublicationIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
A new quaternion-based encryption method for DICOM images
PublicationIn this paper, a new quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We have scrutinized and slightly modified the concept of the DICOM network to point out the best location for the proposed encryption scheme, which significantly improves speed of DICOM images encryption in comparison with those originally embedded into DICOM advanced encryption standard...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublicationIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
Digital fingerprinting for color images based on the quaternion encryption scheme
PublicationIn this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature....
-
Quaternion encryption methods for multimedia transmission, a survey of existing approaches
PublicationIn this paper we review quaternion encryption methods for multimedia transmission. We explain their weak and strong properties as well as suggest possible modifications. Our main focus is an algorithm QFC presented in paper by Dzwonkowski et al. (2015). All encryption methods, presented in this paper, use special properties of quaternions to perform rotations of data sequences in 3D space. Each method uses a common key generation...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublicationIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
Publication -
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublicationThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublicationThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublicationAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Protection of visual data transmission for vessel traffic systems using joint fingerprinting and decryption method based on modified hill cipher
Publication -
Receiver-side fingerprinting method based on quaternion sandwich product
PublicationIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
For Your Eyes Only – Biometric Protection of PDF Documents
PublicationThe paper introduces a concept of a digital document content encryption/decryption with facial biometric data coming from a legitimate user. Access to the document content is simple and straightforward, especially during collaborative work with mobile devices equipped with cameras. Various contexts of document exchange are presented with regard to the next generation pro-active digital documents proposed by authors. An important...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublicationThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
Power equalization of AES FPGA implementation
PublicationThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
Facial data registration facility for biometric protection of electronic documents
PublicationIn modern world, information is crucial, and its leakage may lead to serious losses. Documents as the main medium of information must be therefore highly protected. Nowadays, the most common way of protecting data is using passwords, however it seems inconvenient to type complex passwords, when it is needed many times a day. For that reason a significant research has been conducted on biometric authentication...
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublicationThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
Porównanie nowych metod fingerprintingu i deszyfracji do zabezpieczania obrazów kolorowych
PublicationW artykule porównano nowe metody łącznego fingerprintingu i deszyfracji JFD (ang. Joint Fingerprinting and Decryption) dla obrazów kolorowych zaproponowane w rozprawie doktorskiej dr inż. Bartosza Czaplewskiego. Metody porównano z innymi metodami JFD znanymi z literatury. Metody zostały porównane w kontekście niezauważalności fingerprintów, odporności na szum, odporności na kompresję, odporności na ataki zmowy, oraz odporności...
-
Interaction with medical data using QR-codes
PublicationBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublicationThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
A novel method based on adaptive cuckoo search for optimal network reconfiguration and distributed generation allocation in distribution network
Publication -
IP Core of Coprocessor for Multiple-Precision-Arithmetic Computations
PublicationIn this paper, we present an IP core of coprocessor supporting computations requiring integer multiple-precision arithmetic (MPA). Whilst standard 32/64-bit arithmetic is sufficient to solve many computing problems, there are still applications that require higher numerical precision. Hence, the purpose of the developed coprocessor is to support and offload central processing unit (CPU) in such computations. The developed digital...
-
FPGA implementation of the multiplication operation in multiple-precision arithmetic
PublicationAlthough standard 32/64-bit arithmetic is sufficient to solve most of the scientific-computing problems, there are still problems that require higher numerical precision. Multiple-precision arithmetic (MPA) libraries are software tools for emulation of computations in a user-defined precision. However, availability of a reconfigurable cards based on field-programmable gate arrays (FPGAs) in computing systems allows one to implement...
-
Hillcast - metoda łącznego kryptograficznego zabezpieczenia i fingerprintingu danych dla multicastowej dystrybucji informacji
PublicationW pracy zaproponowano nową, należącą do grupy JDF (ang. Joint Decryption and Fingerprinting) metodę łącznego kryptograficznego zabezpieczenia i fingerprintingu danych, przeznaczoną dla multicastowej dystrybucji informacji multimedialnych. Dane przeznaczone dla dużej liczby odbiorców są przez dystrybutora (właściciela) szyfrowane za pomocą szyfru blokowego, będącego zmodyfikowanym szyfrem Hilla, i w tej postaci są multicastowo przesyłane...
-
Applying ground penetrating radar to tracking of ancient architectural transformations: the case of the monastery St. Peter on the Island of Rab (Croatia)
PublicationThe ground-penetrating radar (GPR) method has been used for many years in archaeological research. However, thismethod is still not widely used in studies of past architecture. The biggest problem with the implementation of the GPRmethod at such sites is usually connected with extensive debris layers, plant cover and standing relics of walls and otherfeatures that restrict the available measurement area. Despite of these, properly...
-
Multi-objective electric distribution network reconfiguration solution using runner-root algorithm
Publication -
A Backtracking Search Algorithm for Distribution Network Reconfiguration Problem
Publication -
Automatic cuts for magnetic scalar potential formulations
Publication -
On the Use of Automatic Cuts Algorithm for T0 – T – Φ Formulation in Nondestructive Testing by Eddy Current
Publication -
Identification, characterization and purification of the lantibiotic staphylococcin T, a natural gallidermin variant
Publication -
Preliminary typology and contextual analysis of Roman and late antique cooking wares from the Roman rural settlement at Podšilo bay on the island of Rab (north–eastern Adriatic, Croatia)
PublicationThe paper presents a preliminary typology of coarse cooking ware from the Roman/late antique layers of the rural settlement at Podšilo bay on the island of Rab. The vessels have been associated with several basic shapes and divided by types, while fabrics have been described macroscopically. Analogies and a contextual analysis were used to propose dating and to assess provenience for well-known ware classes or to define areas...
-
Sustainable Cultural Management in the 21st Century
Publication -
Propriétés macroscopiques équivalentes pour représenter les pertes dans les bobines conductrices
Publication -
High Frequency Proximity Losses Determination for Rectangular Cross Section Conductors
Publication -
High-Frequency Proximity Losses Determination for Rectangular Cross-Section Conductors
Publication -
Łączony fingerprinting i kryptograficzne zabezpieczenie danych z wykorzystaniem szyfru Hilla
PublicationW referacie przedstawiono rozwinięcie metody Hillcast znakowania obrazów, która należy do grupy metod wprowadzających fingerprinting przy deszyfracji zabezpieczonego kryptograficznie obrazu (ang. JFD (Joint Fingerprinting and Decryption)), której głównym przeznaczeniem są usługi wideo na żądanie (ang. VoD (Video on Demand)). Metoda zapewnia kryptograficzne bezpieczeństwo oraz znakowanie treści multimedialnych, przy jednoczesnym...
-
Defining Whole Grain Sorghum Flour and Water Levels to Improve Sensory and Nutritional Quality of Gluten-Free Bread—A Factorial Design Approach
Publication -
Burialscapes of Rab Island (North East Adriatic): The Role of Sepulchral Evidence in the Reconstruction of Roman and Late Antique Rural Settlement Pattern
PublicationOn the bases of archaeological and documentary data an overview of the burial evidence of Roman and late Antique date on the island of Rab (North East Adriatic, Croatia) is brought forth, spatially analysed and interpreted within the so-far defined rural settlement pattern. While aiding in the definition of burial practices and their diachronic changes, data derived from such evidence and interpreted from a social perspective,...
-
The site at the cape Zidine in Lopar in the context of coastal residential and commercial complexes of Rab Island
PublicationSince 2013, the “Archaeological topography of the island of Rab” project has approached the island’s archaeology holistically and interdisciplinary, tackling all periods and archaeological evidence present on the island. Nevertheless, mostly due to a large amount of new data, a significant segment of research is devoted to Roman residential and production complexes, located either in the island’s fields or along the coast. Thus,...
-
Rural Landscapes of Roman (northern) Liburnia: Diachronic Development of Organisation and the Economy in Extra-Urban Territories in the Light of Recent Archaeological Research
PublicationThe archaeology of Roman rural landscapes in the province of Dalmatia, and especially northern Liburnia, has until recently focused on single-site or single-monument analyses, allowing for only geographically patchy and chronologically limited conclusions. Considering the results of recent research in the wider Kvarner and sub-Velebit area, the paper discusses issues of Roman extra-urban territorial organization, the formation...
-
An Island of Connectedness: Intra-Insular and Inter-Regional Communications of Rab Island (North-East Adriatic, Kvarner Gulf), Croatia
PublicationDrawing from archaeological data on Prehistoric and Roman settlement patterns, and respective sepulchral features, just as on later historic and cartographic sources, in this contribution it will be shown how movement along with mobility influenced on and were an integral part of settlement dynamics on the island of Rab (NE Adriatic, Croatia). The employed approach sees the practice of movement as dependent on specific social...
-
The structure of dimethylsulfoxide-solvated magnesium and calcium ions in solution and the solid state, and overview of the coordination chemistry of hydrated and solvated alkaline earth metal ions
PublicationOznaczono strukturę w stanie stałym i ciekłym solwatowanych jonów magnezu i wapnia w dimetylosulfotlenku. Stwierdzono, ze jony te tworzą sześciokoordynacyjne solwaty ze średnią długością wiązań Mg-O i Ca-O 2.062(4) i 2.303(5)A. Przegląd literaturowy ukazał, że jony berylu i magnezu we wszystkich rozpuszczalnikach tworzą odpowiednio cztero- i sześciokoordynacyjne solwaty, podczas gdy jony wapnia i strontu istnieją jako ośmiokoordynacyjne...
-
Earthquake-induced pounding between equal height multi-storey buildings considering soil-structure interaction
PublicationThe present paper investigates the coupled effect of the supporting soil flexibility and pounding between neighbouring, insufficiently separated equal height buildings under earthquake excitation. Two adjacent three-storey structures, modelled as inelastic lumped mass systems with different structural characteristics, have been considered in the study. The models have been excited using a suit of ground motions with different peak...
-
Behaviour of Colliding Multi-Storey Buildings under Earthquake Excitation Considering Soil-Structure Interaction
PublicationThis paper investigates the coupled effect of the supporting soil flexibility and pounding between neighbouring, insufficiently separated buildings under earthquake excitation. Two adjacent three-storey structures, modelled as inelastic lumped mass systems with different structural characteristics, have been considered in the study. The models have been excited using the time history of the Kobe earthquake of 1995. A nonlinear...