Nothing Special   »   [go: up one dir, main page]

You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (2)

Search Parameters:
Keywords = invertible finite automata

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
17 pages, 8177 KiB  
Article
Enhancing Visual Data Security: A Novel FSM-Based Image Encryption and Decryption Methodology
by Gulmira Shakhmetova, Alibek Barlybayev, Zhanat Saukhanova, Altynbek Sharipbay, Sayat Raykul and Altay Khassenov
Appl. Sci. 2024, 14(11), 4341; https://doi.org/10.3390/app14114341 - 21 May 2024
Viewed by 1502
Abstract
The paper presents a comprehensive exploration of a novel image encryption and decryption methodology, leveraging finite state machines (FSM) for the secure transformation of visual data. The study meticulously evaluates the effectiveness of the proposed encryption algorithm using a diverse image dataset. The [...] Read more.
The paper presents a comprehensive exploration of a novel image encryption and decryption methodology, leveraging finite state machines (FSM) for the secure transformation of visual data. The study meticulously evaluates the effectiveness of the proposed encryption algorithm using a diverse image dataset. The encryption algorithm demonstrates high proficiency in obfuscating the original content of images, producing cipher images that resemble noise, thereby substantiating the encryption’s effectiveness. The robustness of the proposed methodology is further evidenced by its performance in the National Institute of Standards and Technology Statistical Test Suite (NIST STS). Such achievements highlight the algorithm’s capability to maintain the stochastic integrity of encrypted data, a critical aspect of data security and confidentiality. Histogram analysis revealed that the encryption process achieves a uniform distribution of pixel values across the encrypted images, masking any identifiable patterns and enhancing the security level. Correlation analysis corroborated the success of the encryption technique, showing a substantial reduction in the correlation among adjacent pixel values, thereby disrupting spatial relationships essential for deterring unauthorized data analysis. This improvement indicates the algorithm’s efficiency in altering pixel patterns to secure image data. Additionally, a comparative analysis of correlation coefficients using various encryption methods on the Lenna image offered insights into the relative effectiveness of different techniques, emphasizing the importance of method selection based on specific security requirements and data characteristics. Full article
(This article belongs to the Section Computing and Artificial Intelligence)
Show Figures

Figure 1

Figure 1
<p>Testing graph.</p>
Full article ">Figure 2
<p>Graph adjacency matrix.</p>
Full article ">Figure 3
<p>The dataset comprises three distinct categories of images: the original images, the encrypted (cipher) images, and the decrypted images.</p>
Full article ">Figure 4
<p>Distribution of adjacent pixels in the original images and corresponding ciphered images: (<b>a</b>) Horizontal plain image and cipher image of Lenna, (<b>b</b>) vertical plain image and cipher image of Lenna, (<b>c</b>) diagonal plain image and cipher image of Lenna, (<b>d</b>) horizontal plain image and cipher image of Mandrill, (<b>e</b>) vertical plain image and cipher image of Mandrill, (<b>f</b>) diagonal plain image and cipher image of Mandrill, (<b>g</b>) horizontal plain image and cipher image of Peppers, (<b>h</b>) vertical plain image and cipher image of Peppers, (<b>i</b>) diagonal plain image and cipher image of Peppers, (<b>j</b>) horizontal plain image and cipher image of Airplane, (<b>k</b>) vertical plain image and cipher image of Airplane, (<b>l</b>) diagonal plain image and cipher image of Airplane.</p>
Full article ">
17 pages, 1059 KiB  
Article
Efficient Algebraic Method for Testing the Invertibility of Finite State Machines
by Zineb Lotfi, Hamid Khalifi and Faissal Ouardi
Computation 2023, 11(7), 125; https://doi.org/10.3390/computation11070125 - 28 Jun 2023
Cited by 2 | Viewed by 1150
Abstract
The emergence of new embedded system technologies, such as IoT, requires the design of new lightweight cryptosystems to meet different hardware restrictions. In this context, the concept of Finite State Machines (FSMs) can offer a robust solution when using cryptosystems based on finite [...] Read more.
The emergence of new embedded system technologies, such as IoT, requires the design of new lightweight cryptosystems to meet different hardware restrictions. In this context, the concept of Finite State Machines (FSMs) can offer a robust solution when using cryptosystems based on finite automata, known as FAPKC (Finite Automaton Public Key Cryptosystems), introduced by Renji Tao. These cryptosystems have been proposed as alternatives to traditional public key cryptosystems, such as RSA. They are based on composing two private keys, which are two FSMs M1 and M2 with the property of invertibility with finite delay to obtain the composed FSM M=M1oM2, which is the public key. The invert process (factorizing) is hard to compute. Unfortunately, these cryptosystems have not really been adopted in real-world applications, and this is mainly due to the lack of profound studies on the FAPKC key space and a random generator program. In this paper, we first introduce an efficient algebraic method based on the notion of a testing table to compute the delay of invertibility of an FSM. Then, we carry out a statistical study on the number of invertible FSMs with finite delay by varying the number of states as well as the number of output symbols. This allows us to estimate the landscape of the space of invertible FSMs, which is considered a first step toward the design of a random generator. Full article
(This article belongs to the Section Computational Engineering)
Show Figures

Graphical abstract

Graphical abstract
Full article ">Figure 1
<p>An illustrative schema of an FAPKC.</p>
Full article ">Figure 2
<p>The Finite State Machine <math display="inline"><semantics><msub><mi mathvariant="script">M</mi><mn>1</mn></msub></semantics></math>.</p>
Full article ">Figure 3
<p>A directed cycle-free graph.</p>
Full article ">Figure 4
<p>The Finite State Machine <math display="inline"><semantics><msub><mi mathvariant="script">M</mi><mn>2</mn></msub></semantics></math>.</p>
Full article ">Figure 5
<p>The Finite State Machine <math display="inline"><semantics><msub><mi mathvariant="script">M</mi><mn>3</mn></msub></semantics></math>.</p>
Full article ">Figure 6
<p>Approximate values for the number of <math display="inline"><semantics><mi>τ</mi></semantics></math>-invertible FSMs when <span class="html-italic">i</span> = 2.</p>
Full article ">Figure 7
<p>Heatmap showing the approximate percentage values of invertible FSMs when <span class="html-italic">i</span> = 2.</p>
Full article ">
Back to TopTop