0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Nano-based High-Speed QCA circuit for Information Security with Image Masking
Authors :
Saeid Seyedi
1
Hatam Abdoli
2
1- دانشگاه بوعلی سینا
2- دانشگاه بوعلی سینا
Keywords :
Security،QCA،Quantum-Dot،Image،QCADesigner،Low space
Abstract :
A potential method for nanoscale computing, quantum-dot cellular automata (QCA) makes use of the electron tunneling between quantum dots inside a cell as well as the electrostatic interaction between surrounding dots. QCA technology outperforms traditional complementary metal-oxide semiconductor (CMOS) technology in terms of speed, power consumption, security, and space utilization. Due to the importance of security, this article investigates utilizing QCA to generate picture masks and security in these pictures. The mask picture is created by an encoder circuit, which may also be used as a decoder. Even if the secret key is still unknown, the original picture can be retrieved using the mask image. Improving the security characteristics in nano-communication, which uses QCA cells and nanodevices, is essential. Image masking entails encrypting an image using a random key to generate an encrypted picture, also known as a cipher image. After that, the original picture and the cipher image are merged to create a mask image, a hidden information set for users. With the secret key, this mask picture may obtain an image from another cipher image created with the same set of random keys. To ensure security in this paper, the suggested QCA encoder generates the mask picture. The efficacy of these designs was confirmed by using QCADesigner for functional verification. The simulation results show that the suggested solutions not only work well but also much surpass earlier approaches in terms of speed and space consumption. The higher performance of these optimum designs over other circuit designs highlights the potential of QCA technology to improve picture masking and security.
Papers List
List of archived papers
Embedded speech encoder for low-resource languages
Alireza A.Tabatabaei - Pouria Sameti - Ali Bohlooli
Classification and Evaluation of Privacy Preserving Data Mining Methods
Negar Nasiri - Mohammadreza Keyvanpour
AN EFFICIENT TASK SCHEDULING IN CLOUD COMPUTING BASED ON ACO ALGORITHM
Zahra Shafahi - Dr Alireza Yari
A Novel Decentralized Privacy Preserving Federated Learning Model for Healthcare Applications
Saba Ameri - Reza Ebrahimi Atani
Business Process Improvement Challenges: A Systematic Literature Review
Hanieh Kashfi - Fereidoon Shams Aliee
A Joint Trajectory and Energy Harvesting Method for an UAV Enabled Disaster Response Network
Hosein Mohammadi Firozjae - Javad Zeraatkar Moghaddam - Mehrdad Ardebilipour
Detection of Backdoor Attacks in Neural Networks Using Input Optimization
Parsa Hashemi Khorsand - Ahmad Nickabadi
An Enhanced Fuzzy Rule-Based Method for Coronary Artery Disease Risk Prediction Using Weighted and Biased Rules
Fatemeh Ahmadi - Mohammad Javad Parseh - Ehsan Amiri
شناسایی و تحلیل ظرفیتهای استفاده از فناوری هوش مصنوعی در توسعه و بهبود شاخص مشارکت الکترونیکی
فرشاد حکمی زاده - عاطفه فرازمند
A New Routing Protocol in Internet of Vehicles Inspired of Spread Model of the Covid-19 Virus
Taha Yasin Rezapour - Esmaeil Zeinali - Reza Ebrahimi Atani - Mohammad Mehdi Gilanian Sadeghi
more
Samin Hamayesh - Version 42.5.2