Auto–transition in RADG based on chaotic system
The RADG (Reaction Automata Direct Graph) cryptosystem is the automata direct graph and reaction states combination. The classical RADG does not require key exchange (keyless), or agreement between users just the design of RADG, which is static. The RADG algorithm with keys has two agreements betwee...
| Main Authors: | Kadhum, Laith M., Zainal Abidin, Ahmad Firdaus, Zolkipli, Mohamad Fadli, Hisham, Syifak Izhar, Bayuaji, L., Ab Razak, Mohd Faizal |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
College of Education, Al-Iraqia University
2023
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/37317/ http://umpir.ump.edu.my/id/eprint/37317/1/Auto%E2%80%93Transition%20in%20RADG%20based%20on%20chaotic%20System.pdf |
Similar Items
New formula to calculate the number of designs in RADG cryptosystem
by: Kadhum, Laith M., et al.
Published: (2021)
by: Kadhum, Laith M., et al.
Published: (2021)
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018)
by: A. Ahmed, Hussam, et al.
Published: (2018)
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
by: Mohamad Nazmi, Nasir, et al.
Published: (2020)
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
by: Hussam Alddin S., Ahmed, et al.
Published: (2017)
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)
by: Yau, Ti Dun, et al.
Published: (2022)
Features, Analysis Techniques, and Detection Methods of Cryptojacking Malware: A Survey
by: Kadhum, Laith M., et al.
Published: (2024)
by: Kadhum, Laith M., et al.
Published: (2024)
Hybrid numeric-analytic method for solving chaotic system
by: Razali, NurIsnida, et al.
Published: (2013)
by: Razali, NurIsnida, et al.
Published: (2013)
A review of digital watermarking techniques, characteristics and attacks in text documents
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
by: Usop, Nur Alya Afikah, et al.
Published: (2021)
Study of graphical authentication system based on persuasive rotation, resizing and cued click point (GUAS)
by: Zolkipli, Mohamad Fadli
Published: (2014)
by: Zolkipli, Mohamad Fadli
Published: (2014)
Hardware development of auto focus microscope
by: Pebrianti, Dwi, et al.
Published: (2019)
by: Pebrianti, Dwi, et al.
Published: (2019)
Geofence alerts application with GPS tracking for children monitoring (CTS)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2021)
The multistage Adomian Decomposition Method for solving chaotic Lü System
by: Razali, Nur Isnida, et al.
Published: (2013)
by: Razali, Nur Isnida, et al.
Published: (2013)
The modified Adomian decomposition method for solving
Chaotic Lü system
by: Razali, Nur Iznida, et al.
Published: (2012)
by: Razali, Nur Iznida, et al.
Published: (2012)
Application of multistage homotopy perturbation method to the chaotic Genesio System
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
by: Chowdhury, Md. Sazzad Hossien, et al.
Published: (2012)
Intelligent autism screening using fuzzy agent
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
by: Nurul Najihah, Che Razali, et al.
Published: (2020)
The prediction of undergraduate student performance in chemistry course using multilayer perceptron
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
by: Che Akmal, Che Yahaya, et al.
Published: (2020)
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization
by: Kamal Z., Zamli, et al.
Published: (2021)
by: Kamal Z., Zamli, et al.
Published: (2021)
Designing substitution boxes based on chaotic map and globalized firefly algorithm
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
by: Ahmed, Hussam Alddin Shihab
Published: (2019)
Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Systematic description of the internet of things: A bibliometric analysis
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
by: Mohd Izham, Mohd Jaya, et al.
Published: (2022)
A framework for malware identification based on behavior
by: Mohamad Fadli, Zolkipli
Published: (2012)
by: Mohamad Fadli, Zolkipli
Published: (2012)
A New Trend of Pseudorandom Number Generator using Multiple Chaotic Systems
by: Saba, M. Ismail, et al.
Published: (2018)
by: Saba, M. Ismail, et al.
Published: (2018)
Cybercrime behaviour in the context of youth development
by: Jaya, M. Izham, et al.
Published: (2022)
by: Jaya, M. Izham, et al.
Published: (2022)
Review of firewall optimization techniques
by: Shakirah, Saidin, et al.
Published: (2018)
by: Shakirah, Saidin, et al.
Published: (2018)
The multistage homotopy-perturbation method: A powerful scheme for handling the Chaotic Lorenz system
by: Chowdhury, Md. Sazzad Hossien
Published: (2010)
by: Chowdhury, Md. Sazzad Hossien
Published: (2010)
PolyAQG Framework: Auto-generating assessment questions
by: Tan, Tee Hean *, et al.
Published: (2021)
by: Tan, Tee Hean *, et al.
Published: (2021)
Localization Watermarking for Authentication of Text Images in Quran
by: Syifak Izhar, Hisham, et al.
Published: (2013)
by: Syifak Izhar, Hisham, et al.
Published: (2013)
Watermark Compression in Digital Medical Image Watermarking
by: Badshah, Gran, et al.
Published: (2013)
by: Badshah, Gran, et al.
Published: (2013)
Intrusion-Detection System Based on Fast Learning Network in Cloud Computing
by: Mohammed Hasan, Ali, et al.
Published: (2018)
by: Mohammed Hasan, Ali, et al.
Published: (2018)
Auto-Logo-Tagging System for Photographer
by: Leong, Khei Hua
Published: (2015)
by: Leong, Khei Hua
Published: (2015)
Cryptography, Steganography, & Digital Watermarking for Text Documentation
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
by: Nurul Suzulyana, Zulkifley, et al.
Published: (2020)
Sine-cosine optimization-based bijective substitution-boxes construction using enhanced dynamics of chaotic map
by: Alzaidi, Amer Awad, et al.
Published: (2018)
by: Alzaidi, Amer Awad, et al.
Published: (2018)
Data Security Issues In Cloud Computing: Review
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
by: Ahmed, Hussam Alddin Shihab, et al.
Published: (2016)
Importance of Watermark Lossless Compression in Digital Medical Image Watermarking
by: Gran, Badshah, et al.
Published: (2015)
by: Gran, Badshah, et al.
Published: (2015)
An implementing of zigzag pattern in numbering watermarking bits for high detection accuracy of tampers in document
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
by: Usop, Nur Alya Afikah, et al.
Published: (2022)
Deep learning based hybrid analysis of malware detection and classification: A recent review
by: Hussain, Syed Shuja, et al.
Published: (2023)
by: Hussain, Syed Shuja, et al.
Published: (2023)
Numbering with Spiral Pattern to Prove Authenticity and Integrity in Medical Images
by: Syifak Izhar, Hisham, et al.
Published: (2016)
by: Syifak Izhar, Hisham, et al.
Published: (2016)
Watermarking techniques for mobile application: A review
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
by: 'Aqilah, Abd. Ghani, et al.
Published: (2021)
Perception and adoption of digital technology in students’ data management: A case study of tasmik program
by: Husni, M., et al.
Published: (2022)
by: Husni, M., et al.
Published: (2022)
Similar Items
-
New formula to calculate the number of designs in RADG cryptosystem
by: Kadhum, Laith M., et al.
Published: (2021) -
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
by: A. Ahmed, Hussam, et al.
Published: (2018) -
An improved mapping pattern for Digital Watermarking using Hilbert-Peano Pattern
by: Mohamad Nazmi, Nasir, et al.
Published: (2020) -
A review of challenges and security risks of cloud computing
by: Hussam Alddin S., Ahmed, et al.
Published: (2017) -
Hermes ransomware v2.1 action monitoring using next generation security operation center (NGSOC) complex correlation rules
by: Yau, Ti Dun, et al.
Published: (2022)