scholarly journals Ensemble of Chaotic and Naive Approaches for Performance Enhancement in Video Encryption

2015 ◽  
Vol 2015 ◽  
pp. 1-11 ◽  
Author(s):  
Jeyamala Chandrasekaran ◽  
S. J. Thiruvengadam

Owing to the growth of high performance network technologies, multimedia applications over the Internet are increasing exponentially. Applications like video conferencing, video-on-demand, and pay-per-view depend upon encryption algorithms for providing confidentiality. Video communication is characterized by distinct features such as large volume, high redundancy between adjacent frames, video codec compliance, syntax compliance, and application specific requirements. Naive approaches for video encryption encrypt the entire video stream with conventional text based cryptographic algorithms. Although naive approaches are the most secure for video encryption, the computational cost associated with them is very high. This research work aims at enhancing the speed of naive approaches through chaos based S-box design. Chaotic equations are popularly known for randomness, extreme sensitivity to initial conditions, and ergodicity. The proposed methodology employs two-dimensional discrete Henon map for (i) generation of dynamic and key-dependent S-box that could be integrated with symmetric algorithms like Blowfish and Data Encryption Standard (DES) and (ii) generation of one-time keys for simple substitution ciphers. The proposed design is tested for randomness, nonlinearity, avalanche effect, bit independence criterion, and key sensitivity. Experimental results confirm that chaos based S-box design and key generation significantly reduce the computational cost of video encryption with no compromise in security.

Author(s):  
Tung T. Vu ◽  
Ha Hoang Kha

In this research work, we investigate precoder designs to maximize the energy efficiency (EE) of secure multiple-input multiple-output (MIMO) systems in the presence of an eavesdropper. In general, the secure energy efficiency maximization (SEEM) problem is highly nonlinear and nonconvex and hard to be solved directly. To overcome this difficulty, we employ a branch-and-reduce-and-bound (BRB) approach to obtain the globally optimal solution. Since it is observed that the BRB algorithm suffers from highly computational cost, its globally optimal solution is importantly served as a benchmark for the performance evaluation of the suboptimal algorithms. Additionally, we also develop a low-complexity approach using the well-known zero-forcing (ZF) technique to cancel the wiretapped signal, making the design problem more amenable. Using the ZF based method, we transform the SEEM problem to a concave-convex fractional one which can be solved by applying the combination of the Dinkelbach and bisection search algorithm. Simulation results show that the ZF-based method can converge fast and obtain a sub-optimal EE performance which is closed to the optimal EE performance of the BRB method. The ZF based scheme also shows its advantages in terms of the energy efficiency in comparison with the conventional secrecy rate maximization precoder design.


Author(s):  
Tu Huynh-Kha ◽  
Thuong Le-Tien ◽  
Synh Ha ◽  
Khoa Huynh-Van

This research work develops a new method to detect the forgery in image by combining the Wavelet transform and modified Zernike Moments (MZMs) in which the features are defined from more pixels than in traditional Zernike Moments. The tested image is firstly converted to grayscale and applied one level Discrete Wavelet Transform (DWT) to reduce the size of image by a half in both sides. The approximation sub-band (LL), which is used for processing, is then divided into overlapping blocks and modified Zernike moments are calculated in each block as feature vectors. More pixels are considered, more sufficient features are extracted. Lexicographical sorting and correlation coefficients computation on feature vectors are next steps to find the similar blocks. The purpose of applying DWT to reduce the dimension of the image before using Zernike moments with updated coefficients is to improve the computational time and increase exactness in detection. Copied or duplicated parts will be detected as traces of copy-move forgery manipulation based on a threshold of correlation coefficients and confirmed exactly from the constraint of Euclidean distance. Comparisons results between proposed method and related ones prove the feasibility and efficiency of the proposed algorithm.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Yunqian He ◽  
Yuelin Wang ◽  
Tie Li

AbstractThe heat conduction and infrared absorption properties of the dielectric film have a great influence on the thermopile performance. Thinning the dielectric film, reducing its contact area with the silicon substrate, or adding high-absorptivity nanomaterials has been proven to be effective in improving thermopiles. However, these methods may result in a decrease in the structural mechanical strength and increases in the fabrication complexity and cost. In this work, a new performance-enhancement strategy for thermopiles by simultaneously controlling the heat conduction and infrared absorption with a TExtured DIelectric (TEDI) film is developed and presented. The TEDI film is formed in situ by a simple hard-molding process that is compatible with the fabrication of traditional thermopiles. Compared to the control FLat DIelectric (FLDI) film, the intrinsic thermal conductance of the TEDI film can be reduced by ~18–30%, while the infrared absorption can be increased by ~7–13%. Correspondingly, the responsivity and detectivity of the fabricated TEDI film-based thermopile can be significantly enhanced by ~38–64%. An optimized TEDI film-based thermopile has achieved a responsivity of 156.89 V·W−1 and a detectivity of 2.16 × 108 cm·Hz1/2·W−1, while the response time constant can remain <12 ms. These results exhibit the great potential of using this strategy to develop high-performance thermopiles and enhance other sensors with heat transfer and/or infrared absorption mechanisms.


Cryptography ◽  
2021 ◽  
Vol 5 (1) ◽  
pp. 4
Author(s):  
Bayan Alabdullah ◽  
Natalia Beloff ◽  
Martin White

Data security has become crucial to most enterprise and government applications due to the increasing amount of data generated, collected, and analyzed. Many algorithms have been developed to secure data storage and transmission. However, most existing solutions require multi-round functions to prevent differential and linear attacks. This results in longer execution times and greater memory consumption, which are not suitable for large datasets or delay-sensitive systems. To address these issues, this work proposes a novel algorithm that uses, on one hand, the reflection property of a balanced binary search tree data structure to minimize the overhead, and on the other hand, a dynamic offset to achieve a high security level. The performance and security of the proposed algorithm were compared to Advanced Encryption Standard and Data Encryption Standard symmetric encryption algorithms. The proposed algorithm achieved the lowest running time with comparable memory usage and satisfied the avalanche effect criterion with 50.1%. Furthermore, the randomness of the dynamic offset passed a series of National Institute of Standards and Technology (NIST) statistical tests.


Author(s):  
Hanz Richter ◽  
Kedar B. Karnik

The problem of controlling the rectilinear motion of an open container without exceeding a prescribed liquid level and other constraints is considered using a recently-developed constrained sliding mode control design methodology based on invariant cylinders. A conventional sliding mode regulator is designed first to address nominal performance in the sliding mode. Then an robustly-invariant cylinder is constructed and used to describe the set of safe initial conditions from which the closed-loop controller can be operated without constraint violation. Simulations of a typical transfer illustrate the usefulness of the method in an industrial setting. Experimental results corresponding to a high-speed transfer validate the theory.


2016 ◽  
Vol 256 ◽  
pp. 319-327 ◽  
Author(s):  
Mario Rosso ◽  
Ildiko Peter ◽  
Ivano Gattelli

During the last decades under the enthusiastic and competent guidance of Mr Chiarmetta SSM processes attained in Italy at Stampal Spa (Torino) an unquestionable high level of industrial development with the production of large numbers of high performance automotive parts, like variety of suspension support, engine suspension mounts, steering knuckle, front suspension wheel, arm and rear axle. Among the most highlighted findings SSM processes demonstrated their capability to reduce the existing gap between casting and forging, moreover during such a processes there are the opportunity to better control the defect level.Purpose of this paper is to highlight the research work and the SSM industrial production attained and developed by Mr G.L. Chiarmetta, as well as to give an overview concerning some alternative methods for the production of enhanced performance light alloys components for critical industrial applications and to present an analysis of a new rheocasting process suitable for the manufacturing of high performance industrial components.


2021 ◽  
Author(s):  
Fei Yu ◽  
Zinan Zhang ◽  
Hui Shen ◽  
Yuanyuan Huang ◽  
Shuo Cai ◽  
...  

Abstract In this paper, a memristive Hopfield neural network with a special activation gradient (MHNN) is proposed by adding a suitable memristor to the Hopfield neural network (HNN) with a special activation gradient. The MHNN is simulated and dynamic analyzed, and implemented on FPGA. Then, a new pseudo-random number generator (PRNG) based on MHNN is proposed. The post-processing unit of the PRNG is composed of nonlinear post-processor and XOR calculator, which effectively ensures the randomness of PRNG. The experiments in this paper comply with the IEEE 754-1985 high precision 32-bit floating point standard and are done on the Vivado design tool using a Xilinx XC7Z020CLG400-2 FPGA chip and the Verilog-HDL hardware programming language. The random sequence generated by the PRNG proposed in this paper has passed the NIST SP800-22 test suite and security analysis, proving its randomness and high performance. Finally, an image encryption system based on PRNG is proposed and implemented on FPGA, which proves the value of the image encryption system in the field of data encryption connected to the Internet of Things (IoT).


Author(s):  
Woosub Jung ◽  
Amanda Watson ◽  
Scott Kuehn ◽  
Erik Korem ◽  
Ken Koltermann ◽  
...  

For the past several decades, machine learning has played an important role in sports science with regard to player performance and result prediction. However, it is still challenging to quantify team-level game performance because there is no strong ground truth. Thus, a team cannot receive feedback in a standardized way. The aim of this study was twofold. First, we designed a metric called LAX-Score to quantify a collegiate lacrosse team's athletic performance. Next, we explored the relationship between our proposed metric and practice sensing features for performance enhancement. To derive the metric, we utilized feature selection and weighted regression. Then, the proposed metric was statistically validated on over 700 games from the last three seasons of NCAA Division I women's lacrosse. We also explored our biometric sensing dataset obtained from a collegiate team's athletes over the course of a season. We then identified the practice features that are most correlated with high-performance games. Our results indicate that LAX-Score provides insight into athletic performance beyond wins and losses. Moreover, though COVID-19 has stalled implementation, the collegiate team studied applied our feature outcomes to their practices, and the initial results look promising with regard to better performance.


Author(s):  
V.L.N. Balaji Gupta Tiruveedhi ◽  
Venkateswara Rao Battula ◽  
Kishore Babu Bonige ◽  
Tejeswarudu B.

This research work was designed to establish and validate a novel stability indicating RP-HPLC method for the combined determination of Benidipine hydrochloride (BHE) and Nebivolol hydrochloride (NHE) in bulk and tablets, dependent on ICH guidelines.The assay method to analyse BHE and NHE was optimized with isocratic elution using acetonitrile: 0.1M acetate buffer (45:55, pH 5.1), Lichrospher ODS RP-18 column and flow pace of 1 ml/min. Total time for single run was 14 min. The injection quantity was 20μl, and was detected at 249nm. The method was verified on a concentration series of 1.25-10μg/ml (NHE) and 1.0-10μg/ml (BHE) for precision, accuracy and linearity. The LOD values were 0.059µg/ml and 0.028µg/ml for NHE and BHE, respectively. The LOQ values were 0.196µg/ml for NHE and 0.094µg/ml for BHE. The recovery percentages were 98.60-100.11% (BHE) and 98.94-101.50% (NHE) with relative standard deviation 0.250-0.694% (BHE) and 0.183-0.400% (NHE). The method was also observed to be efficient, and was sufficiently specific to measure BHE and NHE in the presence of stress-produced degradation products.


Geophysics ◽  
2021 ◽  
pp. 1-71
Author(s):  
Hongwei Liu ◽  
Yi Luo

The finite-difference solution of the second-order acoustic wave equation is a fundamental algorithm in seismic exploration for seismic forward modeling, imaging, and inversion. Unlike the standard explicit finite difference (EFD) methods that usually suffer from the so-called "saturation effect", the implicit FD methods can obtain much higher accuracy with relatively short operator length. Unfortunately, these implicit methods are not widely used because band matrices need to be solved implicitly, which is not suitable for most high-performance computer architectures. We introduce an explicit method to overcome this limitation by applying explicit causal and anti-causal integrations. We can prove that the explicit solution is equivalent to the traditional implicit LU decomposition method in analytical and numerical ways. In addition, we also compare the accuracy of the new methods with the traditional EFD methods up to 32nd order, and numerical results indicate that the new method is more accurate. In terms of the computational cost, the newly proposed method is standard 8th order EFD plus two causal and anti-causal integrations, which can be applied recursively, and no extra memory is needed. In summary, compared to the standard EFD methods, the new method has a spectral-like accuracy; compared to the traditional LU-decomposition implicit methods, the new method is explicit. It is more suitable for high-performance computing without losing any accuracy.


Sign in / Sign up

Export Citation Format

Share Document