T
E
L
K
O
M
N
I
K
A
T
elec
o
m
m
un
ica
t
io
n,
Co
m
pu
t
ing
,
E
lect
ro
nics
a
nd
Co
ntr
o
l
Vo
l.
18
,
No
.
5
,
Octo
b
er
2
0
2
0
,
p
p
.
2
7
7
2
~
2
7
7
9
I
SS
N:
1
6
9
3
-
6
9
3
0
,
ac
cr
ed
ited
First Gr
ad
e
b
y
Kem
en
r
is
tek
d
i
k
ti,
Dec
r
ee
No
: 2
1
/E/KPT
/2
0
1
8
DOI
: 1
0
.
1
2
9
2
8
/TE
L
KOM
NI
K
A.
v
1
8
i5
.
1
4
2
7
9
2772
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//jo
u
r
n
a
l.u
a
d
.
a
c.
id
/in
d
ex
.
p
h
p
/TELK
OM
N
I
K
A
A nov
el met
ho
d f
o
r digita
l data
en
co
ding
-
deco
ding
Am
j
a
d Y.
H
ind
i
Co
m
m
u
n
ica
ti
o
n
E
n
g
i
n
e
e
rin
g
d
e
p
a
rtme
n
t,
F
a
c
u
lt
y
o
f
En
g
in
e
e
rin
g
T
e
c
h
n
o
l
o
g
y
,
Al
-
Ba
lq
a
A
p
p
l
ied
Un
i
v
e
rsity
,
J
o
rd
a
n
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Oct
6
,
2
0
1
9
R
ev
is
ed
Feb
1
3
,
2
0
2
0
Acc
ep
ted
Feb
2
7
,
2
0
2
0
Cry
p
t
o
g
ra
p
h
y
is
o
n
e
o
f
t
h
e
p
a
ra
m
o
u
n
t
a
n
d
m
o
st
v
it
a
l
d
a
ta
t
re
a
tme
n
t
p
r
o
c
e
ss
e
s,
it
a
ll
o
ws
u
s
to
b
e
se
c
u
re
i
n
o
u
r
e
lec
tro
n
ic
tra
n
sa
c
ti
o
n
s.
T
h
e
p
ro
c
e
ss
o
f
c
ry
p
to
g
ra
p
h
y
p
ro
tec
ts
o
u
r
v
a
lu
a
b
l
e
d
a
ta
su
c
h
a
s
p
ri
v
a
te
a
c
c
o
u
n
t
n
u
m
b
e
rs
a
n
d
tran
sa
c
ti
o
n
a
m
o
u
n
ts,
e
lec
tro
n
ic
sig
n
a
t
u
re
s
re
p
lac
e
h
a
n
d
writt
e
n
si
g
n
a
tu
re
s
o
r
c
re
d
it
c
a
rd
a
u
t
h
o
riza
ti
o
n
s,
a
n
d
p
u
b
li
c
-
k
e
y
e
n
c
ry
p
ti
o
n
p
ro
v
id
e
s
c
o
n
f
id
e
n
ti
a
li
t
y
.
Th
e
o
b
jec
ti
v
e
o
f
d
a
ta
e
n
c
ry
p
ti
o
n
i
s
to
k
e
e
p
d
i
g
it
a
l
d
a
ta
c
o
n
fi
d
e
n
ti
a
li
t
y
sa
v
e
a
s
it
is
sto
re
d
o
n
c
o
m
p
u
ter
sy
ste
m
s
a
n
d
tran
sfe
rre
d
u
si
n
g
t
h
e
i
n
tern
e
t
o
r
o
t
h
e
r
c
o
m
p
u
ter
n
e
tw
o
rk
s.
I
n
t
h
is
p
a
p
e
r
we
will
fo
c
u
s
in
e
n
h
a
n
c
i
n
g
se
c
u
ri
ty
lev
e
l
o
f
th
e
e
n
c
ry
p
t
io
n
-
d
e
c
ry
p
ti
o
n
p
r
o
c
e
ss
b
y
in
tro
d
u
c
i
n
g
a
n
o
v
e
l
m
e
th
o
d
,
wh
ich
u
se
s
a
n
y
d
i
g
it
a
l
c
o
l
o
r
ima
g
e
to
e
n
c
o
d
e
-
d
e
c
o
d
e
se
c
re
t
m
e
ss
a
g
e
,
th
e
u
sin
g
o
f
a
sp
e
c
ial
k
e
y
t
o
e
n
c
ry
p
t
-
d
e
c
ry
p
t
t
h
e
e
n
c
o
d
e
d
-
d
e
c
o
d
e
d
m
e
ss
a
g
e
,
t
h
e
c
o
l
o
r
ima
g
e
will
b
e
k
n
o
w
n
o
n
ly
b
y
t
h
e
tra
n
sm
it
ter
a
n
d
re
c
e
iv
e
r
to
k
e
e
p
th
e
p
r
o
c
e
ss
o
f
d
a
ta
trea
tme
n
t
c
o
n
fi
d
e
n
ti
a
l,
th
e
o
b
tain
e
d
e
x
p
e
rim
e
n
tal
re
su
lt
s
b
y
t
h
e
p
ro
p
o
se
d
m
e
th
o
d
will
b
e
a
n
a
ly
z
e
d
to
p
ro
v
e
t
h
e
e
n
h
a
n
c
e
m
e
n
t
i
n
p
ro
c
e
ss
e
fficie
n
c
y
a
n
d
c
o
n
fid
e
n
ti
a
li
t
y
.
K
ey
w
o
r
d
s
:
AE
S
Dec
o
d
er
DE
S
Dig
ital im
ag
e
E
n
co
d
er
Hig
h
t
H
is
to
g
r
am
LED
Sp
ee
d
u
p
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r
th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Am
jad
Y.
Hin
d
i,
C
o
m
m
u
n
icatio
n
E
n
g
in
ee
r
i
n
g
d
ep
ar
tm
en
t,
Facu
lty
o
f
E
n
g
in
ee
r
in
g
T
ec
h
n
o
lo
g
y
,
Al
-
B
alq
a
Ap
p
lied
Un
iv
er
s
ity
.
E
m
ail:
am
jad
h
in
d
i@
b
au
.
ed
u
.
j
o
1.
I
NT
RO
D
UCT
I
O
N
Dig
ital
co
lo
r
im
ag
e
[
1
-
3
]
is
o
n
e
o
f
m
o
s
t
co
m
m
o
n
ly
u
s
ed
d
ata
ty
p
es;
it
i
s
u
s
u
ally
r
ep
r
esen
te
d
b
y
a
3
D
m
atr
ix
(
r
ed
,
g
r
ee
n
,
a
n
d
b
l
u
e
c
o
lo
r
s
ar
e
ass
ig
n
ed
to
th
e
f
ir
s
t,
s
ec
o
n
d
,
an
d
th
i
r
d
d
im
e
n
s
io
n
s
co
r
r
esp
o
n
d
in
g
ly
)
,
ea
ch
co
lo
r
v
alu
e
is
r
an
g
es
f
r
o
m
0
to
2
5
5
,
th
e
r
ep
etitio
n
o
f
ea
ch
co
lo
r
v
alu
e
f
o
r
m
s
th
e
im
ag
e
h
is
to
g
r
am
[
4
,
5
]
as
s
h
o
wn
in
Fig
u
r
es
1
an
d
2
.
I
f
th
e
co
lo
r
im
ag
e
is
clea
r
an
d
n
o
r
m
alize
d
th
en
th
e
h
is
to
g
r
am
wil
l
co
v
er
all
th
e
v
alu
es
b
etwe
en
0
a
n
d
2
5
5
[
4
,
5
]
,
th
u
s
th
e
co
lo
r
v
alu
es
ca
n
b
e
u
s
ed
t
o
h
an
d
le
th
e
ASC
I
I
v
alu
e
o
f
a
n
y
ch
a
r
ac
ter
in
a
n
y
s
ec
r
et
m
ess
ag
e,
allo
win
g
u
s
to
u
s
e
th
e
co
lo
r
im
ag
e
f
o
r
s
ec
u
r
e
d
ata
cr
y
p
to
g
r
ap
h
y
.
T
h
e
g
o
al
o
f
d
ata
cr
y
p
to
g
r
ap
h
y
is
to
p
r
o
tect
d
ata
an
d
to
im
p
r
o
v
e
th
e
s
ec
u
r
ity
wh
er
ev
er
d
at
a
is
s
to
r
ed
o
r
co
n
v
ey
ed
[
6
]
.
Ma
n
y
m
eth
o
d
s
wer
e
p
r
o
p
o
s
ed
to
in
s
u
r
e
t
h
e
s
ec
u
r
it
y
o
f
tr
a
n
s
m
itted
s
ec
r
et
m
ess
ag
e
[
7
-
9
]
,
wh
ic
h
ar
e
u
s
in
g
th
e
tech
n
iq
u
es
o
f
d
ata
h
id
in
g
,
th
e
s
ec
r
et
m
ess
ag
e
is
t
o
b
e
h
id
d
en
in
a
co
v
er
i
n
g
im
a
g
e,
th
e
co
v
er
in
g
im
ag
e
will
b
e
en
cr
y
p
ted
[
1
0
-
1
5
]
.
I
n
th
is
r
esear
ch
,
a
n
ew
m
eth
o
d
wh
ich
is
f
alls
in
th
e
ca
teg
o
r
y
o
f
s
tan
d
ar
d
m
eth
o
d
o
f
d
ata
en
cr
y
p
tio
n
-
d
ec
r
y
p
tio
n
s
u
ch
as DE
S,
AE
S,
L
E
D,
an
d
h
ig
h
t m
eth
o
d
s
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
A
n
o
ve
l m
eth
o
d
fo
r
d
ig
ita
l
d
a
t
a
en
co
d
in
g
-
d
ec
o
d
in
g
(
A
mja
d
Y.
Hin
d
i
)
2773
Fig
u
r
e
1
.
C
o
lo
r
im
ag
e
an
d
h
is
t
o
g
r
am
Fig
u
r
e
2
.
R
esh
ap
ed
c
o
lo
r
im
a
g
es a
n
d
to
tal
h
is
to
g
r
a
m
2.
B
ACK
G
RO
UND
2
.
1
.
DE
S e
ncry
ptio
n
-
decr
y
ptio
n
Data
en
cr
y
p
tio
n
s
tan
d
ar
d
(
DE
S)
[
1
6
]
is
a
b
lo
c
k
cip
h
er
,
at
t
h
e
en
cr
y
p
tio
n
s
ite,
DE
S
d
iv
i
d
es
th
e
s
ec
r
et
m
ess
ag
e
in
to
6
4
b
its
b
lo
ck
s
,
tak
es
a
6
4
-
b
it
tex
t
an
d
m
ak
es
a
6
4
-
b
it
co
d
e;
at
th
e
r
ec
ei
v
in
g
en
d
,
DE
S
tak
es
a
6
4
-
b
it
cip
h
er
tex
t
an
d
cr
ea
t
es
a
6
4
-
b
it
b
lo
ck
.
T
h
ep
r
o
ce
s
s
o
f
en
cr
y
p
tio
n
is
two
p
ar
ts
wh
ich
ar
e
i
n
itial
p
er
m
u
tatio
n
s
an
d
f
in
al
p
er
m
u
t
atio
n
s
(
P
-
b
o
x
es),
an
d
s
ix
teen
Feis
tel
r
o
u
n
d
s
[
1
5
,
1
7
]
.
E
ac
h
Feis
tel
r
o
u
n
d
u
s
es
a
d
if
f
e
r
en
t
k
ey
g
en
e
r
ated
b
y
an
alg
o
r
ith
m
d
escr
ib
ed
b
elo
w
.
Fig
u
r
e
3
s
h
o
ws
th
e
s
tr
u
ctu
r
e
o
f
d
ata
en
cr
y
p
tio
n
s
tan
d
ar
d
at
th
e
s
en
d
e
r
s
ite.
Fig
u
r
e
3
.
DE
S st
r
u
ctu
r
e
[
1
8
]
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
18
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
2
7
7
2
-
2779
2774
2
.
2
.
AE
S da
t
a
encr
y
ptio
n
-
de
cr
y
ptio
n
Ad
v
an
ce
d
en
c
r
y
p
tio
n
s
tan
d
ar
d
(
AE
S)
co
n
s
is
ts
o
f
two
tech
n
iq
u
es
f
o
r
en
cr
y
p
tio
n
a
n
d
d
e
cr
y
p
tio
n
o
f
cip
h
er
tex
t.
W
h
ich
a
r
e
k
n
o
wn
a
s
s
u
b
s
titu
tio
n
an
d
p
e
r
m
u
tatio
n
n
etwo
r
k
(
SP
N)
[
1
9
,
20
]
.
AE
S
d
ea
ls
with
p
lain
tex
t
b
lo
ck
s
o
f
1
2
8
b
its
(
1
6
b
y
tes)
s
ize.
E
ac
h
b
lo
c
k
is
r
ep
r
esen
ted
b
y
4
x
4
m
atr
i
x
es a
n
d
AE
S
o
p
e
r
ates o
n
a
m
atr
i
x
o
f
b
y
tes.
AE
S
u
s
es
s
ev
er
al
r
o
u
n
d
s
an
d
lo
g
ical
-
m
ath
em
atica
l
o
p
er
atio
n
to
p
er
f
o
r
m
en
cr
y
p
ti
o
n
an
d
d
ec
r
y
p
ti
o
n
p
r
o
ce
s
s
es a
s
s
h
o
wn
in
Fig
u
r
e
4
[
20
]
Fig
u
r
e
4
.
AE
S st
r
u
ctu
r
e
[
1
5
]
2
.
3
.
H
i
g
ht
da
t
a
encr
y
pti
o
n
-
decr
ey
ptio
n
HI
GHT
(
Hig
h
s
ec
u
r
it
y
an
d
lig
h
t
weig
h
t)
is
a
s
y
m
m
etr
ic
m
et
h
o
d
o
f
d
ata
e
n
cr
y
p
tio
n
-
d
ec
r
y
p
tio
n
,
wh
ich
u
s
es
a
6
4
b
it k
ey
an
d
6
4
b
it
cip
h
er
tex
t
b
lo
ck
an
d
it
is
s
u
itab
l
e
f
o
r
lo
w
-
r
eso
u
r
ce
d
ev
ice
[
21
]
.
Hig
h
t h
asa
s
im
p
le
s
tr
u
ctu
r
e
with
u
s
esa
b
asic
ar
ith
m
etic
o
p
er
atio
n
–
XOR
as
s
h
awn
in
Fig
u
r
e
5
,
a
d
d
itio
n
/s
u
b
tr
ac
tio
n
in
m
o
d
u
lar
2
5
6
,
a
n
d
cir
c
u
lar
s
h
if
t r
o
tatio
n
,
with
o
u
t u
s
in
g
S
-
B
o
x
[
2
2
,
23
].
Fig
u
r
e
5
.
Hig
h
t stru
ctu
r
e
[
1
8
]
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
A
n
o
ve
l m
eth
o
d
fo
r
d
ig
ita
l
d
a
t
a
en
co
d
in
g
-
d
ec
o
d
in
g
(
A
mja
d
Y.
Hin
d
i
)
2775
2
.
4
.
L
E
D
da
t
a
encr
y
ptio
n
-
decr
y
ptio
n
L
ig
h
t e
n
cr
y
p
tio
n
d
e
v
ice
(
L
E
D
)
is
an
SP
N
ty
p
e
L
ig
h
tweig
h
t b
lo
ck
cip
h
e
r
was f
ir
s
t in
tr
o
d
u
c
ed
b
y
Gu
o
et
al.
in
2
0
1
1
[
24
]
.
T
h
e
s
tep
f
u
n
ctio
n
p
er
f
o
r
m
ed
8
tim
es
f
o
r
th
e
6
4
b
it
k
ey
an
d
1
2
tim
es
f
o
r
th
e
1
2
8
-
b
it
k
ey
s
.
T
h
e
k
e
y
s
u
s
ed
in
L
E
D
b
l
o
ck
c
ip
h
er
m
ay
v
ar
y
f
r
o
m
6
4
b
its
to
1
2
8
b
its
[
2
5
,
2
6
].
L
E
Dd
iv
id
es
th
e
i
n
p
u
t
k
ey
in
to
two
b
lo
ck
s
o
f
6
4
-
b
it k
e
y
s
an
d
p
r
o
ce
s
s
esin
p
ar
allel.
So
m
o
r
e
t
h
an
o
n
e
i
n
p
u
t
ca
n
b
e
p
r
o
ce
s
s
ed
at
a
tim
e,
th
e
r
eb
y
th
e
s
p
ee
d
o
f
ar
ch
itectu
r
e
in
cr
ea
s
ed
at
th
e
co
s
t
o
f
th
e
ar
ea
.
T
h
e
o
p
er
atio
n
in
v
o
lv
ed
in
t
h
e
ar
ch
itectu
r
e
is
ad
d
r
o
u
n
d
k
ey
,
ad
d
co
n
s
tan
t,
s
u
b
s
t
itu
te
ce
lls
,
s
h
if
t r
o
ws an
d
m
ix
co
lu
m
n
s
[2
6
].
3.
T
H
E
P
RO
B
L
E
M
Dig
ital
im
ag
e
h
as
a
h
u
g
e
s
ize
(t
he
d
im
en
s
io
n
s
o
f
a
d
ig
ital
im
ag
e
ar
e
ex
p
r
ess
ed
in
ter
m
s
o
f
its
p
ix
els,
f
o
r
in
s
tan
ce
“8
0
0
x
6
0
0
”
o
r
“1
5
2
0
x
1
2
8
0
”
w
h
er
e
th
e
f
ir
s
t
n
u
m
b
er
is
th
e
wid
th
o
f
th
e
p
h
o
to
an
d
th
e
s
ec
o
n
d
n
u
m
b
er
th
e
h
eig
h
t
o
f
th
e
p
h
o
t
o
)
.
Usi
n
g
th
e
av
ailab
le
s
tan
d
ar
d
s
o
f
d
ata
en
cr
y
p
tio
n
-
d
ec
r
y
p
tio
n
f
o
r
co
lo
r
im
ag
es
will
r
eq
u
ir
e
m
o
r
e
ef
f
o
r
ts
,
th
e
im
ag
e
m
u
s
t
b
e
d
iv
id
ed
in
to
b
lo
ck
s
,
ea
ch
b
lo
ck
m
u
s
t
b
e
en
cr
y
p
ted
,
an
d
th
en
d
ec
r
y
p
ted
.
T
h
is
will in
cr
ea
s
e
th
e
en
cr
y
p
ti
o
n
-
d
ec
r
y
p
tio
n
tim
es,
th
u
s
will d
ec
r
ea
s
e
th
e
s
tan
d
ar
d
m
eth
o
d
s
ef
f
icien
cy
.
4.
T
H
E
P
RO
P
O
SE
D
SO
L
U
T
I
O
N
T
h
e
p
r
o
p
o
s
ed
s
o
lu
tio
n
in
t
r
o
d
u
ce
s
a
m
eth
o
d
th
at
u
s
es
a
d
ig
ital
co
lo
r
im
ag
e
to
e
n
co
d
e
th
e
s
ec
r
et
m
ess
ag
e
in
th
e
en
cr
y
p
p
tio
n
p
h
ase,
an
d
th
e
s
am
e
co
lo
r
im
a
g
e
in
th
e
d
ec
r
y
p
tio
n
p
h
ase
as
an
im
a
g
e
-
d
ec
o
d
er
as
s
h
o
wn
i
n
Fig
u
r
e
6
.
T
h
e
f
o
llo
win
g
p
r
o
ce
d
u
r
es sh
o
w
th
e
im
p
lem
en
tatio
n
o
f
th
e
p
r
o
p
o
s
ed
m
et
h
o
d
:
a)
E
n
cr
y
p
tio
n
p
r
o
ce
d
u
r
e:
Ph
ase
1
: Pr
iv
ate
k
ey
(
PK)
g
e
n
er
atio
n
:
T
h
is
p
h
ase
will
b
e
im
p
lem
en
ted
o
n
ce
b
y
g
e
n
er
atin
g
a
r
a
n
d
o
m
in
teg
er
ar
r
a
y
with
a
b
ig
n
u
m
b
er
o
f
elem
en
t
to
s
u
it
an
y
m
ess
ag
e
with
an
y
len
g
th
,
th
e
g
e
n
er
ated
P
K
m
u
s
t
b
e
s
av
ed
an
d
m
u
s
t
b
e
k
n
o
wn
b
y
th
e
s
en
d
er
an
d
th
e
r
ec
ie
v
er
.
Ph
ase
2
: M
ess
ag
e
en
co
d
in
g
:
Me
s
s
ag
e
en
co
d
in
g
h
as
will b
e
i
m
p
lem
en
ted
as
f
o
llo
we
s
:
−
Select
th
e
s
ec
r
et
m
ess
ag
e.
−
Get
th
e
len
g
th
o
f
th
e
m
ess
ag
e.
−
Select
th
e
im
ag
e
-
en
co
d
er
.
−
Get
th
e
im
ag
e
s
ize.
−
R
esh
ap
e
th
e
im
ag
e
in
to
o
n
e
r
o
w
ar
r
ay
.
Fo
r
ea
ch
ch
ar
ac
ter
in
th
e
m
ess
ag
e
f
in
d
th
e
f
ir
s
t
o
cc
u
r
a
n
es o
f
ch
ar
ac
ter
ASC
I
I
v
alu
e
i
n
th
e
i
m
ag
e,
a
n
d
s
to
r
e
th
e
p
o
s
itin
g
in
en
c
o
d
ed
a
r
r
ay
.
Ph
ase
3
: E
n
cr
y
p
tio
n
p
h
ase:
T
h
e
E
n
cr
y
p
tio
n
p
h
ase
is
p
er
f
o
r
m
ed
b
y
th
e
f
o
llo
win
g
s
tep
s
:
−
L
o
ad
PK
−
Ad
ju
s
t th
e
PK to
m
atch
th
e
m
ess
ag
e
len
g
t.
−
XOR th
e
en
co
d
ed
ar
r
ay
with
PK to
g
et
th
e
en
cr
y
p
ted
m
ess
a
g
e
.
T
ab
le
1
s
h
o
ws an
e
x
am
p
le
o
f
m
ess
ag
e
en
cr
y
p
tio
n
.
Fig
u
r
e
6
.
Pro
p
o
s
ed
m
et
h
o
d
s
tr
u
ctu
r
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
18
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
2
7
7
2
-
2779
2776
T
ab
le
1
.
Me
s
s
ag
e
en
cr
y
p
tio
n
e
x
am
p
le
M
e
ss
a
g
e
c
h
a
r
a
c
t
e
r
s
En
c
o
d
e
d
m
e
ssa
g
e
K
e
y
En
c
r
y
p
t
e
d
m
e
ssa
g
e
z
1
9
5
8
2
4
2
1
8
7
6
i
1
3
4
8
58
1
4
0
6
a
1
0
0
9
1
5
4
8
7
5
d
7
0
2
1
2
3
7
0
9
1
6
5
6
2
2
7
1
6
9
1
a
1
0
0
9
1
9
4
8
1
9
l
9
0
8
1
1
6
1
0
1
6
q
2
1
1
5
4
2
1
1
9
a
1
0
0
9
2
0
9
8
0
0
d
7
0
2
1
1
3
7
1
9
i
1
3
4
8
1
5
6
1
4
9
6
b)
Dec
r
y
p
tio
n
p
r
oc
edur
e:
Ph
ase
1
: G
et
PK:
By
lo
ad
in
g
th
e
PKth
is
p
h
ase
c
an
b
e
im
p
lem
e
n
ted
.
Ph
ase
2
:
Get
th
e
d
ec
r
y
p
ted
m
ess
ag
e
T
h
e
m
ess
ag
e
tr
ea
tem
en
t ta
k
es
th
e
f
o
llo
win
g
f
o
u
r
s
tep
s
:
−
Use th
e
en
cr
y
p
ted
m
ess
ag
e.
−
f
in
d
th
e
m
ess
ag
e
len
g
th
.
−
Ad
ju
s
t PK
to
s
u
it th
e
m
ess
ag
e
len
g
th
.
−
XOR
th
e
k
ey
with
th
e
m
ess
ag
e
t
o
g
et
th
e
d
ec
o
d
ed
m
ess
ag
e
ar
r
ay
.
Ph
ase
3
: M
ess
ag
e
d
ec
o
d
in
g
T
h
e
p
r
o
ce
s
s
o
f
m
ess
ag
e
d
ec
o
d
in
g
h
asth
e
f
o
llo
win
g
s
tep
s
:
−
Get
th
e
d
ec
o
d
e
d
s
ec
r
et
m
ess
ag
e.
−
Get
th
e
len
g
th
o
f
th
e
m
ess
ag
e.
−
Select
th
e
im
ag
e
-
d
ec
o
d
er
.
−
Get
th
e
im
ag
e
s
ize.
−
R
esh
ap
e
th
e
im
ag
e
in
to
o
n
e
r
o
w
ar
r
ay
.
−
Use e
ac
h
v
alu
e
in
th
e
d
ec
o
d
e
d
m
ess
ag
e
as a
p
o
s
itio
n
in
th
e
i
m
ag
e
to
g
et
th
e
p
ix
el
v
alu
e
as a
n
ASC
I
I
co
d
e
o
f
th
e
ch
a
r
ac
ter
.
5.
I
M
P
L
E
M
E
NT
A
T
I
O
N
A
ND
E
XP
E
R
I
M
E
N
T
A
L
RE
SUL
T
S
A
m
atlab
co
d
e
was
wr
iten
to
im
p
lem
en
t
th
e
p
r
o
p
o
s
ed
m
et
h
o
d
o
f
m
ess
ag
e
en
cr
y
p
ti
o
n
-
d
ec
r
y
p
tio
n
,
s
ev
er
al
ex
p
er
im
en
t w
e
r
e
p
er
f
o
r
m
ed
as f
o
llo
w
o
s
:
a)
E
x
p
er
im
en
t
1
:
E
n
cr
y
p
tin
g
t
h
e
s
am
e
s
ec
r
et
m
ess
ag
e
u
s
in
g
v
ar
io
u
s
im
ag
e
-
en
c
o
d
er
:
On
e
s
ec
r
et
m
ess
ag
e
was
tak
en
,
th
e
p
r
p
o
s
ed
m
eth
o
d
was
i
m
p
lem
en
ted
u
s
in
g
v
a
r
io
u
s
co
lo
r
im
ag
es,
T
ab
le
2
s
h
o
ws
th
e
r
esu
lts
o
f
t
h
is
ex
p
er
im
en
t
.
Fr
o
m
th
e
r
esu
lts
s
h
o
wn
in
T
a
b
le
2
we
ca
n
s
ee
th
at
u
s
in
g
v
ar
io
u
s
co
lo
r
im
ag
e
as a
n
en
co
d
er
s
-
d
e
co
d
er
s
lead
s
to
p
r
o
d
u
cin
g
d
if
f
er
en
t e
n
co
d
ed
an
d
en
c
r
y
p
ted
m
ess
ag
es.
T
ab
le
2
.
E
x
p
er
im
en
t
1
r
esu
lts
Or
igi
n
a
l
mes
s
a
ge
I
mage
1
I
mage
2
I
mage
3
I
mage
4
I
mage
5
E
nc
ode
d
E
nc
r
yp
ted
E
nc
ode
d
E
nc
r
yp
ted
E
nc
ode
d
E
nc
r
yp
ted
E
nc
ode
d
E
nc
r
yp
ted
E
nc
ode
d
E
nc
r
yp
ted
z
2019
1809
133
119
159
109
403
353
132
118
i
61
7
243
201
260
318
487
477
79
117
a
76
214
222
68
311
429
384
282
73
211
d
33
90
224
155
270
373
1413
1534
75
48
410
377
24
251
9946
9785
704
547
298
457
a
76
142
222
28
311
501
384
322
73
139
l
30
106
115
7
214
162
505
397
252
136
q
51
55
494
490
316
312
420
416
88
92
a
76
157
222
15
311
486
384
337
73
152
d
33
80
224
145
270
383
1413
1524
75
58
i
61
161
243
111
260
408
487
379
79
211
b)
E
x
p
er
im
en
t
2
: E
n
cr
y
p
tin
g
d
ef
f
ir
en
t secr
et
m
ess
ag
es u
s
in
g
th
e
s
am
e
im
ag
e
-
en
co
d
er
:
Dif
f
er
en
t
s
ec
r
et
m
ess
ag
es
wer
es
tak
en
,
th
e
p
r
p
o
s
ed
m
eth
o
d
was
im
p
lem
en
ted
u
s
in
g
th
e
s
am
e
co
lo
r
im
ag
e
as a
n
en
co
d
er
-
d
ec
o
d
er
,
T
ab
le
3
s
h
o
ws th
e
r
esu
lts
o
f
th
is
ex
p
er
im
en
t
.
Fro
m
th
e
r
esu
lt
s
s
h
o
wn
in
T
ab
le
3
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
A
n
o
ve
l m
eth
o
d
fo
r
d
ig
ita
l
d
a
t
a
en
co
d
in
g
-
d
ec
o
d
in
g
(
A
mja
d
Y.
Hin
d
i
)
2777
we
ca
n
s
ee
th
at
u
s
in
g
th
e
s
am
e
co
lo
r
im
ag
e
to
en
co
d
e
-
d
ec
o
d
e
v
ar
io
u
s
m
ess
ag
es
lead
s
to
p
r
o
d
u
cin
g
d
if
f
er
en
t
en
co
d
ed
an
d
e
n
cr
y
p
ted
m
ess
ag
es
.
T
ab
le
3
.
E
x
p
er
im
en
t
2
r
esu
lts
M
e
ss
a
g
e
1
M
e
ss
a
g
e
2
M
e
ss
a
g
e
3
M
e
ss
a
g
e
4
M
e
ss
a
g
e
5
En
c
o
d
e
d
En
c
r
y
p
t
e
d
En
c
o
d
e
d
En
c
r
y
p
t
e
d
En
c
o
d
e
d
En
c
r
y
p
t
e
d
En
c
o
d
e
d
En
c
r
y
p
t
e
d
En
c
o
d
e
d
En
c
r
y
p
t
e
d
2
0
1
9
1
8
0
9
1
2
7
1
1
0
2
9
99
1
4
5
96
1
4
6
86
1
6
4
61
7
76
1
1
8
42
16
76
1
1
8
76
1
1
8
76
2
1
4
76
2
1
4
42
1
7
6
30
1
3
2
30
1
3
2
33
90
33
90
76
55
51
72
1
4
2
1
1
5
2
6
4
1
0
3
7
7
4
1
0
3
7
7
48
2
1
1
76
1
7
5
4
1
0
3
7
7
76
1
4
2
76
1
4
2
4
1
0
3
4
4
4
1
0
3
4
4
3
8
8
3
2
6
30
1
0
6
37
81
2
4
1
1
3
3
99
23
99
23
51
55
42
46
3
9
1
3
8
7
87
83
32
36
76
1
5
7
76
1
5
7
50
2
2
7
87
1
3
4
34
2
4
3
33
80
33
80
33
80
30
1
1
1
34
83
61
1
6
1
2
5
6
4
1
2
76
2
0
8
61
1
6
1
30
1
3
0
c)
E
x
p
er
im
en
t
3
: Calcu
latin
g
en
c
r
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
tim
es
Dif
f
er
en
t
c
o
lo
r
im
ag
es
wer
e
s
e
lecte
d
as
an
en
c
o
d
er
-
d
ec
o
d
e
r
a
n
d
u
s
ed
to
en
c
r
y
p
t
-
d
ec
r
y
p
t
8
b
y
tes
s
ec
r
et
m
ess
ag
e,
th
e
r
esu
lts
o
f
th
is
ex
p
er
im
en
t
ar
e
s
h
o
wn
in
T
ab
le
4
.
Fro
m
th
e
o
b
tain
ed
r
esu
lts
in
th
is
ex
p
er
im
en
t
we
ca
n
s
ee
th
at
an
y
co
lo
r
im
ag
e
c
an
b
e
u
s
ed
as
an
en
c
o
d
er
-
d
ec
o
d
er
,
b
u
t
it
is
b
etter
to
u
s
e
a
n
im
ag
e
with
s
m
all
s
ize,
th
is
im
ag
e
will
b
e
s
u
itab
le
an
d
will
r
ed
u
ce
th
e
en
cr
y
p
tio
n
t
im
e
(
en
cr
y
p
tio
n
tim
e
in
cl
u
d
es
en
co
d
in
g
tim
e
an
d
en
cr
y
p
tio
n
tim
e)
.
T
ab
le
4
.
E
x
p
er
im
en
t
3
r
esu
lts
I
mag
e
si
z
e
En
c
r
y
p
t
i
o
n
t
i
m
e
(
S
)
D
e
c
r
y
p
t
i
o
n
t
i
m
e
(
S
)
1
5
2
x
1
7
1
x
3
0
.
0
3
9
0
0
.
0
0
0
0
1
1
6
5
x
2
4
7
x
3
0
.
0
4
2
0
0
.
0
0
0
0
1
1
8
3
x
2
7
5
x
3
0
.
0
4
9
0
0
.
0
0
0
0
1
3
6
0
x
4
8
0
x
3
0
.
0
6
6
0
0
.
0
0
0
0
1
3
6
0
x
4
8
0
x
3
0
.
0
7
1
0
0
.
0
0
0
0
1
8
4
6
x
1
5
0
4
x
3
0
.
2
7
2
0
0
.
0
0
0
0
1
9
8
1
x
1
4
7
0
x
3
0
.
3
0
9
0
0
.
0
0
0
0
1
1
0
7
1
x
1
6
0
0
x
3
0
.
3
5
7
0
0
.
0
0
0
0
1
d)
E
x
p
er
im
en
t
4
: Co
m
p
ar
is
o
n
s
w
ith
o
th
er
m
eth
o
d
s
A
m
atlab
co
d
es
wer
e
to
im
p
le
m
en
t
o
th
er
s
tan
d
ar
d
s
o
f
m
ess
ag
e
en
cr
y
p
tio
n
-
d
ec
r
y
p
tio
n
,
a
m
ess
ag
e
o
f
8
b
y
tes
len
g
th
(
6
4
b
its
b
lo
ck
)
was
s
elec
ted
an
d
tr
ea
ted
b
y
ea
ch
m
eth
o
d
,
T
a
b
le
5
s
h
o
ws
th
e
r
esu
lts
o
f
th
is
ex
p
er
im
en
t.
Fro
m
th
e
r
esu
lts
s
h
o
wn
in
T
ab
le
5
we
ca
n
s
ee
th
at
th
e
p
r
o
p
o
s
ed
m
eth
o
d
is
th
e
m
o
s
t
ef
f
icien
t
m
eth
o
d
,
b
ec
au
s
e
it r
eq
u
ir
es a
m
in
im
u
m
tim
e
f
o
r
m
ess
ag
e
en
cr
y
p
tio
n
-
d
ec
r
y
p
tio
n
as sh
o
wn
in
Fig
u
r
e
7.
T
ab
le
5
.
E
x
p
er
im
en
t
4
r
esu
lts
Te
st
P
r
o
p
o
se
d
D
ES
A
ES
LED
H
i
g
h
t
1
0
.
0
3
9
4
0
.
0
7
6
9
0
.
3
4
4
1
0
.
3
0
8
4
0
.
2
6
6
3
2
0
.
0
3
9
3
0
.
0
7
6
3
0
.
3
4
4
8
0
.
3
0
8
9
0
.
2
6
6
0
3
0
.
0
3
9
3
0
.
0
7
6
2
0
.
3
4
4
4
0
.
3
0
8
5
0
.
2
6
6
7
4
0
.
0
3
9
4
0
.
0
7
6
9
0
.
3
4
4
9
0
.
3
0
8
8
0
.
2
6
6
7
5
0
.
0
3
9
4
0
.
0
7
6
2
0
.
3
4
4
7
0
.
3
0
8
5
0
.
2
6
7
0
6
0
.
0
3
9
6
0
.
0
7
6
6
0
.
3
4
4
7
0
.
3
0
8
5
0
.
2
6
6
6
7
0
.
0
3
9
1
0
.
0
7
7
0
0
.
3
4
4
3
0
.
3
0
8
5
0
.
2
6
6
4
8
0
.
0
3
9
0
0
.
0
7
6
7
0
.
3
4
4
2
0
.
3
0
8
4
0
.
2
6
6
2
9
0
.
0
3
9
5
0
.
0
7
6
9
0
.
3
4
4
2
0
.
3
0
8
9
0
.
2
6
6
6
10
0
.
0
3
9
9
0
.
0
7
6
0
0
.
3
4
4
2
0
.
3
0
8
0
0
.
2
6
6
7
T
h
e
av
e
r
ag
e
e
n
cr
y
p
tio
n
tim
es
f
o
r
th
e
u
s
ed
m
et
h
o
d
s
wer
e
c
alcu
lated
,
T
ab
le
6
s
h
o
ws
th
e
r
esu
lts
o
f
ca
lcu
latio
n
s
.
Fro
m
th
e
r
esu
lts
s
h
o
wn
in
T
ab
le
6
we
ca
n
ca
lc
u
late
th
e
s
p
ee
d
u
p
o
f
th
e
p
r
o
p
o
s
ed
m
eth
o
d
u
s
in
g
th
e
f
o
llo
win
g
f
o
r
m
u
la:
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
1
6
9
3
-
6
9
3
0
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
,
Vo
l.
18
,
No
.
5
,
Octo
b
e
r
2
0
2
0
:
2
7
7
2
-
2779
2778
=
ℎ
ℎ
ℎ
T
h
e
r
esu
lts
o
f
s
p
ee
d
u
p
ca
lc
u
latio
n
s
ar
e
s
h
o
wn
in
T
ab
le
7
.
Fro
m
th
e
r
esu
lts
s
h
o
wn
in
T
ab
le
7
we
ca
n
s
ee
th
at
th
e
p
r
o
p
o
s
ed
m
eth
o
d
h
as a
s
ig
n
if
ican
t sp
ee
d
u
p
co
m
p
ar
in
g
w
ith
o
th
er
s
tan
d
ar
d
s
o
f
d
a
ta
en
c
r
y
p
tio
n
.
Fig
u
r
e
7
.
T
im
e
co
m
p
a
r
is
o
n
s
T
ab
le
6
.
Av
e
r
ag
e
en
c
r
y
p
tio
n
tim
e
M
e
t
h
o
d
En
c
r
y
p
t
i
o
n
t
i
m
e
(
S
)
D
ES
0
.
0
7
6
0
A
ES
0
.
3
4
4
0
0
0
LED
0
.
3
0
8
0
H
i
g
h
t
0
.
2
6
6
0
0
0
P
r
o
p
o
se
d
0
.
0
3
9
0
T
ab
le
7
.
Sp
ee
d
u
p
ca
lcu
latio
n
M
e
t
h
o
d
S
p
e
e
d
u
p
D
ES
1
.
9
4
8
7
A
ES
8
.
8
2
0
5
LED
7
.
8
9
7
4
H
i
g
h
t
6
.
8
2
0
5
6.
CO
NCLU
SI
O
N
A
n
o
v
el
m
eth
o
d
o
f
d
ata
en
cr
y
p
tio
n
-
d
ec
r
y
p
tio
n
b
ased
o
n
i
m
ag
e
en
co
d
in
g
-
d
ec
o
d
i
n
g
was
p
r
o
p
o
s
ed
,
im
p
lem
en
ted
a
n
d
test
ed
,
f
r
o
m
th
e
o
b
tain
ed
ex
p
e
r
im
en
tal
r
esu
lts
we
ca
n
co
n
clu
d
e
th
at
th
e
p
r
o
p
o
s
ed
m
et
h
o
d
h
as
th
e
f
o
llo
win
g
ad
v
a
n
tag
es c
o
m
p
ar
ed
with
o
th
er
s
tan
d
a
r
d
s
u
s
e
d
f
o
r
d
ata
cr
y
p
to
g
r
ap
h
y
.
An
y
d
ig
ital im
ag
e
(
c
o
lo
r
o
r
g
r
ay
)
ca
n
b
e
u
s
ed
as
an
en
co
d
er
-
d
ec
o
d
er
,
a
n
y
m
ess
ag
e
ca
n
b
e
en
co
d
ed
-
d
ec
o
d
ed
b
y
an
y
im
ag
e
,
t
h
e
s
am
e
im
ag
e
ca
n
b
e
u
s
ed
to
en
c
o
d
e
-
d
ec
o
d
e
a
n
y
m
ess
ag
e
,
t
h
e
m
ess
ag
e
len
g
th
is
u
n
lim
ited
,
a
m
ess
ag
e
m
ay
b
e
co
n
s
id
er
ed
as
o
n
e
b
l
o
ck
,
o
r
it
ca
n
b
e
d
iv
id
e
d
in
to
b
lo
c
k
with
v
ar
io
u
s
s
izes
.
PK
g
en
er
atio
n
is
a
v
er
y
s
im
p
le
p
r
o
ce
s
s
an
d
it e
asy
to
u
p
d
ate
t
h
e
k
e
y
a
n
y
tim
e
.
T
h
e
p
r
o
p
o
s
ed
m
eth
o
d
h
as a
s
ig
n
if
ican
t sp
e
ed
u
p
,
th
u
s
it
is
m
o
r
e
ef
f
icien
t
th
an
o
th
e
r
m
eth
o
d
s
.
T
h
e
p
r
o
p
o
s
ed
m
eth
o
d
is
v
e
r
y
s
ec
u
r
e
.
I
t
p
r
o
v
id
es
two
lev
el
o
f
s
ec
u
r
ity
th
e
PK
lev
el
an
d
en
c
o
d
er
-
d
ec
o
d
e
r
lev
el.
RE
F
E
R
E
NC
E
S
[1
]
Z
.
A.
Alq
a
d
i
,
M
.
O.
Al
-
Dw
a
iri
,
A
.
A.
Ab
u
Ja
z
a
r
,
R
.
A
.
Zn
e
it
,
“
Op
ti
m
ize
d
Tru
e
-
RG
B
c
o
lo
r
Im
a
g
e
P
ro
c
e
ss
in
g
,
”
W
o
rld
Ap
p
li
e
d
S
c
ie
n
c
e
s J
o
u
rn
a
l
,
v
o
l
.
8
,
n
o
.
10
,
p
p
.
1
1
7
5
-
1
1
8
2
,
2
0
1
0
.
[2
]
Z
.
A.
Alq
a
d
i
,
A
.
A
.
M
o
u
sta
fa
,
M
.
Ald
u
a
ri
,
“
Tr
u
e
Co
lo
r
Im
a
g
e
En
h
a
n
c
e
m
e
n
t
Us
in
g
M
o
r
p
h
o
lo
g
i
c
a
l
Op
e
ra
ti
o
n
s,
”
In
ter
n
a
t
io
n
a
l
Rev
iew o
n
C
o
mp
u
te
rs
&
S
o
ft
w
a
re
,
v
o
l.
4
,
n
o
.
5
,
p
p
.
5
5
7
-
5
6
2
,
2
0
0
9
.
[3
]
A.
M
o
u
sta
fa
,
Z.
A
.
Al
q
a
d
i
,
“
C
o
lo
r
Im
a
g
e
Re
c
o
n
str
u
c
ti
o
n
Us
in
g
A
Ne
w
R'
G'
I
M
o
d
e
l
,
”
J
o
u
rn
a
l
o
f
Co
mp
u
ter
S
c
ien
c
e
,
v
o
l
.
5
,
n
o
.
4
,
p
p
.
2
5
0
-
2
5
4
,
2
0
0
9
.
Evaluation Warning : The document was created with Spire.PDF for Python.
T
E
L
KOM
NI
KA
T
elec
o
m
m
u
n
C
o
m
p
u
t E
l Co
n
tr
o
l
A
n
o
ve
l m
eth
o
d
fo
r
d
ig
ita
l
d
a
t
a
en
co
d
in
g
-
d
ec
o
d
in
g
(
A
mja
d
Y.
Hin
d
i
)
2779
[4
]
J
.
A
.
Az
z
e
h
,
H
.
Alh
a
tam
leh
,
Z
.
A.
Alq
a
d
i
,
M
.
K
.
Ab
u
z
a
lata
,
“
Cre
a
ti
n
g
a
C
o
l
o
r
M
a
p
t
o
b
e
u
se
d
t
o
Co
n
v
e
rt
a
G
ra
y
Im
a
g
e
to
Co
l
o
r
Im
a
g
e
,”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
A
p
p
li
c
a
ti
o
n
s
,
v
o
l
.
1
5
3
,
n
o
.
2
,
p
p
.
3
1
-
3
4
,
2
0
1
6
.
[5
]
J
.
A
.
Az
z
e
h
,
Z
.
Alq
a
d
i,
M
.
Ab
u
z
a
lata
,
“
P
e
rfo
rm
a
n
c
e
An
a
ly
sis
o
f
Artifi
c
ial
Ne
u
ra
l
Ne
two
r
k
s
u
se
d
fo
r
C
o
lo
r
Im
a
g
e
Re
c
o
g
n
it
i
o
n
a
n
d
Re
tri
e
v
in
g
,
”
I
n
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
M
o
b
il
e
C
o
mp
u
ti
n
g
,
v
o
l.
8
,
n
o
.
2
,
p
p
.
2
0
-
3
3
,
2
0
1
9
.
[6
]
M
.
J.
Aq
e
l,
Z
.
A.
Alq
a
d
i
,
I
.
M
.
E
l
Ema
ry
,
“
An
a
ly
sis
o
f
S
trea
m
Cip
h
e
r
S
e
c
u
rit
y
Alg
o
r
it
h
m
,
”
J
o
u
r
n
a
l
o
f
In
fo
rm
a
t
io
n
a
n
d
Co
m
p
u
ti
n
g
S
c
ien
c
e
,
v
o
l.
2
,
n
o
.
4
,
p
p
.
2
8
8
-
2
9
8
,
2
0
0
7
.
[7
]
J.
A
.
Az
z
e
h
,
B
.
Za
h
ra
n
,
Z
.
Al
q
a
d
i,
B
.
A
y
y
o
u
b
,
M
.
M
e
sle
h
,
“
A
No
v
e
l
Ba
se
d
o
n
Im
a
g
e
Blo
c
k
in
g
M
e
th
o
d
to
En
c
ry
p
t
-
De
c
ry
p
t
C
o
lo
r
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
n
I
n
fo
rm
a
ti
c
s V
isu
a
li
za
ti
o
n
,
v
ol
.
3
,
n
o
.
1
,
p
p
8
6
-
93
,
2
0
1
9
.
[8
]
A
.
Y.
Hi
n
d
i
,
M
.
O.
Dw
a
iri
,
Z
.
A.
AlQa
d
i,
“
A
No
v
e
l
Tec
h
n
iq
u
e
f
o
r
Da
ta
S
teg
a
n
o
g
ra
p
h
y
,
”
En
g
in
e
e
rin
g
,
T
e
c
h
n
o
lo
g
y
&
Ap
p
li
e
d
S
c
ie
n
c
e
Res
e
a
rc
h
,
v
o
l.
9
,
n
o
.
6
,
p
p
.
4
9
4
2
-
4
9
4
5
,
2
0
1
9
.
[9
]
J
.
Na
d
ir,
Z
.
Al
q
a
d
i,
A
.
A
.
Ei
n
,
“
Clas
sifica
ti
o
n
o
f
M
a
tri
x
M
u
lt
i
p
li
c
a
ti
o
n
M
e
th
o
d
s
Us
e
d
to
En
c
r
y
p
t
-
d
e
c
ry
p
t
C
o
lo
r
Im
a
g
e
,
”
In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
Co
mp
u
ter
a
n
d
In
fo
rm
a
t
io
n
T
e
c
h
n
o
lo
g
y
,
v
o
l.
5
,
n
o
.
5
,
p
p
.
4
5
9
-
4
6
4
,
2
0
1
6
.
[1
0
]
M
.
J.
Aq
e
l,
Z
.
A
.
Qa
d
i,
A
.
A
.
Ab
d
u
ll
a
h
,
“
RG
B
Co
lo
r
Im
a
g
e
En
c
ry
p
ti
o
n
-
De
c
ry
p
ti
o
n
Us
i
n
g
Im
a
g
e
S
e
g
m
e
n
tatio
n
a
n
d
M
a
tri
x
M
u
lt
i
p
li
c
a
ti
o
n
,
”
I
n
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
E
n
g
in
e
e
rin
g
&
T
e
c
h
n
o
lo
g
y
,
v
o
l.
7
,
n
o
.
3
.
1
3
,
p
p
.
1
0
4
-
107
,
2
0
1
8
.
[1
1
]
Z
.
A.
Al
q
a
d
i
,
M
.
O
.
Al
-
Dw
a
iri
,
H
.
Zain
i
,
e
t
a
l.
,
“
ZJICD
a
l
g
o
rit
h
m
fo
r
JPE
G
ima
g
e
c
o
m
p
re
ss
io
n
/
d
e
c
o
m
p
re
ss
io
n
,”
El
ixir In
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
,
v
o
l.
9
4
,
p
p
.
4
0
3
6
8
-
4
0
3
7
4
,
2
0
1
6
.
[1
2
]
A
.
Y.
He
n
d
i,
M
.
O.
Dw
a
iri
,
Z
.
A
.
Al
-
Qa
d
i,
a
n
d
M
.
S
o
l
ima
n
,
“
A
N
o
v
e
l
S
imp
le
a
n
d
Hig
h
l
y
S
e
c
u
re
M
e
th
o
d
f
o
r
Da
ta
En
c
ry
p
ti
o
n
-
De
c
ry
p
ti
o
n
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Co
mm
u
n
ic
a
ti
o
n
Ne
two
rk
s a
n
d
I
n
f
o
rm
a
ti
o
n
S
e
c
u
rit
y
,
v
o
l.
1
1
,
n
o
.
1
,
p
p
.
2
3
2
-
2
3
8
,
2
0
1
9
.
[1
3
]
J
.
Na
d
ir,
A
.
A
.
Ei
n
,
Z
.
Alq
a
d
i
,
“
A
Tec
h
n
iq
u
e
to
E
n
c
ry
p
t
-
d
e
c
ry
p
t
S
tere
o
Wav
e
F
il
e
,
”
I
n
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Co
mp
u
ter
a
n
d
In
fo
rm
a
t
io
n
T
e
c
h
n
o
lo
g
y
,
v
o
l.
05
,
n
o
.
05
,
p
p
.
4
6
5
-
4
7
0
,
2
0
1
6
.
[1
4
]
M
.
O.
Al
-
Dw
a
iri
,
A
.
Y.
He
n
d
i,
M
.
S
.
S
o
li
m
a
n
,
Z
.
A.
A
.
Alq
a
d
i,
“
A
n
e
w
m
e
th
o
d
fo
r
v
o
ice
sig
n
a
l
f
e
a
tu
re
s
c
re
a
ti
o
n
,
”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
E
lec
trica
l
a
n
d
C
o
mp
u
ter
En
g
in
e
e
rin
g
,
v
o
l.
9
,
n
o
.
5
,
p
p
.
4
0
9
2
~
4
0
9
8
,
2
0
1
9
.
[1
5
]
M
.
O.
Al
-
Dw
a
iri
,
A
.
Y.
He
n
d
i,
Z
.
A.
AlQa
d
i,
“
An
Eff
icie
n
t
a
n
d
Hig
h
l
y
S
e
c
u
re
Tec
h
n
i
q
u
e
t
o
E
n
c
ry
p
t
a
n
d
De
c
ry
p
t
Co
lo
r
Im
a
g
e
s,
”
E
n
g
i
n
e
e
rin
g
,
T
e
c
h
n
o
lo
g
y
&
Ap
p
li
e
d
S
c
ien
c
e
Res
e
a
rc
h
,
v
o
l.
9
,
n
o
.
3
,
p
p
.
4
1
6
5
-
4
1
6
8
,
2
0
1
9
.
[1
6
]
Na
ti
o
n
a
l
B
u
re
a
u
o
f
S
tan
d
a
rd
s
NBS
F
I
P
S
P
UB
8
1
,
“
G
u
id
e
li
n
e
s
fo
r
I
m
p
lem
e
n
ti
n
g
a
n
d
Us
i
n
g
th
e
NBS
Da
ta
En
c
ry
p
ti
o
n
S
tan
d
a
rd
,
U.S
.
De
p
a
rtme
n
t
o
f
Co
m
m
e
rc
e
,
”
1
9
9
5
.
[1
7
]
H.
Ala
n
a
z
i,
H.
A.
Ja
lab
,
A.
A.
Zai
d
a
n
,
B
.
B.
Zaid
a
n
,
“
Ne
w
F
ra
m
e
Wo
rk
o
f
Hi
d
d
e
n
Da
ta
with
in
N
o
n
M
u
lt
ime
d
ia
F
i
le
,”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
C
o
mp
u
ter
a
n
d
Ne
two
rk
S
e
c
u
rity
,
v
o
l.
2
,
n
o.
1
,
p
p
.
46
-
5
4
,
2
0
1
0
.
[1
8
]
A.
W.
Na
ji
,
S
.
A.
Ha
m
e
e
d
,
B.
B.
Zaid
a
n
,
e
t
a
l.
,
“
No
v
e
l
F
ra
m
e
wo
rk
fo
r
Hi
d
d
e
n
Da
ta
in
t
h
e
Im
a
g
e
P
a
g
e
with
in
Ex
e
c
u
tab
le
F
il
e
Us
i
n
g
Co
m
p
u
tati
o
n
b
e
twe
e
n
A
d
v
a
n
c
e
En
c
ry
p
ti
o
n
S
tan
d
a
rd
a
n
d
Dist
o
rti
o
n
Tec
h
n
iq
u
e
s
,”
In
ter
n
a
t
io
n
a
l
J
o
u
rn
a
l
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
In
fo
rm
a
ti
o
n
S
e
c
u
rity
,
v
o
l.
3
,
n
o
.
1
,
p
p
.
73
-
7
8
,
2
0
0
9
.
[1
9
]
Ja
in
R.
,
Je
ju
r
k
a
r
R.
,
C
h
o
p
a
d
e
S
.
,
Va
id
y
a
S
.
,
&
S
a
n
a
p
M
.
,
“
AES
Alg
o
rit
h
m
Us
in
g
5
1
2
Bi
t
Ke
y
Im
p
lem
e
n
tatio
n
fo
r
S
e
c
u
re
Co
m
m
u
n
ica
ti
o
n
,”
In
ter
n
a
t
io
n
a
l
jo
u
rn
a
l
o
f
i
n
n
o
v
a
ti
v
e
Res
e
a
rc
h
in
Co
mp
u
ter
a
n
d
Co
mm
u
n
ica
t
i
o
n
E
n
g
i
n
e
e
rin
g
,
v
o
l.
2
,
n
o
.
3
,
p
p
.
3
5
1
6
-
22
,
2
0
1
4
.
[2
0
]
Ab
d
u
l
lah
A.
M
.
,
Az
iz
R.
H.
H
.
,
“
Ne
w
Ap
p
ro
a
c
h
e
s
to
En
c
ry
p
t
a
n
d
De
c
ry
p
t
Da
ta
i
n
Im
a
g
e
u
si
n
g
C
ry
p
t
o
g
ra
p
h
y
a
n
d
S
teg
a
n
o
g
ra
p
h
y
Al
g
o
ri
th
m
,”
I
n
ter
n
a
ti
o
n
a
l
J
o
u
rn
a
l
o
f
C
o
mp
u
ter
A
p
p
li
c
a
ti
o
n
s
,
v
o
l.
1
4
3
,
n
o.
4
,
p
p
.
11
-
17
,
2
0
1
6
.
[2
1
]
J.
Da
e
m
e
n
,
L.
Kn
u
d
se
n
a
n
d
V.
Rij
m
e
n
,
“
Th
e
Bl
o
c
k
C
ip
h
e
r
S
q
u
a
re
,”
In
ter
n
a
ti
o
n
a
l
W
o
rk
sh
o
p
o
n
Fa
st
S
o
ft
wa
re
En
c
ry
p
ti
o
n
,
p
p
.
1
3
7
-
1
5
1
,
1
9
9
7
.
[2
2
]
M
.
F
e
ld
h
o
fe
r,
S
.
Do
m
in
i
k
u
s,
a
n
d
J.
W
o
lk
e
rsto
rfe
r,
“
S
tro
n
g
A
u
th
e
n
ti
c
a
ti
o
n
f
o
rRF
ID
S
y
ste
m
s
Us
in
g
th
e
AES
Alg
o
rit
h
m
,
”
In
ter
n
a
ti
o
n
a
l
W
o
rk
sh
o
p
o
n
Cry
p
t
o
g
ra
p
h
ic Ha
rd
w
a
re
a
n
d
Emb
e
d
d
e
d
S
y
ste
ms
,
2
0
0
4
.
[2
3
]
M
.
F
e
ld
h
o
fe
r,
J
.
Wo
lk
e
rsto
rfe
r,
a
n
d
V.
Rij
m
e
n
,
“
AES
Im
p
lem
e
n
tatio
n
o
n
a
G
ra
in
o
fS
a
n
d
,
”
IE
E
Pro
c
e
e
d
in
g
s
o
n
In
fo
rm
a
t
io
n
S
e
c
u
rity
,
v
o
l.
1
5
2
,
n
o
.
1
,
p
p
.
1
3
-
2
0
,
2
0
0
5
.
[2
4
]
B
.
Jy
rwa
,
R
.
P
a
il
y
,
“
An
Are
a
-
Th
ro
u
g
h
p
u
t
Eff
icie
n
t
F
P
G
A
Im
p
lem
e
n
tatio
n
o
f
Bl
o
c
k
Cip
h
e
r
AES
Alg
o
rit
h
m
,
”
In
ter
n
a
t
io
n
a
l
C
o
n
fer
e
n
c
e
o
n
A
d
v
a
n
c
e
s in
c
o
mp
u
ti
n
g
,
c
o
n
tro
l,
a
n
d
tele
c
o
mm
u
n
ica
ti
o
n
tec
h
n
o
lo
g
ies
,
2
0
0
9
.
[2
5
]
Li
m
C.
H.,
K
o
rk
is
h
k
o
T
,
“
m
Cry
p
t
o
n
–
A
Li
g
h
twe
i
g
h
t
Blo
c
k
Cip
h
e
r
fo
r
S
e
c
u
rit
y
o
f
Lo
w
Co
st
RF
ID
Tag
s
a
n
d
S
e
n
so
rs,”
In
ter
n
a
t
io
n
a
l
W
o
rk
sh
o
p
o
n
In
f
o
r
ma
ti
o
n
S
e
c
u
rity
Ap
p
li
c
a
ti
o
n
s
,
2
0
0
5
.
[2
6
]
Ho
n
g
D.,
S
u
n
g
J.,
H
o
n
g
S
.
,
e
t
a
l.
,
“
HIG
HT:
A
Ne
w
Blo
c
k
Cip
h
e
r
S
u
it
a
b
le
fo
r
Lo
w
-
Re
so
u
rc
e
De
v
ice
,”
8
th
In
ter
n
a
t
io
n
a
l
W
o
rk
sh
o
p
,
p
p
.
4
6
-
59
,
2
0
0
6
.
Evaluation Warning : The document was created with Spire.PDF for Python.