I
nte
rna
t
io
na
l J
o
urna
l o
f
E
lect
rica
l a
nd
Co
m
p
ute
r
E
ng
in
ee
ring
(
I
J
E
CE
)
Vo
l.
8
,
No
.
5
,
Octo
b
e
r
2
0
1
8
,
p
p
.
3
8
4
3
~3
8
5
1
I
SS
N:
2
0
8
8
-
8708
,
DOI
: 1
0
.
1
1
5
9
1
/
i
j
ec
e
.
v8
i
5
.
p
p
3
8
4
3
-
3851
3843
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ia
e
s
co
r
e
.
co
m/
jo
u
r
n
a
ls
/in
d
ex
.
p
h
p
/
I
JE
C
E
The Propo
sed
De
v
elo
p
m
en
t
o
f
Prot
o
type w
ith
Secret
M
ess
a
g
es
M
o
del in Whats
a
pp Chat
H
a
m
da
ni H
a
m
da
ni
1
,
H
er
u I
s
m
a
nto
2
,
Ag
us
Q
o
m
a
ru
dd
i
n M
un
ir
3
,
B
ud
i R
a
h
m
a
ni
4
,
A
n
dri Sy
a
f
ria
nto
5
,
Didit
Su
pr
iha
nto
6
,
Anin
dita
Septia
rini
7
1
,7
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
,
Un
iv
e
rsitas
M
u
law
a
r
m
a
n
,
S
a
m
a
rin
d
a
,
In
d
o
n
e
sia
2
De
p
a
rtme
n
t
o
f
In
f
o
rm
a
ti
c
s
En
g
in
e
e
rin
g
,
Un
iv
e
rsitas
M
u
sa
m
u
s,
M
e
ra
u
k
e
,
In
d
o
n
e
sia
3
De
p
a
rtme
n
t
o
f
In
f
o
rm
a
ti
c
s
M
a
n
a
g
e
m
e
n
t,
Un
iv
e
rsitas
Re
sp
a
ti
Yo
g
y
a
k
a
rta,
Yo
g
y
a
k
a
rta,
In
d
o
n
e
sia
4
De
p
a
rtme
n
t
o
f
In
f
o
rm
a
ti
c
s
,
S
T
M
IK Ban
jarb
a
ru
,
Ka
li
m
a
n
tan
S
e
lata
n
,
I
n
d
o
n
e
sia
5
De
p
a
rtme
n
t
o
f
In
f
o
rm
a
ti
c
s E
n
g
in
e
e
rin
g
,
S
T
M
IK E
l
Ra
h
m
a
,
Yo
g
y
a
k
a
rta,
In
d
o
n
e
sia
6
De
p
a
rtme
n
t
o
f
El
e
c
tro
n
ica
l
E
n
g
in
e
e
rin
g
,
Un
iv
e
rsitas
M
u
law
a
r
m
a
n
,
S
a
m
a
rin
d
a
,
In
d
o
n
e
sia
Art
icle
I
nfo
AB
ST
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Ma
y
2
8
,
2
0
1
8
R
ev
i
s
ed
A
u
g
1
2
,
2
0
1
8
A
cc
ep
ted
A
u
g
1
9
,
2
0
1
8
De
v
e
lo
p
m
e
n
t
o
f
p
ro
t
o
ty
p
e
a
t
d
a
ta
se
c
u
rit
y
th
ro
u
g
h
se
c
re
t
m
e
s
sa
g
e
s
is
n
e
e
d
e
d
f
o
r
d
isg
u
isin
g
th
e
m
e
ss
a
g
e
s
s
e
n
t
in
sm
a
rtp
h
o
n
e
c
h
a
tt
i
n
g
a
p
p
li
c
a
ti
o
n
,
W
h
a
ts
A
p
p
(W
A
)
Ch
a
t.
W
e
p
ro
p
o
se
a
m
o
d
e
l
to
d
isg
u
ise
a
p
lain
te
x
t
m
e
ss
a
g
e
w
h
ich
is
f
irst
e
n
c
ry
p
ted
b
y
c
r
y
p
t
o
sy
st
e
m
to
c
h
a
n
g
e
t
h
e
p
lai
n
tex
t
m
e
ss
a
g
e
to
c
ip
h
e
rtex
t.
P
lai
n
tex
t
o
r
p
lain
i
m
a
g
e
e
n
terin
g
th
e
sm
a
rtp
h
o
n
e
sy
ste
m
is
c
h
a
n
g
e
d
in
t
o
e
n
c
ry
p
ted
tex
t;
re
c
e
iv
e
r
th
e
n
c
a
n
re
a
d
th
e
m
e
ss
a
g
e
b
y
u
sin
g
sim
il
a
r
k
e
y
w
it
h
th
e
se
n
d
e
r.
T
h
e
w
e
a
k
n
e
ss
o
f
th
is
p
ro
p
o
sa
l
is
t
h
e
m
e
ss
a
g
e
ra
n
d
o
m
s
y
ste
m
is
n
o
t
p
lan
ted
d
i
re
c
tl
y
in
th
e
c
h
a
tt
in
g
a
p
p
li
c
a
ti
o
n
;
th
e
re
f
o
re
m
e
ss
a
g
e
re
m
o
v
in
g
p
ro
c
e
ss
f
ro
m
c
r
y
p
to
s
y
ste
m
to
WA
a
p
p
li
c
a
ti
o
n
is
stil
l
n
e
e
d
e
d
.
T
h
e
stre
n
g
th
o
f
u
sin
g
th
is
m
o
d
e
l
is
th
e
m
e
ss
a
g
e
s
se
n
t
w
il
l
n
o
t
b
e
e
a
sil
y
re
-
e
n
c
r
y
p
ted
b
y
h
a
c
k
e
r
a
n
d
c
a
n
b
e
u
se
d
a
t
c
li
e
n
t
c
o
m
p
u
ti
n
g
s
e
c
ti
o
n
.
K
ey
w
o
r
d
:
C
h
at
tin
g
Me
s
s
a
g
e
Secr
et
Secu
r
it
y
WA
Co
p
y
rig
h
t
©
2
0
1
8
In
stit
u
te o
f
A
d
v
a
n
c
e
d
E
n
g
i
n
e
e
rin
g
a
n
d
S
c
ien
c
e
.
Al
l
rig
h
ts re
se
rv
e
d
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Ha
m
d
an
i
Ha
m
d
a
n
i,
Dep
ar
te
m
en
t o
f
C
o
m
p
u
ter
Sci
en
ce
,
Facu
lt
y
o
f
C
o
m
p
u
ter
Scien
ce
an
d
I
n
f
o
r
m
atio
n
T
ec
h
n
o
lo
g
y
,
Un
i
v
er
s
ita
s
Mu
la
w
ar
m
a
n
,
J
alan
P
en
aj
am
,
Ka
m
p
u
s
Gu
n
u
n
g
Ke
lu
a,
Sa
m
ar
i
n
d
a
7
5
1
2
3
,
E
ast Ka
li
m
an
tan
,
I
n
d
o
n
e
s
ia.
E
m
ail:
h
a
m
d
a
n
i
@
f
k
ti.
u
n
m
u
l.a
c.
id
1.
I
NT
RO
D
UCT
I
O
N
I
t
is
b
eliev
ed
th
at
th
er
e
is
a
f
la
w
i
n
th
e
e
x
is
ti
n
g
p
r
o
to
ty
p
e
in
W
h
ats
A
p
p
(
W
A
)
s
y
s
te
m
k
n
o
w
n
b
y
h
ac
k
er
to
r
e
-
e
n
cr
y
p
t
th
e
m
e
s
s
a
g
es
s
e
n
t
t
h
r
o
u
g
h
o
u
r
s
m
ar
tp
h
o
n
e,
h
e
n
ce
ad
d
itio
n
al
d
ev
elo
p
m
e
n
t
o
f
t
h
e
ap
p
licatio
n
s
y
s
te
m
i
s
n
ee
d
ed
to
s
u
it
s
ec
o
n
d
ar
y
s
ec
u
r
it
y
i
n
s
en
d
in
g
an
d
r
ec
eiv
in
g
s
ec
r
et
m
ess
a
g
e
s
th
r
o
u
g
h
s
o
cial
ch
atti
n
g
s
y
s
te
m
[
1
]
-
[
3
]
.
C
h
at
tin
g
b
ased
co
m
m
u
n
icat
io
n
h
a
s
b
ee
n
d
o
n
e
b
y
m
an
y
p
eo
p
le
o
f
s
m
ar
tp
h
o
n
e
u
s
er
s
b
ec
au
s
e
o
f
i
t
s
ef
f
ec
t
iv
e
n
e
s
s
an
d
e
f
f
icien
c
y
[
2
]
,
[
4
]
-
[
6
]
.
C
o
m
m
u
n
icat
io
n
b
y
ch
att
in
g
is
a
f
o
r
m
o
f
t
h
e
m
o
s
t
ef
f
ec
ti
v
e
tex
t
u
al
co
m
m
u
n
icatio
n
u
s
ed
[
4
]
,
e.
g
.
th
e
te
x
t
u
al
co
n
v
er
s
atio
n
u
s
i
n
g
t
h
e
s
m
ar
tp
h
o
n
e
b
y
s
o
cial
m
ed
ia,
ch
atti
n
g
w
it
h
W
A
,
tel
e
g
r
a
m
,
etc
[
3
]
,
[
5
]
,
[
7
]
.
W
r
itin
g
s
ec
r
et
m
e
s
s
a
g
e
i
s
a
w
a
y
n
ee
d
ed
to
s
ec
u
r
e
d
ata
s
en
t
t
h
r
o
u
g
h
an
I
n
ter
n
et
co
n
n
ec
tio
n
,
th
u
s
ex
c
ep
t
th
e
s
e
n
d
er
an
d
r
ec
eiv
er
k
n
o
w
in
g
t
h
e
co
n
te
n
t
o
f
th
e
m
e
s
s
a
g
e,
th
er
e
w
il
l
b
e
n
o
b
o
d
y
w
h
o
k
n
o
w
s
an
d
r
ea
liz
ed
th
at
th
er
e
is
a
s
ec
r
et
m
es
s
a
g
e
s
e
n
t in
t
h
at
m
es
s
ag
e
[
8
]
.
P
lain
tex
t
a
n
d
p
lain
i
m
a
g
e
s
e
n
t
th
r
o
u
g
h
ch
at
tin
g
ap
p
licatio
n
ar
e
n
o
t
f
u
l
l
y
s
ec
u
r
ed
,
s
o
a
m
o
d
el
is
n
ee
d
ed
to
m
o
d
if
y
th
e
ad
d
itio
n
al
m
es
s
ag
e
in
t
h
e
p
r
o
ce
s
s
o
f
s
en
d
in
g
p
lain
tex
t
th
at
ca
n
b
e
e
n
cr
y
p
ted
[
9
]
.
T
h
en
,
th
er
e
i
s
a
p
o
s
s
ib
ilit
y
o
f
a
n
atta
ck
b
y
t
h
e
h
ac
k
er
to
r
e
-
e
n
cr
y
p
t
th
e
m
e
s
s
a
g
e
s
en
t
to
t
h
e
r
ec
eiv
er
[
1
0
]
,
[
1
1
]
.
A
s
a
co
n
s
eq
u
e
n
ce
,
th
e
s
e
n
d
er
an
d
r
ec
eiv
er
o
f
th
e
s
ec
r
et
m
es
s
a
g
e
ar
e
s
u
p
p
o
s
ed
to
d
esig
n
a
p
r
o
p
o
s
ed
m
o
d
el
b
ased
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
5
,
Octo
b
er
2
0
1
8
:
3
8
4
3
–
3
8
5
1
3844
o
n
n
ee
d
an
d
e
n
cr
y
p
tio
n
m
e
th
o
d
th
e
y
k
n
o
w
,
s
o
t
h
e
m
es
s
ag
e
s
en
t
a
n
d
r
ec
eiv
ed
w
il
l
b
e
li
m
ited
b
y
e
n
cr
y
p
ted
tex
t p
er
s
o
n
all
y
[
1
2
]
.
C
h
at
tin
g
m
o
d
el
d
o
n
e
in
d
i
v
id
u
all
y
o
r
in
t
h
e
g
r
o
u
p
d
o
es
n
o
t
h
av
e
a
n
y
s
ec
u
r
it
y
g
u
ar
a
n
tee
to
th
e
r
ec
eiv
er
,
y
et
t
h
e
p
lai
n
te
x
t
s
en
t
th
r
o
u
g
h
o
p
er
ato
r
s
er
v
er
is
f
r
ag
ile
o
f
h
ac
k
er
attac
k
[
1
0
]
,
[
1
1
]
.
P
lain
tex
t
a
n
d
p
lain
i
m
ag
e
s
a
v
ed
in
t
h
e
o
p
er
ato
r
s
er
v
er
ca
n
b
e
a
w
ea
k
n
ess
o
f
th
e
ap
p
licatio
n
u
s
er
s
w
h
o
f
e
el
s
ec
u
r
e
b
u
t
i
n
f
ac
t
th
er
e
ar
e
m
an
y
h
ac
k
er
a
ttack
s
ac
h
ie
v
i
n
g
te
x
t
u
al
i
n
f
o
r
m
atio
n
s
a
v
ed
i
n
t
h
e
s
er
v
er
[
1
3
]
-
[
1
5
]
,
s
o
an
ad
d
itio
n
al
n
et
w
o
r
k
co
n
tr
o
l so
f
t
w
ar
e
is
n
e
ed
ed
[
1
6
]
.
T
h
e
s
tep
s
o
f
s
en
d
i
n
g
m
e
s
s
a
g
e
th
r
o
u
g
h
m
o
b
ile
is
b
ased
o
n
m
es
s
ag
e
d
e
m
an
d
a
n
d
au
t
h
en
t
i
ca
tio
n
f
r
o
m
m
o
b
ile
A
to
m
o
b
ile
B
[
8
]
.
T
h
is
tech
n
iq
u
e
ca
n
u
s
e
s
ec
r
et
s
h
ar
in
g
tec
h
n
iq
u
e
u
s
i
n
g
m
o
b
ile
SMS
co
n
f
ir
m
a
tio
n
m
et
h
o
d
as
s
h
o
w
n
i
n
Fi
g
u
r
e
1
.
Mo
d
el
s
h
o
w
n
in
Fi
g
u
r
e
1
is
le
s
s
e
f
f
ec
ti
v
e
to
b
e
ap
p
li
ed
in
s
m
ar
tp
h
o
n
e
ap
p
licatio
n
s
y
s
te
m
b
ec
au
s
e
t
h
e
m
es
s
ag
e
s
e
n
t
t
h
r
o
u
g
h
s
m
ar
tp
h
o
n
e
is
a
lo
n
g
te
x
t,
i
m
ag
e
s
an
d
m
u
lti
-
p
ar
ticip
an
t
.
T
h
e
ex
a
m
p
le
o
f
m
u
l
ti
-
p
ar
ticip
an
t
tex
t se
n
d
in
g
in
a
c
h
at
r
o
o
m
is
s
h
o
w
n
b
y
Fi
g
u
r
e
2
.
Fig
u
r
e
1
.
T
h
e
au
th
en
t
icatio
n
f
l
o
w
c
h
ar
t [
8
]
Fig
u
r
e
2
.
A
b
s
tr
ac
ted
ch
at
cl
ie
n
t u
s
er
in
ter
f
ac
e,
in
cl
u
d
i
n
g
ex
a
m
p
le
s
o
f
u
s
er
,
s
y
s
te
m
,
an
d
ac
tio
n
m
e
s
s
a
g
es [
5
]
Fig
u
r
e
2
s
h
o
w
s
a
c
h
atti
n
g
p
r
o
ce
s
s
in
a
g
r
o
u
p
i
n
a
tex
t
u
al
ap
p
licatio
n
.
T
h
is
p
lain
tex
t
is
lik
el
y
d
an
g
er
o
u
s
to
b
e
attac
k
ed
b
y
o
u
ts
id
er
tr
y
i
n
g
to
ac
h
ie
v
e
t
h
o
s
e
in
f
o
r
m
atio
n
t
h
r
o
u
g
h
s
m
a
r
tp
h
o
n
e.
I
n
W
A
i
s
alr
ea
d
y
u
s
i
n
g
e
n
d
-
to
-
en
d
en
cr
y
p
t
io
n
,
b
u
t
w
e
n
ee
d
to
p
r
o
v
id
e
ad
d
itio
n
al
s
y
s
te
m
o
u
ts
id
e
th
e
W
A
s
y
s
te
m
,
s
o
u
s
er
s
f
ee
l
co
n
f
id
en
t
th
at
th
e
m
ess
a
g
es
s
en
t
ar
e
n
o
t
b
e
tap
p
ed
b
y
t
h
e
attac
k
er
s
.
Ne
x
t,
o
u
r
r
esear
ch
f
o
cu
s
es
o
n
h
o
w
to
d
is
g
u
i
s
e
m
e
s
s
a
g
es
s
en
t
th
r
o
u
g
h
ch
att
in
g
ap
p
licatio
n
in
s
m
ar
tp
h
o
n
e
s
y
s
te
m
u
s
ed
b
y
m
an
y
u
s
er
s
n
o
w
ad
a
y
s
.
T
h
e
p
lain
te
x
t
s
e
n
t
w
il
l
b
e
en
cr
y
p
ted
,
th
u
s
t
h
e
te
x
t
s
a
v
ed
in
t
h
e
o
p
er
ato
r
s
er
v
e
r
w
ill
n
o
t
b
e
ea
s
il
y
re
-
en
cr
y
p
ted
b
y
t
h
e
attac
k
er
s
.
T
h
e
tex
t
s
a
v
ed
ca
n
b
e
te
x
tu
a
l
[
1
7
]
o
r
im
ag
e
s
[
1
8
]
.
Dev
elo
p
m
en
t
o
f
a
m
o
d
el
o
f
s
ec
r
et
m
es
s
ag
e
s
t
h
r
o
u
g
h
W
A
v
o
ice
as in
t
h
e
cr
y
p
t a
n
al
y
s
is
o
f
t
w
o
p
ad
s
in
ca
s
e
o
f
co
m
p
r
e
s
s
ed
s
p
ee
ch
[
1
9
]
.
2.
RE
L
AT
E
D
WO
RK
I
n
t
h
e
d
ev
elo
p
m
e
n
t
o
f
t
h
e
p
r
o
p
o
s
ed
m
o
d
el
th
er
e
ar
e
s
ev
er
al
r
elate
d
s
tu
d
ie
s
d
ir
ec
tl
y
o
r
in
d
ir
ec
tl
y
,
s
o
s
o
m
e
p
r
io
r
r
esear
ch
is
n
ee
d
e
d
to
p
r
o
d
u
ce
a
p
r
o
t
o
ty
p
e
s
u
i
tab
le
f
o
r
th
e
s
ec
u
r
it
y
n
ee
d
s
o
f
th
e
n
ex
t
s
ec
r
et
m
es
s
ag
e
.
I
n
[
2
0
]
d
ev
elo
p
in
g
m
es
s
ag
e
a
u
t
h
e
n
ticatio
n
w
it
h
a
co
r
r
elate
d
s
etu
p
f
o
r
s
en
d
i
n
g
m
es
s
ag
e
s
as
d
o
n
e
b
y
B
o
b
an
d
A
lice.
Me
a
n
w
h
ile
,
[
2
1
]
an
al
y
ze
d
th
e
r
ec
en
tl
y
-
p
r
o
p
o
s
ed
b
lo
ck
cip
h
er
u
s
in
g
ce
l
l
u
lar
au
to
m
ata
(
C
A
)
an
d
th
e
s
el
f
-
i
n
v
er
tib
le
f
u
n
cti
o
n
.
T
h
is
p
ap
er
p
er
f
o
r
m
s
in
s
ec
u
r
it
y
a
n
al
y
s
i
s
o
f
th
e
cip
h
er
,
b
ec
au
s
e
o
f
it
s
co
n
j
u
g
ate
n
a
tu
re
.
T
h
e
r
esu
lts
o
f
t
h
is
s
tu
d
y
also
b
u
ild
th
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
w
it
h
o
u
t
k
n
o
w
led
g
e
o
f
t
h
e
s
ec
r
et
k
e
y
s
o
it
n
ee
d
s
to
b
e
f
i
x
ed
.
I
n
[
8
]
d
ev
elo
p
in
g
a
s
ec
r
et
-
k
e
y
cip
h
er
b
ased
o
n
a
n
o
n
-
lin
ea
r
s
tr
u
ct
u
r
ed
co
d
e
w
ith
t
h
e
d
is
tin
g
u
is
h
i
n
g
f
ea
t
u
r
e
t
h
at
i
ts
er
r
o
r
g
en
er
ato
r
is
i
m
p
le
m
e
n
te
d
b
y
a
n
o
n
-
lin
ea
r
co
m
b
in
at
io
n
o
f
co
d
e
w
o
r
d
s
o
f
t
w
o
li
n
ea
r
co
m
p
le
m
e
n
tar
y
co
d
es.
I
n
[
2
]
d
ev
elo
p
in
g
a
p
r
ac
tic
al
r
ep
u
tatio
n
s
y
s
te
m
f
o
r
p
er
v
a
s
iv
e
s
o
cial
ch
a
tti
n
g
w
it
h
Mo
b
ile
A
d
Ho
c
Net
w
o
r
k
(
M
A
NE
T
)
o
n
s
m
ar
tp
h
o
n
e.
I
n
th
i
s
s
t
u
d
y
[
2
2
]
,
a
g
en
er
al
attac
k
s
ce
n
ar
io
w
a
s
g
iv
e
n
in
o
r
d
er
to
co
n
d
u
ct
s
ec
u
r
it
y
an
al
y
s
es
o
f
c
h
ao
s
b
ased
cr
y
p
to
s
y
s
te
m
s
w
it
h
p
r
o
p
o
s
ed
cr
y
p
ta
n
al
y
s
i
s
o
f
a
n
e
w
i
m
ag
e
s
s
o
it c
an
b
e
u
s
ed
in
th
e
M
ANE
T
.
I
n
th
e
p
r
o
p
o
s
ed
alg
o
r
ith
m
,
t
h
e
s
ec
r
et
k
e
y
d
etec
ted
b
et
w
e
en
s
en
d
er
an
d
r
ec
eiv
er
w
a
s
u
s
ed
in
th
e
ca
lcu
latio
n
o
f
s
y
s
te
m
p
ar
a
m
e
ter
s
o
f
ch
ao
tic
m
ap
g
r
o
u
p
.
I
n
[
1
]
p
er
f
o
r
m
a
s
o
cial
g
r
ap
h
b
ased
tex
t
m
in
i
n
g
f
r
a
m
e
w
o
r
k
f
o
r
ch
at
lo
g
in
v
e
s
tig
a
tio
n
f
o
r
p
r
esen
ts
a
u
n
i
f
i
ed
s
o
cial
g
r
ap
h
b
ased
tex
t
m
i
n
in
g
f
r
a
m
e
w
o
r
k
.
Fu
r
t
h
er
,
it
n
ee
d
s
to
b
e
m
ad
e
f
o
r
s
ec
u
r
e
g
r
o
u
p
-
b
ased
m
o
b
il
e
ch
at
p
r
o
to
co
l
[
2
3
]
.
Fo
r
ex
am
p
le,
h
u
g
e
m
o
b
ile
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
Th
e
P
r
o
p
o
s
ed
Dev
elo
p
men
t
o
f
P
r
o
to
typ
e
w
ith
S
ec
r
et
Mes
s
a
g
es Mo
d
el
in
W
h
a
t
s
a
p
p
…
(
Ha
md
a
n
i H
a
md
a
n
i
)
3845
ap
p
licatio
n
s
(
M
-
A
P
P
s
)
cr
ea
ted
f
o
r
th
e
m
o
b
ile
co
m
m
u
n
icati
o
n
s
er
v
ices
w
h
ic
h
ar
e
n
o
t
o
n
l
y
f
o
r
v
o
ice
s
er
v
ice
s
,
b
u
t
also
f
o
r
s
o
cial
n
et
w
o
r
k
i
n
g
s
er
v
ices.
Me
a
n
w
h
ile
,
[
2
4
]
w
o
r
k
ed
o
n
f
o
r
v
is
u
al
cr
y
p
to
g
r
ap
h
y
ca
n
d
o
u
n
s
cr
a
m
b
led
b
y
H
u
m
a
n
Vi
s
u
a
l S
y
s
te
m
(
HV
S)
.
T
h
e
ef
f
ec
t
o
f
co
ac
h
i
n
g
an
d
f
ee
d
b
ac
k
o
n
o
n
lin
e
ch
a
ts
i
n
th
is
ca
s
e
al
s
o
f
o
u
n
d
in
t
h
e
s
t
u
d
y
[
2
5
]
.
C
o
ac
h
i
n
g
o
cc
u
r
r
ed
b
ef
o
r
e
ea
ch
ch
at,
an
d
f
ee
d
b
ac
k
w
as
p
r
o
v
id
ed
im
m
ed
iatel
y
a
f
ter
war
d
s
.
T
h
e
f
in
d
i
n
g
s
s
u
g
g
e
s
t
th
at
o
v
er
ti
m
e,
t
h
e
f
r
eq
u
en
c
y
o
f
h
ig
h
er
-
o
r
d
er
th
i
n
k
in
g
w
ill
i
n
cr
ea
s
e
m
o
r
e
i
n
a
g
r
o
u
p
t
h
at
r
ec
ei
v
es
co
ac
h
in
g
a
n
d
f
ee
d
b
ac
k
th
a
n
i
n
a
g
r
o
u
p
t
h
at
d
o
es
n
o
t
r
ec
eiv
e
co
ac
h
in
g
a
n
d
f
ee
d
b
ac
k
.
I
n
ad
d
itio
n
,
th
e
f
i
n
d
i
n
g
s
s
u
g
g
e
s
t
t
h
at
th
e
C
o
m
m
u
n
it
y
o
f
I
n
q
u
ir
y
f
r
a
m
e
w
o
r
k
h
a
s
b
en
e
f
its
b
e
y
o
n
d
its
u
s
e
i
n
co
u
r
s
e
d
esig
n
,
f
ac
ilit
a
tio
n
,
an
d
ass
es
s
m
en
t
to
in
c
lu
d
e
s
er
v
in
g
as
a
g
u
id
e
to
co
ac
h
in
g
[
2
5
]
.
New
s
te
g
a
n
o
g
r
ap
h
y
a
lg
o
r
ith
m
to
co
n
ce
al
a
lar
g
e
a
m
o
u
n
t
o
f
s
ec
r
et
m
e
s
s
ag
e
u
s
i
n
g
h
y
b
r
id
ad
ap
tiv
e
n
eu
r
al
n
et
w
o
r
k
s
w
i
th
m
o
d
if
ie
d
ad
ap
tiv
e
g
en
et
ic
alg
o
r
ith
m
[
2
6
]
.
Me
an
w
h
ile,
a
h
ig
h
ca
p
ac
it
y
tex
t ste
g
an
o
g
r
ap
h
y
s
ch
e
m
e
b
ased
o
n
L
Z
W
co
m
p
r
e
s
s
io
n
an
d
co
lo
r
co
d
in
g
[
2
7
]
.
T
h
e
s
teg
a
n
o
g
r
ap
h
ic
s
y
s
te
m
t
h
u
s
e
m
b
ed
s
s
ec
r
et
co
n
ten
t
in
c
o
v
er
m
ed
ia
(
li
k
e
tex
t,
i
m
a
g
e,
au
d
io
,
an
d
v
id
eo
)
s
o
th
at
its
e
x
is
ten
ce
is
n
o
t
d
etec
ted
to
an
ea
v
esd
r
o
p
p
er
.
I
m
p
o
s
to
r
Dete
ctio
n
T
h
r
o
u
g
h
C
h
a
t
An
al
y
s
is
also
d
o
n
e
b
y
[
3
]
f
o
r
v
er
i
f
y
t
h
e
id
en
tit
y
o
f
t
h
e
p
er
s
o
n
o
n
th
e
b
asis
o
f
h
is
w
r
i
tin
g
s
t
y
le.
I
n
t
h
i
s
ca
s
e
w
e
also
n
ee
d
a
m
o
d
el
th
at
ca
n
i
n
te
g
r
ate
th
e
s
y
s
te
m
i
n
s
e
n
d
i
n
g
te
x
t.
So
m
e
o
th
er
r
esear
ch
r
esu
l
ts
s
u
c
h
as i
n
[
1
4
]
an
d
[
2
3
]
.
I
n
[
2
8
]
an
e
n
cr
y
p
tio
n
al
g
o
r
ith
m
w
i
th
an
er
r
o
r
d
etec
tio
n
tec
h
n
iq
u
e
a
n
d
t
ec
h
n
iq
u
e
h
as
b
ee
n
s
u
cc
e
s
s
f
u
ll
y
v
er
i
f
ied
a
n
d
s
y
n
t
h
esized
u
s
in
g
X
ili
n
x
b
y
Sp
ar
tan
-
3
E
FP
GA
.
[
1
4
]
p
r
esen
t
a
s
ch
e
m
e
w
h
ich
allo
w
s
an
ar
b
itra
r
y
2
-
q
u
b
it
q
u
a
n
tu
m
s
tate
telep
o
r
tatio
n
b
et
w
ee
n
t
wo
r
em
o
te
p
ar
ties
w
it
h
co
n
tr
o
l
o
f
m
a
n
y
a
g
en
ts
i
n
a
n
et
w
o
r
k
,
w
h
ile
o
n
[
2
3
]
u
s
i
n
g
Mo
b
ile
C
h
at
(
MC)
a
n
d
Mo
b
ile
C
h
at
S
y
s
te
m
(
MCS
)
f
o
r
s
er
v
ices
p
la
y
s
a
v
er
y
i
m
p
o
r
tan
t
r
o
le
in
c
u
r
r
en
t
s
o
ci
al
n
et
w
o
r
k
i
n
g
.
T
h
u
s
,
b
o
th
th
e
Secu
r
e
E
n
d
-
to
-
E
n
d
Secu
r
e
Mo
b
ile
C
h
at
(
SE2
E
-
MC)
s
c
h
e
m
e
a
n
d
Sec
u
r
e
Gr
o
u
p
-
b
ased
Mo
b
ile
C
h
at
(
SG
-
MC
)
s
ch
e
m
e
ar
e
p
r
o
v
id
ed
t
h
e
s
u
it
ab
le
s
o
lu
tio
n
s
.
T
h
e
d
esig
n
a
n
d
i
m
p
le
m
e
n
tat
io
n
o
f
s
ec
u
r
e
c
h
att
in
g
ap
p
licatio
n
w
it
h
en
d
to
en
d
e
n
cr
y
p
t
io
n
[
2
9
]
an
d
co
m
b
in
i
n
g
s
teg
a
n
o
g
r
ap
h
y
an
d
cr
y
p
to
g
r
ap
h
y
o
n
an
d
r
o
id
p
latf
o
r
m
to
ac
h
i
v
e
a
h
i
g
h
-
le
v
el
s
ec
u
r
it
y
[
3
0
]
.
3.
P
RO
P
O
SE
D
M
E
T
H
O
D
Data
s
ec
u
r
it
y
m
o
d
el
is
n
ee
d
ed
to
en
cr
y
p
t
clie
n
t
m
e
s
s
a
g
e
b
ef
o
r
e
s
en
d
in
g
th
r
o
u
g
h
th
e
p
r
o
v
id
er
s
er
v
ice,
t
h
u
s
th
e
m
e
s
s
a
g
e
h
a
s
b
ee
n
en
cr
y
p
ted
w
h
en
it
is
r
ec
e
iv
ed
b
y
t
h
e
s
er
v
er
.
P
lain
te
x
t
a
n
d
p
lain
i
m
a
g
e
s
e
n
t
to
th
e
o
th
er
u
s
er
s
w
ill
n
o
t
b
e
ea
s
il
y
r
ea
d
w
i
th
ap
p
licatio
n
s
u
ch
as
W
A
b
ef
o
r
e
d
ec
r
y
p
ted
to
p
lain
tex
t.
I
n
th
i
s
m
et
h
o
d
,
w
e
p
r
ep
ar
e
s
o
m
e
m
ater
ial
co
n
s
is
ti
n
g
o
f
cr
y
p
t
o
g
r
ap
h
y
m
o
d
el
s
u
ch
a
s
v
i
g
en
er
e
cip
h
er
an
d
tr
an
s
p
o
s
itio
n
to
en
cr
y
p
t t
h
e
m
ess
a
g
e
s
en
t a
n
d
to
s
m
ar
tp
h
o
n
e
as sen
d
er
an
d
r
ec
eiv
er
.
I
n
th
i
s
ca
s
e,
w
e
tr
y
to
d
o
en
cr
y
p
tio
n
b
y
u
s
i
n
g
v
i
g
e
n
er
e
m
o
d
el,
tr
an
s
p
o
s
itio
n
an
d
w
eb
s
er
v
ice
f
o
r
test
i
n
g
w
h
et
h
er
t
h
e
m
ess
a
g
e
s
w
e
s
en
t
ca
n
b
e
e
n
cr
y
p
ted
i
n
t
h
e
s
m
ar
tp
h
o
n
e
s
y
s
te
m
.
Me
a
n
w
h
ile,
w
e
u
s
e
w
eb
s
er
v
ice
f
o
r
in
te
g
r
ati
n
g
d
ata
f
r
o
m
c
lien
t
in
t
h
e
s
m
ar
tp
h
o
n
e
s
o
th
at
th
e
m
es
s
ag
e
w
r
itte
n
i
n
th
e
clien
t
ap
p
licatio
n
ca
n
b
e
ac
ce
p
ted
b
y
W
A
ch
a
t
s
y
s
te
m
.
T
h
is
m
et
h
o
d
is
p
r
o
p
o
s
ed
to
s
ec
u
r
e
tex
t
u
al
m
es
s
a
g
e
an
d
i
m
a
g
es
s
e
n
t
th
r
o
u
g
h
ch
at
tin
g
s
y
s
te
m
h
en
c
e
th
e
u
s
er
s
o
f
ch
a
ttin
g
ap
p
lic
atio
n
f
ee
l
m
o
r
e
s
ec
u
r
ed
.
T
h
e
s
tep
s
o
f
p
r
o
p
o
s
ed
m
o
d
el
i
n
d
e
v
elo
p
in
g
p
r
o
to
ty
p
e
w
i
th
s
ec
r
et
m
e
s
s
a
g
e
m
o
d
el
as
s
h
o
w
n
i
n
Fi
g
u
r
e
3
w
e
ar
e
w
o
r
k
i
n
g
o
n
i
s
u
s
ed
f
o
r
m
es
s
ag
e
s
en
d
i
n
g
p
r
o
ce
s
s
w
r
itte
n
b
y
s
en
d
er
an
d
th
e
n
r
ec
eiv
ed
b
y
o
t
h
er
s
.
Fig
u
r
e
3
.
P
r
o
p
o
s
ed
m
eth
o
d
o
f
ch
at
m
e
s
s
a
g
es
s
ec
u
r
it
y
i
n
(
a)
p
r
iv
ate
ar
ea
to
(
b
)
p
u
b
lic
ar
ea
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
5
,
Octo
b
er
2
0
1
8
:
3
8
4
3
–
3
8
5
1
3846
I
n
Fi
g
u
r
e
3
w
e
ca
n
s
ee
th
e
p
r
o
ce
s
s
in
(
a)
p
r
iv
ate
ar
ea
a
n
d
(
b
)
p
u
b
lic
ar
ea
in
a
p
r
o
p
o
s
e
d
m
et
h
o
d
co
n
s
is
tin
g
o
f
s
e
n
d
er
(
1
)
as
th
e
s
ec
r
et
m
e
s
s
a
g
e
s
en
d
er
.
Sen
d
e
r
(
1
)
f
ill
in
th
e
te
x
tu
al
d
ata
o
r
i
m
a
g
es
as
p
lain
te
x
t
w
h
ic
h
is
th
e
n
en
cr
y
p
ted
b
ef
o
r
e
s
en
d
in
g
s
o
t
h
at
th
e
m
es
s
ag
e
s
e
n
t
to
th
e
s
m
ar
tp
h
o
n
e
is
in
th
e
f
o
r
m
o
f
cip
h
er
tex
t.
T
h
e
m
es
s
ag
e
is
t
h
en
s
e
n
t
to
th
e
p
r
o
v
id
er
s
(
2
)
p
lain
tex
t
as
th
e
o
r
ig
i
n
,
(
3
)
s
tep
f
o
r
m
e
s
s
a
g
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
(
ME
P
)
th
en
s
e
n
t
to
th
e
ch
at
tin
g
s
y
s
te
m
i
n
th
e
s
m
ar
t
p
h
o
n
e
(
4
)
r
ec
eiv
e
en
cr
y
p
ted
m
e
s
s
a
g
e
to
s
en
d
to
r
ec
eiv
er
s
th
r
o
u
g
h
p
r
o
v
id
er
s
.
(
5
)
I
SP
o
n
ly
r
ec
eiv
e
m
ess
a
g
e
t
h
an
ca
n
n
o
t
b
e
r
ea
d
th
e
o
r
ig
in
a
lit
y
a
n
d
th
en
s
en
t to
th
e
r
ec
eiv
er
s
a
s
th
e
d
esti
n
atio
n
(
6
)
.
T
h
e
r
ec
eiv
er
(
6
)
o
f
en
cr
y
p
ted
m
es
s
ag
e
t
h
e
n
in
p
u
t
th
e
e
n
cr
y
p
ted
m
es
s
ag
e
i
n
to
cr
y
p
to
s
y
s
te
m
i
n
th
e
s
m
ar
tp
h
o
n
e
to
b
e
en
cr
y
p
ted
(
7
)
b
y
m
es
s
ag
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
(
MD
P
)
b
ased
o
n
p
r
iv
ate
k
e
y
o
f
t
h
e
s
e
n
d
er
k
e
y
,
t
h
u
s
th
e
o
r
i
g
i
n
tex
t
as
th
e
p
lain
te
x
t
(
8
)
w
ill
b
e
r
et
u
r
n
ed
in
t
h
e
r
ec
ei
v
er
s
y
s
te
m
(
9
)
.
R
e
ce
iv
er
(
9
)
r
ec
eiv
es
th
e
m
es
s
ag
e
i
n
t
h
e
f
o
r
m
o
f
ci
p
h
er
tex
t
w
h
ic
h
is
n
e
x
t
w
i
ll
b
e
d
ec
r
y
p
ted
to
s
ee
t
h
e
o
r
ig
in
al
m
es
s
ag
e.
I
t
ca
n
b
e
s
ee
n
t
h
at
t
h
e
m
es
s
a
g
e
s
e
n
t
f
r
o
m
th
e
s
en
d
er
to
t
h
e
r
ec
eiv
er
th
r
o
u
g
h
p
r
o
v
id
er
is
a
cr
y
p
to
g
r
ap
h
y
m
et
h
o
d
en
cr
y
p
ted
m
e
s
s
a
g
e.
I
n
t
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
w
e
ar
e
w
o
r
k
i
n
g
o
n
,
th
er
e
ar
e
s
o
m
e
m
eth
o
d
s
i
n
b
u
ild
in
g
p
r
o
to
ty
p
e
o
f
s
ec
r
et
m
e
s
s
a
g
e
in
c
h
atti
n
g
.
T
h
ey
ar
e
:
3
.
1
.
M
ess
a
g
e
encr
y
ptio
n
a
nd
decr
y
ptio
n w
it
h v
ig
ener
e
cipher
m
o
del
Vig
e
n
er
e
C
ip
h
er
is
a
p
o
l
y
a
lp
h
ab
etic
s
u
b
s
t
itu
tio
n
cip
h
er
alg
o
r
ith
m
.
I
t
m
ea
n
s
,
f
o
r
ev
er
y
s
i
m
ilar
letter
in
a
p
lain
tex
t
is
n
o
t
s
u
b
s
tit
u
t
ed
b
y
a
letter
b
u
t
an
o
th
er
letter
b
ased
o
n
th
e
k
e
y
u
s
ed
to
en
cr
y
p
t.
Vig
en
er
e
C
ip
h
er
i
s
t
h
e
s
i
m
p
le
f
o
r
m
o
f
p
o
ly
a
lp
h
ab
etic
s
u
b
s
t
itu
tio
n
c
o
d
e
[
3
1
]
.
Vig
en
er
e
C
ip
h
er
i
s
v
er
y
w
ell
-
k
n
o
w
n
b
ec
au
s
e
it is
v
er
y
ea
s
y
to
u
n
d
er
s
tan
d
an
d
i
m
p
le
m
e
n
t
[
3
2
]
.
Vig
e
n
er
e
C
ip
h
er
ca
n
b
e
s
ee
n
o
n
Fi
g
u
r
e
4
.
Fig
u
r
e
4
.
Vig
en
er
e
cip
h
er
s
q
u
ar
e
m
e
th
o
d
[
3
2
]
T
o
p
er
f
o
r
m
Vig
e
n
er
e
cip
h
er
en
cr
y
p
tio
n
,
d
r
a
w
a
d
o
w
n
w
ar
d
v
er
tical
lin
e
f
r
o
m
t
h
e
p
lain
tex
t
in
t
h
e
v
ig
e
n
er
e
s
q
u
ar
e.
T
h
en
d
r
a
w
a
n
ac
r
o
s
s
li
n
e
f
r
o
m
t
h
e
k
e
y
lett
er
to
th
e
r
ig
h
t.
T
h
e
letter
at
t
h
e
in
ter
s
ec
tio
n
s
h
o
w
s
th
e
cip
h
er
te
x
t le
tter
w
it
h
ad
d
itio
n
[
3
1
]
.
Ma
th
e
m
atica
ll
y
,
th
e
en
cr
y
p
tio
n
p
r
o
ce
s
s
i
s
ex
p
r
ess
e
d
as f
o
llo
w
(
1
)
:
=
(
+
)
26
(
1
)
Dec
r
y
p
tio
n
is
d
o
n
e
o
p
p
o
s
itely
b
y
d
r
a
w
i
n
g
ac
r
o
s
s
li
n
e
f
r
o
m
k
e
y
le
tter
to
th
e
ch
ip
er
tex
t
letter
,
th
en
d
r
a
w
a
v
er
tical
lin
e
f
r
o
m
cip
h
er
tex
t
letter
to
th
e
p
lai
n
te
x
t
let
ter
w
it
h
s
u
b
tr
ac
tio
n
[
3
1
]
.
T
h
e
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
ca
n
b
e
w
r
itte
n
m
at
h
e
m
at
icall
y
as f
o
llo
w
(
2
)
:
=
(
−
)
26
(
2
)
w
h
er
e,
=
cip
h
er
tex
t
(
en
cr
y
p
t
io
n
tex
t)
=
p
lain
tex
t
=
k
e
y
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
Th
e
P
r
o
p
o
s
ed
Dev
elo
p
men
t
o
f
P
r
o
to
typ
e
w
ith
S
ec
r
et
Mes
s
a
g
es Mo
d
el
in
W
h
a
t
s
a
p
p
…
(
Ha
md
a
n
i H
a
md
a
n
i
)
3847
3
.
2
.
M
ess
a
g
e
encr
y
ptio
n
a
nd
decr
y
ptio
n w
it
h t
r
a
ns
po
s
it
io
n
mo
del
T
r
an
s
p
o
s
itio
n
m
o
d
el
is
b
a
s
ic
all
y
m
a
k
in
g
cip
h
er
tex
t
b
y
c
h
an
g
i
n
g
p
lai
n
tex
t
o
b
j
ec
t
-
o
b
j
ec
t
p
o
s
itio
n
w
it
h
o
u
t
s
h
if
t
in
g
th
e
p
lai
n
tex
t
o
b
j
ec
t,
th
u
s
in
t
h
i
s
tech
n
iq
u
e
an
o
th
er
ch
ar
ac
ter
is
n
o
t
n
ee
d
e
d
[
3
3
]
.
R
ea
d
in
g
th
e
m
atr
i
x
v
al
u
e
co
lu
m
n
b
y
co
l
u
m
n
b
a
s
ed
o
n
th
e
k
e
y
u
s
ed
is
d
o
n
e
to
g
et
t
h
e
cip
h
er
te
x
t b
y
u
s
in
g
th
i
s
tr
an
s
p
o
s
itio
n
tech
n
iq
u
e
[
3
4
]
.
C
h
ip
er
ex
am
p
le
o
f
ch
ar
ac
ter
tr
an
s
p
o
s
i
t
io
n
tech
n
iq
u
e
f
r
o
m
“
Un
iv
er
s
itas
M
u
la
w
ar
m
an
S
a
m
ar
i
n
d
a”
p
lain
te
x
t a
n
d
u
s
i
n
g
o
f
f
r
a
m
e
9
x
4
is
s
h
o
w
n
b
y
Fi
g
u
r
e
5
.
(
a)
(
b
)
Fig
u
r
e
5
.
(
a)
T
r
an
s
p
o
s
itio
n
m
o
d
el
an
d
(
b
)
ex
am
p
le
o
f
f
r
a
m
e
w
it
h
9
x
4
P
lain
tex
t i
s
ar
r
an
g
ed
to
t
h
e
r
ig
h
t t
h
en
d
o
w
n
w
ar
d
b
y
“
4
3
1
5
2
6
”
k
ey
,
s
o
th
e
cip
h
er
r
es
u
lt
w
il
l
f
o
llo
w
th
e
k
e
y
d
o
w
n
w
ar
d
as
“
I
T
A
NI
E
SAAD
NI
L
AR
US
UM
A
V
A
W
SN
R
M
R
M
A
”.
E
n
cr
y
p
tio
n
f
o
r
d
ata
d
is
g
u
i
s
i
n
g
b
y
u
s
i
n
g
k
e
y
i
s
k
n
o
w
n
as
e
n
cr
y
p
t
io
n
p
r
o
ce
s
s
.
T
h
e
k
e
y
u
s
ed
i
s
alp
h
an
u
m
er
ical
(
a
-
z,
A
-
Z
,
0
-
9
)
.
Fig
u
r
e
6
s
h
o
w
s
th
e
en
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
p
r
o
ce
s
s
as sh
o
w
n
in
Fig
u
r
e
7
at
f
r
a
m
e
9
x
4
p
ix
e
l.
(
a)
(
b
)
Fig
u
r
e
6
.
P
r
o
ce
s
s
o
f
v
er
tical
in
f
r
a
m
e
(
a)
h
o
r
izo
n
tal
e
n
cr
y
p
tio
n
(
b
)
h
o
r
izo
n
tal
d
ec
r
y
p
tio
n
(
a)
(
b
)
Fig
u
r
e
7
.
P
r
o
ce
s
s
o
f
v
er
tical
in
f
r
a
m
e
(
a)
v
er
tical
e
n
cr
y
p
tio
n
an
d
(
b
)
v
er
tical
d
ec
r
y
p
tio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
5
,
Octo
b
er
2
0
1
8
:
3
8
4
3
–
3
8
5
1
3848
Fig
u
r
e
6
s
h
o
w
s
a
p
r
o
ce
s
s
o
f
e
n
cr
y
p
tio
n
a
n
d
d
ec
r
y
p
tio
n
h
o
r
i
zo
n
tall
y
,
m
ea
n
w
h
ile
F
ig
u
r
e
7
s
h
o
w
s
th
e
p
r
o
ce
s
s
v
er
ticall
y
.
T
h
is
m
o
d
el
is
u
s
ed
to
j
u
m
b
le
t
h
e
n
u
m
b
er
o
f
p
ix
el
in
t
h
e
i
m
ag
e
s
s
o
it
ca
n
n
o
t
b
e
ea
s
il
y
r
ec
o
g
n
ized
w
h
e
n
it is
e
n
cr
y
p
te
d
an
d
ca
n
b
e
r
ec
o
g
n
ized
w
h
e
n
it is
d
e
cr
y
p
ted
.
3
.
3
.
I
nte
g
ra
t
io
n w
it
h
w
eb
s
er
v
ice
m
o
del
I
n
th
is
s
tep
w
e
ca
r
r
y
o
u
t
d
ata
in
teg
r
atio
n
b
y
u
s
i
n
g
w
eb
s
er
v
ice
to
ac
h
iev
e
s
ec
r
et
m
es
s
ag
e
th
r
o
u
g
h
s
en
d
er
an
d
r
ec
ei
v
er
i
n
w
h
ic
h
a
r
ch
itect
u
r
e
is
o
r
ie
n
ted
i
n
d
o
in
g
s
er
v
ice
p
r
o
d
u
cin
g
d
i
f
f
er
en
t
s
o
lu
tio
n
i
n
b
u
s
i
n
ess
lo
g
ic
w
ith
v
ar
io
u
s
ap
p
licatio
n
[
1
5
]
.
W
eb
s
er
v
ice
tech
n
o
lo
g
y
co
m
b
i
n
es
th
e
m
es
s
ag
e
s
e
n
t
t
h
r
o
u
g
h
W
h
at
s
A
p
p
(
W
A
)
w
eb
to
b
e
d
is
g
u
is
ed
.
T
h
e
m
o
d
el
o
f
ar
ch
itect
u
r
e
in
t
h
e
w
eb
s
er
v
ice
is
s
h
o
w
n
in
F
ig
u
r
e
8
:
W
e
b
S
e
r
v
i
c
e
s
S
O
A
P
U
D
D
I
W
S
D
L
X
M
L
a
n
d
X
M
L
R
e
l
a
t
e
d
S
t
a
n
d
a
r
d
s
H
T
T
P
S
M
T
P
F
T
P
I
n
t
e
r
n
e
t
P
r
o
t
o
c
o
l
s
Fig
u
r
e
8
.
W
eb
s
er
v
ices b
u
ild
i
n
g
b
lo
ck
s
[
1
5
]
3
.
4
.
Aut
ent
if
ica
t
io
n
m
o
del
An
au
t
h
e
n
ticatio
n
s
y
s
te
m
w
it
h
a
co
r
r
elate
d
s
etu
p
is
a
p
air
o
f
alg
o
r
ith
m
s
(
MAC
,
VER
)
f
o
r
a
s
o
u
r
ce
s
p
ac
e
Ѕ
,
a
m
es
s
ag
e
s
p
ac
e
M
an
d
a
d
is
tr
ib
u
tio
n
o
v
er
×
×
,
s
p
ec
if
i
ed
as f
o
llo
w
s
[
2
0
]
.
a.
Setu
p
(
1
)
.
I
n
itiall
y
,
is
tak
e
n
f
r
o
m
×
×
ac
co
r
d
in
g
to
A
lice
r
ec
ei
v
es
,
B
o
b
r
ec
eiv
es
an
d
Oscar
r
ec
eiv
es
.
b.
A
u
th
en
tica
tio
n
MAC
(
,
Ѕ
)
.
Up
o
n
S
∈
S,
A
lice
u
s
es
h
er
s
ec
r
et
k
e
y
to
r
u
n
alg
o
r
ith
m
MAC
to
g
en
er
ate
a
m
es
s
ag
e
M
=
MAC
(
,
S
).
c.
V
erif
ica
tio
n
VER
(
,
M
)
.
Up
o
n
M
∈
M,
B
o
b
u
s
es
h
is
s
ec
r
et
k
e
y
to
r
u
n
alg
o
r
ith
m
VER
to
co
m
p
u
t
e
−
=
VER
(
Yn
,
M
)
∈
S
∪
{
⊥
},
w
h
er
e
−
=
⊥
m
ea
n
s
t
h
at
B
o
b
ac
ce
p
ts
−
as
an
a
u
t
h
e
n
ticated
s
o
u
r
ce
s
tat
e
w
h
ile
−
=
⊥
m
ea
n
s
a
r
ej
ec
t
.
3
.
5
.
Securit
y
m
o
del
An
au
th
e
n
ticatio
n
s
y
s
te
m
(
M
A
C
,
VER
)
w
i
th
a
co
r
r
elate
d
s
etu
p
f
o
r
s
o
u
r
ce
s
p
ac
e
S.
d
is
tr
ib
u
tio
n
×
×
is
t
-
o
r
d
er
s
ec
u
r
e
i
f
t
h
e
f
o
llo
win
g
h
o
ld
s
.
I
f
u
s
er
attac
k
d
o
esn
’
t
at
tack
,
th
e
n
P
r
(
−
=S
|
S=
S)
i
s
×
×
is
t
-
o
r
d
er
s
ec
u
r
e
if
t
h
e
f
o
llo
w
i
n
g
h
o
ld
s
[
2
0
]
.
a.
Au
t
h
en
t
icatio
n
a
ttac
k
h
as o
n
l
y
a
n
eg
li
g
ib
le
s
u
cc
es
s
p
r
o
b
ab
ili
t
y
i
n
n
i
n
th
e
f
o
llo
w
i
n
g
at
tack
:
b.
Af
ter
s
ee
in
g
m
es
s
ag
e
s
M1
,
·
·
·
,
M
(
≤
t)
f
r
o
m
s
e
n
d
er
to
r
ec
eiv
e
r
,
attac
k
er
co
n
s
tr
u
ct
s
a
n
e
w
m
ess
a
g
e
M
∗
s
u
c
h
th
at
VER
(
Yn
,
M
∗
)
is
d
i
s
ti
n
ct
f
r
o
m
⊥
,
S1
,
·
·
·
,
S,
w
h
er
e
Sii
s
t
h
e
s
o
u
r
ce
s
ta
te
in
.
4.
RE
SU
L
T
S
A
ND
D
I
SCU
SS
I
O
N
4
.
1
.
I
m
ple
m
ent
a
t
io
n r
esu
lt
W
e
r
ec
o
g
n
ize
th
at
th
e
W
A
s
y
s
te
m
alr
ea
d
y
h
a
s
en
d
to
en
d
e
n
cr
y
p
tio
n
.
Ho
w
ev
er
,
w
e
n
ee
d
to
p
r
o
p
o
s
e
o
th
er
s
y
s
te
m
s
o
u
t
s
id
e
t
h
e
s
y
s
te
m
to
g
i
v
e
th
e
W
A
u
s
er
s
m
o
r
e
co
n
f
id
en
ce
i
n
t
h
e
m
es
s
ag
es
t
h
e
y
s
e
n
d
.
O
u
r
r
esear
ch
f
o
cu
s
e
s
o
n
e
n
cr
y
p
ti
n
g
a
n
d
d
ec
r
y
p
tin
g
tex
t
a
n
d
i
m
a
g
es
in
t
h
e
s
ec
r
et
m
e
s
s
a
g
e
t
h
r
o
u
g
h
c
h
att
in
g
to
b
e
ap
p
lied
in
W
A
ap
p
licatio
n
an
d
h
as s
u
cc
e
s
s
f
u
ll
y
test
ed
i
n
a
n
d
r
o
id
s
y
s
te
m
ap
p
licatio
n
,
t
h
u
s
th
e
te
x
t
w
i
ll b
e
f
ir
s
t
en
cr
y
p
ted
b
ef
o
r
e
s
e
n
d
in
g
to
th
e
W
A
ap
p
licatio
n
.
T
h
e
i
m
p
le
m
en
ta
tio
n
o
f
th
e
s
ec
r
et
m
ess
a
g
e
is
s
h
o
w
n
i
n
Fig
u
r
e
9
.
Fig
u
r
e
9
s
h
o
w
s
o
u
r
te
s
t
r
e
s
u
l
t
s
f
o
r
s
en
d
i
n
g
s
ec
r
et
m
ess
a
g
e
s
in
to
p
r
i
v
ate
a
n
d
g
r
o
u
p
ch
a
ts
.
T
h
e
r
esu
lt
o
f
en
cr
y
p
tio
n
p
r
o
ce
s
s
o
f
s
en
te
n
ce
T
HI
S
P
L
A
I
NT
E
XT
is
d
o
n
e
b
y
u
s
in
g
k
e
y
s
o
n
y
s
o
n
y
s
o
n
y
s
,
i.e
.
T
ex
t
f
o
r
T
is
en
cr
y
p
ted
to
k
e
y
S a
n
d
s
o
o
n
,
as th
e
r
es
u
lt t
h
e
s
t
ep
o
f
e
n
cr
y
p
tio
n
ca
n
b
e
s
ee
n
as f
o
llo
w
s
:
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
Th
e
P
r
o
p
o
s
ed
Dev
elo
p
men
t
o
f
P
r
o
to
typ
e
w
ith
S
ec
r
et
Mes
s
a
g
es Mo
d
el
in
W
h
a
t
s
a
p
p
…
(
Ha
md
a
n
i H
a
md
a
n
i
)
3849
(
T
+
S)
m
o
d
2
6
=
(
1
9
+
1
8
)
m
o
d
2
6
=
1
1
=
L
(
ap
p
lied
to
all
tex
t)
T
h
is
s
tep
is
ap
p
lied
to
all
letter
s
in
en
cr
y
p
tio
n
.
C
ip
h
er
tex
t is
r
esu
lted
as
f
o
llo
w
s
:
P
lain
tex
t
: T
HI
S
P
L
A
I
NT
E
XT
Ke
y
: so
n
y
s
o
n
y
s
o
n
y
s
C
ip
h
er
te
xt
: L
VVQ
H
Z
NGFH
R
V
L
T
o
f
in
d
p
lain
te
x
t r
es
u
lt i
n
d
ec
r
y
p
t
io
n
,
th
is
s
tep
i
s
ap
p
lied
:
(
L
-
S)
m
o
d
2
6
=
(
1
1
-
1
8
)
m
o
d
2
6
=
1
9
=
T
(
ap
p
lied
t
o
al
l te
x
t)
T
h
e
r
esu
lt o
f
m
e
s
s
a
g
e
d
ec
r
y
p
ti
o
n
ca
n
b
e
s
ee
n
as
f
o
llo
w
s
:
C
ip
h
er
te
x
t
: L
VVQ
H
Z
NGFH
R
V
L
Ke
y
: so
n
y
s
o
n
y
s
o
n
y
s
P
lain
tex
t
: T
HI
S
P
L
A
I
NT
E
XT
E
n
c
r
y
p
t
i
o
n
S
e
n
d
D
e
c
r
y
p
t
i
o
n
R
e
c
e
i
v
e
r
T
H
I
S
P
L
A
I
N
T
E
X
T
P
r
i
v
a
t
e
c
h
a
t
G
r
o
u
p
c
h
a
t
(
a)
(b
)
(c
)
Fig
u
r
e
9.
(
a)
I
m
p
le
m
e
n
tatio
n
o
f
p
lain
te
x
t a
n
d
p
ictu
r
e
to
W
h
ats
A
p
p
in
(
b
)
p
r
iv
ate
an
d
(
c)
g
r
o
u
p
s
ec
r
et
c
h
at
4
.
2
.
Dis
cu
s
s
io
n
r
es
ult
T
h
er
e
ar
e
s
o
m
e
w
ea
k
n
e
s
s
e
s
w
e
n
ee
d
to
i
m
p
r
o
v
e
i
n
t
h
e
m
o
d
el
w
e
ar
e
w
o
r
k
i
n
g
o
n
.
Fo
r
in
s
tan
ce
,
h
o
w
to
n
o
t
s
ep
ar
ate
s
ec
r
et
m
es
s
ag
e
s
y
s
te
m
an
d
W
A
s
o
t
h
at
t
h
e
m
o
d
el
d
e
v
elo
p
ed
d
o
es
n
o
t
n
e
ed
to
ca
r
r
y
o
u
t
t
w
o
s
tep
s
o
f
t
h
e
p
r
o
ce
s
s
;
m
e
s
s
a
g
e
s
en
t
e
n
cr
y
p
tio
n
an
d
m
e
s
s
a
g
e
r
ec
eiv
ed
d
ec
r
y
p
tio
n
i
n
t
h
e
s
y
s
te
m
an
d
s
e
n
d
in
g
a
m
es
s
ag
e
to
th
e
W
A
s
y
s
te
m
.
W
e
ass
u
m
e
it
is
m
o
r
e
p
r
ac
tical
an
d
s
af
e
to
h
a
v
e
th
e
m
o
d
el
s
ep
ar
ately
w
i
th
t
h
e
W
A
s
o
th
a
t u
s
er
s
d
o
n
o
t n
ee
d
to
en
cr
y
p
t th
e
m
es
s
ag
e
t
h
e
y
d
o
n
o
t in
ten
d
to
i
f
it d
o
es n
o
t r
eq
u
ir
e
a
s
ec
r
et
th
i
n
g
.
5.
CO
NCLU
SI
O
N
T
h
e
m
o
d
el
d
ev
elo
p
ed
h
a
s
p
r
o
d
u
ce
d
a
n
e
w
p
r
o
to
t
y
p
e
in
c
h
at
tin
g
ap
p
licatio
n
to
ad
d
s
ec
r
et
m
es
s
ag
e
a
s
tex
t
s
ec
u
r
it
y
.
T
h
e
m
o
d
el
ca
n
b
e
u
s
ed
b
y
u
s
er
s
o
f
t
h
e
ap
p
licat
io
n
i
n
t
h
eir
s
m
ar
tp
h
o
n
e.
As
t
h
e
r
esu
lt,
u
s
er
s
w
i
ll
b
e
m
o
r
e
s
ec
u
r
e
in
u
s
i
n
g
s
o
cial
ch
atti
n
g
ap
p
licatio
n
th
a
n
b
ef
o
r
e.
I
n
th
e
n
e
x
t r
esear
ch
,
w
e
ar
e
tr
y
in
g
to
in
teg
r
ate
th
e
p
r
o
to
ty
p
e
in
to
s
o
cial
ch
attin
g
ap
p
licatio
n
in
w
eb
s
o
th
at
th
e
m
o
d
el
ca
n
b
e
u
s
e
d
im
m
ed
iatel
y
a
n
d
e
m
b
ed
d
ed
in
W
A
s
y
s
te
m
.
RE
F
E
R
E
NC
E
S
[1
]
T
.
A
n
w
a
r
a
n
d
M
.
A
b
u
lais
h
,
“
A
S
o
c
ial
G
ra
p
h
b
a
se
d
T
e
x
t
M
in
in
g
F
ra
m
e
w
o
r
k
f
o
r
Ch
a
t
L
o
g
In
v
e
st
ig
a
ti
o
n
”
,
Dig
it
.
In
v
e
stig
.
,
v
o
l
.
1
1
,
n
o
.
4
,
p
p
.
3
4
9
-
3
6
2
,
De
c
.
2
0
1
4
.
[2
]
Z.
Ya
n
,
e
t
a
l.
,
“
A
P
ra
c
ti
c
a
l
Re
p
u
tatio
n
S
y
ste
m
f
o
r
P
e
rv
a
siv
e
S
o
c
ial
C
h
a
tt
i
n
g
”
,
J
.
Co
mp
u
t.
S
y
st.
S
c
i.
,
v
o
l.
7
9
,
n
o
.
5
,
p
p
.
5
5
6
-
5
7
2
,
A
u
g
.
2
0
1
3
.
[3
]
S
.
S
h
riv
a
sta
v
a
a
n
d
P
.
S
in
g
h
,
“
Im
p
o
sto
r
De
tec
ti
o
n
t
h
ro
u
g
h
Ch
a
t
A
n
a
l
y
s
is
”
,
Pro
c
e
d
ia
Co
m
p
u
t
.
S
c
i.
,
v
o
l
.
8
9
,
p
p
.
5
4
0
-
5
4
8
,
2
0
1
6
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
0
8
8
-
8708
I
n
t J
E
lec
&
C
o
m
p
E
n
g
,
Vo
l.
8
,
No
.
5
,
Octo
b
er
2
0
1
8
:
3
8
4
3
–
3
8
5
1
3850
[4
]
F
.
A
.
B.
H.
A
li
a
n
d
S
.
M
.
Ay
d
a
h
,
“
De
v
e
lo
p
m
e
n
t
o
f
P
ro
to
ty
p
e
Ch
a
t
S
y
st
e
m
Us
in
g
M
o
b
il
e
P
latf
o
rm
f
o
r
Disa
b
le
P
e
o
p
le
”
,
Pr
o
c
e
d
ia
-
S
o
c
.
Beh
a
v
.
S
c
i.
,
v
o
l.
5
7
,
p
p
.
3
3
-
3
9
,
Oc
t.
2
0
1
2
.
[5
]
D.
C.
Uth
u
s
a
n
d
D.
W
.
A
h
a
,
“
M
u
lt
ip
a
rt
icip
a
n
t
Ch
a
t
A
n
a
ly
sis:
A
S
u
rv
e
y
”
,
Arti
f.
In
tell
.
,
v
o
l
.
1
9
9
-
2
0
0
,
p
p
.
1
0
6
-
1
2
1
,
Ju
n
e
2
0
1
3
.
[6
]
E.
Ha
tf
ield
a
n
d
R.
L
.
Ra
p
so
n
,
“
F
ro
m
P
e
n
P
a
ls
to
Ch
a
t
Ro
o
m
s:
T
h
e
I
m
p
a
c
t
o
f
S
o
c
ial
M
e
d
ia
o
n
M
id
d
le
Eas
tern
S
o
c
iety
”
,
S
p
rin
g
e
rp
l
u
s
,
v
o
l
.
4
,
p
.
2
5
4
,
Ja
n
u
a
ry
2015.
[7
]
T
.
S
u
ti
k
n
o
,
e
t
a
l.
,
“
W
h
a
ts
A
p
p
,
V
ib
e
r
a
n
d
T
e
leg
ra
m
:
Wh
ich
is
th
e
Be
st
f
o
r
In
sta
n
t
M
e
ss
a
g
in
g
?
,
”
In
t.
J
.
El
e
c
tr.
Co
mp
u
t
.
E
n
g
.
,
v
o
l.
6
,
n
o
.
3
,
p
p
.
9
0
9
-
9
1
4
,
2
0
1
6
.
[8
]
V
.
C.
d
a
Ro
c
h
a
a
n
d
D.
L
.
d
e
M
a
c
e
d
o
,
“
A
S
e
c
re
t
-
K
e
y
Cip
h
e
r
b
a
se
d
o
n
a
No
n
-
L
in
e
a
r
S
tru
c
t
u
re
d
Co
d
e
”
,
Co
m
p
u
t
.
Co
mm
u
n
.
,
v
o
l.
2
2
,
p
p
.
7
5
8
-
7
6
1
,
1
9
9
9
.
[9
]
M
.
Ca
b
o
a
ra
,
e
t
a
l.
,
“
L
a
tt
ice
P
o
ll
y
Cra
c
k
e
r
c
r
y
p
to
s
y
ste
m
s
”
,
J
.
S
y
mb
.
C
o
mp
u
t.
,
v
o
l.
4
6
,
n
o
.
5
,
p
p
.
5
3
4
-
5
4
9
,
M
a
y
2
0
1
1
.
[1
0
]
B.
P
u
rn
a
m
a
a
n
d
a
.
H.
H.
Ro
h
a
y
a
n
i,
“
A
Ne
w
M
o
d
if
ied
Ca
e
sa
r
Cip
h
e
r
Cr
y
p
to
g
ra
p
h
y
M
e
th
o
d
w
it
h
Leg
ib
leCip
h
e
rtex
t
F
ro
m
a
M
e
ss
a
g
e
to
Be
En
c
ry
p
ted
”
,
Pro
c
e
d
ia
Co
mp
u
t.
S
c
i.
,
v
o
l.
5
9
,
n
o
.
Ic
c
sc
i,
p
p
.
1
9
5
-
2
0
4
,
2
0
1
5
.
[1
1
]
A
.
M
.
Yo
u
ss
e
f
,
“
Cr
y
p
tan
a
l
y
sis
o
f
a
Qu
a
d
ra
ti
c
Kn
a
p
sa
c
k
c
r
y
p
to
s
y
ste
m
"
,
Co
mp
u
t.
M
a
t
h
.
wit
h
Ap
p
l.
,
v
o
l.
6
1
,
n
o
.
4
,
p
p
.
1
2
6
1
-
1
2
6
5
,
F
e
b
.
2
0
1
1
.
[1
2
]
S
.
Ou
k
il
i
a
n
d
S
.
Bri,
“
Hig
h
T
h
ro
u
g
h
p
u
t
F
P
G
A
I
m
p
le
m
e
n
tatio
n
o
f
Da
ta
En
c
r
y
p
ti
o
n
S
ta
n
d
a
rd
w
it
h
T
i
m
e
V
a
riab
le
S
u
b
-
Ke
y
s
”
,
In
t.
J
.
El
e
c
tr.
Co
m
p
u
t
.
En
g
.
,
v
o
l.
6
,
n
o
.
1
,
p
p
.
2
9
8
-
3
0
6
,
2
0
1
6
.
[1
3
]
X
.
S
u
n
,
“
A
S
c
h
e
m
e
o
f
Co
n
c
e
a
lme
n
t
a
n
d
T
ra
n
sm
issio
n
o
f
S
e
c
re
t
In
f
o
rm
a
ti
o
n
in
T
e
x
t
F
il
e
s
”
,
Ph
y
s.
Pro
c
e
d
i
a
,
v
o
l.
2
5
,
p
p
.
1
3
6
5
-
1
3
6
8
,
2
0
1
2
.
[1
4
]
Z.
Zh
a
n
g
,
“
Co
n
tr
o
ll
e
d
T
e
l
e
p
o
rtatio
n
o
f
a
n
A
rb
i
trar
y
n
-
q
u
b
it
Qu
a
n
tu
m
In
f
o
r
m
a
ti
o
n
u
sin
g
Qu
a
n
tu
m
S
e
c
re
t
S
h
a
rin
g
o
f
Clas
sic
a
l
M
e
ss
a
g
e
”
,
Ph
y
s.
L
e
tt
.
A
,
v
o
l.
3
5
2
,
n
o
.
1
-
2
,
p
p
.
5
5
-
5
8
,
M
a
r.
2
0
0
6
.
[1
5
]
E
.
M
o
ra
d
ian
,
“
In
teg
ra
ti
n
g
Web
S
e
rv
ice
s
a
n
d
In
telli
g
e
n
t
Ag
e
n
ts
in
S
u
p
p
ly
Ch
a
in
f
o
r
S
e
c
u
rin
g
S
e
n
siti
v
e
M
e
ss
a
g
e
s
”
,
in
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
Kn
o
wled
g
e
-
Ba
se
d
a
n
d
In
tell
ig
e
n
t
In
f
o
rm
a
ti
o
n
a
n
d
En
g
in
e
e
rin
g
S
y
ste
ms
,
p
p
.
7
7
1
-
7
7
8
,
2
0
0
8
.
[1
6
]
I.
A
ls
m
a
d
i
a
n
d
D.
X
u
,
“
S
e
c
u
rit
y
o
f
S
o
f
t
w
a
re
D
e
f
in
e
d
Ne
tw
o
rk
s:
A
S
u
rv
e
y
”
,
Co
mp
u
t.
S
e
c
u
r.
,
v
o
l.
5
3
,
p
p
.
7
9
-
1
0
8
,
S
e
p
tem
b
e
r
2
0
1
5
.
[1
7
]
L
.
D.
S
in
g
h
a
n
d
K.
M
.
S
i
n
g
h
,
“
I
m
p
le
m
e
n
tatio
n
o
f
T
e
x
t
En
c
r
y
p
ti
o
n
u
s
in
g
El
li
p
ti
c
C
u
rv
e
Cr
y
p
to
g
ra
p
h
y
”
,
Pro
c
e
d
ia
Co
mp
u
t
.
S
c
i
.
,
v
o
l.
5
4
,
n
o
.
1
,
p
p
.
73
-
8
2
,
2
0
1
5
.
[1
8
]
J.
Zare
p
o
u
r
-
A
h
m
a
d
a
b
a
d
i,
e
t
a
l
.
,
“
A
n
A
d
a
p
ti
v
e
S
e
c
re
t
I
m
a
g
e
sh
a
rin
g
w
it
h
a
n
e
w
Bit
w
is
e
S
teg
a
n
o
g
ra
p
h
ic
P
r
o
p
e
rty
”
,
In
f.
S
c
i.
(
Ny
).
,
v
o
l.
3
6
9
,
p
p
.
4
6
7
-
4
8
0
,
N
o
v
e
m
b
e
r
2016.
[1
9
]
L
.
A
.
Kh
a
n
,
e
t
a
l.
,
“
Cry
p
t
An
a
l
y
sis
o
f
Tw
o
T
i
m
e
P
a
d
s
in
Ca
se
o
f
C
o
m
p
re
ss
e
d
S
p
e
e
c
h
”
,
Co
m
p
u
t
.
El
e
c
tr.
En
g
.
,
v
o
l.
3
7
,
n
o
.
4
,
p
p
.
5
5
9
-
5
6
9
,
Ju
ly
2
0
1
1
.
[2
0
]
S
.
Jia
n
g
,
“
On
m
e
ss
a
g
e
a
u
th
e
n
t
ica
ti
o
n
w
it
h
a
c
o
rre
late
d
se
tu
p
”
,
I
n
f.
Pro
c
e
ss
.
L
e
tt
.
,
v
o
l.
1
1
6
,
n
o
.
4
,
p
p
.
2
8
9
-
2
9
3
,
A
p
ril
2
0
1
6
.
[2
1
]
J.
S
u
n
g
,
e
t
a
l.
,
“
Cry
p
tan
a
ly
sis
o
f
a
n
In
v
o
l
u
ti
o
n
a
l
Bl
o
c
k
Cip
h
e
r
u
sin
g
Ce
ll
u
lar
A
u
to
m
a
ta
”
,
In
f.
Pro
c
e
ss
.
L
e
tt
.
,
v
o
l.
1
0
4
,
n
o
.
5
,
p
p
.
1
8
3
-
1
8
5
,
No
v
.
2
0
0
7
.
[2
2
]
F
.
Öz
k
a
y
n
a
k
a
n
d
A
.
B.
Öz
e
r,
“
Cry
p
tan
a
l
y
sis
o
f
a
n
e
w
I
m
a
g
e
En
c
r
y
p
ti
o
n
A
lg
o
rit
h
m
b
a
se
d
o
n
Ch
a
o
s
”
,
Op
t.
-
In
t
.
J
.
L
ig
h
t
El
e
c
tro
n
Op
t
.
,
v
o
l.
1
2
7
,
n
o
.
1
3
,
p
p
.
5
1
9
0
-
5
1
9
2
,
J
u
ly
2
0
1
6
.
[2
3
]
H.
-
C.
Ch
e
n
,
e
t
a
l.
,
“
A
S
e
c
u
r
e
g
r
o
u
p
-
b
a
se
d
M
o
b
il
e
Ch
a
t
P
r
o
t
o
c
o
l
”
,
J
.
Amb
ien
t
In
tell
.
Hu
ma
n
iz.
C
o
mp
u
t
.
,
v
o
l.
7
,
n
o
.
5
,
p
p
.
6
9
3
-
7
0
3
,
M
a
re
t
2
0
1
6
.
[2
4
]
A
.
V
.
Da
h
a
t
a
n
d
P
.
V
.
C
h
a
v
a
n
,
“
S
e
c
re
t
S
h
a
rin
g
b
a
se
d
V
isu
a
l
Cr
y
p
to
g
ra
p
h
y
S
c
h
e
m
e
Us
in
g
CM
Y
Co
lo
r
S
p
a
c
e
”
,
Pro
c
e
d
ia
C
o
mp
u
t.
S
c
i.
,
v
o
l.
7
8
,
p
p
.
5
6
3
-
5
7
0
,
2
0
1
6
.
[2
5
]
D.
S
.
S
tein
,
e
t
a
l.
,
“
F
r
o
m
‘H
e
ll
o
’
to
Hig
h
e
r
-
Ord
e
r
T
h
in
k
in
g
:
T
h
e
E
ff
e
c
t
o
f
C
o
a
c
h
in
g
a
n
d
Fe
e
d
b
a
c
k
o
n
On
li
n
e
Ch
a
ts
”
,
In
ter
n
e
t
Hi
g
h
.
Ed
u
c
.
,
v
o
l
.
1
6
,
p
p
.
7
8
-
8
4
,
Ja
n
u
a
ry
2
0
1
3
.
[2
6
]
N.
N.
El
-
Em
a
m
a
n
d
R.
A
.
S
.
AL
-
Zu
b
id
y
,
“
Ne
w
ste
g
a
n
o
g
ra
p
h
y
a
lg
o
rit
h
m
to
c
o
n
c
e
a
l
a
larg
e
a
m
o
u
n
t
o
f
se
c
re
t
m
e
ss
a
g
e
u
sin
g
h
y
b
rid
a
d
a
p
ti
v
e
n
e
u
ra
l
n
e
tw
o
rk
s
w
it
h
m
o
d
if
ied
a
d
a
p
ti
v
e
g
e
n
e
ti
c
a
l
g
o
rit
h
m
,
”
J
.
S
y
st.
S
o
ft
w
.
,
v
o
l.
8
6
,
n
o
.
6
,
p
p
.
1
4
6
5
-
1
4
8
1
,
J
u
n
e
2
0
1
3
.
[2
7
]
A
.
M
a
li
k
,
e
t
a
l.
,
“
A
h
ig
h
Ca
p
a
c
it
y
T
e
x
t
S
teg
a
n
o
g
ra
p
h
y
S
c
h
e
m
e
b
a
se
d
o
n
L
ZW
Co
m
p
re
ss
io
n
a
n
d
Co
lo
r
C
o
d
in
g
”
,
En
g
.
S
c
i.
T
e
c
h
n
o
l.
a
n
In
t
.
J
.
,
p
p
.
4
-
1
1
,
A
u
g
u
st
2
0
1
6
.
[2
8
]
T
.
Nar
en
d
r
a
B
ab
u
,
e
t
a
l
.
,
“
I
m
p
le
m
e
n
tatio
n
o
f
Hig
h
S
e
c
u
rit
y
Cr
y
p
to
g
ra
p
h
ic
S
y
ste
m
w
it
h
Im
p
ro
v
e
d
Err
o
r
Co
rre
c
ti
o
n
a
n
d
De
tec
ti
o
n
Ra
te u
si
n
g
F
P
GA
”
,
In
t.
J
.
El
e
c
tr.
C
o
mp
u
t
.
En
g
.
,
v
o
l.
6
,
n
o
.
2
,
p
p
.
6
0
2
-
6
1
0
,
2
0
1
6
.
[2
9
]
A
.
H.
A
li
a
n
d
A
.
M
.
S
a
g
h
e
e
r,
“
De
sig
n
a
n
d
Im
p
le
m
e
n
tatio
n
o
f
S
e
c
u
re
Ch
a
tt
in
g
A
p
p
li
c
a
ti
o
n
with
e
n
d
t
o
e
n
d
En
c
ry
p
ti
o
n
”
,
J
.
E
n
g
.
Ap
p
l.
S
c
i.
,
v
o
l.
1
2
,
n
o
.
1
,
p
p
.
1
5
6
-
1
6
0
,
2
0
1
7
.
[3
0
]
S
.
H.
A
h
m
e
d
,
e
t
a
l.
,
“
Co
m
b
in
i
n
g
S
teg
a
n
o
g
ra
p
h
y
a
n
d
Cr
y
p
to
g
ra
p
h
y
o
n
A
n
d
ro
i
d
P
latf
o
rm
to
Ac
h
iv
e
a
Hig
h
-
Lev
e
l
S
e
c
u
rit
y
”
,
J
.
En
g
.
A
p
p
l
.
S
c
i
.
,
v
o
l.
1
2
,
n
o
.
1
7
,
p
p
.
4
4
4
8
-
4
4
5
2
,
2
0
1
7
.
[3
1
]
A
.
Bh
a
teja
a
n
d
S
.
Ku
m
a
r,
“
G
e
n
e
ti
c
A
l
g
o
rit
h
m
w
it
h
El
it
ism
f
o
r
Cr
y
p
tan
a
l
y
sis
o
f
V
ig
e
n
e
re
Cip
h
e
r
”
,
in
Iss
u
e
s
a
n
d
Ch
a
ll
e
n
g
e
s in
In
tell
ig
e
n
t
Co
mp
u
ti
n
g
T
e
c
h
n
i
q
u
e
s (
ICICT
),
2
0
1
4
In
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
,
2
0
1
4
,
p
p
.
3
7
3
-
3
7
7
.
[3
2
]
A
.
S
a
ra
s
wa
t,
e
t
a
l.
,
“
A
n
Ex
ten
d
e
d
Hy
b
rid
iza
ti
o
n
o
f
Vig
e
n
e
re
a
n
d
Ca
e
sa
r
Cip
h
e
r
T
e
c
h
n
iq
u
e
s
f
o
r
S
e
c
u
re
Co
m
m
u
n
ica
ti
o
n
”
,
Pro
c
e
d
i
a
-
Pro
c
e
d
ia
Co
m
p
u
t
.
S
c
i.
,
v
o
l.
9
2
,
p
p
.
3
5
5
-
3
6
0
,
2
0
1
6
.
[3
3
]
B.
H.
Krish
n
a
,
e
t
a
l.
,
“
M
u
lt
i
p
le
T
e
x
t
En
c
r
y
p
ti
o
n
,
Ke
y
En
tren
c
h
e
d
,
Distrib
u
te
d
Ci
p
h
e
r
u
sin
g
P
a
iri
n
g
F
u
n
c
ti
o
n
s
a
n
d
T
ra
n
sp
o
siti
o
n
Ci
p
h
e
rs
”
,
i
n
T
h
is
fu
ll
-
tex
t
p
a
p
e
r
w
a
s
p
e
e
r
-
re
v
iewe
d
a
n
d
a
c
c
e
p
ted
to
b
e
p
re
se
n
ted
a
t
t
h
e
IEE
E
W
iS
PNE
T
2
0
1
6
c
o
n
fer
e
n
c
e
,
2
0
1
6
,
p
p
.
1
0
5
9
-
1
0
6
1
.
[3
4
]
M
.
Ja
in
a
n
d
S
.
K.
L
e
n
k
a
,
“
S
e
c
re
t
Da
ta
T
ra
n
s
m
i
ss
io
n
u
si
n
g
V
it
a
l
I
m
a
g
e
S
te
g
a
n
o
g
ra
p
h
y
o
v
e
r
T
ra
n
sp
o
siti
o
n
Ci
p
h
e
r
”
,
in
Gr
e
e
n
Co
m
p
u
ti
n
g
a
n
d
I
n
ter
n
e
t
o
f
T
h
in
g
s (
ICGCIo
T
),
2
0
1
5
I
n
ter
n
a
ti
o
n
a
l
Co
n
fer
e
n
c
e
o
n
,
2
0
1
6
,
p
p
.
1
0
2
6
-
1
0
2
9
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J
E
lec
&
C
o
m
p
E
n
g
I
SS
N:
2
0
8
8
-
8708
Th
e
P
r
o
p
o
s
ed
Dev
elo
p
men
t
o
f
P
r
o
to
typ
e
w
ith
S
ec
r
et
Mes
s
a
g
es Mo
d
el
in
W
h
a
t
s
a
p
p
…
(
Ha
md
a
n
i H
a
md
a
n
i
)
3851
B
I
O
G
RAP
H
I
E
S
O
F
AUTH
O
RS
Dr
.
H
a
m
d
a
n
i
is
a
le
c
tu
re
r
a
n
d
a
re
se
a
rc
h
e
rs
a
t
De
p
a
rt
m
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
in
Un
iv
e
rsita
s
M
u
law
a
r
m
a
n
,
In
d
o
n
e
sia
.
He
o
b
t
a
in
e
d
h
is
b
a
c
h
e
l
o
r
d
e
g
re
e
o
f
In
f
o
r
m
a
ti
c
s
in
Un
iv
e
rsitas
A
h
m
a
d
Da
h
lan
,
In
d
o
n
e
sia
(2
0
0
2
)
.
He
o
b
tain
e
d
h
is
M
a
ste
r
o
f
Co
m
p
u
ter S
c
i
e
n
c
e
in
Un
iv
e
rsitas
G
a
d
jah
M
a
d
a
,
In
d
o
n
e
sia
(2
0
0
9
)
a
n
d
P
h
.
D
i
n
C
o
m
p
u
ter
S
c
ien
c
e
a
t
De
p
a
rt
m
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
&
El
e
c
tro
n
ics
in
Un
iv
e
rsitas
Ga
d
jah
M
a
d
a
,
Yo
g
y
a
k
a
rta,
In
d
o
n
e
sia
(
2
0
1
8
)
.
His
r
e
se
a
rc
h
in
tere
sts
in
c
lu
d
e
d
e
c
isio
n
su
p
p
o
rt
sy
ste
m
s (DS
S
),
g
ro
u
p
d
e
c
isio
n
su
p
p
o
rt
sy
ste
m
s (
G
DSS
)
,
s
o
c
ial
n
e
tw
o
rk
s a
n
a
l
y
si
s
,
in
telli
g
e
n
t
s
y
ste
m
,
in
f
o
r
m
a
ti
o
n
se
c
u
rit
y
a
n
d
w
e
b
e
n
g
in
e
e
rin
g
.
E
-
m
a
il
:
h
a
m
d
a
n
i@f
k
ti
.
u
n
m
u
l.
a
c
.
id
;
d
a
n
i@iee
e
.
o
rg
/
W
e
b
:
h
tt
p
:/
/o
d
a
h
e
ta
m
.
c
o
m
H
e
r
u
Is
m
a
n
t
o
re
c
e
iv
e
d
h
is
b
a
c
h
e
lo
r’s
o
f
In
f
o
r
m
a
ti
c
s,
a
n
d
M
a
ste
r
o
f
Co
m
p
u
t
e
r
S
c
ien
c
e
f
ro
m
Un
iv
e
rsitas
P
a
d
jad
jara
n
(
1
9
9
6
)
a
n
d
U
n
iv
e
rsitas
Ga
d
jah
M
a
d
a
(
2
0
0
9
)
re
sp
e
c
ti
v
e
ly
.
Cu
rre
n
tl
y
h
e
is
a
lec
tu
re
r
a
t
De
p
a
rtm
e
n
t
o
f
In
f
o
r
m
a
ti
c
s
En
g
in
e
e
rin
g
,
Un
iv
e
rsitas
M
u
sa
m
u
s,
M
e
ra
u
k
e
,
P
a
p
u
a
a
n
d
h
is
a
P
h
.
D
st
u
d
e
n
t
a
t
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
E
lec
tro
n
ics
,
Un
iv
e
rsitas
G
a
d
jah
M
a
d
a
sin
c
e
2
0
1
4
.
He
w
a
s
in
tere
stin
g
in
De
c
isio
n
S
u
p
p
o
rt
S
y
ste
m
,
G
IS
,
e
-
G
o
v
e
rn
m
e
n
t
S
y
ste
m
.
E
m
a
il
:
h
e
ru
@u
n
m
u
s.a
c
.
id
Ag
u
s
Q
o
m
a
r
u
d
d
in
M
u
n
ir
re
c
e
iv
e
d
h
is
b
a
c
h
e
l
o
r’s
o
f
In
f
o
rm
a
ti
c
s,
a
n
d
M
a
ste
r
o
f
Co
m
p
u
ter
S
c
ien
c
e
f
ro
m
Un
iv
e
rsitas
Isla
m
In
d
o
n
e
sia
(2
0
0
1
)
a
n
d
U
n
iv
e
rsitas
G
a
d
jah
M
a
d
a
(
2
0
0
9
)
re
sp
e
c
ti
v
e
ly
.
Cu
rre
n
tl
y
h
e
is
a
le
c
tu
re
r
a
t
De
p
a
rtme
n
t
o
f
In
f
o
r
m
a
ti
c
s
En
g
in
e
e
rin
g
,
Un
iv
e
rsitas
Re
sp
a
ti
Yo
g
y
a
a
r
ta
a
n
d
h
is a
P
h
D
stu
d
e
n
t
a
t
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
El
e
c
tro
n
ics
,
U
n
iv
e
rsitas
Ga
d
jah
M
a
d
a
sin
c
e
2
0
1
4
.
He
w
a
s
in
tere
stin
g
in
De
c
isio
n
S
u
p
p
o
rt
S
y
ste
m
,
G
IS
,
e
-
G
o
v
e
rn
m
e
n
t
S
y
ste
m
.
Em
a
il
:
a
g
u
sq
m
n
r@
y
a
h
o
o
.
c
o
m
B
u
d
i
Ra
h
m
a
n
i
re
c
e
i
v
e
d
h
is
b
a
c
h
e
lo
r’s
o
f
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
,
a
n
d
M
a
ste
r
o
f
In
f
o
rm
a
ti
c
s
f
ro
m
Yo
g
y
a
k
a
rta
S
tate
Un
iv
e
rsit
y
a
n
d
Dia
n
Nu
sw
a
n
to
ro
U
n
iv
e
rsity
in
2
0
0
3
a
n
d
2
0
1
0
re
sp
e
c
ti
v
e
ly
.
Cu
rre
n
tl
y
h
e
is
a
P
h
D
stu
d
e
n
t
a
t
De
p
a
rtme
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
a
n
d
El
e
c
tro
n
ics
,
Un
iv
e
rsitas
G
a
d
jah
M
a
d
a
sin
c
e
2
0
1
4
.
He
wa
s
in
tere
stin
g
in
Em
b
e
d
d
e
d
S
y
ste
m
a
n
d
Ro
b
o
ti
c
s.
Cu
rre
n
tl
y
h
is
re
se
a
rc
h
f
o
c
u
se
d
is co
m
p
u
ter v
isi
o
n
a
n
d
c
o
n
tr
o
l
sy
ste
m
f
o
r
ro
b
o
t.
His o
th
e
r
re
se
a
rc
h
in
tere
sts in
c
lu
d
e
d
e
c
isio
n
su
p
p
o
r
t
s
y
ste
m
u
sin
g
a
rti
f
ici
a
l
n
e
u
ra
l
n
e
t
w
o
rk
.
He
c
a
n
b
e
c
o
n
tac
ted
b
y
e
m
a
il
:
b
u
d
irah
m
a
n
i@g
m
a
il
.
c
o
m
h
tt
p
:/
/
b
u
d
irah
m
a
n
i.
w
o
rd
p
re
ss
.
c
o
m
And
r
i
S
y
a
fr
ia
n
t
o
is
a
lec
tu
re
r
a
n
d
a
re
se
a
rc
h
e
s a
t
De
p
a
rt
m
e
n
t
o
f
I
n
f
o
rm
a
ti
c
s E
n
g
in
e
e
rin
g
in
S
T
M
I
K
El
Ra
h
m
a
,
Yo
g
y
a
k
a
rta
a
n
d
Bo
rn
A
p
ril
9
th
,
1
9
8
3
i
n
P
a
lem
b
a
n
g
,
In
d
o
n
e
sia
.
He
o
b
tai
n
e
d
h
is
b
a
c
h
e
lo
r
d
e
g
re
e
o
f
In
f
o
r
m
a
ti
c
s
En
g
in
e
e
rin
g
in
U
n
iv
e
rsitas
Bin
a
Da
rm
a
P
a
lem
b
a
n
g
,
In
d
o
n
e
sia
(2
0
0
5
).
H
e
o
b
tai
n
e
d
h
is
M
a
ste
r
o
f
Co
m
p
u
ter
S
c
ien
c
e
in
Un
iv
e
rsitas
Ga
d
jah
M
a
d
a
,
In
d
o
n
e
sia
(2
0
1
0
)
.
His
re
se
a
rc
h
in
tere
sts
in
c
lu
d
e
d
e
c
isio
n
su
p
p
o
r
t
sy
ste
m
s
(DSS
),
in
telli
g
e
n
t
s
y
ste
m
,
In
f
o
r
m
a
ti
o
n
s
y
st
e
m
a
n
d
Cry
p
tan
a
ly
sis
.
Em
a
il
:
a
n
d
ris
y
a
f
rian
to
@g
m
a
il
.
c
o
m
Did
it
S
u
p
r
ih
a
n
to
Cu
rre
n
tl
y
h
e
is
a
P
h
D
S
t
u
d
e
n
t
a
t
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter S
c
ien
c
e
a
n
d
El
e
c
tro
n
ic
s
G
a
d
jah
M
a
d
a
Un
iv
e
rsit
y
a
n
d
lec
tu
re
r
a
t
D
e
p
a
rt
m
e
n
t
o
f
El
e
c
tri
c
a
l
En
g
in
e
e
rin
g
,
Un
iv
e
rsitas
M
u
law
a
r
m
a
n
,
S
a
m
a
rin
d
a
,
In
d
o
n
e
sia
.
His
re
se
a
rc
h
in
tere
sts
in
c
lu
d
e
c
o
m
p
u
ter
n
e
tw
o
rk
s
se
c
u
rit
y
,
e
-
G
o
v
e
rn
m
e
n
t
re
late
d
issu
e
s
a
n
d
se
c
u
rit
y
a
ss
e
s
s
m
e
n
t.
Em
a
il
:
d
id
it
.
su
p
rih
a
n
to
@f
t.
u
n
m
u
l.
a
c
.
id
Dr
.
An
in
d
ita
S
e
p
ti
a
r
i
n
i
w
a
s
b
o
rn
in
Ng
a
n
ju
k
,
Eas
t
Ja
v
a
,
In
d
o
n
e
sia
in
S
e
p
tem
b
e
r
1
st
1
9
8
2
.
S
h
e
re
c
e
iv
e
d
h
e
r
Ba
c
h
e
lo
r
d
e
g
re
e
in
I
n
f
o
rm
a
ti
c
En
g
in
e
e
rin
g
o
f
Un
iv
e
rsitas
S
u
ra
b
a
y
a
,
In
d
o
n
e
sia
in
2
0
0
5
.
S
h
e
re
c
e
iv
e
d
h
e
r
M
a
ste
r
o
f
Co
m
p
u
ter
S
c
in
c
e
d
e
g
re
e
a
t
Un
iv
e
r
sitas
G
a
d
jah
M
a
d
a
,
Yo
g
y
a
k
a
rta,
In
d
o
n
e
sia
in
2
0
0
9
a
n
d
P
h
.
D
i
n
C
o
m
p
u
ter
S
c
ien
c
e
a
t
De
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
&
El
e
c
tro
n
ic
s
in
Un
iv
e
rsitas
G
a
d
jah
M
a
d
a
,
Yo
g
y
a
k
a
rta,
In
d
o
n
e
sia
(2
0
1
8
)
.
S
h
e
is
w
o
rk
in
g
a
s
a
l
e
c
tu
re
in
th
e
d
e
p
a
rtm
e
n
t
o
f
Co
m
p
u
ter
S
c
ien
c
e
Un
iv
e
rsitas
M
u
l
a
wa
r
m
a
n
,
S
a
m
a
rin
d
a
,
I
n
d
o
n
e
sia
sin
c
e
2
0
0
9
.
He
r
re
se
a
rc
h
in
tere
st
a
re
i
m
a
g
e
p
ro
c
e
ss
in
g
,
p
a
tt
e
rn
re
c
o
g
n
it
io
n
a
n
d
n
e
u
ra
l
n
e
tw
o
rk
.
Em
a
il
:
a
n
in
d
it
a
.
se
p
ti
a
ri
n
i@g
m
a
il
.
c
o
m
Evaluation Warning : The document was created with Spire.PDF for Python.