Open Access. Powered by Scholars. Published by Universities.®

Software Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 2 of 2

Full-Text Articles in Software Engineering

A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy Jan 2009

A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy

Articles

A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.

In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …


A Two-Population Insurgency In Colombia: Quasi-Predator-Prey Models - A Trend Towards Simplicity, John A. Adam, John A. Sokolowski, Catherine M. Banks Jan 2009

A Two-Population Insurgency In Colombia: Quasi-Predator-Prey Models - A Trend Towards Simplicity, John A. Adam, John A. Sokolowski, Catherine M. Banks

Mathematics & Statistics Faculty Publications

A sequence of analytic mathematical models has been developed in the context of the "low-level insurgency" in Colombia, from 1993 to the present. They are based on generalizations of the two-population "predator-prey" model commonly applied in ecological modeling, and interestingly, the less sophisticated models yield more insight into the problem than the more complicated ones, but the formalism is available to adapt the model "upwards" in the event that more data becomes available, or as the situation increases in complexity. Specifically, so-called "forcing terms" were included initially in the coupled differential equations to represent the effects of government policies towards …