Journal of Engineering and Applied Sciences

Year: 2016
Volume: 11
Issue: 8
Page No. 1829 - 1834

Machine Learning Based Key Generating for Cryptography

Authors : Hayfaa A. Atee, Robiah Ahmad, Norliza Mohd Noor and Abidulkarim K. Ilijan

References

Baheti, A., L. Singh and A.U. Khan, 2014. Proposed method for multimedia data security using cyclic elliptic curve, chaotic system, and authentication using neural network. Proceedings of the 4th International Conference on Communication Systems and Network Technologies (CSNT), April 7-9, 2014, IEEE, New York, USA., ISBN:978-1-4799-3070-8, pp: 664-668.

Ding, S., H. Zhao, Y. Zhang, X. Xu and R. Nie, 2015. Extreme learning machine: Algorithm, theory and applications. Artif. Intell. Rev., 44: 103-115.
CrossRef  |  Direct Link  |  

Ertugrul, O.F., 2014. A novel approach to synchronization problem of artificial neural network in cryptography. Am. Assoc. Sci. Technol. Commun., 1: 27-32.

Huang, G.B., Q.Y. Zhu and C.K. Siew, 2006. Extreme learning machine: Theory and applications. Neurocomputing, 70: 489-501.
CrossRef  |  Direct Link  |  

Ivancevic, V.G. and T.T. Ivancevic, 2007. Introduction: Human and computational mind. Comput. Mind A Complex Dyn. Perspect., 60: 1-269.

Jogdand, R.M. and S.S. Bisalapur, 2011. Design of an efficient neural key generation. Intl. J. Artif. Intell. Appl., 2: 60-69.

Li, J. and H. Liu, 2013. Colour image encryption based on advanced encryption standard algorithm with two-dimensional chaotic map. IET Inform. Secur., 7: 265-270.
CrossRef  |  Direct Link  |  

Lian, S., 2009. A block cipher based on chaotic neural networks. Neurocomputing, 72: 1296-1301.
Direct Link  |  

Marwaha, P. and P. Marwaha, 2010. Visual cryptographic steganography in images. Proceedings of the International Conference on Computing Communication and Networking Technologies (ICCCNT), July 29-31, 2010, IEEE, New York, USA., ISBN:978-1-4244-6592-7, pp: 1-6.

Moldovyan, A. and N. Moldovyan, 2007. Innovative Cryptography. 2nd Edn., Charles River Media, Boston, Massachusetts,.

Othman, K.M. and M.H.A.L. Jammas, 2011. Implementation of neural-cryptographic system using FPGA. J. Eng. Sci. Technol., 6: 411-428.

Prabakaran, N. and P. Vivekanandan, 2010. A new security on neural cryptography with queries. Int. J. Adv. Netw. Appl., 2: 437-444.

Ranmuthugala, M.H.P. and C. Gamage, 2010. Chaos theory based cryptography in digital image distribution. Proceedings of the International Conference on Advances in ICT for Emerging Regions, September 29-October 1, 2010, Colombo, Sri Lanka, pp: 32-39.

Sharma, M., R.B. Garg and S. Dwivedi, 2014. Comparative analysis of NPN algorithm and DES algorithm. Proceedings of the 2014 3rd International Conference on Reliability, Infocom Technologies and Optimization (ICRITO), October 8-10, 2014, IEEE, New York, USA., ISBN:978-1-4799-6896-1, pp: 1-6.

Stallings, W., 2005. Cryptography and Network Security Principles and Practices. 4th Edn., Prentice Hall, USA.

Suryawanshim S.B. and D. Nawgaje, 2012. A triple -key chaotic neural network for cryptography in image processing. Int. J. Eng. Sci. Emerg. Technol., 2: 46-50.

Zhou, Y., L. Bao and C.P. Chen, 2014. A new 1D chaotic system for image encryption. Signal Process., 97: 172-182.
Direct Link  |  

Zoghabi, A.E., A.H. Yassin and H.H. Hussien, 2013. Survey report on cryptography based on neural network. Intl. J. Emerging Technol. Adv. Eng., 6: 456-462.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved