• English
    • українська
  • English 
    • English
    • українська
  • Login
View Item 
  • Frontpage
  • Факультет інформаційних електронних систем
  • Кафедра інфокомунікаційних систем і технологій
  • Наукові роботи каф. ІКСТ
  • View Item
  • Frontpage
  • Факультет інформаційних електронних систем
  • Кафедра інфокомунікаційних систем і технологій
  • Наукові роботи каф. ІКСТ
  • View Item
Сайт інституційного репозитарію ВНТУ містить роботи, матеріали та файли, які були розміщені докторантами, аспірантами та студентами Вінницького Національного Технічного Університету. Для розширення функцій сайту рекомендується увімкнути JavaScript.

Modeling a method for generating a stream of secret keys in the form of permutation matrices for encryption-masking of video frames and studying its characteristics

Author
Krasilenko, V. G.
Podlubnyi, V. F.
Nikitovych, D. V.
Красиленко, В. Г.
Підлубний, В. Ф.
Нікітович, Д. В.
Date
2023
Metadata
Show full item record
Collections
  • Наукові роботи каф. ІКСТ [457]
Abstract
The article considers a method of forming a stream of secret matrix keys in the form of permutation matrices. On the basis of consideration of the advantages of matrix models and cryptosystems for masking video frames, the urgent need to form a stream of secret matrix keys (MKs) is stressed. It is shown that, taking into account of crypto-transformations in matrix affine-permutation ciphers, a number of keys in the form of permutation matrices (MPs) are required for the successful use of the latter in frame masking tasks. To solve this problem the article proposes a approach of generating a series of MKs (MPs). The method is based on the use of a series of crypto-transformations of the base key using affine encryption while changing the keys of this cipher in accordance with the generated random sequence. Functionality and advantages of the proposed method are demonstrated by model experiments in the Mathcad, screenshots the created modules. The properties of a set of generated MKs (MPs) were investigated using mutual correlation and equivalence normalized functions. Adequacy and stability of the method were confirmed. The advantage of the method is the focus on parallel processing, ease of adaptation to different formats of images, isomorphism of visualization of keys.
URI:
http://ir.lib.vntu.edu.ua//handle/123456789/39020
View/Open
140141.pdf (861.6Kb)

Institutional Repository

FrontpageSearchHelpContact UsAbout Us

University Resources

JetIQLibrary websiteUniversity websiteE-catalog of VNTU

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsTypePublisherLanguageUdcISSNPublicationDOIThis CollectionBy Issue DateAuthorsTitlesSubjectsTypePublisherLanguageUdcISSNPublicationDOI

My Account

LoginRegister

Statistics

View Usage Statistics

ISSN 2413-6360 | Frontpage | Send Feedback | Help | Contact Us | About Us
© 2016 Vinnytsia National Technical University | Extra plugins code by VNTU Linuxoids | Powered by DSpace
Працює за підтримки 
НТБ ВНТУ