Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ Electronic Archive o...arrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
Collection "Information technology and security"
Article . 2016 . Peer-reviewed
Data sources: Crossref
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
versions View all 3 versions
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

High performance encryption tools of visual information based on cellular automata

Високопродуктивні засоби шифрування візуальної інформації на основі клітинних автоматів
Authors: Bilan, Stepan; Demash, Andrii;

High performance encryption tools of visual information based on cellular automata

Abstract

This article describes a method of encryption of visual information, based on the use of cellular automata. This method allows you to solve problems with noise errors in deciphering information, low-speed, low resistance to cracking, as well as move away from the use of generators of noise signals in the known methods of encryption of visual information. Analyzed modern encryption methods of visual information, as well as problems encountered in their implementation and use in the communication channels. The article also presents the structure of the device that implements - encryption is the visual information based on cellular automata, programs, texts, diagrams and results of the encryption method, the basic characteristics of the used field-programmable gate array. The essence of the method is to encrypt the visual information by overlaying additional transformations besides the usual encryption. The first additional conversion is carried out by the chosen method of encoding and digitizing images. The second transformation is to select the sequence of bit layers and their principles scan each block. Data conversions in the form of numerical values are used as additional fields to the key. In addition, the key is not given as a ready-bit sequence, but as the operation code, the units form a key sequence. Options propagation path of the excitation signal and a three-dimensional map of a cellular automaton states belong to the key sequence. The formation of pseudo-random key range increases reliability and protection to burglary resistance. Due to the three-dimensional image coding, the use of technologies of programmable integrated circuits and cellular automata increases speed encryption. The method allows you to create a key range implicitly, that reduces the probability of selecting an opponent. Encryption tools are implemented on cheap field-programmable gate array with high performance in speed, allowing you to encrypt visual information in real time during its transfer via communication channels.

Keywords

Field-Programmable Gate Array, Шифрование, cellular automata, Visual information, шифрування, video, Visual information; encryption; video; cellular automata; Field-Programmable Gate Array., программируемая логическая интегральная схема, клітинний автомат, відеоінформація, клеточный автомат, логічна інтегральна схема, що програмується, видеоинформация, Шифрование; видеоинформация; клеточный автомат; программируемая логическая интегральная схема., encryption

  • BIP!
    Impact byBIP!
    selected citations
    These citations are derived from selected sources.
    This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    3
    popularity
    This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
    Average
    influence
    This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
    Average
    impulse
    This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
    Average
Powered by OpenAIRE graph
Found an issue? Give us feedback
selected citations
These citations are derived from selected sources.
This is an alternative to the "Influence" indicator, which also reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Citations provided by BIP!
popularity
This indicator reflects the "current" impact/attention (the "hype") of an article in the research community at large, based on the underlying citation network.
BIP!Popularity provided by BIP!
influence
This indicator reflects the overall/total impact of an article in the research community at large, based on the underlying citation network (diachronically).
BIP!Influence provided by BIP!
impulse
This indicator reflects the initial momentum of an article directly after its publication, based on the underlying citation network.
BIP!Impulse provided by BIP!
3
Average
Average
Average
Green
gold