2018
DOI: 10.7494/csci.2018.19.3.2749
|View full text |Cite
|
Sign up to set email alerts
|

Generation of Cryptographic Keys With Algorithm of Polygon Triangulation and Catalan Numbers

Abstract: In this paper, a procedure for the application of one computational geometry algorithm in the process of generating hidden cryptographic keys from one segment of a 3D image is presented. The presented procedure consists of three phases. In the first phase, the separation of one segment from the 3D image and determination of the triangulation of the separated polygon are done. In the second phase, a conversion from the obtained triangulation of the polygon in the record that represents the Catalan-key is done. … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
6
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
3
1

Relationship

1
8

Authors

Journals

citations
Cited by 16 publications
(6 citation statements)
references
References 8 publications
0
6
0
Order By: Relevance
“…[34] Dyck paths have been used for generating pseudo-random numbers, identifying sequential algorithms etc., and hence, are used in stenography, cryptography, to name a few. [34][35][36] On the other hand, in Fig. 2 the n th Catalan number gives the number of all the possible structures of a rooted full binary trees (FBTs) with 2n + 1 vertices (represented by circles).…”
Section: Xx:3mentioning
confidence: 99%
“…[34] Dyck paths have been used for generating pseudo-random numbers, identifying sequential algorithms etc., and hence, are used in stenography, cryptography, to name a few. [34][35][36] On the other hand, in Fig. 2 the n th Catalan number gives the number of all the possible structures of a rooted full binary trees (FBTs) with 2n + 1 vertices (represented by circles).…”
Section: Xx:3mentioning
confidence: 99%
“…Digital ethics and privacy, privacy enhancement technologies, self-adaptive security, zero-trust security, endto-end security, DevSecOps, and blockchain are new developments. They should balance the focus of cyber security with transparency and privacy (Saračević et al, 2018).…”
Section: Top 10 Industry 40 Trends In 2021 Cyber Security Transparenc...mentioning
confidence: 99%
“…The importance of the Catalan numbers and combinatorics in cryptography is clearly stated in [11, 12]. Our previous research [13] presented a procedure for the application of one computational geometry algorithm in the process of generating hidden cryptographic keys (Catalan objects) from one segment of the 3D image. Also, Catalan numbers play an important role in steganography (data hiding).…”
Section: Related Workmentioning
confidence: 99%