[PDF][PDF] On properties of PN sequences generated by LFSR–a generalized study and simulation modeling

A Ahmad, SS Al-Busaidi… - Indian Journal …, 2013 - sciresol.s3.us-east-2.amazonaws …
This paper presents a study and developed simulation models for testing properties of
pseudo-noise sequences. A generalized approach is considered while presenting the study …

A CUDA-based parallel implementation of K-nearest neighbor algorithm

S Liang, Y Liu, C Wang, L Jian - 2009 International Conference …, 2009 - ieeexplore.ieee.org
Recent developments in Graphics Processing Units (GPUs) have enabled inexpensive high
performance computing for general-purpose applications. Due to GPU's tremendous …

[DOC][DOC] New signal security system for multimedia data transmission using genetic algorithms

A Kumar, N Rajpal, A Tayal - NCC, 2005 - ncc.org.in
We propose a new signal security system for real time Multimedia data transmission
application. This approach uses the concept of Genetic Algorithms along with NLFFSR (Non …

[HTML][HTML] Copyright protection using non linear forward feedback shift register and error correction technique

N Rajpal, A Kumar, S Dudhani… - 7th Ann. Intl. Conf. Map …, 2004 - geospatialworld.net
The steganography consists of techniques to allow the communication between two
persons, hiding not only the contents but also the very existence of the communication in the …

[PDF][PDF] Design of a pseudo-random binary code generator via a developed simulation model

A Ahmad, D Al-Abri - … Journal on Information Technology (ACEEE-Journal), 2012 - Citeseer
Random Binary Code generator (PRBCG). Based on extensive study of LFSR theory we
developed the simulation model of PRBCG. The developed model is faster and simulates …

Development of a strong stream ciphering technique using non-linear fuzzy logic selector

AM Al-Naamany, A Ahmad - … and Wireless Communications: IFIP TC6/WG6 …, 2003 - Springer
This paper introduces a new methodology of producing Pseudo-Random Binary Sequence
(PRBS) of high complexity while with lesser burden of the processing requirements. The key …

[PDF][PDF] Application of T-code, turbo codes and pseudo-random sequence for steganography

A Kumar, N Rajpal - Journal of Computer Science, 2006 - researchgate.net
In this study, we propose new technique that will address the problem of robustness and
data safety in steganography. The steganography consists of techniques to allow the …

Secure data communication using blind source separation

A Kumar, EA Elkhazmi, OO Khalifa… - … on Computer and …, 2008 - ieeexplore.ieee.org
In this paper, we presents a secure (noise-resistant) algorithm for data communication over
the noisy channel, the message is converted to non-linear Hadamard code, which is having …

On determination of LFSR structures to assure more reliable and secure designs of cryptographic systems

A Ahmad, S Arora, A Al Maashri… - Proceedings of 3rd …, 2014 - ieeexplore.ieee.org
This paper presents an algorithmic procedure for determining the cryptographic key
properties and hence matching with the required complexity and strength to assure a more …

Secret Image Share hiding using Steganography

A Kumar, P Dahiya - 2021 9th International Conference on …, 2021 - ieeexplore.ieee.org
An epic methodology of steganography used to conceal the mysterious picture utilizing
sharing dependent on a (k, n)-limit is proposed. First, Wavelet Transform is applied to the …