scholarly journals Secure Surveillance Systems Using Partial-Regeneration-Based Non-Dominated Optimization and 5D-Chaotic Map

Symmetry ◽  
2021 ◽  
Vol 13 (8) ◽  
pp. 1447
Author(s):  
Gopal Ghosh ◽  
Kavita Verma ◽  
Divya Anand ◽  
Sahil Verma ◽  
Danda B. Rawat ◽  
...  

Due to Internet of Things (IoT), it has become easy to surveil the critical regions. Images are important parts of Surveillance Systems, and it is required to protect the images during transmission and storage. These secure surveillance frameworks are required in IoT systems, because any kind of information leakage can thwart the legal system as well as personal privacy. In this paper, a secure surveillance framework for IoT systems is proposed using image encryption. A hyperchaotic map is used to generate the pseudorandom sequences. The initial parameters of the hyperchaotic map are obtained using partial-regeneration-based non-dominated optimization (PRNDO). The permutation and diffusion processes are applied to generate the encrypted images, and the convolution neural network (CNN) can play an essential role in this part. The performance of the proposed framework is assessed by drawing comparisons with competitive techniques based on security parameters. It shows that the proposed framework provides promising results as compared to the existing techniques.

Author(s):  
Rana Saad Mohammed ◽  
Khalid Kadhim Jabbar ◽  
Hussien Abid Hilal

Image encryption has become an important application aspect of information security. Most attempts are focused on increasing the security aspect, the quality of the resulting image, and the time consumed. On the other hand, dealing with the color image under the spatial domain in this filed is considered as another challenge added to the proposed method that make it sensitivity and difficulty. The proposed method aims to encode a color image by dealing with the main color components of the red (R), green (G), and blue (B) components of a color image to strengthen the dependence of each component by modifying a two dimensional logistic- sine coupling map (2D- LSCM). This is to satisfy the statistical features and reduce time-consumption, and benefit from a mixing step of the second of advanced encryption standard (AES) candidates (serpent block cipher) and modified it to achieve in addition of confusion and diffusion processes. The experimental results showed that our proposed method had the ability to resist against statistical attacks and differential attacks. It also had a uniform histogram, a large key space, complex and faster, closer Shannon entropy to 8, and low correlation values between two adjacent pixels compared with other methods.


1976 ◽  
Vol 32 ◽  
pp. 109-116 ◽  
Author(s):  
S. Vauclair

This paper gives the first results of a work in progress, in collaboration with G. Michaud and G. Vauclair. It is a first attempt to compute the effects of meridional circulation and turbulence on diffusion processes in stellar envelopes. Computations have been made for a 2 Mʘstar, which lies in the Am - δ Scuti region of the HR diagram.Let us recall that in Am stars diffusion cannot occur between the two outer convection zones, contrary to what was assumed by Watson (1970, 1971) and Smith (1971), since they are linked by overshooting (Latour, 1972; Toomre et al., 1975). But diffusion may occur at the bottom of the second convection zone. According to Vauclair et al. (1974), the second convection zone, due to He II ionization, disappears after a time equal to the helium diffusion time, and then diffusion may happen at the bottom of the first convection zone, so that the arguments by Watson and Smith are preserved.


1980 ◽  
Vol 41 (C6) ◽  
pp. C6-28-C6-31 ◽  
Author(s):  
R. Messer ◽  
H. Birli ◽  
K. Differt

Chaotic systems behavior attracts many researchers in the field of image encryption. The major advantage of using chaos as the basis for developing a crypto-system is due to its sensitivity to initial conditions and parameter tunning as well as the random-like behavior which resembles the main ingredients of a good cipher namely the confusion and diffusion properties. In this article, we present a new scheme based on the synchronization of dual chaotic systems namely Lorenz and Chen chaotic systems and prove that those chaotic maps can be completely synchronized with other under suitable conditions and specific parameters that make a new addition to the chaotic based encryption systems. This addition provides a master-slave configuration that is utilized to construct the proposed dual synchronized chaos-based cipher scheme. The common security analyses are performed to validate the effectiveness of the proposed scheme. Based on all experiments and analyses, we can conclude that this scheme is secure, efficient, robust, reliable, and can be directly applied successfully for many practical security applications in insecure network channels such as the Internet


2020 ◽  
pp. 130-135
Author(s):  
D.N. Korotaev ◽  
K.N. Poleshchenko ◽  
E.N. Eremin ◽  
E.E. Tarasov

The wear resistance and wear characteristics of cluster-gradient architecture (CGA) nanostructured topocomposites are studied. The specifics of tribocontact interaction under microcutting conditions is considered. The reasons for retention of high wear resistance of this class of nanostructured topocomposites are studied. The mechanisms of energy dissipation from the tribocontact zone, due to the nanogeometry and the structural-phase structure of CGA topocomposites are analyzed. The role of triboactivated deformation and diffusion processes in providing increased wear resistance of carbide-based topocomposites is shown. They are tested under the conditions of blade processing of heat-resistant titanium alloy.


1996 ◽  
Vol 61 (4) ◽  
pp. 536-563
Author(s):  
Vladimír Kudrna ◽  
Pavel Hasal

To the description of changes of solid particle size in population, the application was proposed of stochastic differential equations and diffusion equations adequate to them making it possible to express the development of these populations in time. Particular relations were derived for some particle size distributions in flow and batch equipments. It was shown that it is expedient to complement the population balances often used for the description of granular systems by a "diffusion" term making it possible to express the effects of random influences in the growth process and/or particle diminution.


Langmuir ◽  
2021 ◽  
Author(s):  
Qun Cao ◽  
Zijun Shao ◽  
Dale K. Hensley ◽  
Nickolay V. Lavrik ◽  
B. Jill Venton

ACS Nano ◽  
2010 ◽  
Vol 4 (12) ◽  
pp. 7349-7357 ◽  
Author(s):  
Nina Balke ◽  
Stephen Jesse ◽  
Yoongu Kim ◽  
Leslie Adamczyk ◽  
Ilia N. Ivanov ◽  
...  

1986 ◽  
Vol 74 ◽  
Author(s):  
A. Katz ◽  
Y. KOMEM

AbstractThe effect of Rapid Thermal Annealing on phase formation and diffusion processes in the Ni(30 nm) /Al(10 nm)/Si system was studied and coxpared to a Ni(30 nm)/Si reference system. Heat treatments were carried out at temperatures between 400°C and 900°C for 2 seconds.The results obtained by means of TEM, AES and XRD indicated that the Ni/Al/Si system underwent a local melting in the intermediate Al layer at the Al/Si eutectic temperature (577°C). This reaction, due to the rapid melting process, resulted in formation of a unique layered-structure composed of a columnar polycrystalline layer (60 nm thick) of Ni2Si and NiSi adjacent to the Si substrate with relatively smooth interface and an outer layer of two separate polycrystalline films (both about 10 m thick) of Al3Ni (inside) and Ni(Al0.5Si0.5 ) (outside). Under the same rapid thermal processing conditions the Ni/Si reference system underwent a solid state reaction which resulted in the formation of a polycrystalline layer (60 nm thick) composed of Ni2Si and NiSi as well as NiSi2.


2013 ◽  
Vol 117 (42) ◽  
pp. 12836-12843 ◽  
Author(s):  
Joseph B. Hubbard ◽  
Steven P. Lund ◽  
Michael Halter

Sign in / Sign up

Export Citation Format

Share Document