Current Search: Socek, Daniel (x)
View All Items
- Title
- Enhanced 1-D chaotic key-based algorithm for image encryption.
- Creator
- Furht, Borko, Socek, Daniel, Magliveras, Spyros S.
- Abstract/Description
-
A recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext attacks and ciphertext-only attacks. In this paper we enhance the CKBA algorithm three-fold: 1) we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, 2) we increase the key size to 128 bits, and 3) we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen...
Show moreA recently proposed Chaotic-Key Based Algorithm (CKBA) has been shown to be unavoidably susceptible to chosen/known-plaintext attacks and ciphertext-only attacks. In this paper we enhance the CKBA algorithm three-fold: 1) we change the 1-D chaotic Logistic map to a piecewise linear chaotic map (PWLCM) to improve the balance property, 2) we increase the key size to 128 bits, and 3) we add two more cryptographic primitives and extend the scheme to operate on multiple rounds so that the chosen/knownplaintext attacks are no longer possible. The new cipher has much stronger security and its performance characteristics remain very good.
Show less - Date Issued
- 2004-11-22
- PURL
- http://purl.flvc.org/fcla/dt/358402
- Subject Headings
- Data encryption (Computer science), Computer algorithm, Mulitmedia systems --Security measures.
- Format
- Document (PDF)
- Title
- Deterministic and non-deterministic basis reduction techniques for NTRU lattices.
- Creator
- Socek, Daniel, Florida Atlantic University, Magliveras, Spyros S.
- Abstract/Description
-
Finding the shortest or a "short enough" vector in an integral lattice of substantial dimension is a difficult problem. The problem is not known to be but most people believe it is [7]. The security of the newly proposed NTRU cryptosystem depends solely on this fact. However, by the definition NTRU lattices possess a certain symmetry. This suggests that there may be a way of taking advantage of this symmetry to enable a new cryptanalytical approach in combination with existing good lattice...
Show moreFinding the shortest or a "short enough" vector in an integral lattice of substantial dimension is a difficult problem. The problem is not known to be but most people believe it is [7]. The security of the newly proposed NTRU cryptosystem depends solely on this fact. However, by the definition NTRU lattices possess a certain symmetry. This suggests that there may be a way of taking advantage of this symmetry to enable a new cryptanalytical approach in combination with existing good lattice reduction algorithms. The aim of this work is to exploit the symmetry inherent in NTRU lattices to design a non-deterministic algorithm for improving basis reduction techniques for NTRU lattices. We show how the non-trivial cyclic automorphism of an NTRU lattice enables further reduction. Our approach combines the recently published versions of the famous LLL algorithm for lattice basis reduction with our automorphism utilization techniques.
Show less - Date Issued
- 2002
- PURL
- http://purl.flvc.org/fcla/dt/12933
- Subject Headings
- Cryptography, Lattice theory, Algorithms
- Format
- Document (PDF)
- Title
- A hybrid color‐based foreground object detection method for automated marine surveillance.
- Creator
- Furht, Borko, Kalva, Hari, Marques, Oge, Culibrk, Dubravko, Socek, Daniel
- Date Issued
- 2005
- PURL
- http://purl.flvc.org/fcla/dt/358420
- Subject Headings
- Computer vision., Automatic tracking., Digital video., Image processing., Optical pattern recognition.
- Format
- Document (PDF)
- Title
- New approaches to encryption and steganography for digital videos.
- Creator
- Furht, Borko, Socek, Daniel, Kalva, Hari, Magliveras, Spyros S., Marques, Oge, Culibrk, Dubravko
- Date Issued
- 2007
- PURL
- http://purl.flvc.org/fcla/dt/337435
- Subject Headings
- Multimedia systems --Security measures., Digital video., Digital watermarking., Data encryption (Computer science) --Technological innovations., Cryptography.
- Format
- Document (PDF)
- Title
- Permutation-based transformations for digital multimedia encryption and steganography.
- Creator
- Socek, Daniel, Florida Atlantic University, Furht, Borko, Magliveras, Spyros S., College of Engineering and Computer Science, Department of Computer and Electrical Engineering and Computer Science
- Abstract/Description
-
The aim of this work is to explore the utilization of permutation-based transformations to achieve compression, encryption and steganography in the domain of digital videos. The main contribution of this dissertation is a novel type of digital video encryption that has several advantages over other currently available digital video encryption methods. An extended classification of digital video encryption algorithms is presented in order to clarify these advantages. The classification itself...
Show moreThe aim of this work is to explore the utilization of permutation-based transformations to achieve compression, encryption and steganography in the domain of digital videos. The main contribution of this dissertation is a novel type of digital video encryption that has several advantages over other currently available digital video encryption methods. An extended classification of digital video encryption algorithms is presented in order to clarify these advantages. The classification itself represents an original work, since to date, no such comprehensive classification is provided in known scientific literature. Both security and performance aspects of the proposed method are thoroughly analyzed to provide evidence for high security and performance efficiency. Since the basic model is feasible only for a certain class of video sequences and video codecs, several extensions providing broader applicability are described along with the basic algorithm. An additional significant contribution is the proposition of a novel type of digital video steganography based on disguising a given video by another video. Experimental results are generated for a number of video sequences to demonstrate the performance of proposed methods.
Show less - Date Issued
- 2006
- PURL
- http://purl.flvc.org/fcla/dt/12225
- Subject Headings
- Image processing--Security measures, Data encryption (Computer science), Computer security, Multimedia systems--Security measures
- Format
- Document (PDF)