Chaotic Systems Based Real-Time Implementation of Visual Cryptography Using LabVIEW

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Real Time Parallel Implementation of Particles Filter Based Visual Tracking

Particle filtering is a widely used method to solve vision tracking problems. However, to be able to run in real-time on standard architecture, the state vector used in the particle filter must remain small [1]. We propose a parallel implementation of a 3D tracking algorithm operating on a stereo video stream and running in real-time on a cluster architecture. We demonstrate the efficiency of t...

متن کامل

Facial Template Protection Using Extended Visual Cryptography And Chaotic Encryption

Protection of biometric data is of prime importance now a days. In this paper a new method is proposed for the protection of biometric facial data using visual cryptography and chaotic encryption. By using visual cryptography each private face image is decomposed into two public host images. The original image gets revealed only when both of these images are available simultaneously. By using c...

متن کامل

Stabilization of chaotic systems via fuzzy time-delayed controller approac

In this paper, we investigate the stabilization of unstable periodic orbits of continuous time chaotic systems usingfuzzy time-delayed controllers. For this aim, we present a control method that can achieve stabilization of an unstableperiodic orbit (UPO) without any knowledge of the system model. Our proposal is attained progressively. First, wecombine the input-to-state linearizing controller...

متن کامل

Arm Based an Real Time Implementation Based on Transportation Systems

The main idea behind this project is to develop a system which can detect drowsiness of the driver and giving an indication in the form of alarm. Since a large number of road accidents occur due to the driver drowsiness, here we are proposing a new transportation system which will reduce the accidents. This system will monitor the driver’s eyes using camera and face detection which is very impo...

متن کامل

study of hash functions based on chaotic maps

توابع درهم نقش بسیار مهم در سیستم های رمزنگاری و پروتکل های امنیتی دارند. در سیستم های رمزنگاری برای دستیابی به احراز درستی و اصالت داده دو روش مورد استفاده قرار می گیرند که عبارتند از توابع رمزنگاری کلیددار و توابع درهم ساز. توابع درهم ساز، توابعی هستند که هر متن با طول دلخواه را به دنباله ای با طول ثابت تبدیل می کنند. از جمله پرکاربردترین و معروف ترین توابع درهم می توان توابع درهم ساز md4, md...

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Traitement du Signal

سال: 2020

ISSN: 0765-0019,1958-5608

DOI: 10.18280/ts.370413