Figure - available from: IET Signal Processing
This content is subject to copyright. Terms and conditions apply.
Tree structured cryptographic system

Tree structured cryptographic system

Source publication
Article
Full-text available
This study proposes a computer cryptographic system through performing the chaotic modulation on the intrinsic mode functions with a non-dyadic number of the encrypted signals. First, the empirical mode decomposition is applied to an input signal to generate a set of intrinsic mode functions. Then, these intrinsic mode functions are categorised int...

Similar publications

Preprint
Full-text available
This paper addresses the important problem of reconstructing a signal from multiple multirate observations. The observations are modeled as the output of an analysis bank, and time-domain analysis is carried out to design an optimal FIR synthesis bank. We pose this as a minimizing the mean-square problem and prove that at least one optimal solution...

Citations

... In some researches, chaotic or hyper-chaotic systems are used to encrypt peripheral data [38][39][40][41][42][43]. In recent years, researchers have focused on the encryption of medical data using chaotic methods [17][18][19][20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35]. Medical data contains important information about patients [41,[44][45][46]. ...
... Applying chaotic modulation in intrinsic mode functions to encrypt medical ECG and EEG data is done in [20]. The results prove that the proposed method for encrypting and decrypting EEG and ECG signals containing chaotic behavior has satisfactory results. ...
Article
Full-text available
In this paper, a novel medical image encryption method based on multi-mode synchronization of hyper-chaotic systems is presented. The synchronization of hyper-chaotic systems is of great significance in secure communication tasks such as encryption of images. Multi-mode synchronization is a novel and highly complex issue, especially if there is uncertainty and disturbance. In this work, an adaptive-robust controller is designed for multimode synchronized chaotic systems with variable and unknown parameters, despite the bounded disturbance and uncertainty with a known function in two modes. In the first case, it is a main system with some response systems, and in the second case, it is a circular synchronization. Using theorems it is proved that the two synchronization methods are equivalent. Our results show that, we are able to obtain the convergence of synchronization error and parameter estimation error to zero using Lyapunov’s method. The new laws to update time-varying parameters, estimating disturbance and uncertainty bounds are proposed such that stability of system is guaranteed. To assess the performance of the proposed synchronization method, various statistical analyzes were carried out on the encrypted medical images and standard benchmark images. The results show effective performance of the proposed synchronization technique in the medical images encryption for telemedicine application.
... Segmentation of speech data into smaller segments makes the speech signal manageable [21,22] and hence the information in the signal can be secured. Encryption of speech signals using chaotic scrambling techniques are explained in [23,24], and the audio signals can be safeguarded. Speech signals are obtained in time domain and it has to be considered in frequency domain [25] for further processing, so as to obtain effective results. ...
Chapter
Security is essential to safeguard confidential data. Data in the form of signal, image, text etc. … can be hacked by intruders. Dual-Level Security with Spiral Mapping [DLSSM] Scheme is proposed to secure the secret data in unsafe medium. DLSSM encompass cryptography and steganography along with strong spiral mapping technique. Cryptographic techniques converts the secret data into cipher data, by which hacker doesn’t understand any information even if they get the data. Spiral mapping method enhances the level of security provided to the secret signal. Steganography hides the secret data within another covering file with no traces of the hidden secret data. Hence, dual level security scheme strengthens the system in covert transmission. Speech signals of various Indian languages from IL-LDC and standard corpus are taken as samples to analyse the proposed DLSSM scheme effectiveness. Standard voice signals are considered as input to prove the novelty of the method. The proposed method [DLSSM] is compared with existing systems to prove its efficiency.
... Under cryptographic discrete signals, it is proposed to understand symbol sequence sets (vectors) of a certain alphabet that possess the necessary (specified) structural, ensemble and correlation properties, temporal and spatial formation complexity and are formed on the basis of random (pseudo-random) processes, including using cryptographic algorithms [4][5][6]. Such signals must meet the requirements of chance, irreversibility, unpredictability [7], have correlation and ensemble properties determined by the owner (user) ICS. ...
... Let us analyze the systems of nonlinear parametric quadratic inequalities (furthersystems) (1) -(2) and (3) -(7), using the introduced model . Systems (4) and (6) if l=L for all 1, q N  must give a complete convolution with the value L, i.e (4): ...
... 3. Build the required number of potential CS W q using the system (1) and key data. 4. Finding pairs or subsets CS W q and W p , that meet the requirements (3 -7). 5. Obtaining a cross-correlation functions state matrix of all possible pairs of potential CS, selected by the results of the previous step, and have all the necessary properties. ...
Book
This book constitutes the refereed proceedings of the 5th International Conference on Information, Communication and Computing Technology, ICICCT 2020, held in New Delhi, India*, in May 2020. The 24 full papers and one short paper presented in this volume were carefully reviewed and selected from 220 submissions. The papers are organized in topical sections on data communication & networking; advanced computing using machine learning. *The conference was held virutally due to the COVID-19 pandemic.