Open Access. Powered by Scholars. Published by Universities.®
- Keyword
Articles 1 - 2 of 2
Full-Text Articles in Software Engineering
A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy
A Covert Encryption Method For Applications In Electronic Data Interchange, Jonathan Blackledge, Dmitry Dubovitskiy
Articles
A principal weakness of all encryption systems is that the output data can be ‘seen’ to be encrypted. In other words, encrypted data provides a ‘flag’ on the potential value of the information that has been encrypted. In this paper, we provide a new approach to ‘hiding’ encrypted data in a digital image.
In conventional (symmetric) encryption, the plaintext is usually represented as a binary stream and encrypted using an XOR type operation with a binary cipher. The algorithm used is ideally designed to: (i) generate a maximum entropy cipher so that there is no bias with regard to any …
A Two-Population Insurgency In Colombia: Quasi-Predator-Prey Models - A Trend Towards Simplicity, John A. Adam, John A. Sokolowski, Catherine M. Banks
A Two-Population Insurgency In Colombia: Quasi-Predator-Prey Models - A Trend Towards Simplicity, John A. Adam, John A. Sokolowski, Catherine M. Banks
Mathematics & Statistics Faculty Publications
A sequence of analytic mathematical models has been developed in the context of the "low-level insurgency" in Colombia, from 1993 to the present. They are based on generalizations of the two-population "predator-prey" model commonly applied in ecological modeling, and interestingly, the less sophisticated models yield more insight into the problem than the more complicated ones, but the formalism is available to adapt the model "upwards" in the event that more data becomes available, or as the situation increases in complexity. Specifically, so-called "forcing terms" were included initially in the coupled differential equations to represent the effects of government policies towards …