The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Steganography is a form of secret communication in which a secret message (text, image) is hidden inside a carrier message (text, image). While in cryptography, the goal is to make everything unreadable to the ones who do not know the password, in steganography, on the other hand, the goal is to camouflage a message inside an apparently innocent carrier. In other words, while cryptography conceals...
Unlike their integer order counterparts, fractional order differentiation is a non-local operation and its computation requires evaluating nested loops over the history of the operated functions. This causes the process to be terribly slow when software based implementations are made using interpreted languages like Python, MATLAB®, etc. The present work demonstrates the development of a fast yet...
The present work demonstrates a novel scheme for recognising Bengali handwritten consonants by exploring the primitive set of strokes that construct the characters. The Bengali consonants are first manually analysed in order to decompose them into their constituent pattern primitives. Once an exhaustive list of such primitives are prepared, a scheme based on mathematical morphology is devised to identify...
This paper presents the development of a novel adaptive backstepping sliding mode control law for temperature control of an industrial heat exchanger system. Backstepping control law has been utilized during the design of reaching mode of the sliding mode controller to ensure a smoother convergence towards sliding surface. However, in order to mitigate the problems of over-conservative approach of...
This paper proposes a novel scheme for recognising Bengali handwritten numerals using mathematical morphology. The numerals are broadly classified into two groups based on the presence and position of blobs and stems in them. Since different writing styles are used by different persons, morphological operations with the same structuring elements (SEs) do not yield satisfactory result. Thus, this paper...
An image can be considered to be a combination of both significant (foreground) objects and some less significant (background) objects. Content aware image resizing (CAIR) algorithm uses the different edge detection methods to segregate the useful objects from the background. When applied to an image, CAIR can resize the image to a very different aspect ratio without destroying the aspect ratio of...
The present work demonstrates a novel fractional order sliding mode controller for synchronization of fractional order chaotic systems and its use in secure communication. First, the existence of the chaotic behaviour is ensured for the autonomous chaotic system under consideration and then a sliding mode controller is designed in order to make the system follow a designated state trajectory. This...
This paper presents a colour image encryption algorithm based on cross-coupled chaotic map and fractional order chaotic systems. Firstly the algorithm employs the cross-coupled chaotic skew tent map to perform the shuffling operation, and then uses the fractional order versions of Lorenz's system and Chen's system to disturb image pixel intensity values. Fractional order extensions of the chaotic...
This paper demonstrates a colour image encryption algorithm that incorporates multiple fractional order chaotic systems. Here, the fractional order extensions of four well known chaotic systems are tactfully combined together to generate the cyphering key. The encrypted image shows uniform histogram, zero autocorrelation and very high entropy for all the three colour-channels. Moreover, the algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.