Wyniki wyszukiwania dla: Encryption and Obfuscation
-
Hybrid Obfuscation of Encryption
Publikacja -
Code Obfuscation. Where is it Heading?
Publikacja -
Hybrid Obfuscation Technique for Reverse Engineering Problems
Publikacja -
Quaternion Encryption Method for Image and Video Transmission
PublikacjaQuaternions are hyper-complex numbers of rank 4. They are often applied to mechanics in 3D space and are considered to be one of the best ways of representing rotations. In this paper a quaternion encryption method, based on algorithm by Nagase et al. (2004) has been proposed. According to a computer-based simulation the results of the performed research yield a high level of security, which is additionally strengthened by the...
-
A New Quaternion Encryption Scheme for Image Transmission
PublikacjaQuaternions are hypercomplex number of rank 4. They are often applied to mechanics in three-dimensional space and considered as one of the best ways to represent rotations. In this paper a new encryption scheme, based on the rotation of data vector in three-dimensional space around another quaternion (key) is proposed. A computer-based simulation was created to analyze the potential of the proposed encryption technique.
-
Digital Fingerprinting based on Quaternion Encryption for Image Transmission
PublikacjaIn this paper a new digital fingerprinting scheme for images is proposed. A proposed method is based on quaternion encryption with Cipher Block Chaining (CBC) mode of operation. Quaternions are hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm is designed for grey-tone images. For purpose of encryption, the algorithm uses the rotation of data vectors presented...
-
Visual Data Encryption for Privacy Enhancement in Surveillance Systems
PublikacjaIn this paper a methodology for employing reversible visual encryption of data is proposed. The developed algorithms are focused on privacy enhancement in distributed surveillance architectures. First, motivation of the study performed and a short review of preexisting methods of privacy enhancement are presented. The algorithmic background, system architecture along with a solution for anonymization of sensitive regions of interest...
-
A new quaternion-based encryption method for DICOM images
PublikacjaIn this paper, a new quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We have scrutinized and slightly modified the concept of the DICOM network to point out the best location for the proposed encryption scheme, which significantly improves speed of DICOM images encryption in comparison with those originally embedded into DICOM advanced encryption standard...
-
Digital fingerprinting for color images based on the quaternion encryption scheme
PublikacjaIn this paper we present a new quaternion-based encryption technique for color images. In the proposed encryption method, images are written as quaternions and are rotated in a three-dimensional space around another quaternion, which is an encryption key. The encryption process uses the cipher block chaining (CBC) mode. Further, this paper shows that our encryption algorithm enables digital fingerprinting as an additional feature....
-
Quaternion encryption methods for multimedia transmission, a survey of existing approaches
PublikacjaIn this paper we review quaternion encryption methods for multimedia transmission. We explain their weak and strong properties as well as suggest possible modifications. Our main focus is an algorithm QFC presented in paper by Dzwonkowski et al. (2015). All encryption methods, presented in this paper, use special properties of quaternions to perform rotations of data sequences in 3D space. Each method uses a common key generation...
-
Digital Fingerprinting Based on Quaternion Encryption Scheme for Gray-Tone Images
PublikacjaIn this paper a new idea of digital images fingerprinting is proposed. The method is based on quaternion encryption in the Cipher Block Chaining (CBC) mode. Quaternion sare hyper-complex numbers of rank 4 and thus often applied to mechanics in three-dimensional space. The encryption algorithm described in the paper is designed for gray-tone images but can easily be adopted for color ones. For the encryption purpose, the algorithm...
-
Hybrid Obfuscation Technique to Protect Source Code From Prohibited Software Reverse Engineering
Publikacja -
Software Performance Enhancement for Encryption and Decryption
Konferencje -
Joint fingerprinting and decryption method for color images based on quaternion rotation with cipher quaternion chaining
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). In this method three color channels of the image are considered a 3D space and each component of the image is represented as a point in this 3D space. The distribution side uses a symmetric cipher to encrypt perceptually essential components of the image with the encryption key and then sends the encrypted data via...
-
Matrix-based robust joint fingerprinting and decryption method for multicast distribution of multimedia
PublikacjaThis paper addresses the problem of unauthorized redistribution of multimedia content by malicious users (pirates). The solution proposed here is a new joint fingerprinting and decryption method which meets the requirements for both imperceptibility and robustness of fingerprints and scalability in terms of design and distribution of fingerprinted multimedia content. The proposed method uses a simple block cipher based on matrix...
-
Receiver-side fingerprinting method for color images based on a series of quaternion rotations
PublikacjaThe proposed method is a new Joint Fingerprinting and Decryption (JFD) method that uses a cipher based on quaternion rotation to encrypt color images that are then sent to all users via multicast transmission. Individual encryption keys depend on the users’ fingerprints, so that a unique fingerprint is introduced into the image during decryption for each decryption key. A simulation-based research was conducted to examine the method’s...
-
Secure Quaternion Feistel Cipher for DICOM Images
PublikacjaAn improved and extended version of a quaternion-based lossless encryption technique for digital image and communication on medicine (DICOM) images is proposed. We highlight and address several security flaws present in the previous version of the algorithm originally proposed by Dzwonkowski et al. (2015). The newly proposed secure quater- nion Feistel cipher (S-QFC) algorithm...
-
Protection of visual data transmission for vessel traffic systems using joint fingerprinting and decryption method based on modified hill cipher
Publikacja -
Receiver-side fingerprinting method based on quaternion sandwich product
PublikacjaIn this paper a new receiver-side fingerprinting method for color images is proposed. The proposed method belongs to the group of Joint Fingerprinting and Decryption (JFD) methods. Each component of the color image is represented as a point in 3D space, which is formed by 3 color channels. Encryption and fingerprinting can be interpreted as rotation, scaling and translation of these points. Calculations are performed using quaternion...
-
For Your Eyes Only – Biometric Protection of PDF Documents
PublikacjaThe paper introduces a concept of a digital document content encryption/decryption with facial biometric data coming from a legitimate user. Access to the document content is simple and straightforward, especially during collaborative work with mobile devices equipped with cameras. Various contexts of document exchange are presented with regard to the next generation pro-active digital documents proposed by authors. An important...
-
A fair distribution scheme for joint fingerprinting and decryption methods= Sprawiedliwy schemat dystrybucji dla metod łącznego osadzania odcisku palca oraz deszyfracji
PublikacjaThe paper addresses the fairness of the security provided by digital fingerprinting methods. It was noted that the digital fingerprinting techniques are designed primarily to protect service providers against the actions of malicious users, while honest users remain vulnerable to acts of malicious providers. The paper describes the customer's rights problem and the unbinding problem, which also apply to joint fingerprinting and...
-
International Workshop on Fast Software Encryption
Konferencje -
Power equalization of AES FPGA implementation
PublikacjaThis paper briefly introduces side channel attacks on cryptographic hardware with special emphasis on differential power analysis(DPA). Based on existing countermeasures against DPA, design method combining power equalization for synchronous and combinatorialcircuits has been proposed. AES algorithm has been implemented in Xilinx Spartan II-E field programmable gate array (FPGA) deviceusing the standard and power-equalized methods....
-
Facial data registration facility for biometric protection of electronic documents
PublikacjaIn modern world, information is crucial, and its leakage may lead to serious losses. Documents as the main medium of information must be therefore highly protected. Nowadays, the most common way of protecting data is using passwords, however it seems inconvenient to type complex passwords, when it is needed many times a day. For that reason a significant research has been conducted on biometric authentication...
-
Shock, unspecified - Female, 0 - Tissue image [314063002432971]
Dane BadawczeThis is the histopathological image of LIVER AND INTRAHEPATIC BILE DUCTS tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Shock, unspecified - Female, 0 - Tissue image [3140630024322191]
Dane BadawczeThis is the histopathological image of LIVER AND INTRAHEPATIC BILE DUCTS tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: Pannoramic 250 3DHistech slide scanner (20x magnification) and saved to DICOM format.
-
Other specified congenital malformations - Male, 0 - Tissue image [314063002432871]
Dane BadawczeThis is the histopathological image of LIVER AND INTRAHEPATIC BILE DUCTS tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: VS200 Olympus slide scanner (20x magnification) and saved to DICOM format.
-
Other specified congenital malformations - Male, 0 - Tissue image [3140630024321101]
Dane BadawczeThis is the histopathological image of LIVER AND INTRAHEPATIC BILE DUCTS tissue sample obtained in Medical University Gdańsk and deposited in ZMDL-GUMED. The sample image was taken using: VS200 Olympus slide scanner (20x magnification) and saved to DICOM format.
-
Immunizing the Hillcast Method against the Known-Plaintext Attack using Periodic Key Exchange
PublikacjaThis paper considers a Joint Fingerprinting and Decryption method, called Hillcast, for the copyright protection and traitor tracing in case of Video on Demand services. Because the method is based on the Hill cipher, it is vulnerable to a known-plaintext attack. The goal of this paper is to present an efficient periodic key exchange mechanism to make this method secure without compromising its scalability, imperceptibility or...
-
Tomasz Gzella mgr inż.
Osoby -
Phung Anh-Tuan Dr
Osoby2007, Hanoi University of Science and Technology 2006. PhD University of Grenoble 2002 Engineer Diploma, Hanoi University of Science and Technology
-
Porównanie nowych metod fingerprintingu i deszyfracji do zabezpieczania obrazów kolorowych
PublikacjaW artykule porównano nowe metody łącznego fingerprintingu i deszyfracji JFD (ang. Joint Fingerprinting and Decryption) dla obrazów kolorowych zaproponowane w rozprawie doktorskiej dr inż. Bartosza Czaplewskiego. Metody porównano z innymi metodami JFD znanymi z literatury. Metody zostały porównane w kontekście niezauważalności fingerprintów, odporności na szum, odporności na kompresję, odporności na ataki zmowy, oraz odporności...
-
Interaction with medical data using QR-codes
PublikacjaBar-codes and QR-codes (Quick Response ) are often used in healthcare. In this paper an application of QR-codes to exchange of laboratory results is presented. The secure data exchange is proposed between a laboratory and a patient and between a patient and Electronic Health Records. Advanced Encryption Standard was used to provide security of data encapsulated within a QR-code. The experimental setup, named labSeq is described....
-
Improvement of Fingerprinting Method based on Hill Cipher by using Frequency Domain
PublikacjaThe main goal of this paper is to present the advantages of a digital fingerprinting in a frequency domain over a pixel domain, in case of VoD services (Video on Demand). The paper presents basic issues of a multimedia data protection by digital fingerprinting. It also describes threats to embedded fingerprints from both collusion attacks and from a transmission itself. Possible solution was presented on the example of the DCT...
-
A novel method based on adaptive cuckoo search for optimal network reconfiguration and distributed generation allocation in distribution network
Publikacja -
Merin Ann Botany
Osoby -
Ana Namikata master
Osoby -
Muhammad Ans
Osoby -
Ali Żand
Osoby -
IP Core of Coprocessor for Multiple-Precision-Arithmetic Computations
PublikacjaIn this paper, we present an IP core of coprocessor supporting computations requiring integer multiple-precision arithmetic (MPA). Whilst standard 32/64-bit arithmetic is sufficient to solve many computing problems, there are still applications that require higher numerical precision. Hence, the purpose of the developed coprocessor is to support and offload central processing unit (CPU) in such computations. The developed digital...
-
FPGA implementation of the multiplication operation in multiple-precision arithmetic
PublikacjaAlthough standard 32/64-bit arithmetic is sufficient to solve most of the scientific-computing problems, there are still problems that require higher numerical precision. Multiple-precision arithmetic (MPA) libraries are software tools for emulation of computations in a user-defined precision. However, availability of a reconfigurable cards based on field-programmable gate arrays (FPGAs) in computing systems allows one to implement...
-
Hillcast - metoda łącznego kryptograficznego zabezpieczenia i fingerprintingu danych dla multicastowej dystrybucji informacji
PublikacjaW pracy zaproponowano nową, należącą do grupy JDF (ang. Joint Decryption and Fingerprinting) metodę łącznego kryptograficznego zabezpieczenia i fingerprintingu danych, przeznaczoną dla multicastowej dystrybucji informacji multimedialnych. Dane przeznaczone dla dużej liczby odbiorców są przez dystrybutora (właściciela) szyfrowane za pomocą szyfru blokowego, będącego zmodyfikowanym szyfrem Hilla, i w tej postaci są multicastowo przesyłane...
-
Applying ground penetrating radar to tracking of ancient architectural transformations: the case of the monastery St. Peter on the Island of Rab (Croatia)
PublikacjaThe ground-penetrating radar (GPR) method has been used for many years in archaeological research. However, thismethod is still not widely used in studies of past architecture. The biggest problem with the implementation of the GPRmethod at such sites is usually connected with extensive debris layers, plant cover and standing relics of walls and otherfeatures that restrict the available measurement area. Despite of these, properly...
-
Multi-objective electric distribution network reconfiguration solution using runner-root algorithm
Publikacja -
A Backtracking Search Algorithm for Distribution Network Reconfiguration Problem
Publikacja -
Automatic cuts for magnetic scalar potential formulations
Publikacja -
On the Use of Automatic Cuts Algorithm for T0 – T – Φ Formulation in Nondestructive Testing by Eddy Current
Publikacja -
Identification, characterization and purification of the lantibiotic staphylococcin T, a natural gallidermin variant
Publikacja -
Preliminary typology and contextual analysis of Roman and late antique cooking wares from the Roman rural settlement at Podšilo bay on the island of Rab (north–eastern Adriatic, Croatia)
PublikacjaThe paper presents a preliminary typology of coarse cooking ware from the Roman/late antique layers of the rural settlement at Podšilo bay on the island of Rab. The vessels have been associated with several basic shapes and divided by types, while fabrics have been described macroscopically. Analogies and a contextual analysis were used to propose dating and to assess provenience for well-known ware classes or to define areas...
-
Propriétés macroscopiques équivalentes pour représenter les pertes dans les bobines conductrices
Publikacja