• No results found

Confusion and Diffusion

New binary image encryption algorithm based on combination of confusion and diffusion

New binary image encryption algorithm based on combination of confusion and diffusion

... ciphers: confusion and diffusion [5]. The aim of confusion phase is to disturb the high correlation among ...the confusion phases design to permute the image by changing the pixel positions ...

9

Indifferentiability  of  Confusion-Diffusion  Networks

Indifferentiability of Confusion-Diffusion Networks

... Still in the same part of the table, one can also note that going from 6 to 7 rounds or from 10 to 11 rounds entails a decrease in security. In our simulator, indeed, the actual purpose of adding the extra round (from 6 ...

82

Construction  of  Lightweight  S-Boxes  using  Feistel   and  MISTY  structures (Full  Version)

Construction of Lightweight S-Boxes using Feistel and MISTY structures (Full Version)

... provide confusion and diffusion [42]. In most cases, confusion is achieved with small substitution boxes (S-Boxes) operating on parts of the state (usually bytes) in parallel, and diffusion is ...

22

A Survey on Multiple Image Encryption Using Chaos Based algorithms And DNA Computing Aarti Patel 1, Dr.Mehul Parikh2

A Survey on Multiple Image Encryption Using Chaos Based algorithms And DNA Computing Aarti Patel 1, Dr.Mehul Parikh2

... level confusion, which makes the security of the cryptosystems not high ...DNA-level confusion and diffusion but pixel-level diffusion, which will enhance the security, complexity and ...

5

A NOVEL TWO DIMENSIONAL SPECTRAL/SPATIAL HYBRID CODE FOR OPTICAL CODE DIVISION 
MULTIPLE ACCESS SYSTEM

A NOVEL TWO DIMENSIONAL SPECTRAL/SPATIAL HYBRID CODE FOR OPTICAL CODE DIVISION MULTIPLE ACCESS SYSTEM

... Hence, the following discussions address some of the advantages of using chaotic maps in the design of the proposed system in this paper. 1. As chaotic functions, Logistic, Tent, Chebyshev, Henon, Gaussian and Duffing ...

10

Expanded 128-bit Data Encryption Standard

Expanded 128-bit Data Encryption Standard

... Data Encryption Standard (DES) is a block cipher that relies on encryption techniques of confusion and diffusion [1] that uses plaintext blocks with the size of 64-bits[r] ...

10

A CONFIGURABLE SECURED IMAGE ENCRYPTION TECHNIQUE USING 3D ARRAY BLOCK ROTATION

A CONFIGURABLE SECURED IMAGE ENCRYPTION TECHNIQUE USING 3D ARRAY BLOCK ROTATION

... the diffusion stages performed alternatively. The confusion and diffusion effect is solely contributed by the permutation and the diffusion stage, ...

6

Confusion with Diffusion? Unravelling IS Diffusion and Innovation Literature with a Focus on SME'S

Confusion with Diffusion? Unravelling IS Diffusion and Innovation Literature with a Focus on SME'S

... Finally, Harrison et al (1997) use an extension of the Theory of Planned Behaviour model, similar in context to factors used by the Thong and Yap (1995) study, to explain and predict a s[r] ...

8

An FPGA Implementation of Chaos based Image
Encryption and its Performance Analysis

An FPGA Implementation of Chaos based Image Encryption and its Performance Analysis

... decryption diffusion phase has to implemented first followed by confusion ...the diffusion phase shuffled bit-planes has to be reshuffled using 3D Logistic Map to retrieve the confused ...

9

A study relating Erikson's concept of identity confusion to effectiveness of psychosocial functioning.

A study relating Erikson's concept of identity confusion to effectiveness of psychosocial functioning.

... adequacy of the interview procedure and rating methods as employed. First, in order to examine our method of eliciting data more closely, reliability scores were established for each of the interview questions used. ...

60

A  Salad  of  Block  Ciphers

A Salad of Block Ciphers

... product and iterated block ciphers, rounds, key schedule, avalanche, confusion, diffusion 25.. and the security reduction principle.[r] ...

305

Vol 2, No 10 (2011)

Vol 2, No 10 (2011)

... less confusion while To avoid complete confusion in Case 2 and to consider alphanumeric characters in message for conversion, Plaintext letters that fall in the same row of the matrix are each replaced by ...

6

Demarcation of the Field of E-Government Assessment

Demarcation of the Field of E-Government Assessment

... to confusion. The confusion here mainly emerges due to the fact that researchers very often use the terms: ‘evaluation e-govern- ment’, ‘e-government measurement’ and ‘e-government benchmarking’ ...

18

The RWTH System Combination System for WMT 2009

The RWTH System Combination System for WMT 2009

... 2.5 Extracting Consensus Translations To generate our consensus translation, we extract the single-best path within the rescored confusion network. With our approach, we could also extract N -best hypotheses. In a ...

5

The Herschel ATLAS data release 2  Paper II  Catalogs of far infrared and submillimeter sources in the fields at the south and north Galactic poles

The Herschel ATLAS data release 2 Paper II Catalogs of far infrared and submillimeter sources in the fields at the south and north Galactic poles

... A detailed description of the processing necessary to produce maps from the Herschel raw data is presented in S17. The resulting maps have pixel sizes of 3, 4, 6, 8, and 12 arcsec for 100, 160, 250, 350, and 500 μ m, ...

13

Exploring the Effect of Student Confusion in Massive Open Online Courses

Exploring the Effect of Student Confusion in Massive Open Online Courses

... on confusion in MOOC context mainly target at students who actively participate in course discussion forums (Agrawal et ...of confusion and both its causes and consequences (Lee et ...their confusion ...

32

Building a Real Word Spell Checker based on Power Links

Building a Real Word Spell Checker based on Power Links

... This work will try to recover the limitation of pre- defined errors by presenting an algorithm which is capable of detecting the errors. This means that the algorithm will start by checking every token in a given ...

6

 DESIGN OF MODEL PREDICTIVE CONTROLLER BASED MULTI OBJECTIVE PSO AND TS 
MODELLING APPROACH

 DESIGN OF MODEL PREDICTIVE CONTROLLER BASED MULTI OBJECTIVE PSO AND TS MODELLING APPROACH

... The Naive Bayes Classifier algorithm training is performed using complaints data obtained from DKBM UMN. Complaints data are divided into two segments, training data and test data. For testing with confusion ...

11

Using Confusion Networks for Speech Summarization

Using Confusion Networks for Speech Summarization

... different confusion networks, the non-pruned ones, and the ones pruned using three different methods, ...use confusion networks to achieve similar or even better performance than using human tran- scripts ...

9

Prediction of confusion attempting algebra homework

Prediction of confusion attempting algebra homework

... In this whole data set, various features are available related to the mastery skill-builder learning.. 200.[r] ...

25

Show all 10000 documents...

Related subjects