Confidential Algorithm for Golden Cryptography Using Haar Wavelet
One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast an...
Gespeichert in:
Veröffentlicht in: | arXiv.org 2015-01 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | |
---|---|
container_issue | |
container_start_page | |
container_title | arXiv.org |
container_volume | |
creator | Mohamed, Marghny H Mahdy, Yousef B Wafaa Abd El-Wahed Shaban |
description | One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends. |
format | Article |
fullrecord | <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2081591102</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2081591102</sourcerecordid><originalsourceid>FETCH-proquest_journals_20815911023</originalsourceid><addsrcrecordid>eNqNykEKwjAQQNEgCBbtHQKuC8nEal2WovYAiksJmLYpMVMnqdDb24UHcPUX7y9YAkrJrNgBrFgaQi-EgP0B8lwlrKzQN_ZpfLTa8dK1SDZ2L94g8Qu6GXhF0xCxJT10E78F61tea038rj_Gmbhhy0a7YNJf12x7Pl2rOhsI36MJ8dHjSH6mB4hC5kcpBaj_ri-BNzld</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2081591102</pqid></control><display><type>article</type><title>Confidential Algorithm for Golden Cryptography Using Haar Wavelet</title><source>Free E- Journals</source><creator>Mohamed, Marghny H ; Mahdy, Yousef B ; Wafaa Abd El-Wahed Shaban</creator><creatorcontrib>Mohamed, Marghny H ; Mahdy, Yousef B ; Wafaa Abd El-Wahed Shaban</creatorcontrib><description>One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Algorithms ; Cryptography ; Data compression ; Encryption ; Huffman codes ; Scientific papers ; Wavelet analysis</subject><ispartof>arXiv.org, 2015-01</ispartof><rights>2015. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780</link.rule.ids></links><search><creatorcontrib>Mohamed, Marghny H</creatorcontrib><creatorcontrib>Mahdy, Yousef B</creatorcontrib><creatorcontrib>Wafaa Abd El-Wahed Shaban</creatorcontrib><title>Confidential Algorithm for Golden Cryptography Using Haar Wavelet</title><title>arXiv.org</title><description>One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.</description><subject>Algorithms</subject><subject>Cryptography</subject><subject>Data compression</subject><subject>Encryption</subject><subject>Huffman codes</subject><subject>Scientific papers</subject><subject>Wavelet analysis</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNqNykEKwjAQQNEgCBbtHQKuC8nEal2WovYAiksJmLYpMVMnqdDb24UHcPUX7y9YAkrJrNgBrFgaQi-EgP0B8lwlrKzQN_ZpfLTa8dK1SDZ2L94g8Qu6GXhF0xCxJT10E78F61tea038rj_Gmbhhy0a7YNJf12x7Pl2rOhsI36MJ8dHjSH6mB4hC5kcpBaj_ri-BNzld</recordid><startdate>20150115</startdate><enddate>20150115</enddate><creator>Mohamed, Marghny H</creator><creator>Mahdy, Yousef B</creator><creator>Wafaa Abd El-Wahed Shaban</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20150115</creationdate><title>Confidential Algorithm for Golden Cryptography Using Haar Wavelet</title><author>Mohamed, Marghny H ; Mahdy, Yousef B ; Wafaa Abd El-Wahed Shaban</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20815911023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Cryptography</topic><topic>Data compression</topic><topic>Encryption</topic><topic>Huffman codes</topic><topic>Scientific papers</topic><topic>Wavelet analysis</topic><toplevel>online_resources</toplevel><creatorcontrib>Mohamed, Marghny H</creatorcontrib><creatorcontrib>Mahdy, Yousef B</creatorcontrib><creatorcontrib>Wafaa Abd El-Wahed Shaban</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science & Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied & Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mohamed, Marghny H</au><au>Mahdy, Yousef B</au><au>Wafaa Abd El-Wahed Shaban</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Confidential Algorithm for Golden Cryptography Using Haar Wavelet</atitle><jtitle>arXiv.org</jtitle><date>2015-01-15</date><risdate>2015</risdate><eissn>2331-8422</eissn><abstract>One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | EISSN: 2331-8422 |
ispartof | arXiv.org, 2015-01 |
issn | 2331-8422 |
language | eng |
recordid | cdi_proquest_journals_2081591102 |
source | Free E- Journals |
subjects | Algorithms Cryptography Data compression Encryption Huffman codes Scientific papers Wavelet analysis |
title | Confidential Algorithm for Golden Cryptography Using Haar Wavelet |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-19T23%3A22%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Confidential%20Algorithm%20for%20Golden%20Cryptography%20Using%20Haar%20Wavelet&rft.jtitle=arXiv.org&rft.au=Mohamed,%20Marghny%20H&rft.date=2015-01-15&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2081591102%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2081591102&rft_id=info:pmid/&rfr_iscdi=true |