Double‐image asymmetric cryptosystem using cylindrical diffraction and spectrum fusion and compression
نویسندگان
چکیده
منابع مشابه
synthesis of amido alkylnaphthols using nano-magnetic particles and surfactants
we used dbsa and nano-magnetic for the synthesis of amido alkylnaphtols.
15 صفحه اولImage Compression using Fusion Technique and Quantization
This paper describes a method for image compression using a fusion technique: combining wavelet transform and curvelet transform. Both the transforms when used individually shows some disadvantages. Wavelets though optimal for point singularities have limitations with directional properties. Similarly curvelets are challenged with small features. By combining both the transforms , the number of...
متن کاملA Fast Quantum-safe Asymmetric Cryptosystem Using Extra Superincreasing Sequences
This paper gives the definitions of an extra superincreasing sequence and an anomalous subset sum, and proposes a fast quantum-safe asymmetric cryptosystem called JUOAN2. The new cryptosystem is based on an additive multivariate permutation problem (AMPP) and an anomalous subset sum problem (ASSP) which parallel a multivariate polynomial problem and a shortest vector problem respectively, and c...
متن کاملFinger Multi-biometric Cryptosystem using Feature-Level Fusion
In this paper, we propose a new finger multi-biometric cryptosystem using feature-level fusion to simultaneously protect multiple templates of fingerprint, finger vein, finger knuckle print and finger shape traits as a single secure sketch. We theoretically analyze the featurelevel fusion for finger multi-biometric cryptosystem with respect to their impact on security and recognition accuracy. ...
متن کاملREACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform
Seven years after the optimal asymmetric encryption padding (OAEP) which makes chosen-ciphertext secure encryption scheme from any trapdoor one-way permutation (but whose unique application is RSA), this paper presents REACT, a new conversion which applies to any weakly secure cryptosystem, in the random oracle model: it is optimal from both the computational and the security points of view. In...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IET Optoelectronics
سال: 2020
ISSN: 1751-8776,1751-8776
DOI: 10.1049/iet-opt.2019.0159