0% Complete
فارسی
Home
/
پانزدهمین کنفرانس بین المللی فناوری اطلاعات و دانش
A Nano-based High-Speed QCA circuit for Information Security with Image Masking
Authors :
Saeid Seyedi
1
Hatam Abdoli
2
1- دانشگاه بوعلی سینا
2- دانشگاه بوعلی سینا
Keywords :
Security،QCA،Quantum-Dot،Image،QCADesigner،Low space
Abstract :
A potential method for nanoscale computing, quantum-dot cellular automata (QCA) makes use of the electron tunneling between quantum dots inside a cell as well as the electrostatic interaction between surrounding dots. QCA technology outperforms traditional complementary metal-oxide semiconductor (CMOS) technology in terms of speed, power consumption, security, and space utilization. Due to the importance of security, this article investigates utilizing QCA to generate picture masks and security in these pictures. The mask picture is created by an encoder circuit, which may also be used as a decoder. Even if the secret key is still unknown, the original picture can be retrieved using the mask image. Improving the security characteristics in nano-communication, which uses QCA cells and nanodevices, is essential. Image masking entails encrypting an image using a random key to generate an encrypted picture, also known as a cipher image. After that, the original picture and the cipher image are merged to create a mask image, a hidden information set for users. With the secret key, this mask picture may obtain an image from another cipher image created with the same set of random keys. To ensure security in this paper, the suggested QCA encoder generates the mask picture. The efficacy of these designs was confirmed by using QCADesigner for functional verification. The simulation results show that the suggested solutions not only work well but also much surpass earlier approaches in terms of speed and space consumption. The higher performance of these optimum designs over other circuit designs highlights the potential of QCA technology to improve picture masking and security.
Papers List
List of archived papers
A Comparison between Slimed Network and Pruned Network for Head Pose Estimation
Amir Salimiparsa - Hadi Veisi - Mohammad-shahram Moin
Violence detection using one-dimensional convolutional networks
Narges Honarjoo - Ali Abdari - Dr Azadeh Mansouri
AOV-IDS: Arithmetic Optimizer with Voting classifier for Intrusion Detection System
Amir Soltany Mahboob - Mohammad Reza Ostadi Moghaddam - Shima Yousefi
تحلیل سازههای موثر بر پذیرش فناوری بلاکچین و استفاده از آن در صنعت بیمه ایران با استفاده از تکنیک معادلات ساختاری (مطالعه موردی: شرکت کارگزاری رسمی بیمه زندگی خوب)
احسان هنری - آفرین اخوان
سیستم توصیه گر برای خرید لوازم آرایشی و بهداشتی مبتنی بر الگوریتم جنگل تصادفی
فاطمه رمضانی خوزستانی - مجید رفیعی
A Hybrid Method to Reduce the Voltage Consumption in the Spiking Neural Networks
Shaghayegh Mehdizadeh saraj - Seyyed Amir Asghari - Mohammadreza Binesh Marvasti
پیشنهادات کالیبره شده براساس احساسات استخراج شده از متون مرتبط با آیتم ها
شیوا پارساراد - دکتر سامان هراتی زاده شیوا پارساراد - سامان هراتی زاده -
Modified Gate Diffusion Input-based QCA RAMs Design
Hamidreza Sadrarhami - S. Mohammadali Zanjani - Mostafa Sadeghi
Knowledge Graph Based Retrieval-Augmented Generation for Multi-Hop Question Answering Enhancement
Mahdi Amiri Shavaki - Pouria Omrani - Ramin Toosi - Mohammad Ali Akhaee
Improving Long-Term Engagement of Insurance Brokerages by Providing Gamified Configurations Based on The Delphi Method
Hosein Bayati - Fattaneh Taghiyareh - Sahand Hashemi
more
Samin Hamayesh - Version 42.5.2