Using IFS as an Encryption Method
Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating complex fractal attractors using simple mathematical models. More precisely, the most popular "fractal -based" algorithms for both...
Saved in:
| Published in | 2009 International Conference on Education Technology and Computer pp. 275 - 278 |
|---|---|
| Main Authors | , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.04.2009
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 0769536093 9780769536095 |
| ISSN | 2155-1812 |
| DOI | 10.1109/ICETC.2009.80 |
Cover
| Abstract | Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating complex fractal attractors using simple mathematical models. More precisely, the most popular "fractal -based" algorithms for both representation as well as compression of computer images have involved some implementation of the method of Iterated Function Systems (IFS) on complete metric spaces. Fractals are generated by simple, recursive calculations. This paper proposes a novel encryption method based on the theory of iterated function system (IFS). This approach exploits the main feature of fractals generated by IFS, so that any individual that happens to find the transformed message will not be able to understand it without the correct method that will reverse the transformation, usually through some contact/agreement with the original. |
|---|---|
| AbstractList | Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating complex fractal attractors using simple mathematical models. More precisely, the most popular "fractal -based" algorithms for both representation as well as compression of computer images have involved some implementation of the method of Iterated Function Systems (IFS) on complete metric spaces. Fractals are generated by simple, recursive calculations. This paper proposes a novel encryption method based on the theory of iterated function system (IFS). This approach exploits the main feature of fractals generated by IFS, so that any individual that happens to find the transformed message will not be able to understand it without the correct method that will reverse the transformation, usually through some contact/agreement with the original. |
| Author | Rushdan, M.S. Al-Saidi, N.M.G. |
| Author_xml | – sequence: 1 givenname: N.M.G. surname: Al-Saidi fullname: Al-Saidi, N.M.G. organization: Inst. for Math. Res. (INSPEM), Univ. Putra Malaysia (UPM), Serdang, Malaysia – sequence: 2 givenname: M.S. surname: Rushdan fullname: Rushdan, M.S. organization: Inst. for Math. Res. (INSPEM), Univ. Putra Malaysia (UPM), Serdang, Malaysia |
| BookMark | eNotjc1Kw0AURgdswaZ26cpNfIDE-zMzyV1KaGug4sK6LtOZiUY0KUk2fXstuvo4cDhfomZd30WlbhFyRJCHulrvq5wAJC_hSiVQWDFsQXimFoTGZFgizVVyUQSApbxWq3H8BLiAtsQLdf82tt17Wm9eUzemrkvXnR_Op6ntu_Q5Th99uFHzxn2NcfW_S7Xf_B4_ZbuXbV097rIWCzNlHLGhQCSRvDGabRQioFAcY6ON97oovHbchIAOG2QhG4Pmo2cQWyIv1d1fto0xHk5D--2G88GgFS0l_wAhPj-o |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IL CBEJK RIE RIL |
| DOI | 10.1109/ICETC.2009.80 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Xplore POP ALL IEEE Xplore All Conference Proceedings IEEE/IET Electronic Library IEEE Proceedings Order Plans (POP All) 1998-Present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Education |
| EndPage | 278 |
| ExternalDocumentID | 5169498 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IF 6IK 6IL 6IN AAJGR AAWTH ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI OCL RIE RIL RNS |
| ID | FETCH-LOGICAL-i175t-3e1f2d229e2c55436e92202d7bef45cc477c4a3fdd1a1f13926ed43bc3096813 |
| IEDL.DBID | RIE |
| ISBN | 0769536093 9780769536095 |
| ISSN | 2155-1812 |
| IngestDate | Wed Aug 27 02:10:47 EDT 2025 |
| IsPeerReviewed | false |
| IsScholarly | false |
| LCCN | 2009900398 |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i175t-3e1f2d229e2c55436e92202d7bef45cc477c4a3fdd1a1f13926ed43bc3096813 |
| PageCount | 4 |
| ParticipantIDs | ieee_primary_5169498 |
| PublicationCentury | 2000 |
| PublicationDate | 2009-April |
| PublicationDateYYYYMMDD | 2009-04-01 |
| PublicationDate_xml | – month: 04 year: 2009 text: 2009-April |
| PublicationDecade | 2000 |
| PublicationTitle | 2009 International Conference on Education Technology and Computer |
| PublicationTitleAbbrev | ICETC |
| PublicationYear | 2009 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssj0000394623 ssj0000395483 |
| Score | 1.4285387 |
| Snippet | Encryption is the process of rearrange the message into difference form so that the message is keep secret The IFS is a scheme for describing and manipulating... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 275 |
| SubjectTerms | Affine transformation Application software Attractor Collage theorem Communication system security Computer science education Cryptography Decoding Educational technology Extraterrestrial measurements Fractal Fractals Image coding Iterated Function System Mathematical model |
| Title | Using IFS as an Encryption Method |
| URI | https://ieeexplore.ieee.org/document/5169498 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LSwMxEA5tT558tOKbFTyaNq99nUtLK1QEK_RWNpMJiLCV2h7015tkd1sRD96SnDKE5JvJN_MNIXciRZOAsNSmKKjSYKnOGVKrLIBmyuqgxDR7TCYv6mERL1rkflcLg4gh-Qz7fhi4fLOCrf8qG3hOR-VZm7TTLKlqtXb_KUzmqoHyeu6ccU8wO1CLqQeyKmr3fKUL42vxnWYe7_U3B9PhaD6spCy9WuSPrisBdMaHZNZst8o1eetvN7oPX7-UHP9rzxHp7cv7oqcdcB2TFpYnvn1znerRJbchkSCajp-j4iMqymhUwvozPC7RLLSc7pH52G1_QuteCvTVOQgbKpFbYYTIUYDzIGSCuRBMmFSjVTGASlNQhbTG8IJb5xaKBI2SGqSLcTIuT0mnXJV4RiKQCec6A3_5FTBwJ2ul1oqnBoFZdk663tLle6WWsayNvPh7-ZIcNPwM41eks1lv8drB_EbfhPP9Bkpenog |
| linkProvider | IEEE |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LTwIxEG4QD3ryAca3a-LRQl-7y54JBJQlJmLCjWynbWJMFoPLQX-9bXcXjPHgre2pk6b9ZvrNfIPQHYu1ioAZbGLNsJBgsEyIxkYYAEmEkV6JKZ1GoxfxMA_nDXS_qYXRWvvkM91xQ8_lqyWs3VdZ13E6IuntoN1QCBGW1VqbHxXCE1GDeTW37rijmC2shdhBWRm3O8bSBvKV_E49D7cKnN1xfzDrl2KWTi_yR98VDzvDA5TWGy6zTd4660J24OuXluN_LTpE7W2BX_C0ga4j1ND5sWvgXCV7tNCtTyUIxsPnIPsIsjwY5LD69M9LkPqm0200G9rtj3DVTQG_WhehwFxTwxRjiWZgfQge6YQxwlQstREhgIhjEBk3StGMGusYskgrwSVwG-X0KD9BzXyZ61MUAI8olT1w118AAXu2hkspaKw0EEPOUMtZungv9TIWlZHnfy_foL3RLJ0sJuPp4wXar9kaQi9Rs1it9ZUF_UJe-7P-Bta5odU |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=2009+International+Conference+on+Education+Technology+and+Computer&rft.atitle=Using+IFS+as+an+Encryption+Method&rft.au=Al-Saidi%2C+N.M.G.&rft.au=Rushdan%2C+M.S.&rft.date=2009-04-01&rft.pub=IEEE&rft.isbn=9780769536095&rft.issn=2155-1812&rft.spage=275&rft.epage=278&rft_id=info:doi/10.1109%2FICETC.2009.80&rft.externalDocID=5169498 |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2155-1812&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2155-1812&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2155-1812&client=summon |