Iranian Standard Code for Information Interchange (ISCII)

1987 ◽  
Vol 6 (4) ◽  
pp. 427-432
Author(s):  
Mohammad Sanati ◽  
Mohammad Dadashzadeh ◽  
Mohammad B Dadfar
2019 ◽  
Vol 17 (04) ◽  
pp. 1950033
Author(s):  
Jia Luo ◽  
Ri-Gui Zhou ◽  
XingAo Liu ◽  
WenWen Hu ◽  
GuangZhong Liu

Based on the novel enhanced quantum representation for quantum image (NEQR), a new blind quantum steganography scheme is proposed. In this scheme, an improved quantum representation of text utilizing American Standard Code for Information Interchange (ASCII) is provided that uses two qubit sequences to store the same quantum text message. The general embedding process of the scheme is as follows: First, the cover image of size [Formula: see text] will be divided into eight blocks of size [Formula: see text] and the secret quantum text of size [Formula: see text] is scrambled by Gray code transform method. Then, the disorder quantum text is embedded into the eight blocks of cover image employing the Gray code as a judgment condition. Meanwhile, the corresponding quantum circuits are drawn. Through the analysis of all quantum circuits, it can be concluded that the scheme has a lower complexity that is [Formula: see text]. And the performance of the proposed scheme is analyzed in terms of simulation results of three items: visual quality, capacity and robustness.


2018 ◽  
Vol 7 (4.10) ◽  
pp. 1
Author(s):  
Krishnaja. R. ◽  
Parameswaran. R.

The security of information passed through the communication channel has become a major concern. Encoding of the messages before transmitting through the channel is most vital. We propose a three level encryption (encoding) using musical notes in traditional Indian and Western system as well as the American Standard Code for Information Interchange (ASCII). A unique method for the decryption is also mentioned in the paper.  


2020 ◽  
Vol 9 (6) ◽  
pp. 2555-2561
Author(s):  
Azizi Abas ◽  
Yuhanis Yusof ◽  
Roshidi Din ◽  
Fazli Azali ◽  
Baharudin Osman

Quick response (QR) code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. There are many existing researches on coloured QR code to increase the storage capacity but from time to time the storage capacity still need to be improved. This paper proposes the use ofcompress, multiplexing and multilayered techniques, as an integrated technique known as CoMM, to increase the storage of the existing QR code. The American Standard Code for Information Interchange (ASCII) text characters are used as an input and performance is measured by the number of characters that can be stored in a single black and white QR code version 40. The experiment metrics also include percentage of missing characters, number of produced QR code, and elapsed time to create the QR code. Simulation results indicate that the proposed algorithm stores 24 times more characters than the black and white QR code and 9 times more than other coloured QR code. Hence, this shows that the coloured QR code has the potential of becoming useful mini-data storage as it does not rely on internet connection.


2021 ◽  
Vol 6 (3) ◽  
pp. 197
Author(s):  
Nur Putrananda Setyapuji Winarno ◽  
Triawan Adi Cahyanto

Cryptography is a technique or method for securing data from other unauthorized parties. The substitution algorithm is the simplest algorithm and is classified as a classic in the field of cryptography, for example the Caesar cipher algorithm. ASCII code (American Standard Code for Information Interchange) is a code that contains characters that can be processed by a computer. By type, not all ASCII characters can be printed by the computer. Some characters are not printed or illegible as usual. These unreadable characters are called control characters. The control character can be used to improve the performance of the Caesar Cipher algorithm, because it focuses on processing text data. The application of control characters uses a simple method but has a complex solution. The results of this study are in the form of a new method with the Caesar cipher algorithm as a classical cryptographic method or technique and ASCII characters as the basis for the development of the ciphertext performance resulting from the encryption process. In testing this method, the success rate reaches 100% in securing the contents of the document with a sample of 500 letters. While the possibility of solving the ciphertext results is classified as difficult because the control characters of the ciphertext results that are illegible will make the decryption result multiple interpretations.


Author(s):  
Christiana Themistocleous

The representation in online environments of non-Roman-based script languages has proved problematic. During the initial years of Computer-mediated Communication, the American Standard Code for Information Interchange character set only supported Roman-alphabetic languages. The solution for speakers of languages written in non-Roman scripts was to employ unconventional writing systems, in an effort to represent their native language in online discourse. The first aim of this chapter is to present the different ways that internet users choose to transliterate or even transcribe their native languages online, using Roman characters. With technological development, and consequently the availability of various writing scripts online, internet users now have the option to either use Roman characters or their native script. If the latter is chosen, internet users still seem to deviate from conventional ways of writing, in this case, however, with regards to spelling. The second aim, therefore, is to bring into light recent developments, by looking at the ways that internet users manipulate orthography, to achieve their communicative purposes.


Sign in / Sign up

Export Citation Format

Share Document