Enviar búsqueda
Cargar
20120140506008 2
•
0 recomendaciones
•
304 vistas
IAEME Publication
Seguir
Tecnología
Denunciar
Compartir
Denunciar
Compartir
1 de 8
Descargar ahora
Descargar para leer sin conexión
Recomendados
Resourceful fast dht algorithm for vlsi implementation by split radix algorithm
Resourceful fast dht algorithm for vlsi implementation by split radix algorithm
eSAT Publishing House
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Marisa Paryasto
Towards a stable definition of Algorithmic Randomness
Towards a stable definition of Algorithmic Randomness
Hector Zenil
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
CSCJournals
El text.tokuron a(2019).jung190711
El text.tokuron a(2019).jung190711
RCCSRENKEI
All Pair Shortest Path Algorithm – Parallel Implementation and Analysis
All Pair Shortest Path Algorithm – Parallel Implementation and Analysis
Inderjeet Singh
Comparison and analysis of combining techniques for spatial multiplexing spac...
Comparison and analysis of combining techniques for spatial multiplexing spac...
IAEME Publication
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithm
ijsrd.com
Recomendados
Resourceful fast dht algorithm for vlsi implementation by split radix algorithm
Resourceful fast dht algorithm for vlsi implementation by split radix algorithm
eSAT Publishing House
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Composite Field Multiplier based on Look-Up Table for Elliptic Curve Cryptogr...
Marisa Paryasto
Towards a stable definition of Algorithmic Randomness
Towards a stable definition of Algorithmic Randomness
Hector Zenil
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
Novel Methods of Generating Self-Invertible Matrix for Hill Cipher Algorithm.
CSCJournals
El text.tokuron a(2019).jung190711
El text.tokuron a(2019).jung190711
RCCSRENKEI
All Pair Shortest Path Algorithm – Parallel Implementation and Analysis
All Pair Shortest Path Algorithm – Parallel Implementation and Analysis
Inderjeet Singh
Comparison and analysis of combining techniques for spatial multiplexing spac...
Comparison and analysis of combining techniques for spatial multiplexing spac...
IAEME Publication
Improving Performance of Back propagation Learning Algorithm
Improving Performance of Back propagation Learning Algorithm
ijsrd.com
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
joker438417
1_VTC_Qian
1_VTC_Qian
Qian Han
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
sipij
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
IAEME Publication
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
iaemedu
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
CSCJournals
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
CSCJournals
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
Kusano Hitoshi
Hm2513521357
Hm2513521357
IJERA Editor
www.ijerd.com
www.ijerd.com
IJERD Editor
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd Iaetsd
Pilot induced cyclostationarity based method for dvb system identification
Pilot induced cyclostationarity based method for dvb system identification
iaemedu
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
idescitation
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
journalBEEI
Vertex frequency
Vertex frequency
Vanessa Brischi Olivatto
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
IJCNC
Fx3111501156
Fx3111501156
IJERA Editor
20120140506024
20120140506024
IAEME Publication
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UNDP Türkiye
Ata enege xxxv enegeo
Ata enege xxxv enegeo
enege
50120140506014
50120140506014
IAEME Publication
50120140506004
50120140506004
IAEME Publication
Más contenido relacionado
La actualidad más candente
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
joker438417
1_VTC_Qian
1_VTC_Qian
Qian Han
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
sipij
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
IAEME Publication
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
iaemedu
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
CSCJournals
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
CSCJournals
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
Kusano Hitoshi
Hm2513521357
Hm2513521357
IJERA Editor
www.ijerd.com
www.ijerd.com
IJERD Editor
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd Iaetsd
Pilot induced cyclostationarity based method for dvb system identification
Pilot induced cyclostationarity based method for dvb system identification
iaemedu
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
idescitation
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
journalBEEI
Vertex frequency
Vertex frequency
Vanessa Brischi Olivatto
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
IJCNC
Fx3111501156
Fx3111501156
IJERA Editor
La actualidad más candente
(17)
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
Realizing xor and_xnor_functions_using_tunnel_field-effect_transistors
1_VTC_Qian
1_VTC_Qian
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
DESIGN OF DELAY COMPUTATION METHOD FOR CYCLOTOMIC FAST FOURIER TRANSFORM
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s, prims and ant colo...
A comparative study on multicast routing using dijkstra’s
A comparative study on multicast routing using dijkstra’s
An Efficient Multiplierless Transform algorithm for Video Coding
An Efficient Multiplierless Transform algorithm for Video Coding
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
Fixed Point Realization of Iterative LR-Aided Soft MIMO Decoding Algorithm
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
論文紹介 Combining Model-Based and Model-Free Updates for Trajectory-Centric Rein...
Hm2513521357
Hm2513521357
www.ijerd.com
www.ijerd.com
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Iaetsd finger print recognition by cordic algorithm and pipelined fft
Pilot induced cyclostationarity based method for dvb system identification
Pilot induced cyclostationarity based method for dvb system identification
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
Performance Analysis of OFDM Transceiver with Folded FFT and LMS Filter
Physical security layer with friendly jammer in half-duplex relaying networks...
Physical security layer with friendly jammer in half-duplex relaying networks...
Vertex frequency
Vertex frequency
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
FURTHER RESULTS ON THE DIRAC DELTA APPROXIMATION AND THE MOMENT GENERATING FU...
Fx3111501156
Fx3111501156
Destacado
20120140506024
20120140506024
IAEME Publication
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UNDP Türkiye
Ata enege xxxv enegeo
Ata enege xxxv enegeo
enege
50120140506014
50120140506014
IAEME Publication
50120140506004
50120140506004
IAEME Publication
Stress reduction using semi elliptical slots in axially loaded plate having c...
Stress reduction using semi elliptical slots in axially loaded plate having c...
IAEME Publication
20120140506005
20120140506005
IAEME Publication
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ijsrd.com
ODD EVEN BASED BINARY SEARCH
ODD EVEN BASED BINARY SEARCH
IAEME Publication
Ijmet 07 06_005
Ijmet 07 06_005
IAEME Publication
Destacado
(10)
20120140506024
20120140506024
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
UN Joint Program on Fostering and Enabling Environment for Gender Equality in...
Ata enege xxxv enegeo
Ata enege xxxv enegeo
50120140506014
50120140506014
50120140506004
50120140506004
Stress reduction using semi elliptical slots in axially loaded plate having c...
Stress reduction using semi elliptical slots in axially loaded plate having c...
20120140506005
20120140506005
Survey on Different Image Encryption Techniques with Tabular Form
Survey on Different Image Encryption Techniques with Tabular Form
ODD EVEN BASED BINARY SEARCH
ODD EVEN BASED BINARY SEARCH
Ijmet 07 06_005
Ijmet 07 06_005
Similar a 20120140506008 2
Key exchange based on Diffie-Hellman protocol and image registration
Key exchange based on Diffie-Hellman protocol and image registration
nooriasukmaningtyas
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IJNSA Journal
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IJNSA Journal
Iaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm using
Iaetsd Iaetsd
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
cscpconf
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
csandit
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
ijma
The fourier transform for satellite image compression
The fourier transform for satellite image compression
csandit
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrity
eSAT Journals
40120140501004
40120140501004
IAEME Publication
40120140501004
40120140501004
IAEME Publication
Color image analyses using four deferent transformations
Color image analyses using four deferent transformations
Alexander Decker
Color image analyses using four deferent transformations
Color image analyses using four deferent transformations
Alexander Decker
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
cscpconf
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
eSAT Publishing House
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
eSAT Journals
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
ijistjournal
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
ijistjournal
Steganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matching
IJECEIAES
40120140503001 2-3
40120140503001 2-3
IAEME Publication
Similar a 20120140506008 2
(20)
Key exchange based on Diffie-Hellman protocol and image registration
Key exchange based on Diffie-Hellman protocol and image registration
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
IMAGE AUTHENTICATION THROUGH ZTRANSFORM WITH LOW ENERGY AND BANDWIDTH (IAZT)
Iaetsd computational performances of ofdm using
Iaetsd computational performances of ofdm using
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
PERFORMANCE EVALUATIONS OF GRIORYAN FFT AND COOLEY-TUKEY FFT ONTO XILINX VIRT...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Performance evaluations of grioryan fft and cooley tukey fft onto xilinx virt...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
Implementation Of Grigoryan FFT For Its Performance Case Study Over Cooley-Tu...
The fourier transform for satellite image compression
The fourier transform for satellite image compression
Image encryption technique incorporating wavelet transform and hash integrity
Image encryption technique incorporating wavelet transform and hash integrity
40120140501004
40120140501004
40120140501004
40120140501004
Color image analyses using four deferent transformations
Color image analyses using four deferent transformations
Color image analyses using four deferent transformations
Color image analyses using four deferent transformations
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
THE FOURIER TRANSFORM FOR SATELLITE IMAGE COMPRESSION
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
Text file encryption using fft technique in lab view 8.6
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
DESPECKLING OF SAR IMAGES BY OPTIMIZING AVERAGED POWER SPECTRAL VALUE IN CURV...
Steganographic Scheme Based on Message-Cover matching
Steganographic Scheme Based on Message-Cover matching
40120140503001 2-3
40120140503001 2-3
Más de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Más de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
danishmna97
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Jago de Vreede
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
The Digital Insurer
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Angeliki Cooney
Architecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
Dropbox
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
apidays
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Zilliz
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Orbitshub
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Jeffrey Haguewood
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Edi Saputra
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
Khushali Kathiriya
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Último
(20)
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Architecting Cloud Native Applications
Architecting Cloud Native Applications
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
20120140506008 2
1.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 45 EFFICIENT WAY OF IMAGE ENCRYPTION USING GENERALIZED WEIGHTED FRACTIONAL FOURIER TRANSFORM WITH DOUBLE RANDOM PHASE ENCODING Priyanka Chauhan1 , Girish Chandra Thakur2 M. Tech. Scholar1 , Associate Professor2 , Dept. of Electronics & Communication Engg., Institute of Engineering & Technology, Alwar-301030 (Raj.), India ABSTRACT Data transfer between the users over different network technologies is increasing day by day. With the data transfer, concern about the information theft by any eavesdropper is also increasing. To prevent this information theft, our information is converted in to unreadable form using some algorithm and it can only be converted into readable form using key. This process of conversion the information into secured form is called encryption. At present information transfer is also in the form of images. In this paper we are going to discuss some of the methods of encrypting the images. In any encryption technique, the major role is played by its key i.e. larger the number of parameters in the key stronger is the encryption technique. So in the thesis we will develop the GWFRFT which is based on the properties of conventional FRFT and discuss random phase encoding technique in FRFT domain. Then study random phase encoding technique in GWFRFT domain. And at last to make the scheme more efficient and strong we encrypt two images in to single image. Keywords: Encryption, FRFT, FT, GWFRFT, Image. 1. INTRODUCTION In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called a cipher) to make it unreadable to anyone except those possessing extra ordinary information, more often than not referred to while a key. This product of the process is encrypted in order in cryptography, referred to cipher text. The invalidate process, i.e., to make the encrypted information readable again, is referred to as decryption (i.e. to make it unencrypted). In recent years there have been numerous reports of confidential data such as INTERNATIONAL JOURNAL OF ADVANCED RESEARCH IN ENGINEERING AND TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME: http://www.iaeme.com/IJARET.asp Journal Impact Factor (2014): 7.8273 (Calculated by GISI) www.jifactor.com IJARET © I A E M E
2.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 46 customers’ personal records being exposed through loss or theft of laptops or endorsement drives. Encrypting like files at rest help guard them should physical security events fail. Digital liberties organization systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest. There have been numerous reports of data in transit being intercepted in current years. Encrypting information in shipment also helps to secure it as it is often difficult to physically secure all access to networks. In this paper we are using Generalized Weighted Fractional Fourier Transform with random phase encoding technique for the encryption of two images in to single image. GWFRFT will be derived from the FRFT. The fractional Fourier transform (FRFT) is a superset of the Fourier transform and has been applied in optics, quantum mechanics, and signal processing areas [15,20,21].In this paper, we discuss a generalized weighted fractional Fourier transform (GWFRFT) which is weighted sum of the integer order fractional Fourier transform. 2. DEFINITION OF FRFT AND GWFRFT FRFT is a generalization of FT [1, 13]. It is not only richer in theory and more flexible in application, but is also not expensive in implementation. It is a powerful tool for the analysis of time- varying signals. With the advent of FRFT and related concepts, it is seen that the properties and applications of the conventional FT are special cases of those of the FRFT. However, in every area where FT and frequency domain concepts are used, there exists the potential for generalization and implementation by using FRFT. Mathematically, α th order FRFT is the α th power of FT operator. Hence α th order FRFT of any signal 2 ( ) ( )s t L R∈ is given by [ ( )] ( ) ( ; , )F s t s t K t dtα α ω +∞ −∞ = ∫ (1) Where 2 2 ( ; , ) ( )exp[( ( ) ( ) ( ) )]K t K B C t B tα ω α α ω α ω α= − + (2) Is the kernel of Fα , α is the fraction, and [1 cot( )] ( ) 2 j K α α π − = (3) ( ) cot( )B α α= (4) 1 ( ) sin( ) C α α = (5) 2 aπ α = (6)
3.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 47 For integer values of α it can be deduced that any fractional Fourier transform repeat itself at an interval of 4 that can be shown as 4 [ ( )] [ ( )]m l l F s t F s t+ = (7) Where m is any integer and l can be any real number. As we discussed the periodic nature of integral order fractional Fourier transform in the previous chapter i.e. integer order fractional Fourier transform is periodic with period 4. So now it is given that α th order FRFT of any signal can be represented in terms of these four integral order FRFT i.e. 0 1 2 3 0 1 2 3[ ( )] ( ) [ ( )] ( ) [ ( )] ( ) [ ( )] ( ) [ ( )]wF s t A F s t A F s t A F s t A F s tα α α α α= + + + (8) Where the coefficients ( )lA α , l = 0,1,2,3 are continuous functions ofα . Generalized weighted fractional Fourier transform obeys the following axioms. I. Continuity axiom: 2 2 : ( ) ( )wF L R L Rα → is continuous in fractional order α . II. Boundary axiom: wFα degenerates into Fα when α is an integer multiple of 2 π or α is an integer. i.e. for integer order the weighted fraction Fourier transform reduces into the normal Fourier transform of signal s(t ) or the signal itself. For different integer values of order a, the values of weighted coefficient is shown in the Table 1. III. Additive axiom: For real numbers α and β , the GWFRFT operator wFα has the following additive property w w w w wF F F F Fα β β α α β+ = = (9) So using these properties and calculating the value of coefficient ( )lA α the final equation of generalized weighted fractional Fourier transform comes out to be 3 3 ( , ) 0 0 [ ( )] exp{( 2 / 4)[(4 1) (4 ) ]} [ ( )]l w M N k k l k F s t j m n k kl F s tα π α = = = − + + −∑∑ (10) A(or α) A0 A1 A2 A3 0 (or 0) 1 0 0 0 1 (or π/2) 0 1 0 0 2 (or π) 0 0 1 0 3 (or 3π/2) 0 0 0 1
4.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 48 3. PROPOSED IDEA OF DOUBLE IMAGE ENCRYPTION BASED ON RANDOM PHASE ENCODING USING GWFRFT Most of the encryption techniques in the literature are dealing with a single amplitude image (i.e. binary text, grayscale or color image). However, in somecases, one need to encrypt two images with certain relations such as two pictures of an object or a picture and its binary text for description, etc., which are often stored or transmitted together. Encrypting the two images directly using the single-image encryption algorithms mentioned in the literature results in two separate encrypted images with random noise distribution, and sometimes, there arises the difficulty in distinguishing between them before decryption and the decryption has to be conducted twice to recover the two images. Multiple images can also be encrypted by using wavelength multiplexing [18] or position multiplexing methods [21], but the qualities of decrypted images are not perfect due to the cross-talk effects between images. Inspired by the architecture of the fully phase encoding [2, 17] and pixel scrambling (random shifting) techniques [18, 20]. The schematic of a method which can convert two images into one encrypted image based on the random phase encoding in the generalized weighted fractional Fourier domain is given in Fig 1. Let f (x0) and g(x0) represent the two primary normalized amplitude images to be encrypted together, J denotes the pixel scrambling operation [20], which interchanges the pixels according to some random permutation, and the image can be retrieved by repositioning the disturbed image according to the special order. For encryption, the pixel scrambling is applied to one of the primary images g(x0), and then, the scrambled result J [g(x0)] is encoded into a phase only function, which can be mathematically expressed as exp[jπ J [g(x0)]],within the range [0,π ] of the phase variation. Fig 1: Schematic of double image encryption The resulting function is multiplied by the other primary image f (x0) to obtain the complex combination signal 0 0 0( ) ( )exp[ [ ( )]]C x f x j J g xπ= (11) Let us consider R1=exp[jφ1(x0)] and R2=exp[jφ2(xa)] are the two random phase masks,where φ1(x0) and φ2(xa) are statistically independent white sequences uniformly distributed in [ 0,2π ] . As shown in Fig 1, C( x0 ) is first multiplied by the first random phase mask R1 , then transformed by GWFRFT with order α with two 4-D vectors (M1 , N1) , multiplied by the second random phase mask R2 , and then transformed by GWFRFT with order β with two 4-D vectors (M2 , N2). Thus, we obtain the final expression of the output encrypted image ψ(xb) , which is given by 2 2 1 1( , ) ( , ) 0 1 0 2( ) {[ ( ( ) [ ( ( )])] [ ( ( )]}b w M N w M N ax F F C x exp j x exp j xβ α ψ φ φ= ⋅ ⋅ ⊗ ⊗ (12) Where ⊗ represent the element-by-element multiplication operation of matrices and the input image for encryption ``f ” is assumed to be real and nonnegative.
5.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 49 The Decryption shown in Fig 2 is the reverse process of the encryption. For decryption, ψ(xb) is transformed by the -βth GWFRFT and the resultant function is multiplied by the conjugate of the second random phase mask R2 , then GWFRFT of order -αth is then applied, resulting in the following decrypted combination function C(x0) after multiplying by the conjugate of the first random phase mask R1 i.e. 1 1 2 20 ( , ) ( , ) 1 0 2( ) { [( ( )) [ ( ( )]]} [ ( ( )]w M N w M N b aC x F F x exp j x exp j xα β ψ φ φ− − = ⋅ ⋅ ⊗ − ⊗ − (13) Now the amplitude-based image f (x0)can be simply retrieved from the decoded C(x0)by taking amplitude, whereas the phase-based image g(x0) requires extracting the phase of C(x0), and dividing it by π, then taking the inverse pixel scrambling transform denoted by J-1 as shown in Fig 2. Fig 2: Schematic of double image decryption 3. SIMULATION RESULTS Computer simulations are performed to verify the proposed encryption technique for double images. Two types of amplitude image, image of college main gate and college logo (Fig 3), are serving as the two primary images to be encrypted together. Each of them has a size of 256 × 256 pixels. We use college main gate image as the amplitude-based image f(x0), and college logo image as the phase-based image g(x0). The two random phase masks, order and 4D vector are as follow(a, b, c, d) is (0.4,3.8,1.7,2.9) and 4D vector are M1=[ 1309 ], M2=[ 102338 ], M3=[12309], M4=[42338], N1=[8257], N2=[79464], N 3 =[ 925111 ] , N 4 =[ 79164 ] .
6.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 50 Then the encrypted and decrypted images are shown in fig 4 and 5 respectively. Fig 3: Primary Images which are used for encryption Fig 4: Single encrypted image using double random phase encoding using GWFRFT Fig 5: Decrypted Images after applying the reverse process
7.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 51 4. COMPARISION WITH THE EXISTING TECHNOLOGY Advanced encryption technique is the symmetric key algorithm similar to double image encryption where we are using the same key for encryption as well as decryption. AES is introduced in year 2001 and since then it is the standard technique for encryption. AES comes for different key sizes like 128 bit, 192 bits or 256 bits. Number of permutations for AES-128 = 2128 Number of permutations for AES-192 = 2192 Now let us calculate the number of permutation required in double image encryption. Let M1 = [0-63, 0-63, 0-63, 0-63] = [26 , 26 , 26 , 26 ] Similar to M1 other vectors i.e. M2, M3, M4, N1, N2, N3, N4 also can take any value between 0-63. Number of possible permutations from vectors = (26 )32 = 2192 Now order “a” can take any value between 0-100 with an interval of 0.1 i.e. 0.1 0.2, 0.3, 0.4 and so on. So Number of possible permutation for order “a” = 1000 ≈ 210 Number of possible permutation for order “(a, b, c,d )” ≈ 240 So, Total number of possible permutation = 2192 * 240 = 2232 As from this the key size is 232 bits and for this key size AES also require 2232 permutations so the performance of this encryption technique is comparable to the AES. 5. CONCLUSION In this paper, a novel approach to implement the image encryption is discussed. As in any encryption the key which is used for encryption serves an important role means larger the number of parameters in the key stronger the encryption techniques. So in GWFRFT, order as well as 4D vectors served as the key making encryption stronger than the encoding in FRFT. To make this encryption technique more efficient and stronger an encryption technique is proposed in which two images is converted into a single complex distribution and finally encrypted into a single image. This proposed encoding technique is successfully implemented for encryption and decryption. And in the last the double image phase random encoding encryption technique is compared with the advanced encryption techniques (AES) using the number of permutation required by the eavesdropper to decode the key in a brute force method of attacking. By this comparison it is clearly shown that proposed encryption technique is more efficient and robust against any attack. REFERENCES [1] V. Namias, “The fractional order Fourier transform and its application to quantum mechanics,” J. Inst. Math. Appl., vol. 25, 1980, pp. 241–265. [2] A. W. Lohmann, “Image rotation, Wigner rotation, and the fractional Fourier transform,” J. Opt. Soc. Am. A 10, 2181- (1993). [3] C. C. Shih, “Fractionalization of Fourier transform,” Opt. Commun., no. 118,Aug. 1, 1995, pp. 495–498. [4] P. Refregier and B. Javidi, “Optical image encryption based on input plane and Fourier plane random encoding,” Opt. Lett., vol. 20, 1995, pp. 767–769. [5] Ozaktas H M, Arikan O, Kutay M A, et al. Digital computation of the fractional Fourier transform. IEEE Trans Signal Process, 1996, 44: 2141–2150. [6] J. Hua, L. Liu, and G. Li, “Extended fractional Fourier transforms,” J. Opt. Soc. Am. A 14, 3316-3322 (1997).
8.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 6, June (2014), pp. 45-52 © IAEME 52 [7] N. Towghi, B. Javidi, and Z. Luo, “Fully phase encrypted image processor,” J. Opt. Soc. Am. A 16, 1915 (1999). [8] G. Unnikrishnan and K. Singh, “ Random fractional Fourier domain encoding for optical security,” Opt. Eng., vol. 39, 2000, pp. 2853–2859. [9] G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption by random phase encoding in the fractional Fourier domain,” Opt. Lett. 25, 887-889 (2000). [10] Candan C, Kutay M, Ozaktas H. The discrete fractional Fourier transform. IEEE Trans Signal Process, 2000, 48: 1329–1337. [11] H. M. Ozaktas, Z. Zalevsky, and M. A. Kutay “The Fractional Fourier Transform with Applications in Optics and Signal Processing” New York: Wiley, 2000. [12] B. Javidi, N. Towghi, N. Maghzi, and S. C. Verrall, “Error-reduction techniques and error analysis for fully phase- and amplitude-based encryption,” Appl. Opt. 39, 4117–4130 (2000). [13] N. K. Nishchal, G. Unnikrishnan, J. Joseph, and K. Singh, “Optical encryption using a localized fractional Fourier transform,” Opt. Eng. 42, 3566-3571, (2003). [14] N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase encryption using fractional Fourier transform,” Opt. Eng. 42, 1583–1588 (2003). [15] N. K. Nishchal, J. Joseph, and K. Singh, “Fully phase-based encryption using fractional order Fourier domain random phase encoding: Error analysis,” Opt. Eng. 43, 2266-2273 (2004). [16] A. Sinha, K. Singh, “Image encryption by using fractional Fourier transform and jigsaw transform in image bit planes,” Opt. Eng. 44, 057001 (2005). [17] G. Situ and J. Zhang, “Multiple-image encryption by wavelength multiplexing,” Opt. Lett. 30, 1306-1308 (2005). [18] J. Zhao, H. Lu, X.S. Song, J.F. Li, and Y.H. Ma, “ Image encryption based on multistage fractional Fourier transforms and pixel scrambling technique,” Opt. Commun. 249, 493-499, (2005). [19] G. Situ and J. Zhang, “Position multiplexing for multiple-image encryption,” J. Opt. A: Pure Appl. Opt. 8, 391 (2006). [20] Ozaydin M, Nemati S, Yeary M, et al. Orthogonal projections and discrete fractional Fourier transforms. In IEEE 12th-Signal Processing Education Workshop, Teton National Park, Wyoming, 2006. 429–433. [21] Ran Tao, Yi Xin, and YueWang, “Image encryption based on random phase encoding in the fractional Fourier domain ,”Optical Express-2007, Vol. 15, No. 24. [22] Z. Liu and S. Liu, “Double image encryption based on iterative fractional Fourier transform,” Opt. Commun. 275, 324–329 (2007). [23] R. Tao, J. Lang, Y. Wang. “Image encryption based on the multiple-parameter fractional Fourier transform,” Opt. Lett. vol. 33, 2008, pp. 581-583. [24] Jun LANG , Ran TAO and Yue WANG, “The Generalized Weighted Fractional Fourier Transform and Its Application to Image Encryption ,” Image and Signal Processing, 2009. CISP ’09. 2nd International Conference, IEEE, 978-1-4244-4131-0. [25] Lang J, Tao R, Wang Y. Image encryption based on the multiple-parameter discrete fractional Fourier transform and chaos function. Opt Comm. 2010, 283: 2092–2096. [26] Prof. Maher K. Mahmood and Jinan N. Shehab, “Image Encryption and Compression Based on Compressive Sensing and Chaos”, International journal of Computer Engineering & Technology (IJCET), Volume 5, Issue 1, 2014, pp. 68 - 84, ISSN Print: 0976 – 6367, ISSN Online: 0976 – 6375. [27] Vismita Nagrale, Ganesh Zambre and Aamir Agwani,, “Image Stegano-Cryptography Based on LSB Insertion & Symmetric Key Encryption”, International Journal of Electronics and Communication Engineering & Technology (IJECET), Volume 2, Issue 1, 2011, pp. 35 - 42, ISSN Print: 0976- 6464, ISSN Online: 0976 –6472.
Descargar ahora