Submit Search
Upload
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFID based Authentication Protocol
•
0 likes
•
37 views
IRJET Journal
Follow
https://irjet.net/archives/V4/i10/IRJET-V4I10223.pdf
Read less
Read more
Engineering
Report
Share
Report
Share
1 of 7
Download now
Download to read offline
Recommended
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
ijcisjournal
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
Alexander Decker
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
seminar
seminar
Souvik Kolay
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
IJMTST Journal
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
BLE as Active RFID
BLE as Active RFID
reelyActive
Recommended
A novel authenticated cipher for rfid systems
A novel authenticated cipher for rfid systems
ijcisjournal
Enhancement of security in rfid using rsa algorithm
Enhancement of security in rfid using rsa algorithm
Alexander Decker
Малоресурсная криптография - Сергей Мартыненко
Малоресурсная криптография - Сергей Мартыненко
HackIT Ukraine
seminar
seminar
Souvik Kolay
A Novel RFID Readers Employee Management System
A Novel RFID Readers Employee Management System
IJMTST Journal
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET- Revisiting Security Aspects of Internet of Things for Self-Managed...
IRJET Journal
Analysis of symmetric key cryptographic algorithms
Analysis of symmetric key cryptographic algorithms
IRJET Journal
BLE as Active RFID
BLE as Active RFID
reelyActive
581 517-525
581 517-525
idescitation
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal
Study and implementation of DES on FPGA
Study and implementation of DES on FPGA
Venkata Kishore
07.dsn.rfid reliability
07.dsn.rfid reliability
nikhiltiware
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
7. manuscript edit sat
7. manuscript edit sat
IAESIJEECS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
Journal For Research
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
IJECEIAES
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
nitin3940
State of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
Final report
Final report
Jagbir Kalirai
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
Editor IJARCET
Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication Protocol
CSCJournals
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFID
Faisal Razzak
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
IJARIIT
Rfid
Rfid
durrmuhammad
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
IJARIDEA Journal
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
SHASHANK WANKHADE
G05215356
G05215356
IOSR-JEN
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...
IJECEIAES
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
More Related Content
What's hot
581 517-525
581 517-525
idescitation
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
IRJET Journal
Study and implementation of DES on FPGA
Study and implementation of DES on FPGA
Venkata Kishore
07.dsn.rfid reliability
07.dsn.rfid reliability
nikhiltiware
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET Journal
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET Journal
7. manuscript edit sat
7. manuscript edit sat
IAESIJEECS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
Journal For Research
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
IJECEIAES
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
nitin3940
State of the art realistic cryptographic
State of the art realistic cryptographic
ijcsa
Final report
Final report
Jagbir Kalirai
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
Editor IJARCET
Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication Protocol
CSCJournals
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFID
Faisal Razzak
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
IJARIIT
Rfid
Rfid
durrmuhammad
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
IJARIDEA Journal
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
SHASHANK WANKHADE
G05215356
G05215356
IOSR-JEN
What's hot
(20)
581 517-525
581 517-525
A Review on QR Code for Hiding Private Information
A Review on QR Code for Hiding Private Information
Study and implementation of DES on FPGA
Study and implementation of DES on FPGA
07.dsn.rfid reliability
07.dsn.rfid reliability
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET- Hardware and Software Co-Design of AES Algorithm on the basis of NIOS ...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
IRJET - Implementation of DNA Cryptography in Cloud Computing and using S...
7. manuscript edit sat
7. manuscript edit sat
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
ANALYSIS OF SIDE CHANNEL ATTACKS ON VARIOUS CRYPTOGRAPHIC ALGORITHMS
Efficient End-to-End Secure Key Management Protocol for Internet of Things
Efficient End-to-End Secure Key Management Protocol for Internet of Things
High throughput implementations of cryptography algorithms on GPU and FPGA
High throughput implementations of cryptography algorithms on GPU and FPGA
State of the art realistic cryptographic
State of the art realistic cryptographic
Final report
Final report
Ijarcet vol-2-issue-3-867-869
Ijarcet vol-2-issue-3-867-869
Novel construction of Secure RFID Authentication Protocol
Novel construction of Secure RFID Authentication Protocol
RFID Protocols and Privacy Models for RFID
RFID Protocols and Privacy Models for RFID
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Dual-Layer Video Encryption and Decryption using RSA Algorithm
Rfid
Rfid
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
A Survey on IPv6 Secure Link Local Communication Models, Techniques and Tools
Security for automation in Internet of Things by using one time password
Security for automation in Internet of Things by using one time password
G05215356
G05215356
Similar to Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFID based Authentication Protocol
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...
IJECEIAES
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET Journal
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET Journal
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET Journal
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET Journal
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET Journal
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
IRJET Journal
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
IRJET Journal
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
IRJET Journal
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
Luz Martinez
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
IJCNCJournal
Ii2514901494
Ii2514901494
IJERA Editor
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
inventionjournals
A sector analysis for rfid human implantation
A sector analysis for rfid human implantation
Alexander Decker
A sector analysis for rfid human implantation
A sector analysis for rfid human implantation
Alexander Decker
A Security Framework in RFID
A Security Framework in RFID
ijtsrd
Grouping based radio frequency identification anti-collision protocols for d...
Grouping based radio frequency identification anti-collision protocols for d...
IJECEIAES
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
YogeshIJTSRD
RFID Technology An Overview
RFID Technology An Overview
ijtsrd
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET Journal
Similar to Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFID based Authentication Protocol
(20)
Secured authentication of radio-frequency identification system using PRESENT...
Secured authentication of radio-frequency identification system using PRESENT...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
Demonetization in Indian Currency – Illegal Money - IoT: Effective Identifica...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET- Security Analysis and Improvements to IoT Communication Protocols ...
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET - Lightweight ECC based RFID Authentication Protocol
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonati...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- Automated Face Detection and Recognition for Detecting Impersonation o...
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
IRJET- RFID Based Security Guard System using GSM
A Survey on Key Technologies and Applications of IoT
A Survey on Key Technologies and Applications of IoT
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
A Survey Of RFID Authentication Protocols Based On Hash-Chain Method
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
AVAILABILITY ASPECTS THROUGH OPTIMIZATION TECHNIQUES BASED OUTLIER DETECTION ...
Ii2514901494
Ii2514901494
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
Radio Frequency Identification (RFID) Based Employee Management System (EMS)
A sector analysis for rfid human implantation
A sector analysis for rfid human implantation
A sector analysis for rfid human implantation
A sector analysis for rfid human implantation
A Security Framework in RFID
A Security Framework in RFID
Grouping based radio frequency identification anti-collision protocols for d...
Grouping based radio frequency identification anti-collision protocols for d...
Data Security by AES Advanced Encryption Standard
Data Security by AES Advanced Encryption Standard
RFID Technology An Overview
RFID Technology An Overview
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
IRJET - RFID based Automatic Entry Restricted Mechanism for Home Security
More from IRJET Journal
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
IRJET Journal
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
IRJET Journal
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
IRJET Journal
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
IRJET Journal
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
IRJET Journal
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
IRJET Journal
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
IRJET Journal
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
IRJET Journal
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
IRJET Journal
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
IRJET Journal
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
IRJET Journal
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
IRJET Journal
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
IRJET Journal
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
IRJET Journal
React based fullstack edtech web application
React based fullstack edtech web application
IRJET Journal
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
IRJET Journal
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
IRJET Journal
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
IRJET Journal
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
IRJET Journal
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
IRJET Journal
More from IRJET Journal
(20)
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
React based fullstack edtech web application
React based fullstack edtech web application
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Recently uploaded
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Omar Fathy
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
sumitt6_25730773
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
meghakumariji156
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
ChandrakantDivate1
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
vanyagupta248
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
bhaskargani46
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
VinayVitekari
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
MayuraD1
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
jabtakhaidam7
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
Amil baba
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
JiananWang21
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
DineshKumar4165
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
DineshKumar4165
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Arindam Chakraborty, Ph.D., P.E. (CA, TX)
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Kandungan 087776558899
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
KOUSTAV SARKAR
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Call Girls Mumbai
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
vershagrag
Recently uploaded
(20)
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
Introduction to Data Visualization,Matplotlib.pdf
Introduction to Data Visualization,Matplotlib.pdf
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Tamil Call Girls Bhayandar WhatsApp +91-9930687706, Best Service
Computer Networks Basics of Network Devices
Computer Networks Basics of Network Devices
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
FEA Based Level 3 Assessment of Deformed Tanks with Fluid Induced Loads
AIRCANVAS[1].pdf mini project for btech students
AIRCANVAS[1].pdf mini project for btech students
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
Moment Distribution Method For Btech Civil
Moment Distribution Method For Btech Civil
DeepFakes presentation : brief idea of DeepFakes
DeepFakes presentation : brief idea of DeepFakes
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
Jaipur ❤CALL GIRL 0000000000❤CALL GIRLS IN Jaipur ESCORT SERVICE❤CALL GIRL IN...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
NO1 Top No1 Amil Baba In Azad Kashmir, Kashmir Black Magic Specialist Expert ...
data_management_and _data_science_cheat_sheet.pdf
data_management_and _data_science_cheat_sheet.pdf
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
Thermal Engineering Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
Cara Menggugurkan Sperma Yang Masuk Rahim Biyar Tidak Hamil
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
💚Trustworthy Call Girls Pune Call Girls Service Just Call 🍑👄6378878445 🍑👄 Top...
Evolving Fast Fourier Transform and Deoxyribonucleic Acid for Security of RFID based Authentication Protocol
1.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1237 Evolving Fast Fourier Transform and Deoxyribonucleic Acid for security of RFID based authentication protocol Vibhu1, Harpreet K. Bajaj2 1M.Tech Scholar CSE Deptt. DAVIET Jalandhar, Punjab, India[1] 2Associate Professor CSE Deptt. DAVIET, Punjab Technical University, India[2] ----------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - RFID based applications used tagging and tracking of objects for tag and reader in IoT. RFID enables identification from distance, unlike earlier barcode technology. RFID system is vulnerable to various security threats and attacks. The aim of our paper is to make a hybrid technique by combining Fast Fourier Transform (FFT) and Deoxyribonucleic acid (DNA) sequence operations.Our proposed technique is different from existing technique in the sense that we are combining two encryption method techniques instead of concentrate on single technique. Our proposed hybrid technique is highly secure and it leads to performance gains when it compare to the existing technique experimentally. Key Words: RFID, Authentication protocol, Internet of things, FFT, DNA 1. INTRODUCTION In a wireless network, during communication between two entities security is a major issue. While communicating, there is a secure connection between two entities when no third party interrupts communication and not even secretly listen the conversation. To protect this conversation between sender and receiver from being accessed by unauthorized users, cryptography method can be used. In cryptography, process of encryption occurs while scrambling of plain text into cipher text and then back again is decryption. The proposed hybrid FFT-DNA scheme is applied on RFID authentication protocol. Radio Frequency Identification (RFID) is a wireless technology for the purposes of automatic identification of electronic tagsphysically attached to objects using an RFID reader [1]. Recently, RFID systems are widely employed in supply chain management, pharmacy management, library collection management, electronic payment systems, automatic toll collection, proximitycards, hospital patient care, containersearch within seaports and many more applications [2]. In general, RFID system composed of three main parts: tags, reader and backend server. A tag is a device which is physically attached to an object. Every tag has its own unique identification. Tags can be passive or active according to the power source [3]. Active tag has its inbuilt power supply, so it gets power from itself. While, reader produced electromagnetic field through which passive tag gets charged. A reader is a device that can recognize the presence of RFID tags and read the information supplied by them. A server is a trusted entity. When the system is set up, all the information related to RFID tags identification is stored in server’s database, through which mutual authentication is done. Using the stored identification information, the server could determine the validity of the tag. Usually, servers have high capability of computing as well as high memory capacity. Recently, internet of things (IoT) is becoming as one of the most dominant communication model in the modern world. The basic idea of this concept is pervasive presence around us of a variety of things or objects such as Radio Frequency Identification (RFID) tags, sensors, actuators, and mobile phones etc. which, through unique addressing schemes, are able to interact with each other and cooperate with their neighbours to reach common goals [4]. There are some application of IoT include: connected cars, smart city, home automation, wearable, smart grid, smart retail, industrial internet andtelehealth. In general, the DNA sequence are used to represent or encode the original data and the properties and DNA nucleotides are used a security enhancing feature which also helps to perform encryption and decryption of DNA sequence representing data. On the other hand, Fast Fourier Transform (FFT) is a compression and encryption tool and applies to quite a few areas such as optical encryption and audio coding. To solve the problem of the low-level security and the great amount of data transmitted, FFT andDNA arecombined. The benefits of the proposed scheme are as follows: (1) The experiment suggest FFT and DNA method can resist man-in-the-middle attack, replay attack and impersonation attack. (2) Compared to ECC it can provide more security because of two-level security. (3) Receiver receives secure data with fast transmission speed. The rest of the paper is organized as follows. Section 2 gives the related work. Section 3 discussed Existing ECC technique. Section 4 proposes FFT and DNA based authentication protocol. Experiments are discussed in
2.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1238 Section 5 followed by the results. Finally, this paper is concluded in Section 6. 2. RELATED WORK Recently, RFID technology deployed in various applications especially as an identity management system, such as supply chain management, e-passports, and credit cards [2]. Currently, series of full-fledge RFID authentication protocol have been proposed. In 2012, Benssalah et al. [5] proposed an efficient challenge- response protocol based on elliptic curve EIGamal encryption schemes. They minimize the computation amount on the tag side by pseudo random number generation (PRNG), an elliptic curve point addition, and two scalar multiplications. They mentioned that their protocol resist from the following security attacks: passive attacks, man-in-the-middle attacks, replay attacks. Farash in 2014 [6], analyse Chou protocol and found that it suffers from lack of tag privacy, lack of forward privacy, lack of mutual authentication weaknesses. Also, it is defenceless to impersonation attacks, tag cloning attacks, and location tracking attacks. Then he proposes a more secure and efficient scheme to cover all the security flaws and weaknesses of Chous protocol. Hannes et al. [7] presents an IPSec conform mutual authentication protocol with added attribute of privacy awareness for IoT infrastructure based on the Diffie- Hellman Integrated Encryption (DHIES) scheme [8]. It has been shown that the tag does not reveal the sensitive information unless it has assured that communication is initiated by the genuine backend reader which achieves privacy preservation concern of RFID carriers. Zhang Leihong et al. [9] proposed FFT and CGI technique to solve the problem that large images can hardly be retrieved for stringent hardware restrictions and security level is low. This technique can be immediately applied to encryption and data storage with the advantages of high security, fast transmission and high quality of reconstructed information. In 2016, Xiuli Chai et al. [10] proposedan image encryptionalgorithm based on chaotic system and deoxyribonucleic acid (DNA) sequence operations. The plain image is encoded into a DNA matrix, and then a new wave-based permutation scheme is performed on it. Experimental results confirm that the proposed algorithm has not only an excellent encryption result but also resists various typical attacks. 3. EXISTING ECC TECHNIQUE Various authentication protocols have been proposed to achieve certain security and privacy goals. Based on the RFID system resources, RFID authentication protocols can be classified into full-fledge class, simple, lightweight, ultra-lightweight authentication protocols. In the full- fledge class, the protocol requests the support of conventional cryptographic functions such as public key cryptography (PKC) or one-way cryptographic function. In fact, PKC assures highest level of security and privacy protection, but it is not fully supported by RFID system because of its high capacity requirement in term of key size and computational cost. One of the most attractive PKC solution is elliptic curve cryptography (ECC) as it provides the same level of security with smaller key sizes, faster computations, lower power consumptions as well as memory and bandwidth savings in contrast to the other PKC such as RSA. An elliptic curve is defined as a set of points (x,y) that satisfy an elliptic curve equation: , where x, y, a and b are within a field. For cryptographic purpose those over the finite field of Fp and F2m are most suitable. The strength ofexisting protocol is based on two elliptic curve computational problem which are: elliptic curve discrete logarithm problem (ECDLP) and elliptic curve factorization problem (ECFP). ECDLP is to find k ∈ [1, n −1] such that Q = k.Pwhere Q and P are two points over E. And the ECFP is to find the points s.Pandt.P fromQ = s.P+ t.PwhereP, Q ∈E and s, t ∈ [1, n-1]. 3.1 Algorithm: Input :Sensor nodes, data (d) Output :Secure data STEP 1.Convert the communicating data into ASCII value STEP 2.Apply ECC on data to generate random number STEP 3.Deploy ECDH method for allowing public-private key pair for authentication STEP 4.New changeable key encrypt the communication and decode data to ASCII value STEP 5.Convert ASCII value to the secure data STEP 6.End 3.2 Flow Chart: The below flow chart elucidates, plain text is converted into its assigned ASCII value. ASCII value is generated to show the numeric value on elliptic curve, message is encrypted using private key and public key. Apply Elliptic Curve Diffie-Hellman (ECDH) method to calculate points on elliptic curve then these encrypted points are send to other site receiver. Now original message is retrieved by applying decryption process. In decryption, firstly decrypt points to original points using ECDH then it is converted to ASCII value and convert it into original text.
3.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1239 4. THE PROPOSED TECHNIQUE FFT AND DNA This paper proposes a new FFT and DNA based mutual authentication protocol that fulfils the RFID security requirements. Also, it uses DNA encoding decoding rules and Fast Fourier Transform with Inverse of Fast Fourier Transform to encrypt communication. The proposed protocol achieves most of the RFID security requirements and resists various attacks. In the scheme data is encrypted twice with the aid of FFT and DNA. The process of FFT-DNA is illustrated in Fig. 2; the process is divided into two steps: User will generate data to send which could be any random number, then each node performs two-dimensional FFT, and finally, DNA encoding rule applied on transformed signal to encrypt the data. In the process of decoding, two-dimensional inverse FFT is utilized to each node and finally DNA decoding rule decrypts the data. 4.1 Fast Fourier Transform FFT is a complicated algorithm made up of N complex points in the time and frequency domains each have one signal. These complex points are composed of two numbers, i.e. real part and the imaginary part. For example, complex sample X[42], it refers to the combination of ReX[42] and ImX[42]. In other words, each complex variable holds two numbers. When two complex variables are multiplied, the four individual components must be combined to form the two components of the product. [22] 4.2 DNA sequence operation 4.2.1 DNA encoding and decoding rules A DNA sequence consists of four nucleic acid bases: A (adenine), C (cytosine), G (guanine) and T (thymine), where A and T are complementary, so are G and C. Because 0 and 1 are complementary in the binary system, 00 and 11 are complementary such as 01 and 10. There are 24 types of encoding rules using the four bases A, C, G and T to encode 00, 01, 10 and 11. But there are only 8 of them which can be seen in Table 1 satisfying the Watson- Crick complementary rule [10]. Note that DNA decoding rule is the reverse operation of DNA encoding rule. In this paper, we use the DNA encoding rule to encode the data. For example, the data value “111” (the corresponding binary number is “01101111”) can be encoded to DNA sequence “CGTT” using DNA encoding rule 1. Inversely, if the DNA sequence is known (for example “TCTA”), the binary number can be obtained by the rule 8 (the decoding rule is 8), which give “00100011” or “35” in decimal number. This is the decoding process of the DNA sequence [25]. Start Original data Convert into ASCII Value Generate ECC Generate Random no. Apply ECDH Evaluate public and private key Decode to ASCII value Convert ASCII value into data Secure data Stop
4.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1240 Table 1.DNA encoding rules Rule 1 2 3 4 5 6 7 8 A 00 00 01 01 10 10 11 11 T 11 11 10 10 01 01 00 00 C 01 10 00 11 00 11 01 10 G 10 01 11 00 11 00 10 01 4.3 Algorithm: Input :Sensor nodes, data (d) Output :Secure data STEP 1.Generate the data to send STEP 2.Apply FFT and DNA on transformed data to convert it into encrypted form STEP 3.Encrypted data to be communicated over the network STEP 4.Apply IFFT and DNA decoding rule on encrypted data STEP 5.Encrypted data then converted into decrypted form STEP 6.Results obtained in DNA sequence STEP 7.End 4.4 Flow Chart: This flow chart elucidates the encryption and decryption process of RFID authentication protocol over a wireless network. Firstly, the RFID protocol will initialize then the user will request to IOT server which generate the data. The generated data will be in binary form. To make this communication secure, will apply fast fourier transform (FFT) on the transformed signal so that no hacker or cracker can crack the data. Then further apply DNA i.e. deoxyribonucleic acid on transformed signal to encode the FFT encrypted data. By applying, DNA our data will be more secured and completely in encrypted form. After encryption, the process of decryption will start. Decryption will be done when the user receive an encrypted data. Inverse Fast Fourier Transform should be applied on the on encrypted data to decrypt it. Then further apply the DNA decoding rule to get the final result. Then end-user will receive the data and secure communication will be completed. Final result will be obtain in DNA sequence which will be in form of its four nucleotides i.e. A (adenine), C (cytosine), G (guanine), T (thymine). These are four acid bases of DNA which will provide the result and no hacker or cracker crack the encoding/decoding rules behind this. So in simple terms, this proposed protocol will be more secure and efficient than the existing one. 5. EXPERIMENTAL RESULTS In this paper, FFT algorithm and DNA encoding rules are considered to obtain secure communication of RFID mutual authentication protocol. The simulation is conducted with the software of MATLAB. The software of MATLAB was used to simulate the development of RFID authentication protocol. The proposed hybrid protocol compared with ECC based RFID authentication protocol on the basis of different parameters: Storage, Overhead, Execution Time, Entropy and Bit Error Rate. These parameters shows that proposed protocol have better results as compared to ECC. Table 2 show that ensemble of FFT-DNA techniques delivers significant performance gains for almost all measures. However the performance of different parameters of both techniques may vary at different number of nodes. Start Initialize RFID based IoT User generate data to send Apply FFT and DNA encoding rules Communicate encrypted data User receive the encrypted Stop Apply IFFT & DNA decoding Results Obtained in DNA sequence Converted into ASCII value and Cipher Text Decrypted ASCII and Cipher text Converted in decrypted data
5.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1241 We can take n number of nodes; here we have considered different nodes starting from Node 10 to Node 30. Then take the values of different parameters at different number of nodes. These values are shown in Table 2. From Table 2, we can see that as the number of nodes increases simultaneously, value of the parameters also increase it increase. Lower values derived as a result are better. These results have brought us to the conclusion that the overall performance of our protocol is better as compared to the existing derived results. Table 2.Comparison proposed ensemble method (FFT-DNA) with ECC 5.1 Results In this section, we discuss the results obtained using FFT- DNA technique for communicating data. These results are summarised as follows: Storage: Storage refers to the process of placing newly acquired information into memory. ECC and FFT-DNA based values utilize the storage in memory. The lower is better. Fig 3 shows comparison from node 10 to node 30. The storage values are in kilobytes. Chart – 1: Storage comparison of existing ECC and proposed technique FFT-DNA Execution Time: Time taken to complete the task, it can be increase or more depending upon encryption algorithm. Fig 5 shows comparison from node 5 to node 21 for execution time. The time is calculated in seconds. Chart – 2: Execution Time comparison of existing ECC and proposed technique FFT-DNA Entropy - In computing entropy is randomness collected by an operating system for use in cryptography or other uses that require random data. A lack of entropy can have negative impact on performance and security. Entropy is measured in Hart (Hartley). 0 10 20 30 40 50 60 70 10 15 20 25 30 Values Number of Nodes ECC FFT-DNA 0 5 10 15 20 25 30 35 10 15 20 25 30 Values Number of Nodes ECC FFT-DNA Parameters Number of Nodes 10 15 20 25 30 ECC FFT- DNA ECC FFT- DNA ECC FFT- DNA ECC FFT- DNA ECC FFT- DNA Storage 45.23 41.22 49.52 43.56 51.46 46.78 55.63 50.28 59.30 53.70 Execution Time 11.29 10.01 13.73 9.61 12.47 11.22 14.24 12.44 15.57 14.17 Entropy 1.73 1.25 1.84 1.41 1.76 1.31 1.81 1.09 1.60 1.44
6.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1242 Chart – 3: Entropy comparison of existing ECC and proposed technique FFT-DNA 6. CONCLUSION In this paper, the feasibility and security of FFT-DNA method were verified. According to experiment it can be concluded that, our proposed FFT-DNA based authentication protocol eliminate the current RFID vulnerabilities raised be insecure channel between tag and reader. A random number generated during the process and its ASCII code is converted into cipher text i.e. encrypted message. Further, it converted into decrypted ASCII message and at last user receives encrypted message. Our experimental results have better and efficient solutions as compared to the existing technique. And with this, new results derived are far better than the earlier technique. These two techniques are compared with each other by considering the three parameters including storage, execution time and entropy. All these features show that our technique has a high security level and is very suitable for encryption. References [1] Roy want. “An introduction to RFID technology.” IEEE pervasivecomputing 5.1 (2006): 25-33. [2] Stephen B. Miles, et al. “RFID technology and applications.” Vol.1 Cambridge: Cambridge University Press, (2008). [3] Amjad Ali Alamr. “A secure ECC based RFID mutual authentication protocol for Internet of Things.” Springer New York, (2016). [4] Luigi Atzori, et al. “The Internet Of Things: A Survey” Computer Networks (2010). [5] Mustapha Benssalah, et al. “RFID authentication protocols based on ECC encryption schemes.” IEEE international conference on RFID-technologies and applications, RFID-TA 2012, Nice, France, November 5-7 (2012), pages 97-100. [6] Fararsh Mohammad Sabzinejad, et al. “Cryptanalysis and improvement of a robust smart card secured authentication scheme on SIP using elliptic curve cryptography.” Multimed Tools Appl 75(8) (2016): 4485- 4504. [7] GrossH, Slamanig D, et al. “Privacy-aware authentication in the internet of things.” Cryptology ePrint Archive, Report (2015)/1110. [8] Michel Abdalla, et al. “The oracle diffie-hellman assumptions and an analysis of dhies.” In: Naccache D (ed) CT-RSA, volume 2020 of lecture notes in computer science. Springer, Berlin, (2001), pp 143-158. [9] Zhang Leihong, et al. “High-performance compression and double cryptography based on compressive ghost imaging with the fast fourier transform.” Optics and Lasers in Engineering 86 (2016) 329-337. [10] Xiuli Chai, et al. “A novel chaos-based image encryption algorithm using DNA sequence operations.” Optics and Lasers in engineering 88 (2017) 197-213. [11] Hoda Jannati, et al. “Cryptanalysis and enhancement of a secure group ownership transfer protocol for RFID tags.” Global Security, Safety and Sustainability & e- Democracy. Springer Berlin Heidelberg, (2012): 186-193. [12] Zahra Ahmadian, et al. “Desynchronization attack on RAPP ultralightweight authentication protocol.” Information processing letters 113.7 (2013): 205-209. [13] Chiu C. Tan, et al. “Secure and serverless RFID authentication and search protocols.” IEEE Transactions on Wireless Communications 7.4 (2008): 1400-1407. [14] Yanjun Zuo. “Secure and private search protocols for RFID systems.” Information Systems Frontiers 12.5 (2010): 507-519. [15] Yong Ki Lee, et al. “Low-cost untraceable authentication protocols for RFID.” Proceedings of the third ACM conference on Wireless network security. ACM, (2010). [16] Md.Endadul Hoque, et al. “Enhancing privacy and security of RFID system with serverless authentication 0 0.2 0.4 0.6 0.8 1 1.2 1.4 1.6 1.8 2 10 15 20 25 30 Values Number of nodes ECC FFT-DNA
7.
International Research Journal
of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 10 | Oct -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 6.171 | ISO 9001:2008 Certified Journal | Page 1243 and search protocols in pervasive environments.” Wireless personal communications 55.1 (2010): 65-79. [17] Mari Carmen Damingo. “An overview of Internet of Things people with disabilities.” Journal of Network and Computer Applications 35 (2012) 584-596. [18] LaiphrakpamDolendro Singh, et al. “Implementation of text encryption using Elliptic curve cryptography.” Procedia Computer Science 54 (2015) 73–82. [19] Debiao He, et al. “An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography.” IEEE Internet of Things Journal, Vol.2, No.1, (2015). [20]Jue-Sam Chou.“An efficient mutual authentication RFID scheme based on elliptic curve cryptography.”JSupercomput (2014) 70:75-94. [21] MasoumehSafkhani, et al. “On the security of Tan et al. serverless RFID authentication and search protocols.” International Workshop on Radio Frequency Identification: Security and Privacy Issues. Springer Berlin Heidelberg, (2012). [22] Wang Yujing, et al. “An image encryption scheme using mixed high dimensional chaotic system combined with fast fourier transform.” IEEE 12th International conference on electronic and measurement & instruments (2015). [23] HangRok Lee, et al. “The tag authentication scheme using self-shrinking generator on RFID system.” Transactions on Engineering, Computing, and Technology 18 (2006): 52-57. [24] Qiang Zhang, et al. “Image encryption using DNA addition combining with chaotic maps.” Mathematical and Computer modelling 52 (2010) 2028 – 2035. [25] Qiang Zhang, et al. “A novel image fusion encryption algorithm based on DNA sequence operation and hyper- chaotic system.” Optik 124 (2013) 3596 – 3600.
Download now