A cryptography using lifting scheme integer wavelet transform over min-max-plus algebra
Mahmud Yunus; Mohamad Ilham Dwi Firmansyah; Kistosil Fahim Subiono
Kybernetika (2024)
- Volume: 60, Issue: 5, page 576-602
- ISSN: 0023-5954
Access Full Article
topAbstract
topHow to cite
topReferences
top- Arul, J., Venkatesulu, M., Encryption quality and performance analysis of GKSBC algorithm., J. Inform. Engrg. Appl. 2(10) (2012).
- Cahyono, J., Subiono, Adzkiya., D., Davvas, B., , J. King Saud University-Computer Inform. Sci. 34 (2020), 2, 627-635. DOI
- Durcheva, M., , ACM Commun. Comput. Algebra 49 (2015), 1, 9. DOI
- Fahim, K., Yunus, M., Max-plus algebra-based wavelet transforms and their applications in compressed image., Int. J. Tomography Simul. 30 (2017), 1, 118-126.
- Fujinoki, K., Ashizawa, K., , Signal Process. J. Pre-proof (2023), 118-126. DOI
- Gafsi, M., Abbassi, N., Amdouni, Rim, A., Hajjaji, M. A., Mohamed, A., Mtibaa, A., , In: 2022 5th International Conference on Advanced Systems and Emergent Technologies (IC_ASET), IEEE 2022, pp. 324-329. DOI
- Gon, A., Mukherjee, A., , Circuits Systems Signal Process. 42 (2022), 1, 580-600. DOI
- Goswami, D., Rahman, N., Biswas, J., Koul, A., Tamang, L. R., Bhattacharjee, A. K., A discrete wavelet transform based cryptographic algorithm., Int. J. Computer Sci. Network Security 11 (2011), 4, 178-182.
- Grigoriev, D., Shpilrain, V., , Commun. Algebra 42 (2014), 6, 2624-2632. MR3169729DOI
- Heijmans, H. J., Goutsias, J., , IEEE Trans. Image Process. 9 (2000), 11, 1897-1913. MR1818452DOI
- Hellman, M., , IEEE Trans. Inform. Theory 22 (1976), 6, 644-654. MR0437208DOI
- Kistosil, F., Adzkiya, D., Subiono, , Kybernetika 54 (2018), 2, 243-267. MR3807713DOI
- Klees, R., Haagmans, R., , Springer, Berlin 1996. DOI
- Mallat, S., , Elsevier, New York 2009. MR2479996DOI
- Merdekawati, D. A., Subiono, , J.f Physics: Conference Series 1341 (2019), 4, 042015. DOI
- Naseer, R., Nasim, M., Sohaib, M., Younis, J., Mehmood, A., Alam, M., Massoud, Y., , Integration 87 (2022), 253-259. DOI
- Nobuhara, H., Trieu, D. B. K., Maruyama, T., Bede, B., , Inform. Sci. 180 (2010), 12, 3232-3247. MR2659043DOI
- Parthasarathy, M. B., Srinivasan, B., , Indian Jo.Sci. Technol. 269 (2014), 21-34. DOI
- Rivest, R. L., Shamir, A., Adleman, L., , Commun. ACM 21 (1978), 2, 120-126. MR0700103DOI
- Salehi, S. A., Dhruba, D. D., , In: IEEE Computer Society Annual Symposium on VLSI (ISVLSI) 2020, pp. 422-427. DOI
- Silverman, J. H., Pipher, J., Hoffstein, J., , Kybernetika, Springer, New York 2008. MR2433856DOI
- Sweldens, W., , SIAM J. Math. Anal. 29 (1998), 2, 511-546. MR1616507DOI
- Sweldens, W., ZAMM-Zeitschrift fur Angewandte Mathematik und Mechanik., SIAM J. Math. Anal. 76 (1996), 2, 41-44.
- Sweldens, W., , Wavelet Appl. Signal Image Process. III 2569 (1995), 68-79. DOI
- Swenson, C., Modern Cryptanalysis: Techniques for Advanced Code Breaking., John Wiley and Sons, Indianapolis 2008.
- Szczesna, A., Switonski, A., Slupik, J., Zghidi, J. H., Josinski, H., Wojciechowski, K., , Inform. Sci. 575 (2021), 732-746. MR4310996DOI
- Tao, Y., Wang, C., , Automatica 119 (2020), 109104. MR4116117DOI
- Tedmori, S., Al-Najdawi, N., , Inform. Sci. 269 (2014), 21-34. MR3180798DOI
- Ukasha, A., , In: International Conference on Engineering and MIS (ICEMIS), 2022, pp. 1-7. DOI
- Walpole, R., Introduction to Statistics., New York 1974.
- Zarkar, S., Vaidya, S., Bharambe, A., Tadvi, A., Chavan, T., Secure server verification by using encryption algorithm and visual cryptography., Int. J. Sci. Res. (IJSR) (2014), 310-313.
- Zhang, H., Tao, Y., Yuegang., Zhang, Z., , Systems Control Lett. 96 (2016), 88-94. MR3547660DOI