Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Filters








993 Hits in 5.9 sec

A Novel Hybrid Protocol and Code Related Information Reconciliation Scheme for Physical Layer Secret Key Generation

Et al. Sujata Kadam
2023 International Journal on Recent and Innovation Trends in Computing and Communication  
These samples are quantized using Vector Quantization with Affinity Propagation Clustering (VQAPC) method to generate the preliminary key.  ...  PLKG process involves channel probing, quantization, information reconciliation (IR) and privacy amplification to generate symmetric secret key.  ...  The method measured the envelope of the channel samples for performing the quantization. A non-uniform quantization method is applied for the secret key generation from the channel samples.  ... 
doi:10.17762/ijritcc.v11i9.9944 fatcat:tvhmknmihveoboqxzq4k6f3y7u

Secure Data-Hiding in Multimedia Using NMF [chapter]

Hafiz Malik, Farhan Baqai, Ashfaq Khokhar, Rashid Ansari
2006 Lecture Notes in Computer Science  
Subsequently, using a secret key a subspace (basis vector) of the estimated basis matrix is used to decompose the host data for information embedding and detection.  ...  Simulation results show that the proposed NMF-based scheme provides flexible control over robustness and capacity for imperceptible embedding.  ...  The secret key K consists of 20 alphanumeric characters is used as a seed to the pseudo-random number generator which iteratively generates random number between 1 and 72-(iteration number ), which is  ... 
doi:10.1007/11848035_36 fatcat:2trnd55l2vdohd2quulpw2drvq

An invisible hybrid color image system using spread vector quantization neural networks with penalized FCM

Chi-Yuan Lin, Chin-Hsing Chen
2007 Pattern Recognition  
In this paper, an invisible hybrid color image hiding scheme based on spread vector quantization (VQ) neural network with penalized fuzzy c-means (PFCM) clustering technology (named SPFNN) is proposed.  ...  In the SPFNN, the penalized fuzzy clustering technology is embedded in a two-dimensional Hopfield neural network in order to generate optimal solutions for IVQ.  ...  A vector quantizer maps the Euclidean × -dimensional space R × into a set { j , j =1, 2, . . . , c} of points in R × , called a codebook.  ... 
doi:10.1016/j.patcog.2006.11.004 fatcat:rvtuewgkxrbbzdwtvr7thmizf4

Secret Key Agreement for Data Dissemination in Vehicular Platoons

Kai Li, Lingyun Lu, Wei Ni, Eduardo Tovard, Mohsen Guizani
2019 IEEE Transactions on Vehicular Technology  
We study a security protocol for data dissemination in the platoon, where the vehicles cooperatively generate a shared secret key based on the quantized fading channel randomness.  ...  We study a security protocol for data dissemination in the platoon, where the vehicles cooperatively generate a shared secret key based on the quantized fading channel randomness.  ...  The authors would like to thank the editors and the anonymous reviewers for their constructive comments on the article.  ... 
doi:10.1109/tvt.2019.2926313 fatcat:zfgpfry2uzfw7h4znzbhg64qqi

QDCT Encoding-Based Retrieval for Encrypted JPEG Images

Qiuju Ji, Peipeng Yu, Zhihua Xia
2020 Journal on Big Data  
By analyzing the algebraic relationship between QDCT and DCT, a QDCT quantization table and QDTC coding for color images are proposed.  ...  A privacy-preserving search model for JPEG images is proposed in paper, which uses the bag-of-encrypted-words based on QDCT (Quaternion Discrete Cosine Transform) encoding.  ...  At the same time, the color mapping matrix Map is used as Key.  ... 
doi:10.32604/jbd.2020.01004 fatcat:tpraqmiw45b27pt5dhzwk7ruui

Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments [article]

Xinwei Zhang, Guyue Li, Junqing Zhang, Linning Peng, Aiqun Hu, Xianbin Wang
2024 arXiv   pre-print
Specifically, we propose deep transfer learning (DTL) and meta-learning-based channel feature mapping algorithms for key generation.  ...  Deep learning-based physical-layer secret key generation (PKG) has been used to overcome the imperfect uplink/downlink channel reciprocity in frequency division duplexing (FDD) orthogonal frequency division  ...  The DTL-based feature mapping for key generation is presented in Section IV. The meta-learning-based feature mapping for key generation is presented in Section V.  ... 
arXiv:2211.03065v2 fatcat:igsqr45zm5cstkyouteg2bglgq

A Multipurpose Audio Watermarking Algorithm Based On Vector Quantization In Dct Domain

Jixin Liu, Zheming Lu
2009 Zenodo  
In this paper, a novel multipurpose audio watermarking algorithm is proposed based on Vector Quantization (VQ) in Discrete Cosine Transform (DCT) domain using the codeword labeling and index-bit constrained  ...  The fragile watermark is embedded into the indices of the high frequency coefficients of the DCT transform by using the constrained index vector quantization method for the purpose of integrity authentication  ...  Different secret keys are used for different watermarks.  ... 
doi:10.5281/zenodo.1083370 fatcat:fdnzpzb6tfazblhq55dic5edya

Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation

Hongbo Liu, Jie Yang, Yan Wang, Yingying Jennifer Chen, Can Emre Koksal
2014 IEEE Transactions on Mobile Computing  
Secret key generation among wireless devices using physical layer information of radio channel has been an attractive alternative for ensuring security in mobile environments.  ...  Our prototype development using MICAz motes and extensive experiments using fading trend based key extraction demonstrate the feasibility of using RSS for group key generation in both indoor and outdoor  ...  This work was supported in part by the US National Science Foundation under grant numbers CNS-0954020, CCF-1018270, CNS-1318751, CNS-1318748, CNS-1054738, CCF-0916664 and Army Research Office W911NF-13  ... 
doi:10.1109/tmc.2014.2310747 fatcat:mminsdmzzbemvayptzidfem72q

Secure data communication using image encryption and compression
IJARCCE - Computer and Communication Engineering

Y.M. KAMBLE, K.B. MANWADE
2014 IJARCCE  
Since, as a channel provider, for secure communication, may tend to compress the encrypted data due to limited channel resource.  ...  For secure communication, original data may convert into unintelligent format. Encryption technique is used for converting plain data into scrambled message.  ...  Used to generate the color vectors clusters. It work same as Kmeans clustering algorithm as mentioned above. Flowchart for VQ-LBG III.  ... 
doi:10.17148/ijarcce.2014.31204 fatcat:gbqmjlk33bcsvff4vpcaf3jzk4

Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting

Hasan Taha, Emad Alsusa
2018 IEEE Transactions on Vehicular Technology  
In this paper, we consider Spatial Modulation (SM) systems and propose a unique physical layer technique that uses a random constellation mapping criterion for secret key exchange.  ...  The principle idea here is to exploit the inherent symbol-antenna mapping feature of the SM technique to encode the secret key.  ...  Conversely, the latter MACs use shared secrets and will not generate the same code only if the same secret key and the same initialization vector were used.  ... 
doi:10.1109/tvt.2017.2764388 fatcat:f34m5uptkvblteyreuivxzry4a

Secret-Key Agreement by Asynchronous EEG over Authenticated Public Channels

Meiran Galis, Milan Milosavljević, Aleksandar Jevremović, Zoran Banjac, Aleksej Makarov, Jelica Radomirović
2021 Entropy  
In this paper, we propose a new system for a sequential secret key agreement based on 6 performance metrics derived from asynchronously recorded EEG signals using an EMOTIV EPOC+ wireless EEG headset.  ...  All generated keys passed the NIST randomness test. The system performance was almost independent of the EEG signals available to the eavesdropper who had full access to the public channel.  ...  In the Conclusion, we discuss a number of open issues and point out a class of algorithms for generating and distributing secret keys based on the so-called data exchange problem [13, 14] .  ... 
doi:10.3390/e23101327 pmid:34682051 pmcid:PMC8534527 fatcat:yqqxkyykxjbjvpvlej5dyeei3y

Page 4298 of Mathematical Reviews Vol. , Issue 2004e [page]

2004 Mathematical Reviews  
clustering algorithm for fitting mixtures to general densi- ties.  ...  The optimal performance of high-rate vector quantization us- ing fixed-rate codes was established by Zador and later general- ized.  ... 

Designing an Efficient Image Encryption-then Compression System
IJIREEICE - Electrical, Electronics, Instrumentation and Control

B. Suneetha
2015 IJIREEICE  
We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images.  ...  In this paper, we design a highly efficient image encryption-thencompression (ETC) system, where both lossless and lossy compressions are considered.  ...  Let CS k and RS k be the secret key vectors controlling the column and the row shift offsets for C k .  ... 
doi:10.17148/ijireeice.2015.3321 fatcat:awpspzdgvjcjtgyb5xpx3hxi2y

An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing

Hua Wang, Zhihua Xia, Jianwei Fei, Fengjun Xiao
2020 IEEE Access  
In general, image retrieval services are very expensive in terms of computing and storage. Therefore, outsourcing services to the cloud server is a good choice for image owners.  ...  It is a ciphertext image retrieval method based on random mapping features with the bag-of-words model.  ...  ACKNOWLEDGMENT The authors would like to thank the Editor and the Anonymous Reviewers for their constructive comments and suggestions, which improve the quality of this article.  ... 
doi:10.1109/access.2020.2983194 fatcat:gdy6h7sy4rbkjjvoqa7cczsf4m

An Investigation of Using Loop-back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation

Linning Peng, Guyue Li, Junqing Zhang, Roger Woods, Ming Liu, Aiqun Hu
2018 IEEE Transactions on Mobile Computing  
A secret key generation protocol is subsequently designed. The performance of the proposed secret key generation method is then evaluated through both numerical simulation and experiments.  ...  Physical layer security key generation exploits unpredictable features from wireless channels to achieve high security, which requires high reciprocity in order to set up symmetric keys between two users  ...  Exploiting physical layer (PHY) channel information for secret key generation is a potential complementary technology; it extracts secret keys from the randomness of wireless channel that has independent  ... 
doi:10.1109/tmc.2018.2842215 fatcat:fk5wmnirlfdzlmt7wp63tozd24
« Previous Showing results 1 — 15 out of 993 results