The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The characteristics of video data are very large amount and real time processing request, and H.264 is a high-complexity video compression standard, so a high speed arithmetic is needed for encrypting video data which is encoded by H.264 standard. But, for a high security video application, it's difficult to find an algorithm to meet the two requests: high security, high speed. A new stream cipher...
Face verification has been widely studied during the past two decades. One of the challenges is the rising concern about the security and privacy of the template database. In this paper, we propose a secure face verification system which employs a user dependent one way transformation based on a two stage hashing algorithm. We first hash the face image using a two stages robust image hashing technique,...
This paper proposes a new invertible two-dimensional map, called Line map, for image encryption and decryption. It maps an image to an array of pixels and then, maps it back from the array to a same sized image. A Line map consists of two submaps: the left Line map and the right Line map, which are used for image encryption and decryption. In order to overcome the shortcoming of conventional image...
Advanced encryption standard (AES) maintains safety and is used for providing security since publishing date. At the present day, crypto devices are produced in order to be smaller and faster. So, AES chips should not only use very small area, but also have enough throughput. In this paper, we present an 8-bit implementation of the AES algorithm which encrypts plaintext with 14.3 Mbps throughput and...
Grid computing architecture was defined to be a complete physical layer. Data transfer in network must be in secure. In this study, encryption and decryption algorithms of a site authentication and its message are developed and applied in each grid node to ensure secure transmitted information. If the site information has been built in supervisor node then it can receive data sent from other grid...
Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that can be used to protect electronic data. The AES can be programmed in software or built with pure hardware. However Field Programmable Gate Arrays (FPGAs) offer a quicker and more customizable solution. This paper presents the AES algorithm with regard to FPGA and the Very...
In this paper, we describe a new forensic image format which can handle high capacity computer disk storages like IDE, SAT A, USB, or etc. And also, it supports metadata that can be defined and extended by users. Especially, it has flag field in which users set the encryption and digital signature algorithms.
In most algebraic-code cryptosystems errors are added to the encoded plaintext to form the ciphertext. The number of added errors is usually less than or equal to the error-correcting capability of the code. In this paper we propose a method that permits the addition of almost double the number of these errors. The idea is based on the fact that linear codes can correct twice as many erasures as errors...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.