Modifying Hebbian Network for Text Cipher

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Algorithm of Cipher Text Containing Key to Produce Cipher Text Transmitted in Network Securit y

A plaintext is separated into two parts, a fixed length part and a variable length part. The second part of the plaintext is encrypted to a cipher text using a key. In this paper, an encryption algorithm which encrypts the first part of the plaintext and the key of the second part to a cipher text is proposed. Basic computing operations, such as inserting dummy symbols, rotating, transposition,...

متن کامل

Amplifying Security for Cipher Text Policy Attribute Based Data Sharing

The rapid growth of usage of Digital technology leads to storage of all categories and types of data in digital media. As the technology is very fast in maintenance and also in data theft. We require providing security for the data stored in the digital media various data security techniques have introduced for the last 5 decades, but all those techniques are only key based techniques. All the ...

متن کامل

Cipher Text Containing Data and Key to Be Transmitted in Network Security

In this paper, we propose an encryption algorithm to encrypt plaintext to cipher text. We apply the basic computing operations, e.g., inserting dummy symbols, rotating, transposition, shifting and complement, in the proposed algorithm to encrypt plaintext to cipher text. The cipher text contains the plaintext, relative data and tables of encryption and transmits through the network. Since the t...

متن کامل

Cipher text only attack on speech time scrambling systems using correction of audio spectrogram

Recently permutation multimedia ciphers were broken in a chosen-plaintext scenario. That attack models a very resourceful adversary which may not always be the case. To show insecurity of these ciphers, we present a cipher-text only attack on speech permutation ciphers. We show inherent redundancies of speech can pave the path for a successful cipher-text only attack. To that end, regularities ...

متن کامل

Hebbian Multilayer Network in a Wheelchair Robot

Motivation to study Hebbian learning arises from its neu-rophysiological plausibility and its suitability for hardware implementation. Up to now, artiicial Hebbian learning, embedded in a real system that performs adaptive motor control, has been restricted to one-layer networks. To overcome this limitation, a novel approach to adaptive pre-processing based on Hebbian learning is presented. It ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Baghdad Science Journal

سال: 2011

ISSN: 2411-7986,2078-8665

DOI: 10.21123/bsj.8.4.1028-1037