Filters








30 Hits in 8.7 sec

On a Symmetric Image Encryption Algorithm Based on the Peculiarity of Plaintext DNA Coding

Yulan Kang, Linqing Huang, Yan He, Xiaoming Xiong, Shuting Cai, Haiyu Zhang
2020 Symmetry  
In this paper, a novel plaintext-related mechanism based on the peculiarity of plaintext DNA coding (PPDC) is presented and used to developed a symmetric image encryption algorithm.  ...  Many plaintext-related or non-plaintext-related image encryption algorithms based on chaotic systems have been found inefficient and insecure under chosen plaintext attacks.  ...  The founding sponsors had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript; nor in the decision to publish the results.  ... 
doi:10.3390/sym12091393 fatcat:hz6gyjb2kzclthqdlpfognijq4

A comparative review on symmetric and asymmetric DNA-based cryptography

Baraa Tareq Hammad, Ali Maki Sagheer, Ismail Taha Ahmed, Norziana Jamil
2020 Bulletin of Electrical Engineering and Informatics  
The first case concerned on symmetric cryptography that involved DNA coding with OTP (one time pad) algorithms.  ...  Asymmetric cryptography was considered in the second case by incorporating the DNA codes in RSA algorithm. The efficiencies of DNA coding in OTP, RSA, and other algorithms were given.  ...  [21] 2011 This research includes an index-based symmetric DNA encryption algorithm. By using the block-cipher and index of string, the algorithm has a specific step for encoding the plaintext.  ... 
doi:10.11591/eei.v9i6.2470 fatcat:y55ifvgep5aw3alx4lzjqqg5fe

On the image encryption algorithm based on the chaotic system, DNA encoding and Castle

Nadeem Iqbal, Rizwan Ali Naqvi, Muhammad Atif, Muhammad Adnan Khan, Muhammad Hanif, Sagheer Abbas, Dildar Hussain
2021 IEEE Access  
An another algorithm for the images encryption based on fractional Fourier transformation, chaotic map and DNA was given by [20] .  ...  Recently, a novel image encryption algorithm has been developed by using the keys derived from plaintext image and DNA [25] .  ...  Moreover, the proposed algorithm renders the better results of P SN R metric for the Lena image when compared with [56] , [57] . I.  ... 
doi:10.1109/access.2021.3106028 fatcat:je2fhdepvfcsnmoxb43wdgginm

VG4 Cipher: Digital Image Encryption Standard

Akhil Kaushik, Vikas Thada
2021 International Journal of Advanced Computer Science and Applications  
The purpose of this research paper is to present a DNA-inspired cryptosystem that can be employed in the domain of image encryption that provides superior security with enhanced efficiency.  ...  The state-of-art cryptographic technique is DNA encryption, which uses biological principles for safeguarding data.  ...  The proposed cryptographic algorithm is primarily based on symmetric encryption and henceforth the decryption procedure of the VG4 cipher is exactly opposite to the encoding process.  ... 
doi:10.14569/ijacsa.2021.0120417 fatcat:ufiigqcjd5gitkp2mjbwkzx7x4

A Novel and Efficient 3D Multiple Images Encryption Scheme Based on Chaotic Systems and Swapping Operations

Muhammad Hanif, Rizwan Ali Naqvi, Sagheer Abbas, Muhammad Adnan Khan, Nadeem Iqbal
2020 IEEE Access  
Single image encryption schemes are not efficient enough when a bunch of images is to be encrypted in some real-world setting.  ...  SHA-256 hash codes have been used to throw the plaintext sensitivity in the proposed cipher. Besides, a 256bit user key has been employed to increase the key space.  ...  The same indexes were then used for the substitution process which was based on the DNA.  ... 
doi:10.1109/access.2020.3004536 fatcat:mim2h2txjvebdn7b3zdgoe3vi4

A Noise-Tolerant Audio Encryption Framework Designed by the Application of S8 Symmetric Group and Chaotic Systems

Haris Aziz, Syed Mushhad Mustuzhar Gilani, Iqtadar Hussain, Abdul Kashif Janjua, Shahzada Khurram
2021 Mathematical Problems in Engineering  
In this paper, a novel encryption scheme is presented for real-time audio applications. The framework of the proposed scheme is grounded on the principles of confusion and diffusion.  ...  The confusion incorporates nonlinearity by the application of Mordell elliptic curves (MEC) and a symmetric group of permutations S8.  ...  [43] came with a new audio encryption algorithm based on chaotic maps and DNA encoding. e algorithm offers reasonable security and achieves a prominent signal-to-noise ratio (SNR).  ... 
doi:10.1155/2021/5554707 doaj:dd945ecfb56d4e57b3a1ea69594316c4 fatcat:recyv4zpsfbsjfesh4lpoixkoe

Privacy-preserving fingercode authentication

Mauro Barni, Fabio Scotti, Alessandro Piva, Tiziano Bianchi, Dario Catalano, Mario Di Raimondo, Ruggero Donida Labati, Pierluigi Failla, Dario Fiore, Riccardo Lazzeretti, Vincenzo Piuri
2010 Proceedings of the 12th ACM workshop on Multimedia and security - MM&Sec '10  
To keep the protocol complexity as low as possible, a particular representation of fingerprint images, named Fingercode, is adopted.  ...  The proposed protocol follows a multi-party computation approach and makes extensive use of homomorphic encryption as underlying cryptographic primitive.  ...  The algorithm this paper focuses on, is based on a particular representation of the fingerprints which yields a relatively short, fixed length code, called Fingercode [4] suitable for matching as well  ... 
doi:10.1145/1854229.1854270 dblp:conf/mmsec/BarniBCRLFFLPSP10 fatcat:aq2nobd4uzgp5knbla3p5vgrkq

Security and Privacy in Molecular Communication and Networking: Opportunities and Challenges

Valeria Loscri, Cesar Marchal, Nathalie Mitton, Giancarlo Fortino, Athanasios V. Vasilakos
2014 IEEE Transactions on Nanobioscience  
We start with a general presentation of attacks in traditional telecommunication systems, and then we describe the main features of the molecular communication paradigm.  ...  Differently to the traditional communication paradigm, the information is encoded on the molecules, that are then used as carriers of information.  ...  By using sequences of short oligonucleotides is possible to generate a long DNA sequence An Encryption Algorithm Inspired from DNA [26] Symmetric key block cipher technique inspired from DNA based on  ... 
doi:10.1109/tnb.2014.2349111 pmid:25148668 fatcat:g4rvzvx23zff3mx6f6ytd26qda

Number Theoretic Transforms for Secure Signal Processing [article]

Alberto Pedrouzo-Ulloa, Juan Ramón Troncoso-Pastoriza, Fernando Pérez-González
2018 arXiv   pre-print
This problem becomes a challenge when the untrusted environment must perform some processing on the sensitive signals; a paradigmatic example is Cloud-based signal processing services.  ...  Approaches based on Secure Signal Processing (SSP) address this challenge by proposing novel mechanisms for signal processing in the encrypted domain and interactive secure protocols to achieve the goal  ...  It is also important to note that Paillier can only deal with one scalar plaintext, while all the primitives using Lauter work in parallel with n plaintext values encrypted in one ciphertext, each one  ... 
arXiv:1607.05229v2 fatcat:mrlorcxrrrg7lbfr7khn7mr2xq

Biometrics and Privacy

Stelvio Cimato, Roberto Sassi, Fabio Scotti
2010 Recent Patents on Computer Science  
These privacy concerns are the subject of current discussions and often prevent the adoption of biometric systems on a large scale.  ...  Unfortunately, with the benefits also possible risks arise. A main concern in the design of biometric authentication systems is the protection of the biometric templates.  ...  of encryption/decryption algorithms.  ... 
doi:10.2174/1874479610801020098 fatcat:bueoxiejprgcnnp3ieticzeoma

BIOSIG 2020 - Komplettband

2020 Biometrics and Electronic Signatures  
The effect of wearing a mask on face recognition in a collaborative environment is currently sensitive yet understudied issue.  ...  We further study the effect of masked face probes on the behaviour of three top-performing face recognition systems, two academic solutions and one commercial off-the-shelf (COTS) system.  ...  Portions of the research in this paper use the FERET database of facial images collected under the FERET program, sponsored by the DOD Counterdrug Technology Development Program Office.  ... 
dblp:conf/biosig/X20 fatcat:hkqvegujqbatdlopbzclkxdive

D3.1 - ASCLEPIOS Security and Policies Model

Institute Of Communication And Computer Systems
2019 Zenodo  
It also reports on the semantics of context-based access control and ABE related policies.  ...  This deliverable provides a model for formally capturing the background knowledge and enabling the ABAC and ABE paradigms, in terms of the ASCLEPIOS project.  ...  Thus, a successful ABE authorization implies the decryption of a key, which then can be used for acquiring the plaintext of the encrypted medical records.  ... 
doi:10.5281/zenodo.4022334 fatcat:vuujxbm7ozgxdprshc6ir2uqda

Privacy on the line: the politics of wiretapping and encryption

1998 ChoiceReviews  
If we could develop an algorithm based on a mathematical theory of the cryptanalysis of block ciphers, we could have proofs that the algorithm would resist certain types of attacks.  ...  It produced the algorithm SHARK, which had good diffusion (spreading the attacker's attention over large numbers of bits), but a plaintext/ciphertext attack on a simplified version of SHARK showed other  ...  , 148, 149 Church Committee on, 137, 170, 170, [200] [201] [202] 11 dimensions of, [141] [142] 128-131, 194 legalization of, 192-195 limits on, 193-195 minimization of, 372 in nineteenth century,  ... 
doi:10.5860/choice.35-6456 fatcat:zlca7qql2ffevobnzs5qckmyqq

Access Control for Databases: Concepts and Systems

Elisa Bertino
2010 Foundations and Trends in Databases  
In [61] , a symmetric encryption algorithm is used, namely AES encryption with 128-bit keys. However, any other symmetric key encryption algorithms can be used within the framework.  ...  An encryption function takes as input a block of data called plaintext and transforms it into a ciphertext with the help of an encryption key.  ... 
doi:10.1561/1900000014 fatcat:trrsnypzyvcq5phpgvee7dumva

Intrusion-Detection Systems [chapter]

Peng Ning, Sushil Jajodia
2012 Handbook of Computer Networks  
Series on ADVANCES IN INFORMATION SECURITY are, one, to establish the state of the art of, and set the course for future research in information security and, two, to serve as a central reference source  ...  and software assurance. of maturity to warrant a comprehensive textbook treatment. ideas for books under this series.  ...  Acknowledgment This work has been partially funded by the Ministero dell'Università e della Ricerca (MiUR) in the framework of the RECIPE Project, and by the EU as part of the IST Programme -within the  ... 
doi:10.1002/9781118256107.ch26 fatcat:aeidzkegvfc27dqqmztiayv3dm
« Previous Showing results 1 — 15 out of 30 results