The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Present day secure speech communication mainly deals with providing maximum security at the cost of minimum complexity. While doing so, they are mainly looking forward to the speech coders for compressing the speech signal thus minimizing the complexity. In this paper an algorithm is proposed that aims at exploiting the basic characteristics of speech signal, while designing such system with reduced...
With the rapid growing of internet and networks applications, data security becomes more important than ever before. Encryption algorithms play a crucial role in information security systems. In this paper, we have a study of the two popular encryption algorithms: DES and Blowfish. We overviewed the base functions and analyzed the security for both algorithms. We also evaluated performance in execution...
Due to advances in data collection and increasing dependency on data mining experts, preserving privacy of the data is a major concern when mining the data. Most of the classifier implementations for data mining have the tradeoff between classification accuracy and maintenance of data privacy. Another important aspect in distance-based classifiers is to accurately compute distance (or similarity)...
Multicast transmission enables a sender to distribute data to multiple intended receivers simultaneously. However, the multicast transmission should be reliable in erasure channel. Forward Error Correction (FEC) enables the lost packets to be recovered from some extra redundant packets without any retransmission. In this paper, we propose a new FEC codes, called Polynomial Interpolation codes (PI...
Secure Multi-Party Computation (SMC) allows parties with similar background to compute results upon their private data, minimizing the threat of disclosure. The exponential increase in sensitive data that needs to be passed upon networked computers and the stupendous growth of internet has precipitated vast opportunities for cooperative computation, where parties come together to facilitate computations...
The individual privacy linking to the widespread use of personal information appears to be a new phenomenon for networked society. In a conventional biometrics enabled authentication system, the privacy remains a controversial topic. Biometric characteristics are indisputable and unique to an individual hence the compromise of the biometric template is permanent. Cancelable biometrics was introduced...
A new ultra-high frequency radio frequency identification (UHF RFID) reader which baseband module is based on ARM processor and FPGA chip has been designed and implemented to satisfy EPC Class-1 Generation 2 protocol. The reader consists of three parts: baseband signal processing board, radio frequency transceiver and interface board. 90 degree phase-shift microstrip line is used in the radio-frequency...
In this paper, improved architectures are proposed for implementation of S-Box and inverse S-Box needed in the Advanced encryption standard (AES) algorithm. These use combinational logic only for implementing SubByte (S-box) and InvSubByte (Inverse S-box). The composite field arithmetic used for implementing S-Box in lower-order Galois field (GF) investigated by several authors recently is used as...
The problem of lossy compression of encrypted image data is considered in this paper. A method is proposed to achieve compression of the encrypted image data based on compressive sensing technique. Joint decoding/decryption is proposed with the modified basis pursuit decoding method to take care of encryption. Simulation results are provided to demonstrate the compression results of the proposed compression...
Multi-cipher and multi-mode cryptosystems are widely used for hardware acceleration in modern security protocols. In a session of communication, these protocols can only use an algorithm along with its operation mode. The switching of cipher algorithms and operation modes can occur between sessions of communication. This paper introduces a multi-cipher cryptosystem (MCC) which enables a cryptosystem...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.