Efficient digital fingerprint production and evaluation for secure communication systems based on genetic algorithms

被引:0
|
作者
Karras, DA
机构
[1] Chalkis Inst Technol, Athens 16342, Greece
[2] Hellen Open Univ, Athens 16342, Greece
来源
ARTIFICIAL INTELLIGENCE AND SOFT COMPUTING - ICAISC 2004 | 2004年 / 3070卷
关键词
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
A novel procedure based on genetic algorithms is presented for the evaluation and production of digital fingerprints in the design of secure communication systems. These digital fingerprints are computed using the methodology of un-keyed one-way functions (hash functions). The problem of evaluating the quality of such functions is formulated as a global optimization one in the space spanned by all possible messages and is approached from a practical viewpoint by involving genetic algorithms, contrary to the very few similar research efforts existing in the literature that are of only theoretical interest. Moreover, the problem of producing digital fingerprints of good quality for use in communication systems is formulated in terms of a hash function constructed by involving the genetic algorithm procedure, exclusively utilizing the crossover operator and the steady-state reproduction method and omitting its random components. The promising results herein obtained illustrate the importance of applying genetic algorithms in communication systems security design.
引用
收藏
页码:628 / 633
页数:6
相关论文
共 50 条
  • [11] Efficient Detection Algorithms for MIMO Communication Systems
    Di-You Wu
    Lan-Da Van
    Journal of Signal Processing Systems, 2011, 62 : 427 - 442
  • [12] Evaluation of image compression algorithms for fingerprint and face recognition systems
    Funk, W
    Arnold, M
    Busch, C
    Munde, A
    Proceedings from the Sixth Annual IEEE Systems, Man and Cybernetics Information Assurance Workshop, 2005, : 72 - 78
  • [13] Research on genetic algorithms based fingerprint image binarization algorithm
    Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100080, China
    不详
    不详
    Jisuanji Gongcheng, 2006, 7 (169-171):
  • [14] Secure and Efficient Online Fingerprint Authentication Scheme Based On Cloud Computing
    Liu, Yao
    Zhou, Tanping
    Yue, Zelun
    Liu, Wenchao
    Han, Yiliang
    Li, Qi
    Yang, Xiaoyuan
    IEEE TRANSACTIONS ON CLOUD COMPUTING, 2023, 11 (01) : 564 - 578
  • [15] Research on Mobile Security Communication Based on Digital Fingerprint Encryption
    Zhang, Guofang
    2019 2ND INTERNATIONAL CONFERENCE ON MECHANICAL ENGINEERING, INDUSTRIAL MATERIALS AND INDUSTRIAL ELECTRONICS (MEIMIE 2019), 2019, : 403 - 407
  • [16] Design and implementation of the Sprott chaotic secure digital communication systems
    Hou, Yi-You
    Chen, Hsin-Chieh
    Chang, Jen-Fuh
    Yan, Jun-Juh
    Liao, Teh-Lu
    APPLIED MATHEMATICS AND COMPUTATION, 2012, 218 (24) : 11799 - 11805
  • [17] Chaotic secure digital communication scheme using auxiliary systems
    Kharel, R.
    Raza, U.
    Ijaz, M.
    Ekpo, S.
    Busawon, K.
    2016 10TH INTERNATIONAL SYMPOSIUM ON COMMUNICATION SYSTEMS, NETWORKS AND DIGITAL SIGNAL PROCESSING (CSNDSP), 2016,
  • [18] Secure Digital Communication Based on Lorenz Stream Cipher
    Alshammari, Ahmed S.
    Sobhy, Mohamed I.
    Lee, Peter
    2017 30TH IEEE INTERNATIONAL SYSTEM-ON-CHIP CONFERENCE (SOCC), 2017, : 23 - 28
  • [19] Secure speech communication system based on a digital chaos
    Zhao, G.
    Zheng, D.L.
    Dong, J.Y.
    2001, University of Science and Technology Beijing (23):
  • [20] Method of digital secure communication based on chaos synchronization
    Luo, XS
    Fang, JQ
    Jiang, PQ
    Wang, BH
    Quan, HJ
    DYNAMICS OF CONTINUOUS DISCRETE AND IMPULSIVE SYSTEMS-SERIES B-APPLICATIONS & ALGORITHMS, 2003, : 136 - 142