Author: Heping Wen
Publisher: Scientific Research Publishing, Inc. USA
ISBN: 1649975457
Category : Antiques & Collectibles
Languages : en
Pages : 202
Book Description
Chaos cryptography is an inter discipline that combines chaotic theory and cryptography, which includes chaotic secure communication system, chaotic symmetric cipher, chaotic public key cipher and chaotic hash function [1]. In this academic monograph, the main object of our discussion is symmetric chaotic cryptography. The block diagram of symmetrical encryption and communication transmission is shown as Figure 1 [2]. The encryption process is ( , ) EK =CP, in which P means plaintext while K means secret key and () E ? represents encryption function. Alice sends the ciphertext which has been encrypted to Bob, the receiving end. Bob makes use of the same secret key which is sent by a secure channel to decrypt and recover the original plaintext ( , ) DK =PC, in which ()D ? is the decryption function. For an attacker Oscar, the ciphertext C is available but the secret key for the secure channel transmission is not known.
Cryptanalysis-Driven Chaotic Image Encryption and Its Applications
Author: Heping Wen
Publisher: Scientific Research Publishing, Inc. USA
ISBN: 1649975457
Category : Antiques & Collectibles
Languages : en
Pages : 202
Book Description
Chaos cryptography is an inter discipline that combines chaotic theory and cryptography, which includes chaotic secure communication system, chaotic symmetric cipher, chaotic public key cipher and chaotic hash function [1]. In this academic monograph, the main object of our discussion is symmetric chaotic cryptography. The block diagram of symmetrical encryption and communication transmission is shown as Figure 1 [2]. The encryption process is ( , ) EK =CP, in which P means plaintext while K means secret key and () E ? represents encryption function. Alice sends the ciphertext which has been encrypted to Bob, the receiving end. Bob makes use of the same secret key which is sent by a secure channel to decrypt and recover the original plaintext ( , ) DK =PC, in which ()D ? is the decryption function. For an attacker Oscar, the ciphertext C is available but the secret key for the secure channel transmission is not known.
Publisher: Scientific Research Publishing, Inc. USA
ISBN: 1649975457
Category : Antiques & Collectibles
Languages : en
Pages : 202
Book Description
Chaos cryptography is an inter discipline that combines chaotic theory and cryptography, which includes chaotic secure communication system, chaotic symmetric cipher, chaotic public key cipher and chaotic hash function [1]. In this academic monograph, the main object of our discussion is symmetric chaotic cryptography. The block diagram of symmetrical encryption and communication transmission is shown as Figure 1 [2]. The encryption process is ( , ) EK =CP, in which P means plaintext while K means secret key and () E ? represents encryption function. Alice sends the ciphertext which has been encrypted to Bob, the receiving end. Bob makes use of the same secret key which is sent by a secure channel to decrypt and recover the original plaintext ( , ) DK =PC, in which ()D ? is the decryption function. For an attacker Oscar, the ciphertext C is available but the secret key for the secure channel transmission is not known.
Applications of Advanced Machine Intelligence in Computer Vision and Object Recognition: Emerging Research and Opportunities
Author: Chakraborty, Shouvik
Publisher: IGI Global
ISBN: 1799827380
Category : Computers
Languages : en
Pages : 271
Book Description
Computer vision and object recognition are two technological methods that are frequently used in various professional disciplines. In order to maintain high levels of quality and accuracy of services in these sectors, continuous enhancements and improvements are needed. The implementation of artificial intelligence and machine learning has assisted in the development of digital imaging, yet proper research on the applications of these advancing technologies is lacking. Applications of Advanced Machine Intelligence in Computer Vision and Object Recognition: Emerging Research and Opportunities explores the theoretical and practical aspects of modern advancements in digital image analysis and object detection as well as its applications within healthcare, security, and engineering fields. Featuring coverage on a broad range of topics such as disease detection, adaptive learning, and automated image segmentation, this book is ideally designed for engineers, physicians, researchers, academicians, practitioners, scientists, industry professionals, scholars, and students seeking research on the current developments in object recognition using artificial intelligence.
Publisher: IGI Global
ISBN: 1799827380
Category : Computers
Languages : en
Pages : 271
Book Description
Computer vision and object recognition are two technological methods that are frequently used in various professional disciplines. In order to maintain high levels of quality and accuracy of services in these sectors, continuous enhancements and improvements are needed. The implementation of artificial intelligence and machine learning has assisted in the development of digital imaging, yet proper research on the applications of these advancing technologies is lacking. Applications of Advanced Machine Intelligence in Computer Vision and Object Recognition: Emerging Research and Opportunities explores the theoretical and practical aspects of modern advancements in digital image analysis and object detection as well as its applications within healthcare, security, and engineering fields. Featuring coverage on a broad range of topics such as disease detection, adaptive learning, and automated image segmentation, this book is ideally designed for engineers, physicians, researchers, academicians, practitioners, scientists, industry professionals, scholars, and students seeking research on the current developments in object recognition using artificial intelligence.
Cryptanalysis-Driven Chaotic Image Encryption and Its Applications
Author: 贺平温
Publisher:
ISBN: 9781649975447
Category :
Languages : en
Pages : 0
Book Description
Publisher:
ISBN: 9781649975447
Category :
Languages : en
Pages : 0
Book Description
Intelligent Fractal-Based Image Analysis
Author: Soumya Ranjan Nayak
Publisher: Elsevier
ISBN: 0443184690
Category : Computers
Languages : en
Pages : 320
Book Description
Fractals are infinite, complex patterns used in modeling physical and dynamic systems. Fractal theory research has increased across different fields of applications including engineering science, health science, and social science. Recent literature shows the vital role fractals play in digital image analysis, specifically in biomedical image processing. Fractal graphics is an interdisciplinary field that deals with how computers can be used to gain high-level understanding from digital images. Integrating artificial intelligence with fractal characteristics has resulted in new interdisciplinary research in the fields of pattern recognition and image processing analysis. Intelligent Fractal-Based Image Analysis: Application in Pattern Recognition and Machine Vision provides insights into the current strengths and weaknesses of different applications as well as research findings on fractal graphics in engineering and science applications. The book aims to improve the exchange of ideas and coherence between various core computing methods and highlight the relevance of related application areas for advanced as well as novice-user application. The book presents an in-depth look at core concepts, methodological aspects, and advanced feature opportunities, focusing on major real time applications in engineering science and health science. The book will appeal to researchers, data scientists, industry professionals, and graduate students in the fields of fractal graphics and its related applications. - Investigates advanced fractal theories spanning neural networks, fuzzy logic, machine learning, deep learning, and hybrid intelligent systems in solving pattern recognition problems - Explores the application of fractal theories to a wide range of medical image processing modalities - Presents case studies that illustrate the application and integration of fractal theories into intelligent computing in the resolution of important pattern recognition and machine vision problems
Publisher: Elsevier
ISBN: 0443184690
Category : Computers
Languages : en
Pages : 320
Book Description
Fractals are infinite, complex patterns used in modeling physical and dynamic systems. Fractal theory research has increased across different fields of applications including engineering science, health science, and social science. Recent literature shows the vital role fractals play in digital image analysis, specifically in biomedical image processing. Fractal graphics is an interdisciplinary field that deals with how computers can be used to gain high-level understanding from digital images. Integrating artificial intelligence with fractal characteristics has resulted in new interdisciplinary research in the fields of pattern recognition and image processing analysis. Intelligent Fractal-Based Image Analysis: Application in Pattern Recognition and Machine Vision provides insights into the current strengths and weaknesses of different applications as well as research findings on fractal graphics in engineering and science applications. The book aims to improve the exchange of ideas and coherence between various core computing methods and highlight the relevance of related application areas for advanced as well as novice-user application. The book presents an in-depth look at core concepts, methodological aspects, and advanced feature opportunities, focusing on major real time applications in engineering science and health science. The book will appeal to researchers, data scientists, industry professionals, and graduate students in the fields of fractal graphics and its related applications. - Investigates advanced fractal theories spanning neural networks, fuzzy logic, machine learning, deep learning, and hybrid intelligent systems in solving pattern recognition problems - Explores the application of fractal theories to a wide range of medical image processing modalities - Presents case studies that illustrate the application and integration of fractal theories into intelligent computing in the resolution of important pattern recognition and machine vision problems
Crypto and AI
Author: Behrouz Zolfaghari
Publisher: Springer Nature
ISBN: 3031448073
Category : Technology & Engineering
Languages : en
Pages : 229
Book Description
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.
Publisher: Springer Nature
ISBN: 3031448073
Category : Technology & Engineering
Languages : en
Pages : 229
Book Description
This book studies the intersection between cryptography and AI, highlighting the significant cross-impact and potential between the two technologies. The authors first study the individual ecosystems of cryptography and AI to show the omnipresence of each technology in the ecosystem of the other one. Next, they show how these technologies have come together in collaborative or adversarial ways. In the next section, the authors highlight the coevolution being formed between cryptography and AI. Throughout the book, the authors use evidence from state-of-the-art research to look ahead at the future of the crypto-AI dichotomy. The authors explain how they anticipate that quantum computing will join the dichotomy in near future, augmenting it to a trichotomy. They verify this through two case studies highlighting another scenario wherein crypto, AI and quantum converge. The authors study current trends in chaotic image encryption as well as information-theoretic cryptography and show how these trends lean towards quantum-inspired artificial intelligence (QiAI). After concluding the discussions, the authors suggest future research for interested researchers.
Wireless Algorithms, Systems, and Applications
Author: Zhe Liu
Publisher: Springer Nature
ISBN: 3030861376
Category : Computers
Languages : en
Pages : 601
Book Description
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
Publisher: Springer Nature
ISBN: 3030861376
Category : Computers
Languages : en
Pages : 601
Book Description
The three-volume set constitutes the proceedings of the 16th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2021, which was held during June 25-27, 2021, in Nanjing, China.The 103 full and 57 short papers presented in these proceedings were carefully reviewed and selected from 315 submissions. Part III of the set includes the papers of the contributors that took part in the workshops co-located with the conference.The following topics are covered in the volume: network protocols, signal processing, wireless telecommunication systems, routing algorithms, cryptography, local area networks, and others.
Soft Computing: Theories and Applications
Author: Rajesh Kumar
Publisher: Springer Nature
ISBN: 9811998582
Category : Technology & Engineering
Languages : en
Pages : 929
Book Description
This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and health care, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2022), held at University Institute of Technology, Himachal Pradesh University Shimla, Himachal Pradesh, India. The book offers valuable insights into soft computing for teachers and researchers alike; the book inspires further research in this dynamic field.
Publisher: Springer Nature
ISBN: 9811998582
Category : Technology & Engineering
Languages : en
Pages : 929
Book Description
This book focuses on soft computing and how it can be applied to solve real-world problems arising in various domains, ranging from medicine and health care, to supply chain management, image processing and cryptanalysis. It gathers high-quality papers presented at the International Conference on Soft Computing: Theories and Applications (SoCTA 2022), held at University Institute of Technology, Himachal Pradesh University Shimla, Himachal Pradesh, India. The book offers valuable insights into soft computing for teachers and researchers alike; the book inspires further research in this dynamic field.
Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption
Author: Banerjee, Santo
Publisher: IGI Global
ISBN: 1615207384
Category : Computers
Languages : en
Pages : 596
Book Description
Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure communications. Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study.
Publisher: IGI Global
ISBN: 1615207384
Category : Computers
Languages : en
Pages : 596
Book Description
Over the past few decades, there has been numerous research studies conducted involving the synchronization of dynamical systems with several theoretical studies and laboratory experimentations demonstrating the pivotal role for this phenomenon in secure communications. Chaos Synchronization and Cryptography for Secure Communications: Applications for Encryption explores the combination of ordinary and time delayed systems and their applications in cryptographic encoding. This innovative publication presents a critical mass of the most sought after research, providing relevant theoretical frameworks and the latest empirical research findings in this area of study.
Applications of Chaos and Nonlinear Dynamics in Science and Engineering - Vol. 2
Author: Santo Banerjee
Publisher: Springer
ISBN: 3642293298
Category : Technology & Engineering
Languages : en
Pages : 270
Book Description
Chaos and nonlinear dynamics initially developed as a new emergent field with its foundation in physics and applied mathematics. The highly generic, interdisciplinary quality of the insights gained in the last few decades has spawned myriad applications in almost all branches of science and technology—and even well beyond. Wherever the quantitative modeling and analysis of complex, nonlinear phenomena are required, chaos theory and its methods can play a key role. This second volume concentrates on reviewing further relevant, contemporary applications of chaotic nonlinear systems as they apply to the various cutting-edge branches of engineering. This encompasses, but is not limited to, topics such as the spread of epidemics; electronic circuits; chaos control in mechanical devices; secure communication; and digital watermarking. Featuring contributions from active and leading research groups, this collection is ideal both as a reference work and as a ‘recipe book’ full of tried and tested, successful engineering applications.
Publisher: Springer
ISBN: 3642293298
Category : Technology & Engineering
Languages : en
Pages : 270
Book Description
Chaos and nonlinear dynamics initially developed as a new emergent field with its foundation in physics and applied mathematics. The highly generic, interdisciplinary quality of the insights gained in the last few decades has spawned myriad applications in almost all branches of science and technology—and even well beyond. Wherever the quantitative modeling and analysis of complex, nonlinear phenomena are required, chaos theory and its methods can play a key role. This second volume concentrates on reviewing further relevant, contemporary applications of chaotic nonlinear systems as they apply to the various cutting-edge branches of engineering. This encompasses, but is not limited to, topics such as the spread of epidemics; electronic circuits; chaos control in mechanical devices; secure communication; and digital watermarking. Featuring contributions from active and leading research groups, this collection is ideal both as a reference work and as a ‘recipe book’ full of tried and tested, successful engineering applications.
Chaos-based Cryptography
Author: Ljupco Kocarev
Publisher: Springer
ISBN: 3642205429
Category : Technology & Engineering
Languages : en
Pages : 400
Book Description
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.
Publisher: Springer
ISBN: 3642205429
Category : Technology & Engineering
Languages : en
Pages : 400
Book Description
Chaos-based cryptography, attracting many researchers in the past decade, is a research field across two fields, i.e., chaos (nonlinear dynamic system) and cryptography (computer and data security). It Chaos' properties, such as randomness and ergodicity, have been proved to be suitable for designing the means for data protection. The book gives a thorough description of chaos-based cryptography, which consists of chaos basic theory, chaos properties suitable for cryptography, chaos-based cryptographic techniques, and various secure applications based on chaos. Additionally, it covers both the latest research results and some open issues or hot topics. The book creates a collection of high-quality chapters contributed by leading experts in the related fields. It embraces a wide variety of aspects of the related subject areas and provide a scientifically and scholarly sound treatment of state-of-the-art techniques to students, researchers, academics, personnel of law enforcement and IT practitioners who are interested or involved in the study, research, use, design and development of techniques related to chaos-based cryptography.