Sciweavers

20 search results - page 3 / 4
» Image encryption using chaotic logistic map
Sort
View
JDCTA
2010
113views more  JDCTA 2010»
13 years 26 days ago
A Watermarking Algorithm Based on Block Energy Analysis of Wavelet Transform's Coefficients and Lorenz Chaotic Attractor
Perceptual transparency and robustness are conflicting requirements. To ensure the security of the watermarkhow to choose the embedding position and intensity is a difficult probl...
Xuelong Hu, Wei Tian, Yongai Zheng
ICRA
2008
IEEE
170views Robotics» more  ICRA 2008»
14 years 15 days ago
Human detection using iterative feature selection and logistic principal component analysis
— We present a fast feature selection algorithm suitable for object detection applications where the image being tested must be scanned repeatedly to detected the object of inter...
Wael Abd-Almageed, Larry S. Davis
CORR
2011
Springer
167views Education» more  CORR 2011»
12 years 9 months ago
The weak password problem: chaos, criticality, and encrypted p-CAPTCHAs
- Vulnerabilities related to weak passwords are a pressing global economic and security issue. We report a novel, simple, and effective approach to address the weak password probl...
T. V. Laptyeva, S. Flach, K. Kladko
AMC
2007
91views more  AMC 2007»
13 years 6 months ago
Deterministic and random synthesis of discrete chaos
In this paper, two anticontrol algorithms for synthesis of discrete chaos are introduced. In these algorithms, the control parameter of a discrete dynamical system is switched, ei...
Miguel Romera, Michael Small, Marius-F. Danca
IJNSEC
2011
145views more  IJNSEC 2011»
13 years 1 months ago
Symmetric Key Image Encryption Scheme with Key Sequences Derived from Random Sequence of Cyclic Elliptic Curve Points
In this paper, cyclic elliptic curves of the form y2 + xy = x3 + ax2 + b, a, b ∈ GF(2m ) with order M is considered in the design of a Symmetric Key Image Encryption Scheme with...
S. V. Sathyanarayana, M. Aswatha Kumar, K. N. Hari...