Secure FSM-based arithmetic codes

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure FSM-based arithmetic codes

Recently, arithmetic coding has attracted the attention of many scholars because of its high compression capability. Accordingly, in this paper, a method that adds secrecy to this well-known source code is proposed. Finite state arithmetic code is used as source code to add security. Its finite state machine characteristic is exploited to insert some random jumps during source coding process. I...

متن کامل

An efficient secure channel coding scheme based on polar codes

In this paper, we propose a new framework for joint encryption encoding scheme based on polar codes, namely efficient and secure joint secret key encryption channel coding scheme. The issue of using new coding structure, i.e. polar codes in Rao-Nam (RN) like schemes is addressed. Cryptanalysis methods show that the proposed scheme has an acceptable level of security with a relatively smaller ke...

متن کامل

Design of Reliable and Secure Multipliers by Multilinear Arithmetic Codes

We propose an efficient technique for the detection of errors in cryptographic circuits introduced by strong adversaries. Previously a number of linear and nonlinear error detection schemes were proposed. Linear codes provide protection only against primitive adversaries which no longer represents practice. On the other hand nonlinear codes provide protection against strong adversaries, but at ...

متن کامل

Secure Regenerating Codes Based on Rashmi-Shah-Kumar MBR Codes

In this paper, we present a construction of (n, k, d,m) secure regenerating codes for distributed storage systems against eavesdroppers that can observe either data stored in at most m storage nodes or downloaded data for repairing at most m failed nodes in a network where m < k ≤ d ≤ n − 1. The (n, k, d,m) secure regenerating code is based on an (n, k, d) minimum bandwidth regenerating (MBR) c...

متن کامل

ARITHMETIC-BASED FUZZY CONTROL

Fuzzy control is one of the most important parts of fuzzy theory for which several approaches exist. Mamdani uses $alpha$-cuts and builds the union of the membership functions which is called the aggregated consequence function. The resulting function is the starting point of the defuzzification process. In this article, we define a more natural way to calculate the aggregated consequence funct...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Signal, Image and Video Processing

سال: 2012

ISSN: 1863-1703,1863-1711

DOI: 10.1007/s11760-012-0351-z