Download Multimedia Communications, Services and Security: 8th by Andrzej Dziech, Mikolaj Leszczuk, Remigiusz Baran PDF

By Andrzej Dziech, Mikolaj Leszczuk, Remigiusz Baran

This quantity constitutes the refereed complaints of the eighth overseas convention on Multimedia Communications, providers and protection, MCSS 2015, held in Krakow, Poland, in November 2015.
The sixteen complete papers integrated within the quantity have been chosen from 39 submissions. The papers disguise ongoing learn actions within the following issues: multimedia companies; clever tracking; audio-visual structures; biometric purposes; experiments and deployments.

Show description

Read or Download Multimedia Communications, Services and Security: 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedings PDF

Similar information theory books

Information theory: structural models for qualitative data

Krippendorff introduces social scientists to details idea and explains its program for structural modeling. He discusses key themes akin to: the right way to make sure a knowledge concept version; its use in exploratory learn; and the way it compares with different methods comparable to community research, course research, chi sq. and research of variance.

Ours To Hack and To Own: The Rise of Platform Cooperativism, a New Vision for the Future of Work and a Fairer Internet

The on-demand financial system is reversing the rights and protections staff fought for hundreds of years to win. traditional net clients, in the meantime, hold little keep watch over over their own info. whereas promising to be the nice equalizers, on-line systems have usually exacerbated social inequalities. Can the web be owned and ruled another way?

Additional resources for Multimedia Communications, Services and Security: 8th International Conference, MCSS 2015, Kraków, Poland, November 24, 2015. Proceedings

Example text

Several pseudo-random number generators (PRNG) have been proposed which are using the form of elliptic curves. Since [8] methods, different approaches for extracting pseudo-randomness from elliptic curves have been proposed such as [9–12]. The key sequence generators used in this paper is based on the Chaos-Driven Elliptic Curve Pseudo-random Number Generator (C-D ECPRNG) which uses the Linear Congruential Generator on EC (EC-LCG) presented in [13] with modulation by chaotic maps. The C-D ECPRNG constructions increases randomness of the sequence generated and makes its period (theoretically) infinite since it combines positive properties of both ECPRNG and Chaotic Pseudo-random Number Generators (CPRNG) as discussed in [14].

Firstly, Koblitz’s method is used for encoding image pixels to EC-points or the mapping method for mapping image pixels to EC-points as well. Secondly, addition of the resulted EC-points from first step with the ECpoints resulted from the C-D ECPRNG are done to obtain EC-points encrypted sequences. The decryption process is done vice-versa. The two methods implementation was done and the encrypted EC-points was obtained. The obtained EC-points from each step in the proposed image encryption scheme are plotted demonstrated that the encrypted EC-points are uniformly distributed on the used elliptic curves.

To encrypt the EC mapped points resulted from Table 3, we utilize EC-points sequence generated from C-D ECPRNG. In this case, we choose the same generator point G = (502, 23) and initial value U0 = (4, 386) belong to E defined in (11) and the random bits bi generated from the Logistic map defined in Sect. 6701. Table 4 showed how the encryption process works and the EC encrypted points obtained. Rows (1,2) represent pixel indexes and the corresponding pixel values respectively. Rows (3,4) represent EC mapped points resulted from Table 3 and EC-points resulted from C-D ECPRNG respectively.

Download PDF sample

Rated 4.76 of 5 – based on 12 votes