DATA SECURITY USING 2D CELLULAR AUTOMATA RULES
نویسندگان
چکیده
منابع مشابه
Digital Data Security and Copyright Protection Using Cellular Automata
The emergence of many challenges and the rapid development of the means of communications and computer networks and the Internet. Digital information revolution has affected a lot on human societies. Data today has become available in digital format (text, image, audio, and video), which led to the emergence of many opportunities for creativity for innovation as well as the emergence of a new k...
متن کاملForest Fire Simulation Using 2d Cellular Automata
Since many decades different parts of world's forest environment undergo depletion because of many factors but major depletion is due to random forest fires a state, process, or instance of combustion in which fuel or other material is ignited and combined with oxygen, giving off light, heat and flame. This causes destruction of a building, town, forest etc. In Andhra Pradesh the forest area to...
متن کاملEncompression Using Two-dimensional Cellular Automata Rules
In this paper, we analyze the algebraic structure of some null boundary as well as some periodic boundary 2-D Cellular Automata (CA) rules by introducing a new matrix multiplication operation using only AND, OR instead of most commonly used AND, EX-OR. This class includes any CA whose rule, when written as an algebra, is a finite Abelean cyclic group in case of periodic boundary and a finite co...
متن کاملEncryption using cellular automata chain-rules
Chain rules are maximally chaotic CA rules that can be constructed at random to provide a huge number of encryption keys — where the the CA is run backwards to encrypt, forwards to decrypt. The methods are based on the reverse algorithm and the Z-parameter [5]. 1 The CA reverse algorithm and basins of attraction In the simplest cellular automata [4], each cell in a ring of cells updates its val...
متن کاملIdentifying Cellular Automata Rules
This paper studies a method for identifying cellular automata rules (CA rules). Given a sequence of CA configurations, we first seek an appropriate neighborhood of a cell and collect cellular changes of states as evidences. The collected evidences are then classified using a decision tree, which is used for constructing CA transition rules. Conditions for classifying evidences in a decision tre...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Students' Research in Technology & Management
سال: 2017
ISSN: 2321-2543
DOI: 10.18510/ijsrtm.2017.512