New Chaotic Information Security Algorithms
نویسندگان
چکیده
منابع مشابه
New Chaotic Information Security Algorithms
In this paper, new information security algorithms using a Rossler chaotic function are suggested, which contain image encryption, data encryption and data hiding. In designing the image encryption algorithm, a chaotic block was used to change the pixels value using the target pixels in each block. The experiments show that the system performance is improved and the cipher image characteristics...
متن کاملInformation Security Management – A New Paradigm
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that the copies are not made or distributed for profit or commercial advantage, that the copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than SAICSIT or the ACM must be honoured. Abstracting wi...
متن کاملNew thinking about information technology security
This is the last of three related papers exploring how contemporary computer architecture affects security. It brings together the concepts introduced in the earlier papers and presents a generalized approach to protection, isolation, and access control. We call this approach the Generalized Trusted Computing Base. Based upon the “divide and conquer” approach to achieving protection, understand...
متن کاملDesign and Evaluation of Decision Making Algorithms for Information Security
Title of dissertation: DESIGN AND EVALUATION OF DECISION MAKING ALGORITHMS FOR INFORMATION SECURITY Alvaro A. Cárdenas, Doctor of Philosophy, 2006 Dissertation directed by: Professor John S. Baras Department of Electrical and Computer Engineering The evaluation and learning of classifiers is of particular importance in several computer security applications such as intrusion detection systems (...
متن کاملHistogram based comparison on Symmetric Encryption Algorithms of Information Security
Information sharing and transfer of secured data is a challenging issue in Internet and Network applications, so there is a need to protect such applications. Encryption algorithms play a main role in information security systems. On the other side, those algorithms consume a significant amount of computing resources such as CPU time, memory, and battery power. There are so many Symmetric Encry...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Computer Applications
سال: 2013
ISSN: 0975-8887
DOI: 10.5120/12740-9632