True random number generation from mobile telephone photo based on chaotic cryptography

L Zhao, X Liao, D Xiao, T Xiang, Q Zhou… - Chaos, Solitons & …, 2009 - Elsevier
A cheap, convenient and universal TRNG based on mobile telephone photo for producing
random bit sequence is proposed. To settle the problem of sequential pixels and …

Random-bit sequence generation from image data

YA Alsultanny - Image and Vision Computing, 2008 - Elsevier
The random number generated is very important in constructing encryption keys together
with the other algorithm parameters. A new approach is proposed to generate a random-bit …

Symmetric encryption algorithm inspired by randomness and non-linearity of immune systems

S Ariffin, R Mahmod, A Jaafar… - International Journal of …, 2012 - igi-global.com
In data encryption, the security of the algorithm is measured based on Shannon's confusion
and diffusion properties. This paper identifies the correspondences and highlights the …

Security in opportunistic sensor network and IoT having sensors using light weight key generation and cryptographic algorithm

MS Arafath, KUR Khan… - … Conference on Recent …, 2018 - ieeexplore.ieee.org
Due to the vigorous constraint of resources in Opportunistic Sensor Network (OSN) and IoT
having sensors and their applications in military and business raises demand to look out …

[PDF][PDF] Development of DNA-based dynamic key-dependent block cipher

AH SAEED - 2015 - core.ac.uk
, Q JHQHUDO VHFXULW\LV FRQFHSWXDOO\³IUHHGRP I computer science perspective,
it is the deterrence of, or safeguard against, unauthorized access to data as well as …

Systematic approach for image partitioning and shuffling

Y Alsultanny - Journal of Discrete Mathematical Sciences and …, 2007 - Taylor & Francis
A new algorithm is developed for image encryption by using the CBC (Code Block Chaining)
mode. The algorithm depends on the secrete key that is generated from the image …

[PDF][PDF] A Stego-analysis techniques by SOD using Statistical Measurements Based on FPGA

ES Abbas, DH Mohammed, TR Saeed… - IRAQI JOURNAL OF …, 2015 - iasj.net
Steganalysis is the technique of analyzing a stego-image to determine whether it has
embedded data or not. More deliberately steganalysis, it can be achieved by coding a …

[引用][C] Applied Science University

Y Alsultanny - Journal of Discrete Mathematical Sciences & …, 2007