secret communication
Recently Published Documents


TOTAL DOCUMENTS

140
(FIVE YEARS 30)

H-INDEX

14
(FIVE YEARS 1)

2021 ◽  
pp. 225-233
Author(s):  
S. K. Ghosh ◽  
Joydev Hazra ◽  
Satarupa Biswas ◽  
Sachin Rana ◽  
Anushikha

Author(s):  
Christopher Thalacker ◽  
Frederik Hahn ◽  
Jarn de Jong ◽  
Anna Pappa ◽  
Stefanie Barz

Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 904
Author(s):  
Yuhan Chen ◽  
Hideki Sano ◽  
Masashi Wakaiki ◽  
Takaharu Yaguchi

In a secret communication system using chaotic synchronization, the communication information is embedded in a signal that behaves as chaos and is sent to the receiver to retrieve the information. In a previous study, a chaotic synchronous system was developed by integrating the wave equation with the van der Pol boundary condition, of which the number of the parameters are only three, which is not enough for security. In this study, we replace the nonlinear boundary condition with an artificial neural network, thereby making the transmitted information difficult to leak. The neural network is divided into two parts; the first half is used as the left boundary condition of the wave equation and the second half is used as that on the right boundary, thus replacing the original nonlinear boundary condition. We also show the results for both monochrome and color images and evaluate the security performance. In particular, it is shown that the encrypted images are almost identical regardless of the input images. The learning performance of the neural network is also investigated. The calculated Lyapunov exponent shows that the learned neural network causes some chaotic vibration effect. The information in the original image is completely invisible when viewed through the image obtained after being concealed by the proposed system. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method. Some security tests are also performed. The proposed method is designed in such a way that the transmitted images are encrypted into almost identical images of waves, thereby preventing the retrieval of information from the original image. The numerical results show that the encrypted images are certainly almost identical, which supports the security of the proposed method.


Author(s):  
Altyn Muratova ◽  
Shara Mazhitaevna Mazhitaуeva ◽  
Bayan Zhumashevna Sarybaeva

The article considers the secret means of Kazakh communication and analyzes the purpose and place of using secret means of communication. The types of secret communication, the national characteristics of the phenomenon using examples from works of art are described. It shows that both verbal and non-verbal means of communication take an important place in communication. Based on the semantic analysis of auxiliary means of communication used depending on the worldview and culture, history and lifestyle of each nation, on the basis of language facts the author shows an important place of this phenomenon in the life of each people. Secret language is a phenomenon that exists in a language, but has not been the object of special research, except for one or two statements in the scientific literature. Therefore, our goal is to reveal the nature of the whole phenomenon in language and determine the ways of their transmission.


Author(s):  
Luis Adrián Lizama-Pérez ◽  
José Mauricio López Romero

We introduce a novel key exchange protocol based on non-commutative matrix multiplication defined in $\mathbb{Z}_p^{n \times n}$. The security of our method does not rely on computational problems as integer factorization or discrete logarithm whose difficulty is conjectured. We claim that the unique eavesdropper's opportunity to get the secret/private key is by means of an exhaustive search which is equivalent to the unsorted database search problem. Furthermore, we show that the secret/private keys become indistinguishable to the eavesdropper. Remarkably, to achieve a 512-bit security level, the keys (public/private) are of the same size when matrix multiplication is done over a reduced 8-bit size modulo. Also, we discuss how to achieve key certification and Perfect Forward Secrecy (PFS). Therefore, Lizama's algorithm becomes a promising candidate to establish shared keys and secret communication between (IoT) devices in the quantum era.


2021 ◽  
Vol 11 (8) ◽  
pp. 3418
Author(s):  
Cheonshik Kim ◽  
Dongkyoo Shin ◽  
Chingnung Yang ◽  
Lu Leng

Image compression technology and copyright protection are certainly the important technologies for free exchange of multimedia. For compression of an image, we propose a color Absolute Moment Block Trucation Coding (AMBTC) method using a common bit-plane created by k-means. In addition, a data hiding method based on a color AMBTC using Optimal Pixel Adjustment Process (OPAP) was proposed for copyright protection and confidential secret communication. The number of quantization levels of the proposed color AMBTC is nine per block. Therefore, the edge of the compressed color image can be expressed more delicately. As a result of the simulation, it can be seen that the edge of the image of the color AMBTC is close to the original image. Moreover, the data hiding performance of the proposed method also obtained excellent results. For the experiment, we measured the quality of the image using the Color Difference (CD) we proposed, and the measurement result was very satisfactory.


Author(s):  
Luis Adrián Lizama-Pérez ◽  
José Mauricio López Romero

We introduce a novel key exchange protocol based on non-commutative matrix multiplication. The security of our method does not rely on computational problems as integer factorization or discrete logarithm whose difficulty is conjectured. We claim that the unique opportunity for the eavesdropper to get the private key is by means of an exhaustive search which is equivalent to searching an unsorted database problem. Therefore, the algorithm becomes a promising candidate to be used in the quantum era to establish shared keys and achieve secret communication. Furthermore, to establish a 256-bit secret key the size of the public key only requires 256 bits while the private key occupies just 384 bits. Matrix multiplications can be done over a reduced 4-bit size modulo. Also, we show that in a generalized method, private numbers become indistinguishable and we discuss how to achieve Perfect Forward Secrecy (PFS). As a consequence, Lizama's protocol becomes a promising alternative for Internet-of-Things (IoT) computational devices in the quantum era.


Author(s):  
Altyn N. Muratova ◽  
◽  
Shara Mazhitayeva ◽  
Bayan Zh. Sarybayeva ◽  
Aiman Kelmaganbetova ◽  
...  

The article is devoted to the study of the national cognitive nature, the hidden essence of non-verbal techniques. The main purpose of the study is to prove that, based on materials on nonverbal uses in language, they are used to convey a confidential, hidden message, to show that in international communication there is a change in the semantics of nonverbal actions depending on the culture and individual knowledge of each nation. Methods In human life, in parallel with verbal communication, an experiment was conducted on nonverbal techniques, sometimes used in pure form and used to convey a secret and hidden message. The article presents an analysis based on a statistical method compared with some kinemes used in a common language. In the studies on non-verbal techniques, it is noted that they perform a main function in the relations between people. In this article, in the course of analyzing the nature of nonverbal techniques, we characterized some kinemes used depending on the worldview of the Kazakh people, and concluded that their background is directly related to the mystery. Application of the study: the results, materials, and conclusions of the work can be used in the history of language, sociolinguistics, and paralinguistic studies, and allow researchers of gesture semantics to explore nonverbal techniques from a new perspective. Scientists-linguists, psychologists have created many works related to the definition of human nature, character, and the place of nonverbal techniques in the speech act. However, it was not said that auxiliary means located outside the language will be used to transmit confidential, non-public information. In this work, we stopped at the place of nonverbal methods of transmitting confidential, hidden information and analyzed the functions in confidential communication.


2021 ◽  
pp. 210-220
Author(s):  
Antonio Nicaso ◽  
Marcel Danesi
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document