Confidential Algorithm for Golden Cryptography Using Haar Wavelet

One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast an...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:arXiv.org 2015-01
Hauptverfasser: Mohamed, Marghny H, Mahdy, Yousef B, Wafaa Abd El-Wahed Shaban
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page
container_issue
container_start_page
container_title arXiv.org
container_volume
creator Mohamed, Marghny H
Mahdy, Yousef B
Wafaa Abd El-Wahed Shaban
description One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.
format Article
fullrecord <record><control><sourceid>proquest</sourceid><recordid>TN_cdi_proquest_journals_2081591102</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><sourcerecordid>2081591102</sourcerecordid><originalsourceid>FETCH-proquest_journals_20815911023</originalsourceid><addsrcrecordid>eNqNykEKwjAQQNEgCBbtHQKuC8nEal2WovYAiksJmLYpMVMnqdDb24UHcPUX7y9YAkrJrNgBrFgaQi-EgP0B8lwlrKzQN_ZpfLTa8dK1SDZ2L94g8Qu6GXhF0xCxJT10E78F61tea038rj_Gmbhhy0a7YNJf12x7Pl2rOhsI36MJ8dHjSH6mB4hC5kcpBaj_ri-BNzld</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2081591102</pqid></control><display><type>article</type><title>Confidential Algorithm for Golden Cryptography Using Haar Wavelet</title><source>Free E- Journals</source><creator>Mohamed, Marghny H ; Mahdy, Yousef B ; Wafaa Abd El-Wahed Shaban</creator><creatorcontrib>Mohamed, Marghny H ; Mahdy, Yousef B ; Wafaa Abd El-Wahed Shaban</creatorcontrib><description>One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.</description><identifier>EISSN: 2331-8422</identifier><language>eng</language><publisher>Ithaca: Cornell University Library, arXiv.org</publisher><subject>Algorithms ; Cryptography ; Data compression ; Encryption ; Huffman codes ; Scientific papers ; Wavelet analysis</subject><ispartof>arXiv.org, 2015-01</ispartof><rights>2015. This work is published under http://creativecommons.org/licenses/by/3.0/ (the “License”). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.</rights><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><link.rule.ids>776,780</link.rule.ids></links><search><creatorcontrib>Mohamed, Marghny H</creatorcontrib><creatorcontrib>Mahdy, Yousef B</creatorcontrib><creatorcontrib>Wafaa Abd El-Wahed Shaban</creatorcontrib><title>Confidential Algorithm for Golden Cryptography Using Haar Wavelet</title><title>arXiv.org</title><description>One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.</description><subject>Algorithms</subject><subject>Cryptography</subject><subject>Data compression</subject><subject>Encryption</subject><subject>Huffman codes</subject><subject>Scientific papers</subject><subject>Wavelet analysis</subject><issn>2331-8422</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2015</creationdate><recordtype>article</recordtype><sourceid>BENPR</sourceid><recordid>eNqNykEKwjAQQNEgCBbtHQKuC8nEal2WovYAiksJmLYpMVMnqdDb24UHcPUX7y9YAkrJrNgBrFgaQi-EgP0B8lwlrKzQN_ZpfLTa8dK1SDZ2L94g8Qu6GXhF0xCxJT10E78F61tea038rj_Gmbhhy0a7YNJf12x7Pl2rOhsI36MJ8dHjSH6mB4hC5kcpBaj_ri-BNzld</recordid><startdate>20150115</startdate><enddate>20150115</enddate><creator>Mohamed, Marghny H</creator><creator>Mahdy, Yousef B</creator><creator>Wafaa Abd El-Wahed Shaban</creator><general>Cornell University Library, arXiv.org</general><scope>8FE</scope><scope>8FG</scope><scope>ABJCF</scope><scope>ABUWG</scope><scope>AFKRA</scope><scope>AZQEC</scope><scope>BENPR</scope><scope>BGLVJ</scope><scope>CCPQU</scope><scope>DWQXO</scope><scope>HCIFZ</scope><scope>L6V</scope><scope>M7S</scope><scope>PHGZM</scope><scope>PHGZT</scope><scope>PIMPY</scope><scope>PKEHL</scope><scope>PQEST</scope><scope>PQGLB</scope><scope>PQQKQ</scope><scope>PQUKI</scope><scope>PRINS</scope><scope>PTHSS</scope></search><sort><creationdate>20150115</creationdate><title>Confidential Algorithm for Golden Cryptography Using Haar Wavelet</title><author>Mohamed, Marghny H ; Mahdy, Yousef B ; Wafaa Abd El-Wahed Shaban</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-proquest_journals_20815911023</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2015</creationdate><topic>Algorithms</topic><topic>Cryptography</topic><topic>Data compression</topic><topic>Encryption</topic><topic>Huffman codes</topic><topic>Scientific papers</topic><topic>Wavelet analysis</topic><toplevel>online_resources</toplevel><creatorcontrib>Mohamed, Marghny H</creatorcontrib><creatorcontrib>Mahdy, Yousef B</creatorcontrib><creatorcontrib>Wafaa Abd El-Wahed Shaban</creatorcontrib><collection>ProQuest SciTech Collection</collection><collection>ProQuest Technology Collection</collection><collection>Materials Science &amp; Engineering Collection</collection><collection>ProQuest Central (Alumni Edition)</collection><collection>ProQuest Central UK/Ireland</collection><collection>ProQuest Central Essentials</collection><collection>ProQuest Central</collection><collection>Technology Collection</collection><collection>ProQuest One Community College</collection><collection>ProQuest Central Korea</collection><collection>SciTech Premium Collection</collection><collection>ProQuest Engineering Collection</collection><collection>Engineering Database</collection><collection>ProQuest Central (New)</collection><collection>ProQuest One Academic (New)</collection><collection>Publicly Available Content Database</collection><collection>ProQuest One Academic Middle East (New)</collection><collection>ProQuest One Academic Eastern Edition (DO NOT USE)</collection><collection>ProQuest One Applied &amp; Life Sciences</collection><collection>ProQuest One Academic</collection><collection>ProQuest One Academic UKI Edition</collection><collection>ProQuest Central China</collection><collection>Engineering Collection</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Mohamed, Marghny H</au><au>Mahdy, Yousef B</au><au>Wafaa Abd El-Wahed Shaban</au><format>book</format><genre>document</genre><ristype>GEN</ristype><atitle>Confidential Algorithm for Golden Cryptography Using Haar Wavelet</atitle><jtitle>arXiv.org</jtitle><date>2015-01-15</date><risdate>2015</risdate><eissn>2331-8422</eissn><abstract>One of the most important consideration techniques when one want to solve the protecting of digital signal is the golden matrix. The golden matrices can be used for creation of a new kind of cryptography called the golden cryptography. Many research papers have proved that the method is very fast and simple for technical realization and can be used for cryptographic protection of digital signals. In this paper, we introduce a technique of encryption based on combination of haar wavelet and golden matrix. These combinations carry out after compression data by adaptive Huffman code to reduce data size and remove redundant data. This process will provide multisecurity services. In addition Message Authentication Code (MAC) technique can be used to provide authentication and the integrity of this scheme. The proposed scheme is accomplished through five stages, the compression data, key generation, encryption stage, the decryption stage and decompression at communication ends.</abstract><cop>Ithaca</cop><pub>Cornell University Library, arXiv.org</pub><oa>free_for_read</oa></addata></record>
fulltext fulltext
identifier EISSN: 2331-8422
ispartof arXiv.org, 2015-01
issn 2331-8422
language eng
recordid cdi_proquest_journals_2081591102
source Free E- Journals
subjects Algorithms
Cryptography
Data compression
Encryption
Huffman codes
Scientific papers
Wavelet analysis
title Confidential Algorithm for Golden Cryptography Using Haar Wavelet
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-19T23%3A22%3A04IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=document&rft.atitle=Confidential%20Algorithm%20for%20Golden%20Cryptography%20Using%20Haar%20Wavelet&rft.jtitle=arXiv.org&rft.au=Mohamed,%20Marghny%20H&rft.date=2015-01-15&rft.eissn=2331-8422&rft_id=info:doi/&rft_dat=%3Cproquest%3E2081591102%3C/proquest%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2081591102&rft_id=info:pmid/&rfr_iscdi=true