Filters








486 Hits in 8.1 sec

Video encoding by using cellular automata based on chaos theory

Saeed teimoori, Reza saravani
2019 International Journal of Engineering and Technology  
In this paper presented a method for encode video by using the above functions Kayes and cellular automata.  ...  to encoder structuring an image block [8] .  ...  In this paper, we partakes encoder based on hyper-chaos function, which are spatial when acts, with these difference that for the encoding using from a two-dimensional cellular automata.  ... 
doi:10.21817/ijet/2019/v11i6/191106090 fatcat:q7n5zqu2kjbnxdcn66nh2vw6ci

Cellular automata codebooks applied to compact image compression

Radu DOGARU, Manfred GLESNER, Ronald TETZLAFF
2006 Analele Universităţii "Dunărea de Jos" Galaţi: Fascicula III, Electrotehnică, Electronică, Automatică, Informatică  
Such codebooks are convenient for simple and circuit efficient compression schemes based on binary vector quantization, applied to the bitplanes of any monochrome or color image.  ...  Emergent computation in semi-totalistic cellular automata (CA) is used to generate a set of basis (or codebook).  ...  For instance, in (Lafe, 1997) a Cellular Automata Transform (CAT) is proposed and applied for image compression.  ... 
doaj:8bdc52c63b364dd089dba4a8d23a363b fatcat:an5pmpyygnhhnla7tln3zfo3ja

Encoding Binary Images using Cellular Automata for Data Compression

Nashat G.AlBdour
2014 International Journal of Computer Applications  
This method enables us to compress the image code. These groups will be separated to objects in an image by using cellular automata which uses bend-points determination.  ...  In this paper, I propose a method for efficient coding of images using cellular automata. This method allows us to describe each selected group of neighboring cells of bend points in the contour.  ...  In this paper, we propose a method with hardware for optimal encoding of images by extracting the information elements using cellular automata methodology.  ... 
doi:10.5120/15998-4965 fatcat:iwx6sxnu6ffwnltpywclmy5tka

An Alternate Way to Develop Lossless Graphical Data Compression Package using Non-Linear Single Cycle Multiple Attractor Cellular Automata

Kundu
2009 Journal of Convergence Information Technology  
Single Cycle Multiple Attractor Cellular Automata (SMACA) is used as a compression tool. The results achieved through experimentation are based on lossless image compression.  ...  The first pass compresses the PNM image using SMACA based techniques followed by the second pass which utilizes Huffman variable length encoding scheme.  ...  Multiple Attractor Cellular Automata (MACA) and/or Single Cycle Multiple Attractor Cellular Automata (SMACA) form the backbone on which the proposed compression technique is based and we also use the Huffman  ... 
doi:10.4156/jcit.vol4.issue2.kundu fatcat:wun47vojxfcetjyfopu3ivgrmm

Computational Image Encryption Techniques: A Comprehensive Review

Mandeep Kaur, Surender Singh, Manjit Kaur, Erivelton Geraldo Nepomuceno
2021 Mathematical Problems in Engineering  
These approaches are categorized based on different concepts such as chaotic maps, DNA, compressive sensing, and optical image encryption.  ...  They use different concepts for image encryption to increase security. The main aim of this paper is to present a comprehensive review of the existing image encryption approaches.  ...  [63] proposed an encryption approach for grayscale images based on 1D quantum cellular automata. Murugan et al.  ... 
doi:10.1155/2021/5012496 fatcat:oidlu6wptveyphresdjape2gya

Cellular Automata Based Robust Watermarking Architecture Towards The Vlsi Realization

V. H. Mankar, T. S. Das, S. K. Sarkar
2007 Zenodo  
The Cellular Automata Transform, CA based PN sequence generator, and CA ECC are the requisite blocks that are developed not only to meet the reliable hardware requirements but also for the basic spread  ...  In order to facilitate this hardware realization, cellular automata (CA) concept is introduced.  ...  A cellular automata (CA) is an array of sites (cells), which evolves, in discrete steps.  ... 
doi:10.5281/zenodo.1085067 fatcat:lhusox5iunfglie6nkgiyjxp2m

TWO-LEVEL DATA SECURITY USING STEGANOGRAPHY AND 2D CELLULAR AUTOMATA

S.Saraswathi .
2014 International Journal of Research in Engineering and Technology  
In the first level, data is encoded in the image and in the second level the encoded image is encrypted using 2-D Cellular Automata rules.  ...  The use of Cellular Automata rules is for the parallelism it provides during generation.  ...  Sambhu Prasad Panda, Madhusmita Sahu [10] proposed an encryption and decryption algorithm for block cipher based on the linear (periodic boundary-PB) and nonlinear cellular (complements) automata rules  ... 
doi:10.15623/ijret.2014.0319060 fatcat:y3eillkc4bex7jiph6p3psskzm

Fast and Efficient Design of a PCA-Based Hash Function

Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
2015 International Journal of Computer Network and Information Security  
We propose a simple and efficient hash function based on programmable elementary cellular automata.  ...  The proposed hash function is built using elementary cellular automata that are very suitable for cryptographic applications, due to their chaotic and complex behavior derived from simple rules interaction  ...  The proposed function uses two internals, namely: a compression function based on programmable cellular automata controlled by the chaining variable bits, and a transformation function construct from a  ... 
doi:10.5815/ijcnis.2015.06.04 fatcat:6yjwkt6ogfffzly7sht5un3jmi

Building Secure and Fast Cryptographic Hash Functions Using Programmable Cellular Automata

Alaa Eddine Belfedhal, Kamel Mohamed Faraoun
2015 Journal of Computing and Information Technology  
In this paper, we propose a fast and efficient hash function using programmable cellular automata that are very suitable for cryptographic applications due to their chaotic and complex behavior derived  ...  Cryptographic hash functions have recently brought an exceptional research interest.  ...  Conclusions In this paper, we propose a cryptographic hash function based on cellular automata.  ... 
doi:10.2498/cit.1002639 fatcat:siseskuuzjduvgwtyomyhqf66q

Evolving Structures in Complex Systems [article]

Hugo Cisneros, Josef Sivic, Tomas Mikolov
2020 arXiv   pre-print
We discuss several ways how a metric for measuring the complexity growth can be defined. This includes approaches based on compression algorithms and artificial neural networks.  ...  In this paper we propose an approach for measuring growth of complexity of emerging patterns in complex systems such as cellular automata.  ...  Theoretically this should not be a problem for a good enough linear compression algorithm, but hardware and software limitations make it impractical to work with existing algorithms on higher dimensional  ... 
arXiv:1911.01086v2 fatcat:waxnonm52ve4vnyuts467beyay

A lightweight cryptographic solution to secure digital transmissions on resource-constrained environments

Saiida Lazaar
2021 General Letters in Mathematics  
In the end, the paper will give a comparison between the studied hash functions aiming to come up with a recommendation of good lightweight hash functions suitable for implementation in an IoT framework  ...  Numerous scientific studies have emerged with the advent of the cloud and the Internet of Things (IoT); all of them have expressed a strong need for building secure, efficient and fast cryptosystems targeting  ...  Acknowledgments The author gratefully acknowledge the anonymous reviewers for their valuable comments.  ... 
doi:10.31559/glm2021.10.2.4 fatcat:bmicopcwkjaktpj65ejbrc2uze

Neuromorphic Engineering: From Neural Systems to Brain-Like Engineered Systems

Francesco Carlo Morabito, Andreas G. Andreou, Elisabetta Chicca
2013 Neural Networks  
The structured heap queue is tested on fieldprogrammable gate array (FPGA) for an image segmentation experiment that implies the use of a SNN of 65 536 neurons and 513 184 synapses.  ...  João Carneiro, Sio-Hoi Ieng, Christoph Posch, and Ryad Benosman, in the paper ''Event-Based 3D Reconstructions from Neuromorphic Retinas'', present an innovative N-ocular 3D reconstruction algorithm for  ... 
doi:10.1016/j.neunet.2013.07.001 pmid:23899498 fatcat:37jafps74zfj7ftnrodzpiib5y

Formation of Unique Characteristics of Hiding and Encoding of Data Blocks Based on the Fragmented Identifier of Information Processed by Cellular Automata

Elena Kuleshova, Anatoly Marukhlenko, Vyacheslav Dobritsa, Maxim Tanygin
2020 Computers  
The purpose of the study is to develop an algorithm for hiding and encoding data blocks based on a fragmented identifier of information processed on the basis of cellular automata in the scale of binary  ...  Currently, the following applications of the theory of cellular automata are known: symmetric encryption, data compression, digital image processing and some others.  ...  The description of the proposed organization scheme for multi-threaded data processing based on cellular automata is presented.  ... 
doi:10.3390/computers9020051 fatcat:aeyhq7vifrgehkik4kc357kwsm

An Efficient Design of DCT Approximation Based on Quantum Dot Cellular Automata (QCA) Technology

Ismail Gassoumi, Lamjed Touil, Bouraoui Ouni, Abdellatif Mtibaa
2019 Journal of Electrical and Computer Engineering  
On the other hand, quantum-dot cellular automata (QCA) can present a novel opportunity for the design of highly parallel architectures and algorithms for improving the performance of image and video processing  ...  The DCT is considered to be one of the most essential techniques in image and video compression systems, and consequently a number of extensive works had been carried out by researchers on the power optimization  ...  Among them, quantum-dot cellular automata (QCA) is one of the most promising solutions to design ultra-low-power and very high-speed digital circuits [17, 18] .  ... 
doi:10.1155/2019/9029526 fatcat:i4zaqne7lzgbdpyfhj5tzgbfli

When an attacker meets a cipher-image in 2018: A Year in Review [article]

Chengqing Li, Yun Zhang, Eric Yong Xie
2019 arXiv   pre-print
an image cryptanalyst.  ...  This paper aims to review the encountered technical contradictions when an attacker meets the cipher-images encrypted by the image encryption schemes (algorithms) proposed in 2018 from the viewpoint of  ...  Encrypting images with compressing techniques In [72] , an image encryption scheme based on compressive sensing and chaotic map were proposed.  ... 
arXiv:1903.11764v2 fatcat:uoun46alavexflmuvcbtlinlqm
« Previous Showing results 1 — 15 out of 486 results