Using IFS as an Encryption Method

Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating complex fractal attractors using simple mathematical models. More precisely, the most popular "fractal -based" algorithms for both...

Full description

Saved in:
Bibliographic Details
Published in2009 International Conference on Education Technology and Computer pp. 275 - 278
Main Authors Al-Saidi, N.M.G., Rushdan, M.S.
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.04.2009
Subjects
Online AccessGet full text
ISBN0769536093
9780769536095
ISSN2155-1812
DOI10.1109/ICETC.2009.80

Cover

Abstract Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating complex fractal attractors using simple mathematical models. More precisely, the most popular "fractal -based" algorithms for both representation as well as compression of computer images have involved some implementation of the method of Iterated Function Systems (IFS) on complete metric spaces. Fractals are generated by simple, recursive calculations. This paper proposes a novel encryption method based on the theory of iterated function system (IFS). This approach exploits the main feature of fractals generated by IFS, so that any individual that happens to find the transformed message will not be able to understand it without the correct method that will reverse the transformation, usually through some contact/agreement with the original.
AbstractList Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating complex fractal attractors using simple mathematical models. More precisely, the most popular "fractal -based" algorithms for both representation as well as compression of computer images have involved some implementation of the method of Iterated Function Systems (IFS) on complete metric spaces. Fractals are generated by simple, recursive calculations. This paper proposes a novel encryption method based on the theory of iterated function system (IFS). This approach exploits the main feature of fractals generated by IFS, so that any individual that happens to find the transformed message will not be able to understand it without the correct method that will reverse the transformation, usually through some contact/agreement with the original.
Author Rushdan, M.S.
Al-Saidi, N.M.G.
Author_xml – sequence: 1
  givenname: N.M.G.
  surname: Al-Saidi
  fullname: Al-Saidi, N.M.G.
  organization: Inst. for Math. Res. (INSPEM), Univ. Putra Malaysia (UPM), Serdang, Malaysia
– sequence: 2
  givenname: M.S.
  surname: Rushdan
  fullname: Rushdan, M.S.
  organization: Inst. for Math. Res. (INSPEM), Univ. Putra Malaysia (UPM), Serdang, Malaysia
BookMark eNotjc1Kw0AURgdswaZ26cpNfIDE-zMzyV1KaGug4sK6LtOZiUY0KUk2fXstuvo4cDhfomZd30WlbhFyRJCHulrvq5wAJC_hSiVQWDFsQXimFoTGZFgizVVyUQSApbxWq3H8BLiAtsQLdf82tt17Wm9eUzemrkvXnR_Op6ntu_Q5Th99uFHzxn2NcfW_S7Xf_B4_ZbuXbV097rIWCzNlHLGhQCSRvDGabRQioFAcY6ON97oovHbchIAOG2QhG4Pmo2cQWyIv1d1fto0xHk5D--2G88GgFS0l_wAhPj-o
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/ICETC.2009.80
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Xplore POP ALL
IEEE Xplore All Conference Proceedings
IEEE/IET Electronic Library
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Education
EndPage 278
ExternalDocumentID 5169498
Genre orig-research
GroupedDBID 6IE
6IF
6IK
6IL
6IN
AAJGR
AAWTH
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
OCL
RIE
RIL
RNS
ID FETCH-LOGICAL-i175t-3e1f2d229e2c55436e92202d7bef45cc477c4a3fdd1a1f13926ed43bc3096813
IEDL.DBID RIE
ISBN 0769536093
9780769536095
ISSN 2155-1812
IngestDate Wed Aug 27 02:10:47 EDT 2025
IsPeerReviewed false
IsScholarly false
LCCN 2009900398
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i175t-3e1f2d229e2c55436e92202d7bef45cc477c4a3fdd1a1f13926ed43bc3096813
PageCount 4
ParticipantIDs ieee_primary_5169498
PublicationCentury 2000
PublicationDate 2009-April
PublicationDateYYYYMMDD 2009-04-01
PublicationDate_xml – month: 04
  year: 2009
  text: 2009-April
PublicationDecade 2000
PublicationTitle 2009 International Conference on Education Technology and Computer
PublicationTitleAbbrev ICETC
PublicationYear 2009
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssj0000394623
ssj0000395483
Score 1.4285387
Snippet Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating...
SourceID ieee
SourceType Publisher
StartPage 275
SubjectTerms Affine transformation
Application software
Attractor
Collage theorem
Communication system security
Computer science education
Cryptography
Decoding
Educational technology
Extraterrestrial measurements
Fractal
Fractals
Image coding
Iterated Function System
Mathematical model
Title Using IFS as an Encryption Method
URI https://ieeexplore.ieee.org/document/5169498
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5tT558tOKbFTyaNq99nUtLK1QEK_RWNpMJiLCV2h7015tkd1sRD96SnDKE5JvJN_MNIXciRZOAsNSmKKjSYKnOGVKrLIBmyuqgxDR7TCYv6mERL1rkflcLg4gh-Qz7fhi4fLOCrf8qG3hOR-VZm7TTLKlqtXb_KUzmqoHyeu6ccU8wO1CLqQeyKmr3fKUL42vxnWYe7_U3B9PhaD6spCy9WuSPrisBdMaHZNZst8o1eetvN7oPX7-UHP9rzxHp7cv7oqcdcB2TFpYnvn1znerRJbchkSCajp-j4iMqymhUwvozPC7RLLSc7pH52G1_QuteCvTVOQgbKpFbYYTIUYDzIGSCuRBMmFSjVTGASlNQhbTG8IJb5xaKBI2SGqSLcTIuT0mnXJV4RiKQCec6A3_5FTBwJ2ul1oqnBoFZdk663tLle6WWsayNvPh7-ZIcNPwM41eks1lv8drB_EbfhPP9Bkpenog
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG4QD3ryAca3a-LRQl-7y54JBJQlJmLCjWynbWJMFoPLQX-9bXcXjPHgre2pk6b9ZvrNfIPQHYu1ioAZbGLNsJBgsEyIxkYYAEmEkV6JKZ1GoxfxMA_nDXS_qYXRWvvkM91xQ8_lqyWs3VdZ13E6IuntoN1QCBGW1VqbHxXCE1GDeTW37rijmC2shdhBWRm3O8bSBvKV_E49D7cKnN1xfzDrl2KWTi_yR98VDzvDA5TWGy6zTd4660J24OuXluN_LTpE7W2BX_C0ga4j1ND5sWvgXCV7tNCtTyUIxsPnIPsIsjwY5LD69M9LkPqm0200G9rtj3DVTQG_WhehwFxTwxRjiWZgfQge6YQxwlQstREhgIhjEBk3StGMGusYskgrwSVwG-X0KD9BzXyZ61MUAI8olT1w118AAXu2hkspaKw0EEPOUMtZungv9TIWlZHnfy_foL3RLJ0sJuPp4wXar9kaQi9Rs1it9ZUF_UJe-7P-Bta5odU
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+International+Conference+on+Education+Technology+and+Computer&rft.atitle=Using+IFS+as+an+Encryption+Method&rft.au=Al-Saidi%2C+N.M.G.&rft.au=Rushdan%2C+M.S.&rft.date=2009-04-01&rft.pub=IEEE&rft.isbn=9780769536095&rft.issn=2155-1812&rft.spage=275&rft.epage=278&rft_id=info:doi/10.1109%2FICETC.2009.80&rft.externalDocID=5169498
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2155-1812&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2155-1812&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2155-1812&client=summon