H04L9/001

IMAGE ENCRYPTION METHOD AND APPARATUS, SENSOR AND READABLE STORAGE MEDIUM
20210044418 · 2021-02-11 ·

The present disclosure discloses an image encryption method comprising: acquiring a row encryption sequence and a column encryption sequence, and acquiring, from a pixel array component of a sensor, pixel rows corresponding to the respective elements of the row encryption sequence; encrypting and sorting pixels in each of the pixel rows by using the column encryption sequence to obtain encrypted pixel rows corresponding to the respective pixel rows; and arranging the encrypted pixel rows according to a preset arrangement order to obtain an encrypted image. The method may perform encryption when generating an original image to obtain an encrypted image. In addition, the present disclosure also provides an image encryption apparatus, a sensor, and a computer readable storage medium, which also have the above-mentioned beneficial effects.

OPTICAL AUTHENTICATION OF IMAGES

Systems and methods performed for generating authentication information for an image using optical computing are provided. When a user takes a photo of an object, an optical authentication system receives light reflected and/or emitted from the object. The system also receives a random key from an authentication server. The system converts the received light to plenoptic data and uploads it to the authentication server. In addition, the system generates an optical hash of the received light using the random key, converts the generated optical hash to a digital optical hash, and uploads the digital optical hash to the authentication server. When the authentication server receives the upload, it verifies whether the time of the upload is within a certain threshold time from the sending of the random key and whether the digital optical hash was generated from the same light as the plenoptic data.

DATA DETECTION MITIGATION IN PRINTED CIRCUIT BOARDS

Provided is a method for masking a sensitive signal by injecting noise into planes of a printed circuit board (PCB). The method comprises detecting, by a secondary integrated circuit (IC), a noise signal on a shared plane of a PCB that includes the secondary IC. The noise signal may be analyzed to determine the characteristics of the noise signal. A masking signal may be generated based on the characteristics. The masking signal may then be injected onto the shared plane.

SYSTEM FOR EMBEDDING AN IDENTIFICATION CODE IN A PHONE CALL VIA AN INAUDIBLE SIGNAL
20210084490 · 2021-03-18 ·

A system for transmitting an identification code in a telecommunications system via a mobile device. The mobile device includes a component to generate embed an identification code by generating an inaudible signal. The inaudible signal is either ultrasonic or infrasonic. The mobile device also generates an audible signal based on information received from a microphone associated with the mobile device, merges the inaudible signal with the audible signal to produce a combined signal, and transmits the combined signal from the mobile device to the other device via the wireless network.

COMMUNICATION SYSTEM AND METHOD USING UNITARY BRAID DIVISIONAL MULTIPLEXING (UBDM) WITH PHYSICAL LAYER SECURITY
20210036901 · 2021-02-04 ·

A system includes first and second sets of communication devices. A processor coupled to the first set of communication devices produces a first encoded vector and transmits the first encoded vector to the second set of communication devices via a communication channel that applies a channel transformation to the first encoded vector during transmission. A processor coupled to the second set of communication devices receives the transformed signal, detects an effective channel thereof, and identifies left and right singular vectors of the effective channel. A precoding matrix is selected from a codebook of unitary matrices based on a message, and a second encoded vector is produced based on a second known vector, the precoding matrix, a complex conjugate of the left singular vectors, and the right singular vectors. The second encoded vector is sent to the first set of communication devices for identification of the message.

CONTINUOUS VARIABLE QUANTUM SECRET SHARING
20210036846 · 2021-02-04 ·

Continuous variable quantum secret sharing (CV-QSS) technologies are described that use laser sources and homodyne detectors. Here, a Gaussian-modulated coherent state (GMCS) prepared by one device passes through secure stations of other devices sequentially on its way to a trusted device, and each of the other devices coherently adds a locally prepared, independent GMCS to the group of propagating GMCSs. Finally, the trusted device measures both the amplitude and the phase quadratures of the received group of coherent GMCSs using double homodyne detectors. The trusted device suitably uses the measurement results to establish a secure key for encoding secret messages to be broadcast to the other devices. The devices cooperatively estimate, based on signals corresponding to their respective Gaussian modulations, the trusted device's secure key, so that the cooperative devices can decode the broadcast secret messages with the secure key.

COMMUNICATION SYSTEM AND METHOD USING ORTHOGONAL FREQUENCY DIVISION MULTIPLEXING (OFDM) WITH NON-LINEAR TRANSFORMATION
20210006446 · 2021-01-07 · ·

A method of encoding data includes identifying multiple complex number pairs of a data vector and generating a transformed data vector by applying a non-linear transformation to each complex number pair from the multiple complex number pairs. The non-linear transformation includes modifying a phase of a first complex number from each complex number pair. The phase modification is based on a value associated with a second complex number from each complex number pair. A signal representing the transformed data vector is sent to multiple transmitters for transmission to multiple receivers. A signal representing the non-linear transformation is sent to a compute device for transmission of the non-linear transformation to the multiple receivers prior to transmission of the signal representing the transformed data vector from the multiple transmitters to the multiple receivers, for recovery of the data vector at the multiple receivers.

Method for Generating Digital Quantum Chaotic Wavepacket Signals
20210006390 · 2021-01-07 ·

A method for generating digital quantum chaotic orthonormal wavepacket signals includes the following steps: construct a N-dimensional Hermitian matrix ; calculate N eigen-wavefunctions .sub.j of a quantum Hamiltonian system with the Hamiltonian by some numerical calculation methods, wherein the Hamiltonian is the Hermitian matrix ; extract some or all of the eigen-functions .sub.j with obvious chaos features as quantum chaotic eigen-wavefunctions according to a chaos criterion; generate some semi-classical digital quantum chaotic wavepacket signals .sub.j(n) with the same mathematical form as the quantum chaotic eigen-wavefunctions and length N from the selected quantum chaotic eigen-wavefunctions according to the mathematical correspondence between the classical signal and the wavefunction in quantum mechanics. By combining the quantum state chaotic transition theory and the classical time-frequency analysis, some semi-classical quantum chaotic wavepacket digital signals are generated according to the mathematical correspondence between the classical time-frequency signal and the wavefunction in quantum mechanics.

Method For Sequentially Encrypting And Decrypting Singly Linked Lists Based On Double Key Stream Ciphers

A method for sequentially encrypting and decrypting singly linked lists based on double key stream ciphers comprises: establishing a plaintext set M according to a plaintext file; using the plaintext set M as an initial value and performing iterative decryption to obtain a ciphertext set C, wherein a key set P and an algorithm set A are used during the iterative decryption; for the ciphertext set C, performing multiple decryptions by calling the key set P and calling keys in the key set P, wherein a key set P and an algorithm set A are used during the decryptions; and, converting the obtained result of decryption into a plaintext file.

System and method for physical one-way function authentication via chaotic integrated photonic resonators

A system and method is provided for a cryptographic primitive and authentication protocol comprised of micro-cavity resonators at optical wavelengths. A micro-cavity resonator is illuminated with an optical challenge signal and the cavity returns an output response that is dependent on the input signal. Digital signal processing is performed on the output signal to generate a corresponding digital representation. This process is repeated for variations of the input signal with its digital output being stored in a database. A user or object claiming an identity presents a token to the system. The system selects a subset of the available challenge-response pairs and presents the challenges to the token. The system compares the digitized responses with the original responses expected for that token. The system will approve or deny the claimed identity corresponding to the presented token.