A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2024; you can also visit the original URL.
The file type is application/pdf
.
Filters
A Novel Hybrid Protocol and Code Related Information Reconciliation Scheme for Physical Layer Secret Key Generation
2023
International Journal on Recent and Innovation Trends in Computing and Communication
These samples are quantized using Vector Quantization with Affinity Propagation Clustering (VQAPC) method to generate the preliminary key. ...
PLKG process involves channel probing, quantization, information reconciliation (IR) and privacy amplification to generate symmetric secret key. ...
The method measured the envelope of the channel samples for performing the quantization. A non-uniform quantization method is applied for the secret key generation from the channel samples. ...
doi:10.17762/ijritcc.v11i9.9944
fatcat:tvhmknmihveoboqxzq4k6f3y7u
Secure Data-Hiding in Multimedia Using NMF
[chapter]
2006
Lecture Notes in Computer Science
Subsequently, using a secret key a subspace (basis vector) of the estimated basis matrix is used to decompose the host data for information embedding and detection. ...
Simulation results show that the proposed NMF-based scheme provides flexible control over robustness and capacity for imperceptible embedding. ...
The secret key K consists of 20 alphanumeric characters is used as a seed to the pseudo-random number generator which iteratively generates random number between 1 and 72-(iteration number ), which is ...
doi:10.1007/11848035_36
fatcat:2trnd55l2vdohd2quulpw2drvq
An invisible hybrid color image system using spread vector quantization neural networks with penalized FCM
2007
Pattern Recognition
In this paper, an invisible hybrid color image hiding scheme based on spread vector quantization (VQ) neural network with penalized fuzzy c-means (PFCM) clustering technology (named SPFNN) is proposed. ...
In the SPFNN, the penalized fuzzy clustering technology is embedded in a two-dimensional Hopfield neural network in order to generate optimal solutions for IVQ. ...
A vector quantizer maps the Euclidean × -dimensional space R × into a set { j , j =1, 2, . . . , c} of points in R × , called a codebook. ...
doi:10.1016/j.patcog.2006.11.004
fatcat:rvtuewgkxrbbzdwtvr7thmizf4
Secret Key Agreement for Data Dissemination in Vehicular Platoons
2019
IEEE Transactions on Vehicular Technology
We study a security protocol for data dissemination in the platoon, where the vehicles cooperatively generate a shared secret key based on the quantized fading channel randomness. ...
We study a security protocol for data dissemination in the platoon, where the vehicles cooperatively generate a shared secret key based on the quantized fading channel randomness. ...
The authors would like to thank the editors and the anonymous reviewers for their constructive comments on the article. ...
doi:10.1109/tvt.2019.2926313
fatcat:zfgpfry2uzfw7h4znzbhg64qqi
QDCT Encoding-Based Retrieval for Encrypted JPEG Images
2020
Journal on Big Data
By analyzing the algebraic relationship between QDCT and DCT, a QDCT quantization table and QDTC coding for color images are proposed. ...
A privacy-preserving search model for JPEG images is proposed in paper, which uses the bag-of-encrypted-words based on QDCT (Quaternion Discrete Cosine Transform) encoding. ...
At the same time, the color mapping matrix Map is used as Key. ...
doi:10.32604/jbd.2020.01004
fatcat:tpraqmiw45b27pt5dhzwk7ruui
Enabling Deep Learning-based Physical-layer Secret Key Generation for FDD-OFDM Systems in Multi-Environments
[article]
2024
arXiv
pre-print
Specifically, we propose deep transfer learning (DTL) and meta-learning-based channel feature mapping algorithms for key generation. ...
Deep learning-based physical-layer secret key generation (PKG) has been used to overcome the imperfect uplink/downlink channel reciprocity in frequency division duplexing (FDD) orthogonal frequency division ...
The DTL-based feature mapping for key generation is presented in Section IV. The meta-learning-based feature mapping for key generation is presented in Section V. ...
arXiv:2211.03065v2
fatcat:igsqr45zm5cstkyouteg2bglgq
A Multipurpose Audio Watermarking Algorithm Based On Vector Quantization In Dct Domain
2009
Zenodo
In this paper, a novel multipurpose audio watermarking algorithm is proposed based on Vector Quantization (VQ) in Discrete Cosine Transform (DCT) domain using the codeword labeling and index-bit constrained ...
The fragile watermark is embedded into the indices of the high frequency coefficients of the DCT transform by using the constrained index vector quantization method for the purpose of integrity authentication ...
Different secret keys are used for different watermarks. ...
doi:10.5281/zenodo.1083370
fatcat:fdnzpzb6tfazblhq55dic5edya
Group Secret Key Generation via Received Signal Strength: Protocols, Achievable Rates, and Implementation
2014
IEEE Transactions on Mobile Computing
Secret key generation among wireless devices using physical layer information of radio channel has been an attractive alternative for ensuring security in mobile environments. ...
Our prototype development using MICAz motes and extensive experiments using fading trend based key extraction demonstrate the feasibility of using RSS for group key generation in both indoor and outdoor ...
This work was supported in part by the US National Science Foundation under grant numbers CNS-0954020, CCF-1018270, CNS-1318751, CNS-1318748, CNS-1054738, CCF-0916664 and Army Research Office W911NF-13 ...
doi:10.1109/tmc.2014.2310747
fatcat:mminsdmzzbemvayptzidfem72q
Secure data communication using image encryption and compression
IJARCCE - Computer and Communication Engineering
2014
IJARCCE
IJARCCE - Computer and Communication Engineering
Since, as a channel provider, for secure communication, may tend to compress the encrypted data due to limited channel resource. ...
For secure communication, original data may convert into unintelligent format. Encryption technique is used for converting plain data into scrambled message. ...
Used to generate the color vectors clusters. It work same as Kmeans clustering algorithm as mentioned above.
Flowchart for VQ-LBG
III. ...
doi:10.17148/ijarcce.2014.31204
fatcat:gbqmjlk33bcsvff4vpcaf3jzk4
Secret Key Exchange and Authentication via Randomized Spatial Modulation and Phase Shifting
2018
IEEE Transactions on Vehicular Technology
In this paper, we consider Spatial Modulation (SM) systems and propose a unique physical layer technique that uses a random constellation mapping criterion for secret key exchange. ...
The principle idea here is to exploit the inherent symbol-antenna mapping feature of the SM technique to encode the secret key. ...
Conversely, the latter MACs use shared secrets and will not generate the same code only if the same secret key and the same initialization vector were used. ...
doi:10.1109/tvt.2017.2764388
fatcat:f34m5uptkvblteyreuivxzry4a
Secret-Key Agreement by Asynchronous EEG over Authenticated Public Channels
2021
Entropy
In this paper, we propose a new system for a sequential secret key agreement based on 6 performance metrics derived from asynchronously recorded EEG signals using an EMOTIV EPOC+ wireless EEG headset. ...
All generated keys passed the NIST randomness test. The system performance was almost independent of the EEG signals available to the eavesdropper who had full access to the public channel. ...
In the Conclusion, we discuss a number of open issues and point out a class of algorithms for generating and distributing secret keys based on the so-called data exchange problem [13, 14] . ...
doi:10.3390/e23101327
pmid:34682051
pmcid:PMC8534527
fatcat:yqqxkyykxjbjvpvlej5dyeei3y
Page 4298 of Mathematical Reviews Vol. , Issue 2004e
[page]
2004
Mathematical Reviews
clustering algorithm for fitting mixtures to general densi- ties. ...
The optimal performance of high-rate vector quantization us- ing fixed-rate codes was established by Zador and later general- ized. ...
Designing an Efficient Image Encryption-then Compression System
IJIREEICE - Electrical, Electronics, Instrumentation and Control
2015
IJIREEICE
IJIREEICE - Electrical, Electronics, Instrumentation and Control
We also demonstrate that an arithmetic coding-based approach can be exploited to efficiently compress the encrypted images. ...
In this paper, we design a highly efficient image encryption-thencompression (ETC) system, where both lossless and lossy compressions are considered. ...
Let CS k and RS k be the secret key vectors controlling the column and the row shift offsets for C k . ...
doi:10.17148/ijireeice.2015.3321
fatcat:awpspzdgvjcjtgyb5xpx3hxi2y
An AES-Based Secure Image Retrieval Scheme Using Random Mapping and BOW in Cloud Computing
2020
IEEE Access
In general, image retrieval services are very expensive in terms of computing and storage. Therefore, outsourcing services to the cloud server is a good choice for image owners. ...
It is a ciphertext image retrieval method based on random mapping features with the bag-of-words model. ...
ACKNOWLEDGMENT The authors would like to thank the Editor and the Anonymous Reviewers for their constructive comments and suggestions, which improve the quality of this article. ...
doi:10.1109/access.2020.2983194
fatcat:gdy6h7sy4rbkjjvoqa7cczsf4m
An Investigation of Using Loop-back Mechanism for Channel Reciprocity Enhancement in Secret Key Generation
2018
IEEE Transactions on Mobile Computing
A secret key generation protocol is subsequently designed. The performance of the proposed secret key generation method is then evaluated through both numerical simulation and experiments. ...
Physical layer security key generation exploits unpredictable features from wireless channels to achieve high security, which requires high reciprocity in order to set up symmetric keys between two users ...
Exploiting physical layer (PHY) channel information for secret key generation is a potential complementary technology; it extracts secret keys from the randomness of wireless channel that has independent ...
doi:10.1109/tmc.2018.2842215
fatcat:fk5wmnirlfdzlmt7wp63tozd24
« Previous
Showing results 1 — 15 out of 993 results