16 results on '"Shafali Agarwal"'
Search Results
2. Designing a Pseudo-Random Bit Generator Using Generalized Cascade Fractal Function
- Author
-
Shafali Agarwal
- Subjects
Pseudorandom number generator ,Cascade phoenix lambda fractal,PRNG,Mandelbrot set,dynamic behavior,key security analysis ,Computer Science, Interdisciplinary Application ,Computer science ,Mechanical Engineering ,Biomedical Engineering ,Function (mathematics) ,Mandelbrot set ,Topology ,Fractal ,Cascade ,Pseudo random bit generator ,Electrical and Electronic Engineering ,Bilgisayar Bilimleri, Disiplinler Arası Uygulamalar ,Engineering (miscellaneous) - Abstract
A cascade function is designed by combining two seed maps that resultantly has more parameters, high complexity, randomness, and more unpredictable behavior. In the paper, a cascade fractal function, i.e. cascade-PLMS is proposed by considering the phoenix and lambda fractal functions. The constructed cascade-PLMS exhibits the required fractal features such as fractional dimension, self-similar structure, and covering entire phase space by the data sequence in addition to the chaotic properties. Due to the chaotic behavior, the proposed function is utilized to generate a pseudo-random number sequence in both integer and binary format. This is the result of an extreme scalability feature of a fractal function that can be implemented on a large scale. A sequence generator is designed by performing the linear function operation to the real and imaginary part of a cascade-PLMS, cascade-PLJS separately, and the iteration number at which the cascade-PLJS converges to the fixed point. The performance analysis results show that the given method has a large keyspace, fast key generation speed, high key sensitivity, and strong randomness. Therefore, the scheme can be efficiently used further to design a secure cryptosystem with the ability to withstand various attacks.
- Published
- 2021
- Full Text
- View/download PDF
3. Image Encryption Techniques Using Fractal Function : A Review
- Author
-
Shafali Agarwal
- Subjects
Image Encryption ,Plaintext-aware encryption ,Theoretical computer science ,Computer science ,Fractal transform ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,NIST test suite ,02 engineering and technology ,Encryption ,01 natural sciences ,chaotic function ,010309 optics ,Multiple encryption ,fractal ,0103 physical sciences ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,Computer Science::Cryptography and Security ,business.industry ,Key space ,Scrambling ,Deterministic encryption ,Probabilistic encryption ,020201 artificial intelligence & image processing ,business - Abstract
An increasing demand of secure data transmission over internet leads to the challenge of implementing a consistent cryptosystem. In 2004, USA navy published the patent which highlights the importance of fractal as an encryption/decryption key in a cryptosystem [1]. Fractal possess butterfly effect i.e. sensitivity to initial condition, due to which small change in input produces a major change in output. This paper summarizes the various recent image encryption techniques in which fractal key is used to encrypt/decrypt followed by substitution, scrambling and diffusion techniques to provide strong cryptosystem. The algorithms covered both private key encryption as well as public key encryption technique in the paper. The analysed algorithms include a set of fractal function such as Mandelbrot set, Julia set, Hilbert curve, 3D fractal, multi-fractal, IFS and chaotic function to generate a complex key used in the encryption process. Corresponding performance of each algorithm is analysed by PSNR test, key space, sensitivity analysis and correlation coefficient value between the adjacent pixels of both images (Original image and encrypted image) which shows significant improvement in performance over the traditional encryption methods.
- Published
- 2022
- Full Text
- View/download PDF
4. Chaotic Dynamics of Complex Logistic Map in ISuperior Orbit
- Author
-
Shafali Agarwal and Usa Independent Researcher Plano
- Subjects
Computer science ,Dynamics (mechanics) ,Chaotic ,Statistical physics ,Orbit (control theory) ,Logistic map - Published
- 2020
- Full Text
- View/download PDF
5. Stability Analysis of Switched Complex Logistic Map in Ishikawa Orbit
- Author
-
Shafali Agarwal
- Subjects
Physics ,Mechanical Engineering ,Mathematical analysis ,Logistic map ,Orbit (control theory) ,Stability (probability) ,Civil and Structural Engineering - Published
- 2021
- Full Text
- View/download PDF
6. A Chaotic Cryptosystem using Conjugate Transcendental Fractal Function
- Author
-
Independent Researcher Plano, Texas , Usa and Shafali Agarwal
- Subjects
Fractal ,Computer Networks and Communications ,Computer science ,Applied Mathematics ,Applied mathematics ,Function (mathematics) ,Transcendental number ,Chaotic cryptosystem ,Safety Research ,Software ,Computer Science Applications ,Information Systems ,Conjugate - Published
- 2019
- Full Text
- View/download PDF
7. Preserving Information Security Using Fractal-Based Cryptosystem
- Author
-
Shafali Agarwal
- Subjects
Theoretical computer science ,Fractal ,Computer science ,Computer Science::Computer Vision and Pattern Recognition ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,0202 electrical engineering, electronic engineering, information engineering ,Cryptosystem ,020207 software engineering ,020201 artificial intelligence & image processing ,02 engineering and technology ,Information security ,Computer Science::Cryptography and Security - Abstract
The chapter intends to propose a hybrid cryptosystem based on a chaotic map and a fractal function. The sequential order of process execution provides a computationally less expensive and simple approach that still designed a secure cryptosystem. A one-dimensional Ricker map and its modified form are employed to initially shuffle the image pixels twice, and also a pseudo-random sequence is generated using both maps. The algorithm implemented a sequence of pixel confusion-diffusion steps using the image rotation and a transcendental anti-Mandelbrot fractal function (TAMFF) and its Mann-iterated fractal function (Sup-TAMFF). Finally, the pixel value of an image obtained in the last step and the recent two pixels of the encrypted image is XORed with the corresponding pseudo-random matrix value to get the cipher image. Subsequently, various performance tests are conducted to verify the suitability of the given method to be used in real-world information transmission.
- Published
- 2020
- Full Text
- View/download PDF
8. A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSION
- Author
-
Shafali Agarwal
- Subjects
Key generation ,Pixel ,Computer Networks and Communications ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,02 engineering and technology ,Encryption ,030218 nuclear medicine & medical imaging ,03 medical and health sciences ,0302 clinical medicine ,Fractal ,Burning ship fractal, Knuth shuffle method, Image encryption, Hilbert transformation, dynamic diffusion ,Hardware and Architecture ,Computer Science::Computer Vision and Pattern Recognition ,Computer Science::Multimedia ,0202 electrical engineering, electronic engineering, information engineering ,Key (cryptography) ,Cryptosystem ,020201 artificial intelligence & image processing ,Confusion and diffusion ,business ,Algorithm ,Fisher–Yates shuffle ,Computer Science::Cryptography and Security - Abstract
This paper proposes a fractal-based image encryption algorithm which follows permutation-substitution structure to maintain confusion and diffusion properties. The scheme consists of three phases: key generation process; pixel permutation using the Knuth shuffle method; and the dynamic diffusion of scrambled image. A burning ship fractal function is employed to generate a secret key sequence which is further scanned using the Hilbert transformation method to increase the randomness. The chaotic behavior of the fractal strengthens the key sensitivity towards its initial condition. In the permutation phase, the Knuth shuffle method is applied to a noisy plain image to change the index value of each pixel. To substitute the pixel values, a dynamic diffusion is suggested in which each scrambled pixel change its value by using the current key pixel and the previously ciphered image pixel. To enhance the security of the cryptosystem, the secret key is also modified at each encryption step by performing algebraic transformations. The visual and numerical analysis demonstrates that the proposed scheme is reliable to secure transmission of gray as well as color images.
- Published
- 2019
- Full Text
- View/download PDF
9. Image Encryption using Curved Scrambling and Diffusion
- Author
-
Rishi Kumar Gupta, Shafali Agarwal, and Neha Dwivedi
- Subjects
business.industry ,Computer science ,General Engineering ,02 engineering and technology ,Encryption ,01 natural sciences ,010305 fluids & plasmas ,Scrambling ,Image (mathematics) ,0103 physical sciences ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Diffusion (business) ,business ,Algorithm - Published
- 2016
- Full Text
- View/download PDF
10. Cryptographic Key Generation Using Burning Ship Fractal
- Author
-
Shafali Agarwal
- Subjects
Pseudorandom number generator ,Key generation ,Pixel ,Computer science ,business.industry ,Key space ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,020206 networking & telecommunications ,Hilbert curve ,02 engineering and technology ,Encryption ,Fractal ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,business ,Algorithm ,Burning Ship fractal - Abstract
The study introduces a key generation scheme using a burning ship fractal function, Hilbert transformation and an external key. The burning ship function is a modified version of a well-known Mandelbrot set function in which absolute value of a complex variable is considered. The process starts with the scrambling of the fractal image pixels by applying a Hilbert curve scanning. To enhance the randomness and complexity, an external key is obtained using a pseudo random number generator (PRNG), whose length depends on the size of the used fractal image. Further, a covering module is applied in which eight different types of operations are performed recursively to cover the scrambled fractal image pixels using eight different keys. At each iteration, a modified external key was used to perform the respective operation to the remaining image pixels. Moreover, to ensure the robustness of the proposed scheme, each block of tempkey (created in previous step) permuted using the sorting indexes of the modified tempkey blocks. The performance analysis of the given method is carried out in terms of the key space, key sensitivity, key generation time, histogram, and correlation coefficient. The results indicate that the proposed method is reliable and secure with great potential to be further use in the image encryption applications.
- Published
- 2018
- Full Text
- View/download PDF
11. Map-Reduce Implementations: Survey and Performance Comparison
- Author
-
Zeba Khanam and Shafali Agarwal
- Published
- 2015
- Full Text
- View/download PDF
12. Convergence Analysis of Transcendental Fractals
- Author
-
Shafali Agarwal and Ashish Negi
- Subjects
Mathematics::Dynamical Systems ,Computer science ,Transcendental function ,Function (mathematics) ,Mandelbrot set ,Julia set ,Algebra ,symbols.namesake ,Computer Science::Graphics ,Conjugacy class ,Fractal ,Newton fractal ,symbols ,Trigonometric functions ,Sine ,Transcendental number ,Algorithm ,Mandelbox - Abstract
Mandelbrot set with transcendental function presents an out of the ordinary field of research because of its magnificence and geometrical complexities. Earlier many researchers used feedback system to study it and reveal new concepts unexplored the geometry of transcendental Mandelbrot set with new iterative approach. The objective of the paper is to analyze the work done by several researchers to visualize beautiful fractal graphics of Mandelbar set with sine, cosine functions using Mann iteration method. Also the rate of convergence of function in the presence of transcendental function and conjugacy with Mandelbrot set and related complex structure of superior Julia set.
- Published
- 2012
- Full Text
- View/download PDF
13. Map Reduce: A Survey Paper on Recent Expansion
- Author
-
Shafali Agarwal and Zeba Khanam
- Subjects
General Computer Science ,Computer science ,Process (engineering) ,Map reduce ,Scale (chemistry) ,Fault tolerance ,Data mining ,State (computer science) ,computer.software_genre ,Execution time ,computer - Abstract
A rapid growth of data in recent time, Industries and academia required an intelligent data analysis tool that would be helpful to satisfy the need to analysis a huge amount of data. MapReduce framework is basically designed to compute data intensive applications to support effective decision making. Since its introduction, remarkable research efforts have been put to make it more familiar to the users subsequently utilized to support the execution of massive data intensive applications. Our survey paper emphasizes the state of the art in improving the performance of various applications using recent MapReduce models and how it is useful to process large scale dataset. A comparative study of given models corresponds to Apache Hadoop and Phoenix will be discussed primarily based on execution time and fault tolerance. At the end, a high-level discussion will be done about the enhancement of the MapReduce computation in specific problem area such as Iterative computation, continuous query processing, hybrid database etc.
- Published
- 2015
- Full Text
- View/download PDF
14. Burning Ship and Its Quasi Julia Images Using Mann Iteration
- Author
-
Ashish Negi and Shafali Agarwal
- Subjects
Mathematical optimization ,Fractal ,Rate of convergence ,Position (vector) ,Applied mathematics ,Function (mathematics) ,Fixed point ,Mandelbrot set ,Measure (mathematics) ,Mathematics ,Image (mathematics) - Abstract
An invented form of Mandelbrot set came into existence in 1992 when Michelitsch and Rossler have applied seemingly small changes in complex analytic Mandelbrot set function and got an image resembled to a ship going into flame. He named it burning ship. Our goal in this paper is to apply Mann Iteration method to burning ship function and produce a collection of stunning images. We have also calculated the fixed points of such images to measure the convergence rate and those fixed points can be further useful in various fractal applications such as fractal cryptography. Hence we are in position to examining numerically the stability of the fractals.
- Published
- 2014
- Full Text
- View/download PDF
15. Fixed point results of transcendental superior antifractals
- Author
-
Ashish Negi and Shafali Agarwal
- Subjects
Pure mathematics ,Fractal ,Transcendental function ,Transcendental equation ,Mathematical analysis ,Trigonometric functions ,Function (mathematics) ,Sine ,Transcendental number ,Fixed point ,Mathematics - Abstract
Antipolynomial of a complex polynomial is generated by applying iteration on a function zd+c for d>=2. This complex function has been intense area for researcher. If we use transcendental function like sine, cosine etc with antipolynomial, i.e. sin zd+c, it becomes a more elite area to design beautiful images of fractal. This paper emphasizes on the creation and analysis of fractals and their convergent to fixed point.
- Published
- 2012
- Full Text
- View/download PDF
16. Dynamics of Mandelbrot set with Transcendental Function
- Author
-
Ashish Negi, Gunjan Srivastava, and Shafali Agarwal
- Subjects
Pure mathematics ,Mathematics::Dynamical Systems ,General Computer Science ,Logarithm ,Computer science ,Transcendental function ,Transcendental equation ,Fixed point ,Mandelbrot set ,Exponential function ,Misiurewicz point ,Computer Science::Graphics ,Fractal ,Sine ,Transcendental number ,Trigonometry ,Complex quadratic polynomial ,Mandelbox - Abstract
These days Mandelbrot set with transcendental function is an interesting area for mathematicians. New equations have been created for Mandelbrot set using trigonometric, logarithmic and exponential functions. Earlier, Ishikawa iteration has been applied to these equations and generate new fractals named as Relative Superior Mandelbrot Set with transcendental function. In this paper, the Mann iteration is being applied on Mandelbrot set with sine function i.e. sin(zn)+c and new fractals with the concept of Superior Transcendental Mandelbrot Set will be shown. Our goal is to focus on the less number of iterations which are required to obtain fixed point of function sin(zn)+c.
- Published
- 2012
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.