The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Based on the definition of linear transformations, the Walsh linear spectrum and cyclic spectrum and their inverse transformations are discussed; the dual property of Bent functions is also proved; the Chrestenson linear spectrum and cyclic spectrum and their inverse transformations are discussed. Finally, it is proved that the relationship between Chrestenson linear spectrum and Chrestenson cyclic...
With cryptographic investigations, the design of Boolean functions is a wide area. The Boolean functions play important role in the construction of a symmetric cryptosystem. In this paper the modified hill climbing method is considered. Using hill climbing techniques, the method allows modifying bent functions used to design balanced, highly non-linear Boolean functions with high algebraic degree...
Data conversion between different data sets is an important research issue in computer science. Because of its computational complexity and demand for high accuracy, many data conversion problems arising in application can not be solved effectively. Based on the analysis of construction method, a new bijective function hn from natural numbers set N and its n-ary Cartesian product set Nn has been proposed...
In this paper, we present a scheme of steganalysis of JPEG images with the use of polynomial fitting and computational intelligence techniques. Based on the Generalized Gaussian Distribution (GGD) model in the quantized DCT coefficients, the errors between the logarithmic domain of the histogram of the DCT coefficients and the polynomial fitting are extracted as features to detect the adulterated...
To amend the defects of low perceptual transparency, low capacity, low security of the present information hiding technology in PDF files, we present a novel steganographic algorithm which is better in perceptual transparency property, capacity and security. Attributive to the insensitiveness of PDF files to the seriation of entries, the algorithm helps to realize the information hiding in high degree...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.