Security measures for Smart Devices through Cryptography Using Cellular Automaton

نویسندگان

  • M. Venugopal
  • Dr. E. G. Rajan
  • Dr. Sharma
چکیده

Present Embedded industry is emphasising more on Smart devices and they have gained much importance in daily life. The devices includes communication, Bio-Medical, image processing, Power, etc. While using smart devices (iButton Technology) data acquisition and user authentication has to be done.Various security concepts are developed to suite these requirement. One such security measure is using cryptography. Cryptography has gained much importance in the recent past due to the advancement in the technology for securing information. Visual Cryptography is such a cryptographic technique through which users hide information securely based on key authentication. This paper examines a new approach in visual cryptography using pextral coding algorithm in the framework of cellular automata. Primarily a 3 x 3 matrix pextral icon is considered. A 2D pextral icon is a convex polygon formed of pixels in a nine neighbourhood enclosing the central pixel. This central pixel is similar to a pixel considered for an image in Cryptography. Dropping one, two or three pixels in the given matrix forms 16 convex polygons. Out of these 16 polygons, few will have mirror symmetry. Two such mirror symmetry polygons were considered and the central pixel of these polygons will form the image pixel. An algorithm is developed to generate two signatures on an ASCII image. Combining the two signatures will reconstruct the original image. Results show that no loss of information and improved security. Keywords— Visual Cryptography, Authentication, Key, Pextral Coding, ASCII Image.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Cryptography Techniques for Image Security and Authentication using Cellular Automata Algorithms

This Security and authentication are the two important criteria for any industrial product controlled through electronics. Microcontrollers interfacing along with electronic circuits, Controls various aspects of industry equipment. One among them is the communication and transfer of data between the equipment. In certain situations a need arises to secure the data and a proper authentication is...

متن کامل

A Cellular Automaton Based Fast One-Way Hash Function Suitable for Hardware Implementation

One way hash functions are an important tool in achieving authentication and data integrity The aim of this paper is to propose a novel one way hash function based on cellular automata whose cryp tographic properties have been extensively studied over the past decade or so Furthermore security of the proposed one way hash function is analyzed by the use of very recently published results on app...

متن کامل

Efficient Cellular Automata Based Versatile Multiplier for GF(2m)

In this paper, a low-complexity Programmable Cellular Automata (PCA) based versatile modular multiplier in GF(2) is presented. The proposed versatile multiplier increases flexibility in using the same multiplier in different security environments, and it reduces the user's cost. Moreover, the multiplier can be easily extended to high order of m for more security, and low-cost serial implementat...

متن کامل

An Introduction to Differential Computation Analysis (DCA) on the withe-box cryptography algorithms

Advances in information and communication technologies lead to use of some new devices such as smart phones. The new devices provide more advantages for the adversaries hence with respect to them, one can define with-box cryptography. In this new model of cryptography, designers try to hide the key using as a kind of implementation. The Differential Computation Analysis (DCA) is a side channel ...

متن کامل

A New Cellular Architecture for Information Retrieval from Sensor Networks through Embedded Service and Security Protocols

Substantial changes have occurred in the Information Technology (IT) sectors and with these changes, the demand for remote access to field sensor information has increased. This allows visualization, monitoring, and control through various electronic devices, such as laptops, tablets, i-Pads, PCs, and cellular phones. The smart phone is considered as a more reliable, faster and efficient device...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013