8 resultados para RSA encryption
em Biblioteca Digital da Produção Intelectual da Universidade de São Paulo (BDPI/USP)
Resumo:
A phase-only encryption/decryption scheme with the readout based on the zeroth-order phase-contrast technique (ZOPCT), without the use of a phase-changing plate on the Fourier plane of an optical system based on the 4f optical correlator, is proposed. The encryption of a gray-level image is achieved by multiplying the phase distribution obtained directly from the gray-level image by a random phase distribution. The robustness of the encoding is assured by the nonlinearity intrinsic to the proposed phase-contrast method and the random phase distribution used in the encryption process. The experimental system has been implemented with liquid-crystal spatial modulators to generate phase-encrypted masks and a decrypting key. The advantage of this method is the easy scheme to recover the gray-level information from the decrypted phase-only mask applying the ZOPCT. An analysis of this decryption method was performed against brute force attacks. (C) 2009 Society of Photo-Optical Instrumentation Engineers. [DOI: 10.1117/1.3223629]
Resumo:
This paper presents a novel algorithm to successfully achieve viable integrity and authenticity addition and verification of n-frame DICOM medical images using cryptographic mechanisms. The aim of this work is the enhancement of DICOM security measures, especially for multiframe images. Current approaches have limitations that should be properly addressed for improved security. The algorithm proposed in this work uses data encryption to provide integrity and authenticity, along with digital signature. Relevant header data and digital signature are used as inputs to cipher the image. Therefore, one can only retrieve the original data if and only if the images and the inputs are correct. The encryption process itself is a cascading scheme, where a frame is ciphered with data related to the previous frames, generating also additional data on image integrity and authenticity. Decryption is similar to encryption, featuring also the standard security verification of the image. The implementation was done in JAVA, and a performance evaluation was carried out comparing the speed of the algorithm with other existing approaches. The evaluation showed a good performance of the algorithm, which is an encouraging result to use it in a real environment.
Resumo:
The functional relation between the decline in the rate of a physiological process and the magnitude of a stress related to soil physical conditions is an important tool for uses as diverse as assessment of the stress-related sensitivity of different plant cultivars and characterization of soil structure. Two of the most pervasive sources of stress are soil resistance to root penetration (SR) and matric potential (psi). However, the assessment of these sources of stress on physiological processes in different soils can be complicated by other sources of stress and by the strong relation between SR and psi in a soil. A multivariate boundary line approach was assessed as a means of reducing these cornplications. The effects of SR and psi stress conditions on plant responses were examined under growth chamber conditions. Maize plants (Zea mays L.) were grown in soils at different water contents and having different structures arising from variation in texture, organic carbon content and soil compaction. Measurements of carbon exchange (CE), leaf transpiration (ILT), plant transpiration (PT), leaf area (LA), leaf + shoot dry weight (LSDW), root total length (RTL), root surface area (RSA) and root dry weight (RDW) were determined after plants reached the 12-leaf stage. The LT, PT and LA were described as a function of SR and psi with a double S-shaped function using the multivariate boundary line approach. The CE and LSDW were described by the combination of an S-shaped function for SR and a linear function for psi. The root parameters were described by a single S-shaped function for SR. The sensitivity to SR and psi depended on the plant parameter. Values of PT, LA and LSDW were most sensitive to SR. Among those parameters exhibiting a significant response to psi, PT was most sensitive. The boundary line approach was found to be a useful tool to describe the functional relation between the decline in the rate of a physiological process and the magnitude of a stress related to soil physical conditions. (C) 2009 Elsevier B.V. All rights reserved.
Resumo:
A genetic polymorphism of the beta 2-glycoprotein I (beta 2-GPI) is recognized by antiphospholipid antibodies (aPL) and may even play a role in the development of antiphospholipid syndrome (APS). The objectives of this study were to determine a Val/Leu SNP at position 247 of the beta 2-GPI gene in Brazilian patients with APS and to compare these data with clinical and laboratory manifestations. Polymorphism assignment was performed by PCR followed by Rsa I restriction endonuclease. The titration of anti-beta 2-GPI antibodies was detected by ELISA. The results showed significantly higher frequencies of the V-encoding allele and the homozygous VV genotype in patients with APS than in control subjects (OR = 1.781, P = 0.0068; and OR = 6.413, P < 0.0001, respectively). The frequency of this genotype was also significantly higher in patients with arterial and venous thrombosis than in the control group (52% and 44%, respectively, versus 13%). Anti-beta 2-GPI-positive patients had significantly higher frequencies of the VV genotype than the controls subjects (OR = 8.179, P < 0.0001). These results suggest that the V-encoding allele and the homozygous VV genotype at position 247 of the beta 2-GPI gene may play a role in the generation of anomalous beta 2-GPI, with consequent auto-antibody production, and in phenotype expression of arterial and venous thrombosis in APS patients.
Resumo:
A novel cryptography method based on the Lorenz`s attractor chaotic system is presented. The proposed algorithm is secure and fast, making it practical for general use. We introduce the chaotic operation mode, which provides an interaction among the password, message and a chaotic system. It ensures that the algorithm yields a secure codification, even if the nature of the chaotic system is known. The algorithm has been implemented in two versions: one sequential and slow and the other, parallel and fast. Our algorithm assures the integrity of the ciphertext (we know if it has been altered, which is not assured by traditional algorithms) and consequently its authenticity. Numerical experiments are presented, discussed and show the behavior of the method in terms of security and performance. The fast version of the algorithm has a performance comparable to AES, a popular cryptography program used commercially nowadays, but it is more secure, which makes it immediately suitable for general purpose cryptography applications. An internet page has been set up, which enables the readers to test the algorithm and also to try to break into the cipher.
Resumo:
Excited state absorption and excited state dynamics of indocyanine-green (ICG) dissolved in dymethyl sulfoxide were measured using white-light continuum Z-scan (WLCZScan) and white-light continuum pump-probe (WLCPP) techniques. The excited state absorption spectrum, obtained through Z-scan measurements, revealed saturable absorption (SA) for wavelengths longer than 630 nm, while reverse saturable absorption (RSA) appeared, as indicated by a band at approximately 570 nm. Both processes were modeled by a three-energy-level diagram, from which the excited state cross-section values were determined. SA and RSA were also observed in pump-probe experiments, with a recovery time in the hundreds of picoseconds time scale due to the long lifetime of the first excited state of ICG. Such results contribute to the understanding of ICG optical properties, allowing application in photonics and medicine. Copyright (C) 2010 John Wiley & Sons, Ltd.
Resumo:
Consider the following problem: Forgiven graphs G and F(1),..., F(k), find a coloring of the edges of G with k colors such that G does not contain F; in color i. Rodl and Rucinski studied this problem for the random graph G,,, in the symmetric case when k is fixed and F(1) = ... = F(k) = F. They proved that such a coloring exists asymptotically almost surely (a.a.s.) provided that p <= bn(-beta) for some constants b = b(F,k) and beta = beta(F). This result is essentially best possible because for p >= Bn(-beta), where B = B(F, k) is a large constant, such an edge-coloring does not exist. Kohayakawa and Kreuter conjectured a threshold function n(-beta(F1,..., Fk)) for arbitrary F(1), ..., F(k). In this article we address the case when F(1),..., F(k) are cliques of different sizes and propose an algorithm that a.a.s. finds a valid k-edge-coloring of G(n,p) with p <= bn(-beta) for some constant b = b(F(1),..., F(k)), where beta = beta(F(1),..., F(k)) as conjectured. With a few exceptions, this algorithm also works in the general symmetric case. We also show that there exists a constant B = B(F,,..., Fk) such that for p >= Bn(-beta) the random graph G(n,p) a.a.s. does not have a valid k-edge-coloring provided the so-called KLR-conjecture holds. (C) 2008 Wiley Periodicals, Inc. Random Struct. Alg., 34, 419-453, 2009
Resumo:
Methanolic extract powders of acerola, passion fruit and pineapple industrial residues, including pulp, seeds and peel, altogether (except for acerola) devoid of seeds, were screened for antioxidant capacity. The total phenolic contents (TPCs) of the extract powders were compared with their radical-scavenging activities (RSA) against both DPPH(center dot) and superoxide anion (O(2)(center dot-)) radicals, and their protective effect against liposome peroxidation, triggered by peroxyl radical. Lipid peroxidation was followed by the fluorescence decay of the probe, 4,4-difluoro-5-(4-phenyl-1,3-butadienyl)-4-bora-3a,4a-diaza-s-indacene-3-undecanoic acid (C(11)-BODIPY(581/591)). The TPCs of acerola, passion fruit and pineapple extract powders were (94.6 +/- 7.4); (41.2 +/- 4.2) and (9.1 +/- 1.3) mg of gallic acid equivalents g(-1) of dry extract, respectively. Acerola showed the best RSA-DPPH(center dot) scores, whereas passion fruit was more protective on the RSA-O(2)(center dot-) system. Together with the protective effects against lipid peroxidation (rate of BODIPY decay) which, were similar for acerola and passion fruit extracts, these data suggest that the methanolic extracts of acerola and passion fruit residues may be useful as antioxidant supplements, particularly the acerola extract, due to its high phenolic content. (C) 2008 Elsevier Ltd. All rights reserved