A new digital watermarking model using honey encryption and reversible cellular automata [PDF]
Watermarking is the process of embedding and extracting a watermark design on a digital cover to prove the image’s copyright or ownership, thereby securing the image’s authenticity. The proposed method in this paper uses a combination of honey encryption
Jianxin Xiong +3 more
doaj +2 more sources
A new encryption algorithm for image data based on two-way chaotic maps and iterative cellular automata [PDF]
Due to their simplicity of implementation and compliance with the encryption issue, chaotic models are often utilized in picture encryption applications.
Mimouna Abdullah Alkhonaini +5 more
doaj +2 more sources
Efficient Design of Reversible Code Converters Using Quantum Dot Cellular Automata [PDF]
Quantum dot Cellular Automata (QCA) is an attractive field of nano-technology which offers the various advantages over existing CMOS technology for the development of logic circuits.
Javeed Iqbal Reshi, M. Tariq Banday
doaj +2 more sources
Optimal Computational Modeling and Simulation of QCA Reversible Gates for Information Reliability in Nano-Quantum Circuits [PDF]
As the relationship between energy and information loss and reversible gates was revealed, much interest in reversible gate design arose, and as quantum-dot cellular automata (QCA) gained attention as a next-generation nano circuit design technology ...
Jun-Cheol Jeon
doaj +2 more sources
Cellular Automata: Reversibility, Semi-reversibility and Randomness [PDF]
In this dissertation, we study two of the global properties of 1-dimensional cellular automata (CAs) under periodic boundary condition, namely, reversibility and randomness. To address reversibility of finite CAs, we develop a mathematical tool, named reachability tree, which can efficiently characterize those CAs.
Kamalika Bhattacharjee
+5 more sources
New classes of reversible cellular automata
A Boolean function $f$ on $k$~bits induces a shift-invariant vectorial Boolean function $F$ from $n$ bits to $n$ bits for every $n\geq k$. If $F$ is bijective for every $n$, we say that $f$ is a proper lifting, and it is known that proper liftings are ...
J. Haugland, Tron Omland
semanticscholar +3 more sources
Encryption based on reversible cellular automata
The reversible cellular automata is featured by its no information loss and parallel information processing. A new block cipher based on reversible second-order toggle cellular automata was proposed.
PING Ping +3 more
doaj +3 more sources
Design of cryptographically secure AES like S-Box using second-order reversible cellular automata for wireless body area network applications. [PDF]
Gangadari BR, Rafi Ahamed S.
europepmc +2 more sources
Nano-communication networks have critical roles in future worldwide communications, which provide efficient data transmission at ultra-high speeds employing nano-circuits that operate with ultra-low power.
Mohsen Vahabi +2 more
doaj +2 more sources
An Efficient Image Encryption using DNA Cryptography and Reversible Cellular Automata
The hybridization of DNA with reversible cellular automata techniques is an open area of research. This paper has focused on reversible cellular automata technique and DNA cryptographic operations which are used for compressing and encrypting together ...
Rajwant Kaur, A. Kumar, Simranjit Kaur
openalex +2 more sources

