RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

This article introduces a novel method for generating random binary sequences from Random Polar Angles (RPA). These sequences can be derived from an image, akin to QR-Codes, making them suitable for cryptographic applications and information coding systems. The proposed method allows the generation of multiple codes using the same image. It is based on the LPCN (Lowest Polar Angle Connectivity Node) algorithm, which, in each iteration, selects a node from a graph that forms the minimal polar angle with its neighbor found in the previous iteration. The decision on the type of bit to generate (0 or 1) is based on the nature of the angles found (acute or obtuse). The primary objective of this research is to facilitate the transformation of a graph's image representation into a concealed binary code, thereby enhancing data security. We have assessed the randomness of the generated codes through entropy analysis, revealing greater unpredictability.

Original languageEnglish
Title of host publicationICFNDS 2023 - 2023 The 7th International Conference on Future Networks and Distributed Systems
PublisherAssociation for Computing Machinery
Pages611-617
Number of pages7
ISBN (Electronic)9798400709036
DOIs
StatePublished - 21 Dec 2023
Event7th International Conference on Future Networks and Distributed Systems, ICFNDS 2023 - Dubai, United Arab Emirates
Duration: 21 Dec 202322 Dec 2023

Publication series

NameACM International Conference Proceeding Series

Conference

Conference7th International Conference on Future Networks and Distributed Systems, ICFNDS 2023
Country/TerritoryUnited Arab Emirates
CityDubai
Period21/12/2322/12/23

Bibliographical note

Publisher Copyright:
© 2023 ACM.

Keywords

  • graph
  • key generation
  • LPCN algorithm
  • polar-angle
  • Random generation

ASJC Scopus subject areas

  • Human-Computer Interaction
  • Computer Networks and Communications
  • Computer Vision and Pattern Recognition
  • Software

Fingerprint

Dive into the research topics of 'RPA-Code for Secure Binary Sequence Generation from Graph-Based Scanning'. Together they form a unique fingerprint.

Cite this