Open Access. Powered by Scholars. Published by Universities.®

Engineering Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Engineering

A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd Dec 2017

A Data Hiding Scheme Based On Chaotic Map And Pixel Pairs, Sengul Dogan Sd

Journal of Digital Forensics, Security and Law

Information security is one of the most common areas of study today. In the literature, there are many algorithms developed in the information security. The Least Significant Bit (LSB) method is the most known of these algorithms. LSB method is easy to apply however it is not effective on providing data privacy and robustness. In spite of all its disadvantages, LSB is the most frequently used algorithm in literature due to providing high visual quality. In this study, an effective data hiding scheme alternative to LSB, 2LSBs, 3LSBs and 4LSBs algorithms (known as xLSBs), is proposed. In this method, random …


Chaotic Behavior In High-Gain Interleaved Dc-Dc Converters, Ahmad Alzahrani, Pourya Shamsi, Mehdi Ferdowsi, Cihan H. Dagli Nov 2017

Chaotic Behavior In High-Gain Interleaved Dc-Dc Converters, Ahmad Alzahrani, Pourya Shamsi, Mehdi Ferdowsi, Cihan H. Dagli

Electrical and Computer Engineering Faculty Research & Creative Works

In this paper, chaotic behavior in high gain dc-dc converters with current mode control is explored. The dc-dc converters exhibit some chaotic behavior because they contain switches. Moreover, in power electronics (circuits with more passive elements), the dynamics become rich in nonlinearity and become difficult to capture with linear analytical models. Therefore, studying modeling approaches and analysis methods is required. Most of the high-gain dc-dc boost converters cannot be controlled with only voltage mode control due to the presence of right half plane zero that narrows down the stability region. Therefore, the need of current mode control is necessary to …


New Fractals For Computer Generated Art Created By Iteration Of Polynomial Functions Of A Complex Variable, Charles F. Babbs Sep 2017

New Fractals For Computer Generated Art Created By Iteration Of Polynomial Functions Of A Complex Variable, Charles F. Babbs

Weldon School of Biomedical Engineering Faculty Working Papers

Novel fractal forms can be created by iteration of higher order polynomials of the complex variable, z, with both positive and negative exponents, followed by optional integer power transformation, k zz . Such functions lead to an expanded universe of fascinating fractal patterns that can be incorporated into computer generated art.


Generalized Fractals For Computer Generated Art: Preliminary Results, Charles F. Babbs Sep 2017

Generalized Fractals For Computer Generated Art: Preliminary Results, Charles F. Babbs

Weldon School of Biomedical Engineering Faculty Working Papers

This paper explores new types of fractals created by iteration of the functions xn+1 = f1(xn, yn) and yn+1 = f2(xn, yn) in a general plane, rather than in the complex plane. Iteration of such functions generates orbits with novel fractal patterns. Especially interesting are N-th order polynomials, raised to a positive or negative integer power, p.

Such functions create novel fractal patterns, including budding, spiked, striped, dragon head, and bat-like forms. The present faculty working paper shows how to create a rich variety of complex and fascinating fractals using this generalized approach, which is accessible to students with high …


One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge Jun 2017

One-To-Cloud One-Time Pad Data Encryption: Introducing Virtual Prototyping With Pspice, Paul Tobin, Lee Tobin, Roberto Gandia Blanquer Dr, Michael Mckeever, Jonathan Blackledge

Conference papers

In this paper, we examine the design and application of a one-time pad encryption system for protecting data stored in the Cloud. Personalising security using a one-time pad generator at the client-end protects data from break-ins, side-channel attacks and backdoors in public encryption algorithms. The one-time pad binary sequences were obtained from modified analogue chaos oscillators initiated by noise and encoded client data locally. Specific ``one-to-Cloud'' storage applications returned control back to the end user but without the key distribution problem normally associated with one-time pad encryption. Development of the prototype was aided by ``Virtual Prototyping'' in the latest version …


A Practical Realization Of A Return Map Immune Lorenz Based Chaotic Stream Cipher In Circuitry, Daniel Robert Brown May 2017

A Practical Realization Of A Return Map Immune Lorenz Based Chaotic Stream Cipher In Circuitry, Daniel Robert Brown

Masters Theses

Some chaotic systems are advantageously capable of self-synchronizing with a like system through a single shared state. Using a plain text binary message, a single system parameter can be modulated to mask this message and transmit it securely through the single shared state. The most simple implementations of this encryption technique are, however, vulnerable to the return map attack. Using a time-scaling factor to further obfuscate the modulation process, a return map attack immunity is gained. We report on the progress towards a realization of this process in real-time analog circuitry using off-the-shelf components.


On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge Feb 2017

On The Development Of A One-Time Pad Generator For Personalising Cloud Security, Paul Tobin, Lee Tobin, Michael Mckeever, Jonathan Blackledge

Conference papers

Cloud computing security issues are being reported in newspapers, television, and on the Internet, on a daily basis. Furthermore, in 2013, Edward Snowden alleged backdoors were placed in a number of encryption systems by the National Security Agency causing confidence in public encryption to drop even further. Our solution allows the end-user to add a layer of unbreakable security by encrypting the data locally with a random number generator prior to uploading data to the Cloud. The prototype one-time pad generator is impervious to cryptanalysis because it generates unbreakable random binary sequences from chaos sources initiated from a natural noise. …


Cradg: A Chaotic Radg Security System, Salah Albermany, Maryam Nathim, Zahir Hussain Jan 2017

Cradg: A Chaotic Radg Security System, Salah Albermany, Maryam Nathim, Zahir Hussain

Research outputs 2014 to 2021

A high-performance ciphering algorithm is presented. The proposed method combines old school ciphering (Reaction Automata Direct Graph (RADG)) with chaotic systems to obtain higher level of security. Chaotic sequences are highly sensitive to any changes in their parameters, adding a higher level of security to the proposed approach, called CRADG.