Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Handbook of Applied Cryptography
Handbook of Applied Cryptography
The Transform and Data Compression Handbook
The Transform and Data Compression Handbook
Theory of Information and Coding
Theory of Information and Coding
Biometric Recognition: Security and Privacy Concerns
IEEE Security and Privacy
Automatic Fingerprint Recognition Systems
Automatic Fingerprint Recognition Systems
Secure smartcardbased fingerprint authentication
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Handbook of Learning and Approximate Dynamic Programming (IEEE Press Series on Computational Intelligence)
Security on FPGAs: State-of-the-art implementations and attacks
ACM Transactions on Embedded Computing Systems (TECS)
Integrated Computer-Aided Engineering - Artificial Neural Networks
Hi-index | 0.00 |
This paper describes a novel ultra-secure, unidirectional communication channel for use in public communication networks, which is based on a) learning algorithms in combination with neural nets for fabrication of a unique pair of modules for encryption and decryption, and b) in combination with decision trees for the decryption process, c) signal transformation from spatial to temporal patterns by means of ambiguous spatial-temporal filters (ST filters), d) absence of public- or private keys, and e) requirement of biometric data of one of the users for both generation of the pair of hardware/software modules and for the decryption by the receiver. To achieve these features we have implemented an encryption-unit (EU) using ST filters for encryption and a decryption unit (DU) using learning algorithms and decision trees for decryption.