2,095 results on '"ASCII"'
Search Results
2. Creating and Developing a High-Throughput Covert Channel via Program Execution
- Author
-
Abdulrahman Alhelal and Mohammad Al-Khatib
- Subjects
Covert channel throughput ,time ,optimization ,index out of bound ,exception ,ASCII ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
A covert communication channel facilitates direct data transfer between two parties through pre-communication knowledge agreements, ensuring secure and confidential transmission of information. However, the existing covert channels suffer from performance limitations, specifically in terms of throughput and speed. The encoding techniques employed in covert channels can be time-consuming and have limited data transfer capabilities. Furthermore, the ability of covert channels to handle files with different formats has not been sufficiently explored. This paper introduces a high-performance implementation of a covert channel that leverages Java exception handling during program execution. To optimize the covert channel’s performance, this research explores the use of several encoding methods, including ASCII, Byte, Hexadecimal, Base64, and Huffman coding. The proposed covert channel’s performance is evaluated and analyzed for various coding methods. To study the impact on performance, multiple file formats, including text, audio, and video, were used in the experiment. Experimental results showed that the hexadecimal coding method improves the throughput and decreases the time delay of the covert channel. This is attributed to its ability to minimize the number of tries before encountering an “Index Out of Bounds” exception. On the contrary, the Base64 method is found to be inefficient as it produces longer strings than the original inputs, resulting in increased time delays during data transfer. The best results are achieved when applying the hexadecimal method with Huffman coding. It takes 6241 milliseconds to transmit a 12.8-megabyte text file, with a throughput of 23116 bits per millisecond.
- Published
- 2024
- Full Text
- View/download PDF
3. Serial Communication in C
- Author
-
LaMeres, Brock J. and LaMeres, Brock J.
- Published
- 2023
- Full Text
- View/download PDF
4. Novel secure data protection scheme using Martino homomorphic encryption
- Author
-
Ch. Rupa, Greeshmanth, and Mohd Asif Shah
- Subjects
Cloud ,Data ,Homomorphic Encryption ,Matrix rotations ,ASCII ,Avalanche effect ,Computer engineering. Computer hardware ,TK7885-7895 ,Electronic computers. Computer science ,QA75.5-76.95 - Abstract
Abstract Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing technique and security techniques to preserve their data securely from intruders and hackers. Even yet, because of the technology's rapid advancement and inherent insecurity, attackers are conducting assaults on the cloud data. Hence, a homomorphic encryption technique was proposed based on Matrix Transformations with shifts, rotations, and transpositions of Binary converted ASCII values of each character in the plain text. For both encryption and decryption, symmetric cryptography employs the same secret key. The “avalanche effect” is a desirable feature of symmetric encryption in which two distinct keys generate separate cipher texts for the same message. As there are different conditions for the key, it helps to achieve this effect in this technique. The suggested algorithm's cryptanalysis reveals that it is more powerful than the existing encryption methods and resistant to a variety of attacks. So that an attacker cannot easily predict a plaintext through a statistical analysis.
- Published
- 2023
- Full Text
- View/download PDF
5. Secure Optical Image Encryption and Data Hiding Technique in Compression Domain Using Dual Key-Based Bit Swapping
- Author
-
Anusree, L., Rahiman, M. Abdul, Angrisani, Leopoldo, Series Editor, Arteaga, Marco, Series Editor, Panigrahi, Bijaya Ketan, Series Editor, Chakraborty, Samarjit, Series Editor, Chen, Jiming, Series Editor, Chen, Shanben, Series Editor, Chen, Tan Kay, Series Editor, Dillmann, Rüdiger, Series Editor, Duan, Haibin, Series Editor, Ferrari, Gianluigi, Series Editor, Ferre, Manuel, Series Editor, Hirche, Sandra, Series Editor, Jabbari, Faryar, Series Editor, Jia, Limin, Series Editor, Kacprzyk, Janusz, Series Editor, Khamis, Alaa, Series Editor, Kroeger, Torsten, Series Editor, Li, Yong, Series Editor, Liang, Qilian, Series Editor, Martín, Ferran, Series Editor, Ming, Tan Cher, Series Editor, Minker, Wolfgang, Series Editor, Misra, Pradeep, Series Editor, Möller, Sebastian, Series Editor, Mukhopadhyay, Subhas, Series Editor, Ning, Cun-Zheng, Series Editor, Nishida, Toyoaki, Series Editor, Pascucci, Federica, Series Editor, Qin, Yong, Series Editor, Seng, Gan Woon, Series Editor, Speidel, Joachim, Series Editor, Veiga, Germano, Series Editor, Wu, Haitao, Series Editor, Zamboni, Walter, Series Editor, Zhang, Junjie James, Series Editor, Bindhu, V., editor, Tavares, João Manuel R. S., editor, and Du, Ke-Lin, editor
- Published
- 2022
- Full Text
- View/download PDF
6. Validation Technique for Zero-Knowledge-Based Transactions of Blockchain Digital Assets Using ASCII Computation Technique
- Author
-
Alshihri, Saad, Park, WooRam, Park, Sooyong, Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, and Arai, Kohei, editor
- Published
- 2022
- Full Text
- View/download PDF
7. Novel secure data protection scheme using Martino homomorphic encryption.
- Author
-
Rupa, Ch., Greeshmanth, and Shah, Mohd Asif
- Subjects
CLOUD computing security measures ,DATA protection ,PUBLIC key cryptography ,BLOCK ciphers ,STATISTICS ,CRYPTOGRAPHY ,TEXT messages ,IMAGE encryption - Abstract
Globally, data maintenance and its security are vital tasks due to the rapid development of advanced technologies. Users now utilise Cloud computing technique and security techniques to preserve their data securely from intruders and hackers. Even yet, because of the technology's rapid advancement and inherent insecurity, attackers are conducting assaults on the cloud data. Hence, a homomorphic encryption technique was proposed based on Matrix Transformations with shifts, rotations, and transpositions of Binary converted ASCII values of each character in the plain text. For both encryption and decryption, symmetric cryptography employs the same secret key. The "avalanche effect" is a desirable feature of symmetric encryption in which two distinct keys generate separate cipher texts for the same message. As there are different conditions for the key, it helps to achieve this effect in this technique. The suggested algorithm's cryptanalysis reveals that it is more powerful than the existing encryption methods and resistant to a variety of attacks. So that an attacker cannot easily predict a plaintext through a statistical analysis. [ABSTRACT FROM AUTHOR]
- Published
- 2023
- Full Text
- View/download PDF
8. Pattern Matching Compression Algorithm for DNA Sequences
- Author
-
Punitha, K., Murugan, A., Kacprzyk, Janusz, Series Editor, Gomide, Fernando, Advisory Editor, Kaynak, Okyay, Advisory Editor, Liu, Derong, Advisory Editor, Pedrycz, Witold, Advisory Editor, Polycarpou, Marios M., Advisory Editor, Rudas, Imre J., Advisory Editor, Wang, Jun, Advisory Editor, Shakya, Subarna, editor, Balas, Valentina Emilia, editor, Haoxiang, Wang, editor, and Baig, Zubair, editor
- Published
- 2021
- Full Text
- View/download PDF
9. Employment of Cryptographic Modus Operandi Based on Trigonometric Algorithm and Resistor Color Code
- Author
-
Chowdhury, Rajdeep, Kumar, Sukhwant, Kacprzyk, Janusz, Series Editor, Pal, Nikhil R., Advisory Editor, Bello Perez, Rafael, Advisory Editor, Corchado, Emilio S., Advisory Editor, Hagras, Hani, Advisory Editor, Kóczy, László T., Advisory Editor, Kreinovich, Vladik, Advisory Editor, Lin, Chin-Teng, Advisory Editor, Lu, Jie, Advisory Editor, Melin, Patricia, Advisory Editor, Nedjah, Nadia, Advisory Editor, Nguyen, Ngoc Thanh, Advisory Editor, Wang, Jun, Advisory Editor, Hassanien, Aboul Ella, editor, Bhatnagar, Roheet, editor, and Darwish, Ashraf, editor
- Published
- 2021
- Full Text
- View/download PDF
10. Lightweight symmetric key encryption for text using XOR operation and permutation matrix
- Author
-
Deshmukh, Maroti and Rawat, Arjun Singh
- Published
- 2023
- Full Text
- View/download PDF
11. A New Methodology to Implement ASCII-Based Cryptography
- Author
-
Agarwal, Shubha, Bansal, Jagdish Chand, Series Editor, Deep, Kusum, Series Editor, Nagar, Atulya K., Series Editor, Mathur, Garima, editor, Sharma, Harish, editor, Bundele, Mahesh, editor, Dey, Nilanjan, editor, and Paprzycki, Marcin, editor
- Published
- 2020
- Full Text
- View/download PDF
12. Block cipher construction using minimum spanning tree from graph theory and its application with image encryption.
- Author
-
Rasheed MW, Mahboob A, Bilal M, and Shahzadi K
- Abstract
In modern cryptography, Substitution Boxes (S-boxes) are critical in introducing confusion into ciphertext, significantly enhancing encryption security. With the rising sophistication of hacking techniques, there is a growing need to develop stronger and more dynamic S-boxes. This paper proposes a novel method for constructing cryptographically secure S-boxes using graph theory, specifically based on the Minimum Spanning Tree (MST) of cycle graphs. The process begins by converting plaintext into vertices, forming a cycle graph. Special characters are incorporated, and ASCII-based values are assigned to vertices. The distance between vertices is calculated using their intersections, leading to the creation of an MST graph. The final step involves obtaining the adjacency matrix, which is further processed to generate the S-box. The S-box's unpredictability is enhanced by employing the S
256 permutation from the symmetric group. Various cryptographic tests are conducted to evaluate the proposed S-box's performance, with results demonstrating its robustness when compared to existing S-box designs. Furthermore, this S-box is applied to an image encryption scheme, and its efficacy is thoroughly assessed. The findings highlight the potential of the proposed method to contribute significantly to cryptographic security., Competing Interests: Declaration of conflicting interestsThe authors declared no potential conflicts of interest with respect to the research, authorship, and/or publication of this article.- Published
- 2024
- Full Text
- View/download PDF
13. An Efficient Speech Compression Technique in Time Domain with Nearly Constant Compression
- Author
-
Hore, Ayan, Jain, Pratik, Chakraborty, Debashis, Kacprzyk, Janusz, Series Editor, Saini, H. S., editor, Singh, Ravi Kishore, editor, Patel, Vishal M., editor, Santhi, K., editor, and Ranganayakulu, S.V., editor
- Published
- 2019
- Full Text
- View/download PDF
14. Power Series Transform in Cryptology and ASCII
- Author
-
Gençoğlu, Muharrem Tuncay, Baleanu, Dumitru, Luo, Albert C. J., Series Editor, Taş, Kenan, editor, Baleanu, Dumitru, editor, and Machado, J. A. Tenreiro, editor
- Published
- 2019
- Full Text
- View/download PDF
15. Effective and Efficient Digital Advertisement Algorithms
- Author
-
Assija, Vishal, Baliyan, Anupam, Jain, Vishal, Kacprzyk, Janusz, Series editor, Pal, Nikhil R., Advisory editor, Bello Perez, Rafael, Advisory editor, Corchado, Emilio S., Advisory editor, Hagras, Hani, Advisory editor, Kóczy, László T., Advisory editor, Kreinovich, Vladik, Advisory editor, Lin, Chin-Teng, Advisory editor, Lu, Jie, Advisory editor, Melin, Patricia, Advisory editor, Nedjah, Nadia, Advisory editor, Nguyen, Ngoc Thanh, Advisory editor, Wang, Jun, Advisory editor, Saini, A. K., editor, Nayak, A. K., editor, and Vyas, Ram Krishna, editor
- Published
- 2018
- Full Text
- View/download PDF
16. Experiencias del Hash en la vida informática
- Author
-
Maxs Barrera, Luis Santana, Radames Pereira, and María Yahaira Tejedor
- Subjects
colisión ,conversión ,métodos de búsqueda ,transformación de llaves ,hash ,módulo ,cadena ,ascii ,medio cuadrado ,Science (General) ,Q1-390 - Abstract
Este artículo resalta el proceso de generación de llaves codificadas y, los métodos Hash asociados al mismo y las colisiones que ocurren tras dicha transformación. La tecnología dentro de este contexto está orientada primordialmente a buscar diferentes alternativas para proteger la información almacenada, por ejemplo través de la encriptación de llaves, minimizando el riesgo de que esta pueda alterarse o perderse, aprovechando al máximo el espacio de almacenamiento. Finalmente, se trabajó en el aporte de un nuevo método sobre la base de dos fórmulas, una que genera la llave y otra que se usa en caso de que ocurra una colisión, ya que después del análisis y prueba de algunos de los métodos existentes se evidenciaron vacíos al momento de contrarrestar colisiones, oportunidad que aprovechamos y que sometemos a consideración.
- Published
- 2018
- Full Text
- View/download PDF
17. Secure Spread Spectrum Based Multiple Watermarking Technique for Medical Images
- Author
-
Singh, Amit Kumar, Kumar, Basant, Singh, Ghanshyam, Mohan, Anand, Furht, Borko, Series editor, Singh, Amit Kumar, editor, Kumar, Basant, editor, Singh, Ghanshyam, editor, and Mohan, Anand, editor
- Published
- 2017
- Full Text
- View/download PDF
18. An ASCII based effective and multi-operation image encryption method.
- Author
-
Naz, Farah, Shoukat, Ijaz Ali, Ashraf, Rehan, Iqbal, Umer, and Rauf, Abdul
- Subjects
IMAGE encryption ,HISTOGRAMS ,SIGNAL-to-noise ratio ,STATISTICAL correlation - Abstract
The main challenge for American Standard Code for Information Interchange (ASCII) based image encryption methods is to increase security with less computational cost. Earlier, well known image encryption techniques are not only deficient in performance but also lacked in embedding of confidential data in an image using ASCII based methods. Therefore, this study aims to contribute an ASCII based efficient and secure image encryption method having additional feature of embedding confidential data in an image. Moreover, the embedding process is not static but it is dynamic as compared to the existing work. The novelty of proposed method encompasses optimal security, effective encryption speed and randomized embedding of secret data in an image even of having multi-operations. The proposed method was evaluated experimentally with variety of tests such as Pixel correlation analysis, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Histogram, Entropy, Peak Signal to Noise Ratio (PSNR), and Mean Square Error (MSE) including encryption decryption time. Thus the experimental results show that the proposed method is optimally secure and outperformed in image encryption as well as in randomized embedding of confidential data than the existing techniques. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
19. Implementation Drilling with Casing ROP Optimization with Multi Regression Mathematical Model in KHALDA co. Fields in the Western Desert, Egypt.
- Author
-
Ibrahim, Mostafa, El Fakharany, Taher, Farhat, Mohamed S., and Maher, Mohamed
- Subjects
- *
CASING drilling , *OIL well drilling , *GAS well drilling , *DRILL stem , *MATHEMATICAL models - Abstract
Casing While Drilling (CWD) technique allows the operator to simultaneously drill and case a wellbore section in only one run without the necessity to pull the drill string out of the hole. This innovative technology comes into play in a time when oil and gas well drilling faces a lot of challenges such as excessive lost circulation, formation fluid influx, formation instability, etc. CWD is implemented into today's drilling activities in order to safely and economically deal with these obstructive challenges. In addition to eliminating/minimizing the effects of these challenges, it remarkably improves the entire economics of the drilling project. Researches and developments are continuously on their way to further improve the performance of the technique in order to minimize its limitations. A lot of case studies all over the world have been analyzed and their related practical lessons have been stated. Based on this paper is about evaluating the drilling with casing ROP optimization model of the drilling parameters to surface hole section drilling of vertical wells by a statistical-regression model using the linear equation analysis technique. The model will be evaluated by deriving the unknown proportionality constant and five exponents utilizing the statistical - regression curve of the least-squares fitting method. The prepared field data used from (ASCII) drilling parameters to three drilled wells in two fields (X, Y) in KHALDA Company. Then, the model's equation will be a regression with respect to five of the independent parameters which are a weight on bit (WOB), drill string rotation (RPM), standpipe pressure (SPP), torque, impact force (IF) and rate of penetration (ROP). Then it will be evaluated over a range of values for these parameters. The parametric study presents KHALDA two field data based on ROP model development and testing with near and far way field wells. Two different modeling approaches have been implemented, and their application and limitations have been tested. ROP optimization procedures are also developed with the objective of increasing ROP, reducing drilling time and hence reducing drilling costs. By Integrated model for the field data, we can compromise with a new well in the different location taking into account any deviation in geological lithology or depth, etc. will make a change in the predicted data then we can predicate the percentage of success according to the optimization of the drilling parameters and best practices to drilling team. Finally, it is recommended that the model can be applied in the oil well drilling industry in different oil wells fields rather than the vertical wells used in this paper. [ABSTRACT FROM AUTHOR]
- Published
- 2020
20. Call numbers and collating sequences
- Author
-
Howard, Les
- Published
- 1990
21. Text hiding in an image using least significant bit and ant colony optimization
- Author
-
Ali Ihsan Naji Al-Hussein, Thair A. Kadhim, and Mohammed S. Alfaras
- Subjects
Least significant bit ,Pixel ,Steganography ,Computer science ,Ant colony optimization algorithms ,Histogram ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Key (cryptography) ,General Medicine ,ASCII ,Algorithm ,Image (mathematics) - Abstract
In today’s technological world, one of the most challenging problems is information security. In the past ten years, many methods were introduced for securing the secret data transmission over the public network (Internet). One of the best choices to solve such issue is to combine AI and steganography methods. In the presented work, the text will be hidden inside an image depending on the ant colony optimization algorithm for generation of secret key for hiding. First an image is chosen as a carrier media of the secret text, then a set of rows are chosen from carrier image and used as an entry point for the ant colony optimization algorithm where the matrix resulting from the algorithm is used as a key to determine the hiding pixels of secret text bits in an image. The secret text will convert to ASCII code then convert to binary bits and hiding these bits on pixels of image depending on generation key using least significant bits techniques. The experimental results were the high-quality stego images as well as its minimal histogram changeability, also validating the efficiency of the suggested method, and it’s hard to determine pixels of hiding and complexity to determine the sequence of hiding bits.
- Published
- 2023
- Full Text
- View/download PDF
22. Putting It All Together: System of Systems Multidisciplinary Engineering
- Author
-
Crowder, James A., Carbone, John N., Demijohn, Russell, Crowder, James A., Carbone, John N., and Demijohn, Russell
- Published
- 2016
- Full Text
- View/download PDF
23. A symmetric-based framework for securing cloud data at rest.
- Author
-
MOHAMMED, Mohammed Anwar and ABED, Fadhil Salman
- Subjects
- *
CLOUD computing , *CLOUD storage , *SECURITY systems , *IMAGE encryption , *REST , *INTERNET - Abstract
Cloud computing is the umbrella term for delivering services via the Internet. It enables enterprises and individuals to access services such as virtual machines, storage, or applications on demand. It allows them to achieve more by paying less, and it removes the barrier of installing physical infrastructure. However, due to its openness and availability over the Internet, the issue of ensuring security and privacy arises. This requires careful consideration from enterprises and individuals before the adoption of cloud computing. In order to overcome security issues, cloud service providers are required to use strong security measures to secure their storage and protect cloud data from unauthorized access. In this paper, a novel framework and symmetric-based encryption scheme for securing cloud data at rest is introduced. The performance evaluation of the new framework shows that it has a high level of efficiency, feasibility, and scalability. [ABSTRACT FROM AUTHOR]
- Published
- 2020
- Full Text
- View/download PDF
24. A novel quantum steganography scheme based on ASCII.
- Author
-
Luo, Jia, Zhou, Ri-Gui, Liu, XingAo, Hu, WenWen, and Liu, GuangZhong
- Subjects
- *
CRYPTOGRAPHY , *GRAY codes , *QUANTUM gates , *TEXT messages , *QUANTUM computing , *IMAGE representation - Abstract
Based on the novel enhanced quantum representation for quantum image (NEQR), a new blind quantum steganography scheme is proposed. In this scheme, an improved quantum representation of text utilizing American Standard Code for Information Interchange (ASCII) is provided that uses two qubit sequences to store the same quantum text message. The general embedding process of the scheme is as follows: First, the cover image of size 2 n × 2 n will be divided into eight blocks of size 2 n − 2 × 2 n − 1 and the secret quantum text of size 2 n − 2 × 2 n − 1 is scrambled by Gray code transform method. Then, the disorder quantum text is embedded into the eight blocks of cover image employing the Gray code as a judgment condition. Meanwhile, the corresponding quantum circuits are drawn. Through the analysis of all quantum circuits, it can be concluded that the scheme has a lower complexity that is O (n). And the performance of the proposed scheme is analyzed in terms of simulation results of three items: visual quality, capacity and robustness. [ABSTRACT FROM AUTHOR]
- Published
- 2019
- Full Text
- View/download PDF
25. Using mono chrome image in secure data transfer based on book cipher
- Author
-
Hind Jumaa Serteep and Wedad Abdul Khuder Naser
- Subjects
Book cipher ,Monochrome Image ,Image ,ASCII ,least significant bit - Abstract
In the current digitalized world human race confront huge and fast technical progress in communication networks, That contribute to exposure of data and information that is transmitted through these networks to different levels of exposure and attack Also, the authentication of the digital products and services become very important to both makers and customers and can be separated from those that are invalid , The science of transfer secret data in several multimedia carriers like audio , text, video or image so that can achieve the authentication requirements that were mentioned is called steganography. This paper introduces a new steganography technique that will increase the difficulty of exhaustive key search, it based on book cipher combined with ASCII (American Standard for Information interchange) mapping technique using image as reference key.
- Published
- 2022
- Full Text
- View/download PDF
26. A Novel Intelligent AI-based Security to Enhance the Data Communication
- Author
-
Shaik, Amjan, Hung, Bui Thanh, Chakrabarti, Prasun, and Shankar S., Siva
- Subjects
ASCII ,Internet of things ,Deep Neural network ,prime numbers ,secure communication ,MT-ECC ,string value - Abstract
In this work, we propose a novel known as matrix translation and Elliptic curve cryptography (MT-ECC) approach for secured data communication in IoT network systems. The proposed approach includes phases such as the key generation stage, encryption stage; cluster-based secure routing stage, and decryption stage. Moreover, we introduced two types of tables such as string location relying on ASCII value and Prime number generation table and space reference table. Meanwhile, after the completion of key generation on the transmitter side, the data is transmitted to the receiver side and authorized users can access the data without any loss. Besides, if any attacks happen means it is necessary to detect the intrusion and normal data, and for that purpose we propose a novel Deep Neural Network (DNN) based Gazella optimization (GO) algorithm which effectively detects the intrusion and separates the normal data traffic from the available datasets. For the experimental purpose, we have taken the Kaggle dataset and implemented it in MATLAB and the comparative results show that the proposed approach is effectively used for secured communication and detects intrusion efficiently in case attacks happen.
- Published
- 2023
27. E-ART: A New Encryption Algorithm Based on the Reflection of Binary Search Tree
- Author
-
Bayan Alabdullah, Natalia Beloff, and Martin White
- Subjects
security ,cryptography ,dynamic key ,binary tree ,ASCII ,Technology - Abstract
Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existing solutions require multi-round functions to prevent differential and linear attacks. This results in longer execution times and greater memory consumption, which are not suitable for large datasets or delay-sensitive systems. To address these issues, this work proposes a novel algorithm that uses, on one hand, the reflection property of a balanced binary search tree data structure to minimize the overhead, and on the other hand, a dynamic offset to achieve a high security level. The performance and security of the proposed algorithm were compared to Advanced Encryption Standard and Data Encryption Standard symmetric encryption algorithms. The proposed algorithm achieved the lowest running time with comparable memory usage and satisfied the avalanche effect criterion with 50.1%. Furthermore, the randomness of the dynamic offset passed a series of National Institute of Standards and Technology (NIST) statistical tests.
- Published
- 2021
- Full Text
- View/download PDF
28. A new high capacity and secure image realization steganography based on ASCII code matching
- Author
-
Huwaida Tagelsir Elshoush, Abdelrahman Altigani, and Mahmoud M. Mahmoud
- Subjects
Cover (telecommunications) ,Steganography ,Computer Networks and Communications ,business.industry ,Computer science ,ASCII ,Huffman coding ,Encryption ,Peak signal-to-noise ratio ,symbols.namesake ,Hardware and Architecture ,Media Technology ,Key (cryptography) ,symbols ,Code (cryptography) ,business ,Algorithm ,Software - Abstract
Digital Steganography is the art of hiding secret messages behind an innocent looking digital media that do not raise suspicions. In this paper, a new proposed image realization steganography method is introduced which is a mapping-based method that hides in an unrevealed manner and without any change in the image cover file. The image cover is only used for referencing. The proposed method generates the cover-secret mapping that will realize the concealed secret message without embedding the real message. A mapping between the American Standard Code of Information Interchange (ASCII) codes of a secret message and an image is performed and the positions of the secret message in the image is noted in a position array. This reference positions are then sent to the receiver after first being compressed by Huffman algorithm and then encrypted using Advanced Encryption Standard with 128 bits key (AES-128). The position array and the cover image are transferred separately, so that the interception of any one file alone will not conceal any information. In addition, it has unlimited capacity as specific matching positions can be used more than once. Furthermore, the proposed method has a reduced size of position key and mapping table, hence having high-speed searching and matching compared to prevailing methods. Furthermore, several experimental tests have been applied to assess the efficiency and performance of the new proposed method to evaluate it according to the widely used metrics: Mean Squared Error (MSE) and Peak Signal to Noise Ratio (PSNR). From the security point of view, Structural Similarity Index Measure (SSIM) together with Histogram have been performed. Moreover, it is critiqued showing its pros and cons and further compared with existing state-of-the-art research. The experimental results verified the efficacy of the new proposed method.
- Published
- 2021
- Full Text
- View/download PDF
29. TECHNICAL METHODS AND ALGORITHMS FOR DEVELOPING EFFICIENT OPTICAL CHARACTER RECOGNITION SYSTEM:: AN OVERVIEW.
- Author
-
Ibrahim, Yakubu A. and Ibiyemi, Tunji S.
- Abstract
Machine recognition problem of printed documents in Optical Character Recognition has been the target of research in the area of pattern recognition. Study in this aspect has been controlled by a need to join the natural process of image input with the data processing abilities of computer system. In this regard, engineers and scientists are not able to make judicious use of OCR systems for their technical work because they lack effective algorithms for interpretation of complex expressions even though it is important part of a Human Computer Interaction system. However, OCR in a nut shell is the electronic change of printed or handwritten text into images using machine encoding scheme representation like ASCII or Unicode. Hence, various methods and algorithms have been demonstrated in the study to increase the efficiency of system to effectively solve OCR problems. The study shows the concept of various OCR algorithms such as support vector machine, decision tree classifier, statistical, structural, artificial neural networks and template matching algorithms. [ABSTRACT FROM AUTHOR]
- Published
- 2018
30. Use of GPS at research of roads & a vehicle
- Author
-
M. V. Sirai, D. V. Mishuta, and V. G. Мikhailov
- Subjects
module gn-803g ,business.industry ,Computer science ,gps ,software ,raspberry pi 3/4 ,Array data type ,Information technology ,NMEA 0183 ,ASCII ,T58.5-58.64 ,Minicomputer ,law.invention ,Software ,law ,Global Positioning System ,business ,MATLAB ,computer ,Algorithm ,Interpolation ,computer.programming_language - Abstract
The purpose of this work are consideration of use of GPS for a research of roads and modeling of the vehicle/wheel machines (WM).Implementation for this problem of the measuring registering complex on a basis the Raspberry Pi 3/4 minicomputer, the GN-803G sensor and creation of the software in the language C/C ++ is considered.The obtained information about GPS and approaches of selection of necessary data from the messages on the basis of the NMEA 0183 standard submitted in the text ASCII form with the fields divided by a comma is analyzed. An assessment of opportunities of use of the obtained information is given.The scheme of connection of the GN-803N module to Raspberry 3/4 through the GPIO protocol is developed and proved.Reduction of the obtained data to a constant step with use of a polynom of Lagrange of the 2-nd order on three points of a variable step is considered.It is recommended at further use of this corrected data array in process modeling of the car application of a method of interpolation CatMull-Rom on the 4-th points at the fixed step. Program fragments are given in C/C ++.It is offered in the territory of RB during the determining of relative distances and a binding to cards at conversion it is possible to use the simplified linear formula lat_m= 112297,6196∙ Ddec lat , lon_m= 63215,444 ∙ Ddec lon .The offered technique of application of GPS, software, received data are planned to be used for a research of influence of the driver and road conditions on the movement of the vehicle and the subsequent their application when modeling in Matlab/ Simulink, and also in problems of preliminary debugging of management systems by self-driving vehicles.
- Published
- 2021
31. Playfair with Multi Strata Encryption
- Author
-
Raghad K. Salih and Madeha Sh. Yousif
- Subjects
General Computer Science ,business.industry ,Computer science ,Substitution (logic) ,General Chemistry ,Encryption ,ASCII ,General Biochemistry, Genetics and Molecular Biology ,law.invention ,Permutation ,Cipher ,Playfair cipher ,law ,Key (cryptography) ,Arithmetic ,business ,Cryptanalysis - Abstract
Playfair cipher is a substitution scheme. The classical playfair scheme has a limited matrix size containing only uppercase letters, so it is prone to hackers and cryptanalysis. To increase the resistance of playfair cipher, a new encipherment and decipherment method is proposed in this work, which depends on the permutation and its inverse, respectively. In addition, a modified key matrix is utilized, which includes capital and small Alphabets, numbers, and 38 special characters collected from ASCII codes. In the proposed method, both substitution and transposition schemes are used, where the first stratum of the cipher is a substitution by using key matrix and the second stratum is a transposition by using permutation key which provides multi strata resistance to brute force and other cryptanalysis attacks. A comparison between the traditional playfair scheme and the proposed method demonstrates that the encoded text is hard to recognize by cryptanalysts, which improves the security of the encryption process.
- Published
- 2021
- Full Text
- View/download PDF
32. Steganography Technique and Modification of Substitution Cipher Using ASCII Code and Fibonacci Sequences
- Author
-
Pujo Hari Saputro, Musthofa Galih Pradana, and Bondan Wahyu Pamekas
- Subjects
Steganography ,business.industry ,Computer science ,Substitution cipher ,Science ,Cryptography ,Plaintext ,Caesar cipher ,General Medicine ,QA75.5-76.95 ,ASCII ,Vigenère cipher ,Electronic computers. Computer science ,Key (cryptography) ,QA1-939 ,Arithmetic ,business ,caesar cipher, vigenere cipher, modification, steganography, cryptography ,Mathematics - Abstract
Cryptography is widely used to secure data and information so that it is not easily misused by parties who are not interested in the data. One type of cryptographic algorithm is Caesar Cipher and Vigenere Cipher. Both of these algorithms are classic cryptographic algorithms that need to be modified so that they become more optimal in the data security process. The first modification is to modify the Vigenere key using Fibonacci. In general, Vigenere Cipher will repeat the same keyword to complete the number of characters that are lacking so that the number of characters is the same as the number of characters in the plaintext. The second modification is to change or convert plaintext letters into ASCII letters so that the code is more difficult to solve. After the ASCII conversion process is done, the next results will be converted back in Hexa letters. In addition to the two modifications made, the steganography technique is also added by hiding the code behind the media in the form of images. Images that are sampled will be renamed and stored in different places.
- Published
- 2021
33. Text Encryption Method Using multi Hyper-chaotic systems
- Author
-
Hayder Abood Qasim
- Subjects
business.industry ,Computer science ,media_common.quotation_subject ,Key space ,Chaotic ,Pharmaceutical Science ,Plaintext ,ASCII ,Encryption ,Complementary and alternative medicine ,Computer engineering ,Cryptosystem ,Pharmacology (medical) ,Simplicity ,business ,Bitwise operation ,media_common - Abstract
With rapid evaluation of technologies, huge amount of critical information can exchange over unsecure network every day, secure and fast encryption schemes become more and more urgent need to provide the desirable confidentiality and thwart unauthorized access, lately and for many reasons, chaotic based encryption algorithms become more and more popular technique due to exceptionally superior characteristics such as simplicity, resistance attacks and high speed, in this paper the advantages of two nonlinear hyper-chaotic systems will utilized to strength the proposed encryption algorithm, the random sequences generated from systems will used to position scramble and value change of the plaintext, the main features of such method are efficiency, large key space, low computational overhead, and simple design as well as the experimental results demonstrate that the proposed method have more ability to thwart attacks.
- Published
- 2021
- Full Text
- View/download PDF
34. Hexagonal Grid Numbering
- Author
-
Tomas By
- Subjects
Computer science ,business.industry ,Coordinate system ,ASCII ,Square (algebra) ,Numbering ,Computational science ,Software ,Orthogonal coordinates ,Artificial Intelligence ,Control and Systems Engineering ,Electrical and Electronic Engineering ,Geographic coordinate system ,business ,Hexagonal tiling - Abstract
A fundamental requirement for scientific treatment of board games is a simple and practical numbering of the map locations. With square grids, an obvious solution is coordinates along two orthogonal axes. Hexagonal grids, however, have three axes, and only one of them can be aligned with an edge of a square board. Various systems have been proposed for numbering hexagonal grids, and several remain in use. Computational tools that support games with hexagonal grids will presumably need to convert, or operate directly on, the grid coordinates. While it would be possible to write separate software for each of the different coordinate systems, a more general approach is to define a formal description of the coordinate system, which is then supplied as data, and have a single piece of software that can handle all possible hexagonal grid coordinates. Such a system is proposed here, after an exhaustive survey of the various existing coordinate systems, and a comprehensive investigation of the logical possibilities for defining a coordinate system on a hexagonal grid. The formal expression that defines any specific coordinate system consists of around ten characters in the standard 7-b ASCII alphabet, for maximum computational interoperability.
- Published
- 2021
- Full Text
- View/download PDF
35. Desenvolupament d'una aplicació basada en Arduino per a la monitorització i registre de les dades de producció energètica d'una instal·lació solar fotovoltaica
- Author
-
Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica, Velasco Quesada, Guillermo, Palau Sevilla, Moisés, Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica, Velasco Quesada, Guillermo, and Palau Sevilla, Moisés
- Abstract
El present document pretén plasmar el procediment realitzat per a la confecció d’una aplicació de monitorització i registre de dades sobre el comportament d’una placa fotovoltaica a nivell de consum elèctric. El desenvolupament d’aquesta aplicació es dur a terme mitjançant la programació amb IDE de la placa ELEGOO Mega2560 R3, la qual és un equivalent de la placa Arduino Mega 2560, establint una via de comunicació sèrie RS-485 basada en MODBUS amb l’analitzador de xarxa elèctrica Circutor CVM-SPRS485-C25A. La connexió física del sistema es realitza connectant d’una banda l’analitzador de xarxa entre el convertidor DC/AC de la placa fotovoltaica i la connexió a xarxa elèctrica per a que de manera simultània s’alimenti elèctricament i pugui captar les dades de consum. D’altra banda la connexió amb el nostre microcontrolador es dur mitjançant cablejat des del port RS-485 de l’analitzador al mòdul de comunicació connectat al nostre microcontrolador per a poder establir a la comunicació. Les funcionalitats disponibles per a aquest desenvolupament són: - Monitorització de dades del sistema connectat a xarxa elèctrica. - Registre periòdic variable de les dades anteriors en mòdul SD. Les dades obtingudes seran tots aquells valors de consum energètic disponibles amb la connexió del Circutor, ja que posteriorment, amb l’explotació d’aquestes dades es podran discriminar aquells valors de l’anàlisi que no siguin d’interès. Aquest projecte analitzarà, a més a més de les dades anteriors, l’impacte ambiental d’una instal·lació d’aquest tipus., El presente documento pretende plasmar el procedimiento realizado para la confección de una aplicación de monitorización y registro de datos sobre el comportamiento de una placa fotovoltaica a nivel de consumo eléctrico. El desarrollo de la aplicación se lleva a cabo mediante la programación con IDE de la placa ELEGOO Mega2560 R3, la cual es un equivalente de la placa Arduino Mega2560, estableciendo una vía de comunicación serie RS-485 basada en MODBUS con el analizador de red eléctrica Circutor CVM-SPRS485-C25A. La conexión física del sistema se realiza conectando por un lado el analizador de red entre el convertidor DC/AC de la placa fotovoltaica y la conexión a red eléctrica, para que de manera simultánea se alimente eléctricamente y pueda captar los datos de consumo. Por otro lado, la conexión con el microcontrolador se realiza mediante el cableado desde el puerto RS-485 del analizador de red al módulo de comunicación conectado a nuestro microcontrolador para poder establecer la comunicación. Las funcionalidades disponibles para el desarrollo son: - Monitorización de datos del sistema conectado a red eléctrica. - Registro periódico variable de los datos anteriores en módulo SD. Los datos obtenidos serán todos aquellos valores de consumo energético disponibles con la conexión del Circutor, ya que posteriormente, con la explotación de estos datos se podrán discriminar aquellos valores de análisis que no sean de interés. Este proyecto analizará, además de los datos anteriores, el impacto ambiental de una instalación de este tipo., This document pretends to show the realized procedure of the confection of a monitoring and data logs application according to the behavior of a solar panel in consideration of electric supply. The application development is done by the programming of ELEGOO Mega2560 R3 shield, which is an equivalent shield of Arduino Mega2560, stablishing a based MODBUS Serial communication done by the RS-485 interface with Circutor CVM-SP-RS485-C25A electric net analyzer. The physical connection of the system is done by connecting the electric net analyzer between DC/AC converter of the solar panel and the connection to the net, to have, at the same time, voltage feeding and data capturing. In another way, the connection with the microcontroller is done by the wiring of the RS-485 port of CIRCUTOR’s analyzer to the communication module that is connected to the shield. The available functionalities of the present development are: - Data monitoring of the system which is connected to the electric net. - Periodic and variable data log of the previous data through SD module. Obtained data will be all available electric values of power consumption in the Circutor connection, because, later, with data mining we will filter these values which are not of interest. This project will analyze, in addition, the environmental impact of this kind of installation., Objectius de Desenvolupament Sostenible::13 - Acció per al Clima
- Published
- 2022
36. A New Proposed Coding Method for Steganography Purpose
- Author
-
Suhad M. Kadhem
- Subjects
Transmission (telecommunications) ,Cover (telecommunications) ,Steganography ,Computer science ,Information hiding ,Run-length encoding ,Communication source ,Data mining ,ASCII ,computer.software_genre ,computer ,Coding (social sciences) - Abstract
Transferring data in a safe way is one of the things that have been of interest since ancient times. Data hiding or steganography is a method used to protect the data during its transmission. Coding is a method to represent the data in another shape, so a high level of security is achieved by using coding and hiding data together. The proposed method is a hybrid between coding and hiding, but this paper focuses on proposed a data coding part only, such that the cover text (that used for information hiding) will be used to extract private information between the sender and the receiver for coding process, and the output of the proposed coding method can be used for information hiding process. Apply the proposed coding method will provide a high level of security and complexity and produce ASCII of non-printed characters which can be employed for steganography purposes to obtain complete similarity between secret text and cover text.
- Published
- 2021
- Full Text
- View/download PDF
37. Steganographic Methods Resistant to JPEG Compression
- Author
-
M.V. Kurkina, I.V. Ponomarev, and D.I. Strokin
- Subjects
Theoretical computer science ,Steganography ,business.industry ,Computer science ,Byte ,Cryptography ,computer.file_format ,ASCII ,JPEG ,Software ,Key (cryptography) ,NET Framework ,business ,computer - Abstract
The active development of computer systems and information technologies implies an increase in the importance of ensuring the protection and security of information during its transfer or storage. Today, the fulfillment of the necessary data confidentiality requirements tends to the direction of cryptography and steganography. The choice of the applied method of encoding information directly depends on the goals of the user, as well as the available software. The main requirement for the message encoding process is the availability of acceptable computational complexity of the implementation. The article discusses methods of ensuring data confidentiality employing digital steganography, using BMP images as container files, and carrying out their subsequent compression to the JPEG format without losing hidden information. Mathematical methods of constructing a stegosystem for encoding ASCII are studied — a message, each character of which is encoded with exactly one byte. As a result, a computer program was created based on the Microsoft Visual Studio 2017 programming environment and the C# programming language (.NET Framework). The stereotype, in this case, is a sequence of steps between image pixels, into which information is embedded. In this case, the algorithm allows you to memorize not the entire sequence of steps (that is, not the entire keystroke), but only the first five characters of the key or half of the key.
- Published
- 2021
- Full Text
- View/download PDF
38. Desenvolupament d'una aplicació basada en Arduino per a la monitorització i registre de les dades de producció energètica d'una instal·lació solar fotovoltaica
- Author
-
Palau Sevilla, Moisés, Universitat Politècnica de Catalunya. Departament d'Enginyeria Electrònica, and Velasco Quesada, Guillermo
- Subjects
ASCII ,Circutor ,RS-485 ,IDE ,Enginyeria electrònica [Àrees temàtiques de la UPC] ,Prototip ,Microcontrolador ,Photovoltaic power generation ,Comunicacions ,Analitzador de Xarxa Elèctrica ,Placa de Desenvolupament ,Arduino (Controlador programable) ,Electrònica ,Modbus RTU ,Arduino ,Arduino (Programmable controller) ,Energia solar fotovoltaica - Abstract
El present document pretén plasmar el procediment realitzat per a la confecció d’una aplicació de monitorització i registre de dades sobre el comportament d’una placa fotovoltaica a nivell de consum elèctric. El desenvolupament d’aquesta aplicació es dur a terme mitjançant la programació amb IDE de la placa ELEGOO Mega2560 R3, la qual és un equivalent de la placa Arduino Mega 2560, establint una via de comunicació sèrie RS-485 basada en MODBUS amb l’analitzador de xarxa elèctrica Circutor CVM-SPRS485-C25A. La connexió física del sistema es realitza connectant d’una banda l’analitzador de xarxa entre el convertidor DC/AC de la placa fotovoltaica i la connexió a xarxa elèctrica per a que de manera simultània s’alimenti elèctricament i pugui captar les dades de consum. D’altra banda la connexió amb el nostre microcontrolador es dur mitjançant cablejat des del port RS-485 de l’analitzador al mòdul de comunicació connectat al nostre microcontrolador per a poder establir a la comunicació. Les funcionalitats disponibles per a aquest desenvolupament són: - Monitorització de dades del sistema connectat a xarxa elèctrica. - Registre periòdic variable de les dades anteriors en mòdul SD. Les dades obtingudes seran tots aquells valors de consum energètic disponibles amb la connexió del Circutor, ja que posteriorment, amb l’explotació d’aquestes dades es podran discriminar aquells valors de l’anàlisi que no siguin d’interès. Aquest projecte analitzarà, a més a més de les dades anteriors, l’impacte ambiental d’una instal·lació d’aquest tipus. El presente documento pretende plasmar el procedimiento realizado para la confección de una aplicación de monitorización y registro de datos sobre el comportamiento de una placa fotovoltaica a nivel de consumo eléctrico. El desarrollo de la aplicación se lleva a cabo mediante la programación con IDE de la placa ELEGOO Mega2560 R3, la cual es un equivalente de la placa Arduino Mega2560, estableciendo una vía de comunicación serie RS-485 basada en MODBUS con el analizador de red eléctrica Circutor CVM-SPRS485-C25A. La conexión física del sistema se realiza conectando por un lado el analizador de red entre el convertidor DC/AC de la placa fotovoltaica y la conexión a red eléctrica, para que de manera simultánea se alimente eléctricamente y pueda captar los datos de consumo. Por otro lado, la conexión con el microcontrolador se realiza mediante el cableado desde el puerto RS-485 del analizador de red al módulo de comunicación conectado a nuestro microcontrolador para poder establecer la comunicación. Las funcionalidades disponibles para el desarrollo son: - Monitorización de datos del sistema conectado a red eléctrica. - Registro periódico variable de los datos anteriores en módulo SD. Los datos obtenidos serán todos aquellos valores de consumo energético disponibles con la conexión del Circutor, ya que posteriormente, con la explotación de estos datos se podrán discriminar aquellos valores de análisis que no sean de interés. Este proyecto analizará, además de los datos anteriores, el impacto ambiental de una instalación de este tipo. This document pretends to show the realized procedure of the confection of a monitoring and data logs application according to the behavior of a solar panel in consideration of electric supply. The application development is done by the programming of ELEGOO Mega2560 R3 shield, which is an equivalent shield of Arduino Mega2560, stablishing a based MODBUS Serial communication done by the RS-485 interface with Circutor CVM-SP-RS485-C25A electric net analyzer. The physical connection of the system is done by connecting the electric net analyzer between DC/AC converter of the solar panel and the connection to the net, to have, at the same time, voltage feeding and data capturing. In another way, the connection with the microcontroller is done by the wiring of the RS-485 port of CIRCUTOR’s analyzer to the communication module that is connected to the shield. The available functionalities of the present development are: - Data monitoring of the system which is connected to the electric net. - Periodic and variable data log of the previous data through SD module. Obtained data will be all available electric values of power consumption in the Circutor connection, because, later, with data mining we will filter these values which are not of interest. This project will analyze, in addition, the environmental impact of this kind of installation. Objectius de Desenvolupament Sostenible::13 - Acció per al Clima
- Published
- 2022
39. The Use of ASCII Graphics in Roguelikes.
- Author
-
Johnson, Mark R.
- Abstract
This article explores the semiotics of the “roguelike” genre. Most roguelikes reject contemporary advances in graphical technology and instead present their worlds, items, and creatures as American Standard Code for Information Interchange (ASCII) characters. This article first considers why this unusual graphical style has endured over time and argues that it is an aesthetic construction of nostalgia that positions roguelikes within a clear history of gameplay philosophies that challenge the prevailing contemporary assumptions of role-playing games. It second notes that the semantic code for understanding the ASCII characters in each and every roguelike is different and explores the construction of these codes, how players decode them, and the potential difficulties in such decodings. The article then combines these to explore how such visuals represent potential new ground in the study of game semiotics. [ABSTRACT FROM AUTHOR]
- Published
- 2017
- Full Text
- View/download PDF
40. A corpus-based approach in archaeolinguistics
- Author
-
Ilia A. Afanasev
- Subjects
archaeolinguistics ,Computer science ,corpus linguistics ,review ,Restricted access ,Old Church Slavonic ,P1-1091 ,Ancient Greek ,corpus-based approach ,ASCII ,language.human_language ,Linguistics ,Field (computer science) ,Writing system ,Corpus linguistics ,language ,Corpus based ,Philology. Linguistics - Abstract
The article focuses on archaeolinguistics as a separate field of knowledge and outlines the features that distinguish it from other disciplines in comparative studies. It analyses the existing text collections and shows how they may find application in a corpus-based research in ancient languages. It also discusses approaches to creating new corpora of texts. The study focuses on Old Church Slavonic and Ancient Greek, in particular, it analyses the existing corpora in these languages, e. g., Corpus Cyrillo-Methodianum Helsingiense. Most of the corpora under study are not tagged. Some of them change the original writing system (from Glagolitic to Latin, using, for instance, ASCII), while the others have a restricted access. Some of the corpora are no longer available at all or available as part of local databases only. Thus, corpus-based resources in ancient languages in question are obviously insufficient. To facilitate more effective research, the easiest possible solution is to develop new corpora by using platforms specializing in linguistic analysis (e. g., CDLI or Lingvodoc) or systems that support DIY corpora. However, such platforms are often paywalled, may have limited functionality, or lack comprehensive user guides. With all the above in mind, there seems to be no ready solution for archaeolinguists who want to use a corpus-based approach in their study. They either have to make a considerable effort to modify an existing system for their purposes, or to build one of their own. In conclusion, the article proposes one of the possible ways to address these issues.
- Published
- 2021
- Full Text
- View/download PDF
41. Deep Learning-Based Automated Lip-Reading: A Survey
- Author
-
Souheil Fenghour, Daqing Chen, Bo Li, Kun Guo, and Perry Xiao
- Subjects
General Computer Science ,Computer science ,Feature extraction ,Machine learning ,computer.software_genre ,ASCII ,Convolutional neural network ,computer vision ,lip-reading ,General Materials Science ,Artificial neural network ,business.industry ,Deep learning ,feature extraction ,General Engineering ,Visual speech recognition ,deep learning ,Viseme ,Visualization ,TK1-9971 ,Recurrent neural network ,ComputingMethodologies_PATTERNRECOGNITION ,classification ,Artificial intelligence ,Electrical engineering. Electronics. Nuclear engineering ,business ,computer - Abstract
A survey on automated lip-reading approaches is presented in this paper with the main focus being on deep learning related methodologies which have proven to be more fruitful for both feature extraction and classification. This survey also provides comparisons of all the different components that make up automated lip-reading systems including the audio-visual databases, feature extraction, classification networks and classification schemas. The main contributions and unique insights of this survey are: 1) A comparison of Convolutional Neural Networks with other neural network architectures for feature extraction; 2) A critical review on the advantages of Attention-Transformers and Temporal Convolutional Networks to Recurrent Neural Networks for classification; 3) A comparison of different classification schemas used for lip-reading including ASCII characters, phonemes and visemes, and 4) A review of the most up-to-date lip-reading systems up until early 2021.
- Published
- 2021
42. Increasing data storage of coloured QR code using compress, multiplexing and multilayered technique
- Author
-
Roshidi Din, Fazli Azali, Baharudin Osman, Yuhanis Yusof, and Azizi Abas
- Subjects
Control and Optimization ,business.product_category ,Computer Networks and Communications ,business.industry ,Computer science ,Compression ,QR code ,ASCII ,Multiplexing ,Computer engineering ,Hardware and Architecture ,Control and Systems Engineering ,Multilayer ,Computer data storage ,Computer Science (miscellaneous) ,Internet access ,Code (cryptography) ,Data storage ,Electrical and Electronic Engineering ,business ,Instrumentation ,Information Systems - Abstract
Quick response (QR) code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. There are many existing researches on coloured QR code to increase the storage capacity but from time to time the storage capacity still need to be improved. This paper proposes the use ofcompress, multiplexing and multilayered techniques, as an integrated technique known as CoMM, to increase the storage of the existing QR code. The American Standard Code for Information Interchange (ASCII) text characters are used as an input and performance is measured by the number of characters that can be stored in a single black and white QR code version 40. The experiment metrics also include percentage of missing characters, number of produced QR code, and elapsed time to create the QR code. Simulation results indicate that the proposed algorithm stores 24 times more characters than the black and white QR code and 9 times more than other coloured QR code. Hence, this shows that the coloured QR code has the potential of becoming useful mini-data storage as it does not rely on internet connection.
- Published
- 2020
- Full Text
- View/download PDF
43. DEVELOPMENT OF A POSTPROCESSOR FOR TURNING CENTER AND MULTI-TASK MACHINE WITH MULTI-CHANNEL CNC SYSTEMS
- Author
-
Tsvetan Kaldashev
- Subjects
Engineering drawing ,Software ,Machining ,Computer science ,business.industry ,Interface (computing) ,Data file ,Factory (object-oriented programming) ,CAD ,General Medicine ,Turret ,ASCII ,business - Abstract
This article discusses the possibility of developing a postprocessor for turning center with 2 turrets and a multi-channel CNC system with NC program format characteristic of machine Mazak Integrex I series. Typical for these CNCs is the usage of two support programs - one for each turret. The CAD / CAM system PTC Creo is used to solve the problem, where tool transitions are developed for machining the workpieces. The postprocessor is software that translates the CL Data file i.e. turns it into a NC program with preparatory, technological, and supplementary commands to control the machine. G-POST, which is integrated into the PTC Creo CAD / CAM system, is used to develop the post-processor. To solve the problem, a specialized programming language FIL (Factory Interface Language) is used which, with its features and capabilities to work with files in ASCII code, achieves the ultimate goal - NC program in format characteristics suitable for machines Mazak Integrex I series.
- Published
- 2020
- Full Text
- View/download PDF
44. A Novel Block Cipher Based on Randomly Shuffled Key Strings
- Author
-
Md. Kamrul Hossain, Muhammad Sadrul Muttaquin Hoque Najat, and Ahmed Imteaj
- Subjects
Multidisciplinary ,Theoretical computer science ,business.industry ,Computer science ,010102 general mathematics ,Advanced Encryption Standard ,Cryptography ,Information security ,Random permutation ,ASCII ,Encryption ,01 natural sciences ,Cipher ,0101 mathematics ,business ,Block cipher - Abstract
Information security has immense importance in today’s world of digital communication. Sharing information between intended parties while keeping it secret from any outsider is a challenging task. Cryptography provides the security of information by keeping the information secret among only the communicating parties. In this paper, a new cryptographic algorithm is propounded, which is a block cipher algorithm. A positive integer, n, two $$n\times 256$$ tables of ASCII characters, and a string, Mapper, are used as shared private keys in the proposed method. Every row of the key tables and Mapper contains a random permutation of all the ASCII characters. In the beginning of encryption of a block, an Exclusive Or (XOR) operation is done between the block and a random array of integers. Then, a 3-round substitution operation is done using the key tables and Mapper. We found that the encryption and the decryption speed of the proposed algorithm is faster than the encryption–decryption speed of Advanced Encryption Standard (AES) and Data Encryption Standard (DES). The strength of the proposed cipher was analyzed in the light of some popular attacks, and we found that the system is strong enough against those attacks. We hope that if integrated with the modern cryptography protocols, this method will enhance modern digital communication security.
- Published
- 2020
- Full Text
- View/download PDF
45. Implementation of CAESAR CIPHER Cryptography Techniques for Android Based Information Data Security
- Author
-
Irma Salamah, Fina Triana, and Jon Endri
- Subjects
lcsh:T58.5-58.64 ,business.industry ,Computer science ,Programming language ,lcsh:Information technology ,media_common.quotation_subject ,Cryptography ,Caesar cipher ,Information security ,computer.software_genre ,ASCII ,Punctuation ,lcsh:TA168 ,Cipher ,lcsh:Systems engineering ,cryptography, caesar cipher, information data security, android ,Android (operating system) ,business ,computer ,media_common ,Coding (social sciences) - Abstract
Information data security is an important aspect of exchanging data and information. Data and information security can be done in various ways, including by using the cesarean cipher method in cryptographic techniques. The cesarean cipher method of cryptographic technique is a substitution coding system which is done by replacing each alphabet character with other characters along the 26 alphabet characters so that the coding only occurs in the alphabet itself without any other punctuation. This study proposes a modification to the cesarean cipher technique by adding to the number of characters used, namely 256 characters in the ASCII code. The caesar cipher application or CaesarApp uses the methodology of library study, consultation, application design and application testing. The implementation of the CaesarApp application was created using the open-source Android Studio 3.5 application. The results of tests conducted on the CaesarApp application note that the modification of the caesar cipher with 256 ASCII characters results in a secure information data security application, this application has a deficiency in reading limitations on ASCII characters, so characters cannot be read properly on android users.
- Published
- 2020
46. Deep Learning-Based Cryptanalysis of Lightweight Block Ciphers
- Author
-
Jaewoo So
- Subjects
Keyspace ,Science (General) ,Article Subject ,Computer Networks and Communications ,Computer science ,business.industry ,Deep learning ,020206 networking & telecommunications ,Data_CODINGANDINFORMATIONTHEORY ,02 engineering and technology ,ASCII ,law.invention ,Q1-390 ,law ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,T1-995 ,020201 artificial intelligence & image processing ,Artificial intelligence ,Arithmetic ,business ,Cryptanalysis ,Technology (General) ,Information Systems ,Block cipher - Abstract
Most of the traditional cryptanalytic technologies often require a great amount of time, known plaintexts, and memory. This paper proposes a generic cryptanalysis model based on deep learning (DL), where the model tries to find the key of block ciphers from known plaintext-ciphertext pairs. We show the feasibility of the DL-based cryptanalysis by attacking on lightweight block ciphers such as simplified DES, Simon, and Speck. The results show that the DL-based cryptanalysis can successfully recover the key bits when the keyspace is restricted to 64 ASCII characters. The traditional cryptanalysis is generally performed without the keyspace restriction, but only reduced-round variants of Simon and Speck are successfully attacked. Although a text-based key is applied, the proposed DL-based cryptanalysis can successfully break the full rounds of Simon32/64 and Speck32/64. The results indicate that the DL technology can be a useful tool for the cryptanalysis of block ciphers when the keyspace is restricted.
- Published
- 2020
- Full Text
- View/download PDF
47. Optical character recognition based on local invariant features
- Author
-
Pavithira Loganathan and Sandhya Balakrishnan Poodikkalam
- Subjects
Local invariant ,Computer science ,business.industry ,Transition (fiction) ,Process (computing) ,020206 networking & telecommunications ,Pattern recognition ,02 engineering and technology ,Neural network nn ,Optical character recognition ,ASCII ,computer.software_genre ,Character (mathematics) ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,0202 electrical engineering, electronic engineering, information engineering ,Media Technology ,020201 artificial intelligence & image processing ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,computer - Abstract
The Optical Character Reader (OCR) process means the transition from scanned manual or written images to a machine-determined document. The American Standard Code for Information Interchange (ASCII...
- Published
- 2020
- Full Text
- View/download PDF
48. Ancient text recognition: a review
- Author
-
Manish Kumar Jindal, Sonika Rani Narang, and Munish Kumar
- Subjects
Linguistics and Language ,Information retrieval ,Alphanumeric ,Computer science ,media_common.quotation_subject ,Feature extraction ,02 engineering and technology ,Optical character recognition ,ASCII ,computer.software_genre ,Language and Linguistics ,Field (computer science) ,Artificial Intelligence ,020204 information systems ,Devanagari ,Reading (process) ,Pattern recognition (psychology) ,ComputingMethodologies_DOCUMENTANDTEXTPROCESSING ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,computer ,media_common - Abstract
Optical character recognition (OCR) is an important research area in the field of pattern recognition. A lot of research has been done on OCR in the last 60 years. There is a large volume of paper-based data in various libraries and offices. Also, there is a wealth of knowledge in the form of ancient text documents. It is a challenge to maintain and search from this paper-based data. At many places, efforts are being done to digitize this data. Paper based documents are scanned to digitize data but scanned data is in pictorial form. It cannot be recognized by computers because computers can understand standard alphanumeric characters as ASCII or some other codes. Therefore, alphanumeric information must be retrieved from scanned images. Optical character recognition system allows us to convert a document into electronic text, which can be used for edit, search, etc. operations. OCR system is the machine replication of human reading and has been the subject of intensive research for more than six decades. This paper presents a comprehensive survey of the work done in the various phases of an OCR with special focus on the OCR for ancient text documents. This paper will help the novice researchers by providing a comprehensive study of the various phases, namely, segmentation, feature extraction and classification techniques required for an OCR system especially for ancient documents. It has been observed that there is a limited work is done for the recognition of ancient documents especially for Devanagari script. This article also presents future directions for the upcoming researchers in the field of ancient text recognition.
- Published
- 2020
- Full Text
- View/download PDF
49. QR-Code Generator Based on FPGA
- Author
-
Yaroslav Volodymyrovych Sokol and Anton Yuriiovych Varfolomiiev
- Subjects
Video Graphics Array ,Computer science ,business.industry ,Controller (computing) ,Interface (computing) ,Synchronization (computer science) ,Code (cryptography) ,Signal edge ,ASCII ,business ,Computer hardware ,Block (data storage) - Abstract
The IP-core for QR-code generation, which supports codes of the first version and the M-type level of correction (allows to recover information from damaged up to 15% code image) is developed. Based on this IP-core and the DE1-SoC development board, containing the Cyclone V FPGA chip, the real QR-code generation device was implemented. The device uses the PS/2 interface to enter text data that should be encoded in the QR-code and output the result (generated code) on a VGA monitor as an image. The suggested device has the following structure: the control module, the IP-core for QR-code generation, and I/O modules. The control module performs the general device management and implemented as the state machine, which has the following states: reset and memory cleaning, read the text that should be encoded from the keyboard, create the main part of the QR-code, create correction data, combine the correction data with the main part of the QR-code, transform the result into a 21x21 pixel matrix and displaying the code on the screen. The input module reads the keyboard signals (synchronization and data signal) and converts them into the ASCII codes. To do this, on each falling edge of the synchronization signal the values of the data signal are registered and propagated to the 8-bit bus. Since the keyboard may have a contact bounce, this module additionally filters the received data using the delay filtering. The output module is the VGA controller that simply generates the necessary clock signals for the proper VGA monitor functioning. After the QR-code is generated, its matrix is enlarged and passed to the VGA controller. Also, in parallel with that, the text, which was encoded in the code, is printed on the display. The IP block for QR-code generation consists of three submodules. The first one receives a text in ASCII format (now only 14 characters are supported) and generates the primary sequence of data to be encrypted in the code. The second submodule calculates the correction data using the Reed-Solomon algorithm. To use this algorithm, the additional array is reserved to store the correction data. This array is filled with special information, depending on the level of correction and the code version number. The algorithm also requires tables of the forward and reverse Galois fields, which are precalculated and stored in the submodule’s ROM. The third module generates the matrix itself: it places the alignment patterns, the information of the used type of mask, level of correction, and adds timing patterns. After that, the mask superimposed on the data generated by the previous module, and the result is copied to the code’s matrix in the required order.
- Published
- 2020
- Full Text
- View/download PDF
50. Two Stage Text Encryption Using a Private Table of the Sumerian System
- Author
-
Elham Hassan Aziz
- Subjects
Computer science ,business.industry ,language ,Sumerian ,Table (database) ,Information security ,Stage (hydrology) ,Arithmetic ,ASCII ,Encryption ,business ,language.human_language - Published
- 2020
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.