I
nte
rna
t
io
na
l J
o
urna
l o
f
I
nfo
rm
a
t
ics a
nd
Co
m
m
un
ica
t
io
n T
ec
hn
o
lo
g
y
(
I
J
-
I
CT
)
Vo
l.
14
,
No
.
2
,
A
u
g
u
s
t
20
25
,
p
p
.
5
9
4
~
6
0
4
I
SS
N:
2252
-
8
7
7
6
,
DOI
:
1
0
.
1
1
5
9
1
/iji
ct
.
v14
i
2
.
p
p
5
9
4
-
6
0
4
594
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ict.
ia
esco
r
e.
co
m
Bo
lstering
ima
g
e
encryp
tion
techni
ques wit
h blockc
h
a
in
technolo
g
y
-
a
sy
stema
tic
r
ev
iew
Na
rm
a
dh
a
A
nn
a
du
ra
i
,
Ag
us
t
hiy
a
r
Ra
m
u
D
e
p
a
r
t
me
n
t
o
f
C
o
mp
u
t
e
r
A
p
p
l
i
c
a
t
i
o
n
s,
S
R
M
I
n
st
i
t
u
t
e
o
f
S
c
i
e
n
c
e
a
n
d
T
e
c
h
n
o
l
o
g
y
,
C
h
e
n
n
a
i
,
I
n
d
i
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
J
u
l 4
,
2
0
2
4
R
ev
is
ed
No
v
1
9
,
2
0
2
4
Acc
ep
ted
Dec
1
5
,
2
0
2
4
M
u
lt
ime
d
ia
d
a
ta
p
lay
s
a
m
o
m
e
n
to
u
s
ro
le
i
n
p
re
se
n
t
w
o
rld
.
Wi
th
th
e
a
d
v
a
n
c
e
m
e
n
ts
in
v
a
ri
o
u
s
fiel
d
s
o
f
re
se
a
rc
h
li
k
e
in
tern
e
t
o
f
t
h
in
g
s
(
Io
T
)
,
in
d
u
strial
Io
T
(
II
o
T
)
,
c
lo
u
d
c
o
m
p
u
ti
n
g
,
m
e
d
ica
l
ima
g
e
p
ro
c
e
ss
in
g
,
a
n
d
m
a
n
y
m
o
re
tec
h
n
o
lo
g
ies
,
th
e
d
i
g
it
a
l
ima
g
e
s
h
a
v
e
a
lrea
d
y
e
n
c
ro
a
c
h
e
d
th
e
m
u
lt
ime
d
ia
e
o
n
.
T
h
e
m
a
jo
r
c
h
a
ll
e
n
g
e
li
e
s
i
n
p
ro
v
id
i
n
g
a
tam
p
e
r
p
r
o
o
f
ima
g
e
with
h
ig
h
e
r
lev
e
l
o
f
se
c
u
rit
y
a
n
d
c
o
n
fi
d
e
n
ti
a
li
t
y
w
h
il
e
b
e
in
g
t
ra
n
sm
it
ted
th
ro
u
g
h
a
p
u
b
li
c
n
e
two
rk
.
Im
a
g
e
e
n
c
ry
p
ti
o
n
tec
h
n
iq
u
e
s
a
re
c
o
n
sid
e
re
d
to
b
e
th
e
p
re
d
o
m
i
n
a
n
t
m
e
th
o
d
to
a
n
ti
c
ip
a
te
se
c
u
rit
y
fro
m
a
n
y
u
n
a
u
t
h
o
r
ize
d
u
se
r
a
c
c
e
s
s.
Th
is
h
a
s
in
d
e
e
d
p
r
o
v
o
k
e
d
th
e
re
se
a
rc
h
e
rs
to
c
re
a
te
n
e
w
d
iv
e
rse
a
n
d
h
y
b
rid
a
l
g
o
r
it
h
m
s
fo
r
e
n
c
ry
p
ti
n
g
th
e
ima
g
e
s.
At
p
re
se
n
t
b
l
o
c
k
c
h
a
i
n
h
a
s
b
e
e
n
th
e
m
o
st
p
re
v
a
le
n
tl
y
d
isc
u
ss
e
d
m
e
th
o
d
f
o
r
se
c
u
rit
y
a
n
d
t
h
e
n
e
x
t
le
v
e
l
o
f
se
c
u
rit
y
c
a
n
b
e
f
o
re
se
e
n
u
sin
g
t
h
e
b
l
o
c
k
c
h
a
i
n
e
n
c
ry
p
t
io
n
tec
h
n
i
q
u
e
s.
Th
is
p
a
p
e
r
id
e
n
ti
fies
th
e
li
tera
tu
re
wh
ich
m
a
in
ly
f
o
c
u
se
s
o
n
a
ss
o
r
ted
ima
g
e
e
n
c
ry
p
ti
o
n
tec
h
n
iq
u
e
s
with
b
l
o
c
k
c
h
a
in
tec
h
n
o
l
o
g
y
a
p
p
li
e
d
o
n
d
i
g
it
a
l
ima
g
e
s
fr
o
m
h
e
tero
g
e
n
e
o
u
s
so
u
rc
e
s.
A
n
o
v
e
rv
iew
h
a
s
b
e
e
n
p
ro
p
o
se
d
to
d
isc
u
ss
o
n
th
e
se
tec
h
n
iq
u
e
s.
K
ey
w
o
r
d
s
:
B
lo
ck
ch
ain
tech
n
o
l
o
g
y
Hy
b
r
id
alg
o
r
ith
m
s
I
I
o
T
I
m
ag
e
en
c
r
y
p
tio
n
I
o
T
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Nar
m
ad
h
a
An
n
ad
u
r
ai
Dep
ar
tm
en
t o
f
C
o
m
p
u
ter
A
p
p
licatio
n
s
,
SR
M
I
n
s
titu
te
o
f
Sci
en
ce
an
d
T
ec
h
n
o
l
o
g
y
R
am
ap
u
r
am
,
C
h
en
n
ai,
I
n
d
ia
E
m
ail:
n
a0
9
6
8
@
s
r
m
is
t.e
d
u
.
in
1.
I
NT
RO
D
UCT
I
O
N
I
n
th
is
r
ap
id
g
r
o
win
g
er
a
o
f
i
n
ter
n
et
an
d
tech
n
o
lo
g
ies,
d
ig
ita
l
im
ag
es
ar
e
co
n
s
id
er
ed
to
b
e
o
n
e
o
f
th
e
i
n
th
is
r
ap
id
ly
g
r
o
win
g
e
r
a
o
f
in
ter
n
et
an
d
a
d
v
an
ce
d
tech
n
o
l
o
g
ies,
d
ig
ital
im
ag
es
h
av
e
e
m
er
g
ed
as
o
n
e
o
f
th
e
m
o
s
t
im
p
o
r
tan
t
s
o
u
r
ce
s
o
f
in
f
o
r
m
atio
n
.
I
n
f
ac
t,
d
ig
ital
im
a
g
es
ar
e
n
o
w
o
m
n
ip
r
esen
t,
im
p
in
g
in
g
o
n
v
ar
i
o
u
s
s
ec
to
r
s
ac
r
o
s
s
th
e
g
lo
b
e.
Fro
m
s
o
cial
m
ed
ia
p
latf
o
r
m
s
to
m
ed
ical
d
iag
n
o
s
tics
,
d
ig
ital
im
ag
es
s
er
v
e
as
cr
u
cial
d
ata
f
o
r
d
if
f
er
e
n
t
ap
p
licatio
n
s
.
E
v
er
y
d
a
y
,
b
illi
o
n
s
o
f
d
ev
ices
g
en
er
ate
im
m
en
s
e
v
o
lu
m
es
o
f
im
ag
e
d
ata,
co
n
tr
ib
u
tin
g
to
a
v
is
u
al
-
d
o
m
in
ated
ec
o
s
y
s
tem
.
T
h
ese
im
ag
es,
wh
eth
er
two
-
d
im
e
n
s
io
n
al
o
r
th
r
ee
-
d
im
en
s
io
n
al,
h
av
e
a
p
r
o
f
o
u
n
d
im
p
ac
t
o
n
t
h
e
h
u
m
a
n
b
r
ain
,
as
v
is
u
al
d
ata
is
p
r
o
ce
s
s
ed
m
o
r
e
r
a
p
id
ly
t
h
a
n
an
y
o
th
e
r
f
o
r
m
o
f
in
f
o
r
m
atio
n
.
T
h
is
is
wh
y
i
m
ag
es
h
av
e
b
ec
o
m
e
t
h
e
id
e
al
m
ed
iu
m
f
o
r
c
o
m
m
u
n
icatio
n
an
d
in
f
o
r
m
atio
n
ex
ch
an
g
e
i
n
to
d
ay
’
s
in
teg
r
ate
d
an
d
in
ter
c
o
n
n
ec
te
d
wo
r
ld
[
1
]
-
[
6
]
.
Ho
wev
er
,
with
th
e
g
r
o
win
g
r
elian
ce
o
n
im
ag
e
d
ata
c
o
m
es
an
in
c
r
ea
s
e
in
s
ec
u
r
i
ty
c
o
n
ce
r
n
s
.
T
h
e
s
h
ee
r
v
o
lu
m
e
o
f
d
i
g
ital
im
ag
e
s
b
ein
g
tr
an
s
m
itted
o
v
er
th
e
in
ter
n
et
o
p
en
s
u
p
m
u
ltip
le
av
en
u
es
f
o
r
p
o
ten
ti
al
cy
b
er
th
r
ea
ts
.
T
h
ese
th
r
ea
ts
ca
n
r
an
g
e
f
r
o
m
u
n
au
th
o
r
ized
ac
ce
s
s
an
d
d
ata
b
r
ea
ch
es to
im
ag
e
m
an
ip
u
latio
n
an
d
th
ef
t o
f
s
en
s
itiv
e
in
f
o
r
m
atio
n
.
I
n
p
ar
ticu
lar
,
th
e
tr
an
s
m
is
s
io
n
o
f
im
ag
e
d
at
a
o
v
er
n
etwo
r
k
s
p
r
esen
ts
s
ev
e
r
al
ch
allen
g
es,
as
m
alicio
u
s
a
cto
r
s
m
ay
i
n
ter
ce
p
t,
alter
,
o
r
m
is
u
s
e
th
e
d
ata
d
u
r
i
n
g
th
e
tr
a
n
s
f
er
p
r
o
ce
s
s
.
As
s
u
ch
,
en
s
u
r
in
g
th
e
co
n
f
id
en
tia
lity
,
in
teg
r
ity
,
a
n
d
s
ec
u
r
ity
o
f
d
ig
ital
im
ag
es
h
as
b
ec
o
m
e
a
s
ig
n
if
ican
t
p
r
io
r
it
y
f
o
r
b
o
th
in
d
iv
i
d
u
als
an
d
o
r
g
an
izatio
n
s
[
7
]
-
[
1
0
]
.
B
lo
ck
ch
ain
tech
n
o
lo
g
y
h
as
g
ain
ed
s
ig
n
if
ican
t
atten
tio
n
as
a
p
o
ten
tial
s
o
lu
tio
n
f
o
r
en
h
an
cin
g
th
e
s
ec
u
r
ity
o
f
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
B
o
ls
teri
n
g
ima
g
e
en
cryp
tio
n
t
ec
h
n
iq
u
es w
ith
b
lo
ck
ch
a
in
tec
h
n
o
lo
g
y
…
(
N
a
r
ma
d
h
a
A
n
n
a
d
u
r
a
i
)
595
im
ag
e
d
ata.
Or
ig
in
ally
d
ev
elo
p
ed
as th
e
u
n
d
er
ly
in
g
t
ec
h
n
o
l
o
g
y
f
o
r
B
itco
in
,
b
lo
ck
ch
ain
w
as c
r
ea
ted
to
ad
d
r
ess
th
e
is
s
u
e
o
f
d
o
u
b
le
-
s
p
en
d
in
g
i
n
d
ig
ital
cu
r
r
en
c
y
tr
an
s
ac
tio
n
s
.
I
ts
d
ec
en
tr
alize
d
n
atu
r
e
,
wh
e
r
e
tr
an
s
ac
tio
n
s
ar
e
v
er
if
ied
b
y
a
n
etwo
r
k
o
f
n
o
d
es,
en
s
u
r
es
th
at
d
ata
is
im
m
u
tab
le
an
d
tam
p
er
-
r
esis
tan
t.
Ov
er
th
e
y
ea
r
s
,
th
e
ap
p
licatio
n
s
o
f
b
lo
c
k
ch
ain
te
ch
n
o
lo
g
y
h
av
e
e
x
p
an
d
ed
b
e
y
o
n
d
cr
y
p
to
c
u
r
r
en
cies,
with
its
p
o
ten
tial
b
ein
g
ex
p
lo
r
ed
in
v
ar
io
u
s
d
o
m
ain
s
s
u
ch
as
s
u
p
p
l
y
ch
ai
n
m
a
n
ag
e
m
en
t,
h
ea
lth
ca
r
e,
a
n
d
ev
en
d
i
g
ital
im
ag
e
s
ec
u
r
ity
[
1
1
]
-
[
1
4
]
.
W
h
en
in
teg
r
ated
with
en
cr
y
p
tio
n
tech
n
iq
u
es,
b
lo
c
k
ch
ain
tech
n
o
l
o
g
y
ca
n
s
ig
n
if
i
ca
n
tly
en
h
an
ce
th
e
s
ec
u
r
ity
o
f
im
a
g
e
d
ata.
E
n
cr
y
p
tio
n
p
lay
s
a
k
e
y
r
o
le
i
n
p
r
o
tectin
g
im
a
g
e
d
ata
b
y
c
o
n
v
er
tin
g
it
in
to
an
u
n
r
ea
d
a
b
le
f
o
r
m
at
t
h
at
ca
n
o
n
ly
b
e
d
ec
ip
h
er
ed
b
y
au
t
h
o
r
i
ze
d
p
ar
ties
with
th
e
c
o
r
r
ec
t
d
ec
r
y
p
tio
n
k
ey
.
T
h
is
en
s
u
r
es
th
at
ev
en
if
an
im
a
g
e
is
in
ter
ce
p
ted
d
u
r
i
n
g
tr
an
s
m
is
s
io
n
,
it
r
em
ain
s
s
ec
u
r
e
an
d
in
ac
ce
s
s
ib
le
to
u
n
au
th
o
r
ized
u
s
er
s
.
B
y
co
m
b
i
n
in
g
en
cr
y
p
tio
n
with
b
lo
ck
c
h
ain
,
th
e
s
ec
u
r
ity
f
r
am
ewo
r
k
b
ec
o
m
es
ev
en
m
o
r
e
r
o
b
u
s
t,
p
r
o
v
id
in
g
ad
d
i
tio
n
al
la
y
er
s
o
f
p
r
o
tectio
n
[
1
5
]
-
[
1
8
]
.
On
e
o
f
th
e
k
ey
f
ea
tu
r
es
o
f
b
lo
ck
ch
ain
tec
h
n
o
lo
g
y
is
its
d
ec
en
tr
alize
d
s
tr
u
ctu
r
e.
T
r
ad
itio
n
al
ce
n
tr
alize
d
s
y
s
tem
s
s
to
r
e
d
ata
in
a
s
in
g
le
lo
c
atio
n
,
m
ak
in
g
th
e
m
v
u
ln
er
ab
le
to
attac
k
s
.
I
f
a
h
ac
k
er
m
a
n
ag
es
to
b
r
ea
c
h
th
e
ce
n
tr
alize
d
s
y
s
tem
,
th
e
y
ca
n
p
o
ten
tially
g
ain
ac
ce
s
s
to
all
th
e
s
to
r
ed
d
ata.
I
n
c
o
n
t
r
ast,
b
lo
ck
c
h
ain
o
p
er
ates
o
n
a
d
is
tr
ib
u
ted
led
g
er
,
wh
er
e
d
ata
is
s
to
r
ed
ac
r
o
s
s
m
u
ltip
le
n
o
d
es.
E
ac
h
n
o
d
e
in
t
h
e
n
etwo
r
k
h
as
a
c
o
p
y
o
f
th
e
e
n
tire
b
lo
c
k
ch
ain
,
en
s
u
r
i
n
g
t
h
at
n
o
s
in
g
le
p
o
in
t o
f
f
ailu
r
e
ex
is
ts
.
T
h
is
d
ec
en
tr
a
lized
s
tr
u
ctu
r
e
m
a
k
es
it
s
ig
n
if
ican
tly
m
o
r
e
c
h
allen
g
in
g
f
o
r
attac
k
er
s
to
co
m
p
r
o
m
is
e
th
e
s
y
s
tem
,
as
t
h
ey
wo
u
ld
n
ee
d
to
s
im
u
ltan
eo
u
s
ly
b
r
ea
c
h
m
u
ltip
le
n
o
d
e
s
to
alter
th
e
d
ata.
Desp
ite
th
e
n
u
m
er
o
u
s
ad
v
a
n
ta
g
es
th
at
b
l
o
ck
ch
ain
tech
n
o
lo
g
y
o
f
f
er
s
f
o
r
im
ag
e
d
ata
s
ec
u
r
it
y
,
it
is
im
p
o
r
tan
t
to
r
ec
o
g
n
ize
th
at
t
h
e
tech
n
o
lo
g
y
is
n
o
t w
ith
o
u
t its
ch
allen
g
es.
On
e
o
f
th
e
p
r
im
ar
y
co
n
ce
r
n
s
with
b
lo
ck
ch
ain
is
its
s
ca
lab
ilit
y
.
As
th
e
n
u
m
b
e
r
o
f
tr
an
s
ac
tio
n
s
o
n
a
b
lo
c
k
ch
ain
n
etwo
r
k
in
c
r
ea
s
es,
th
e
s
ize
o
f
th
e
b
lo
ck
c
h
ain
also
g
r
o
ws,
lead
in
g
to
s
lo
wer
tr
an
s
ac
tio
n
p
r
o
ce
s
s
in
g
tim
es
[
1
9
]
-
[
2
2
]
.
Fo
r
ap
p
licatio
n
s
th
at
g
en
er
ate
lar
g
e
v
o
lu
m
es
o
f
im
ag
e
d
ata,
s
u
ch
as
s
o
cial
m
ed
ia
p
latf
o
r
m
s
o
r
s
ec
u
r
ity
s
u
r
v
eillan
ce
s
y
s
tem
s
,
th
is
s
c
alab
ilit
y
is
s
u
e
ca
n
h
in
d
er
th
e
ef
f
icien
cy
o
f
th
e
b
lo
ck
ch
ain
s
y
s
tem
.
Mo
r
eo
v
er
,
th
e
d
ec
en
tr
alize
d
n
atu
r
e
o
f
b
l
o
ck
ch
ain
r
e
q
u
ir
es
s
ig
n
if
ican
t
co
m
p
u
tatio
n
al
p
o
wer
an
d
en
er
g
y
co
n
s
u
m
p
tio
n
,
p
ar
ticu
lar
ly
f
o
r
n
etwo
r
k
s
th
at
r
ely
o
n
co
n
s
en
s
u
s
alg
o
r
ith
m
s
lik
e
p
r
o
o
f
o
f
w
o
r
k
(
Po
W
)
.
T
h
e
r
ese
ar
ch
es
[
2
3
]
-
[
2
5
]
p
r
o
v
id
es
a
s
y
s
t
em
atic
r
ev
iew
b
y
s
y
s
tem
atica
lly
ex
p
lo
r
in
g
th
e
i
n
teg
r
atio
n
o
f
b
l
o
ck
ch
ain
with
im
ag
e
en
cr
y
p
tio
n
tech
n
iq
u
es,
id
en
tify
in
g
t
h
e
g
ap
s
in
cu
r
r
e
n
t
r
esear
ch
,
an
d
o
f
f
er
i
n
g
n
ew
i
n
s
ig
h
ts
in
to
p
o
ten
tial
ar
ea
s
f
o
r
f
u
tu
r
e
wo
r
k
.
Un
lik
e
ex
is
t
in
g
r
ev
iews
th
at
f
o
cu
s
s
o
lely
o
n
in
d
iv
id
u
a
l
d
o
m
ain
s
,
th
is
p
ap
er
b
r
id
g
es
th
e
two
f
ield
s
,
an
aly
zin
g
th
eir
s
y
n
er
g
ies
an
d
th
e
u
n
iq
u
e
s
ec
u
r
ity
c
h
allen
g
es
t
h
at
ar
is
e
in
r
ea
l
-
tim
e
s
y
s
tem
s
lik
e
in
ter
n
et
o
f
th
in
g
s
(
I
o
T
)
an
d
h
ea
lth
ca
r
e.
Mo
r
eo
v
er
,
we
in
tr
o
d
u
ce
a
n
e
w
class
if
icatio
n
f
r
am
ewo
r
k
t
h
at
ca
teg
o
r
izes
th
e
ex
is
tin
g
m
e
th
o
d
s
b
ased
o
n
th
eir
ap
p
licab
ilit
y
to
s
p
ec
if
ic
u
s
e
ca
s
es
s
u
ch
as
m
ed
ical
im
ag
in
g
,
in
d
u
s
tr
ial
I
o
T
(
I
I
o
T
)
,
an
d
lar
g
e
-
s
ca
le
d
ec
en
tr
alize
d
s
y
s
tem
s
.
2.
UT
I
L
I
Z
A
T
I
O
N
O
F
I
M
AG
E
E
NCRY
P
T
I
O
N
I
m
ag
e
d
ata
ar
e
u
tili
z
ed
in
d
iv
er
s
e
asp
ec
ts
o
n
m
u
ltip
le
d
o
m
ain
s
o
f
ad
v
a
n
ce
d
tech
n
o
lo
g
ies
lik
e
m
ed
ical
im
ag
in
g
,
ar
tific
ial
i
n
tellig
en
ce
,
an
d
co
m
p
u
ter
v
is
io
n
,
im
ag
e
d
ata
co
n
s
is
ts
o
f
v
er
y
s
en
s
itiv
e
an
d
co
n
f
id
en
tial
in
f
o
r
m
atio
n
wh
ic
h
is
p
r
o
n
e
to
v
ar
i
o
u
s
k
in
d
s
o
f
attac
k
s
wh
en
tr
an
s
f
er
r
e
d
th
r
o
u
g
h
th
e
u
n
s
ec
u
r
e
d
ch
an
n
el.
Secu
r
ity
o
f
th
ese
im
ag
es
ar
e
co
n
s
id
er
ed
to
b
e
ess
en
tial
wh
ich
ca
n
b
e
o
b
tain
ed
th
r
o
u
g
h
im
a
g
e
en
cr
y
p
tio
n
tech
n
iq
u
es.
Fig
u
r
e
1
s
h
o
ws th
e
r
ec
en
t a
p
p
licatio
n
s
o
f
im
ag
e
en
c
r
y
p
tio
n
.
Fig
u
r
e
1
.
R
ec
en
t a
p
p
licatio
n
s
o
f
im
ag
es
en
cr
y
p
tio
n
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
14
,
No
.
2
,
A
u
g
u
s
t
20
25
:
594
-
604
596
3.
I
M
AG
E
DAT
A
O
VE
RV
I
E
W
An
im
ag
e
d
ata
is
d
ef
in
ed
a
s
g
r
o
u
p
o
f
p
ix
els.
I
m
a
g
e
is
r
ep
r
esen
ted
b
y
its
h
eig
h
t
a
n
d
wid
th
(
Dim
en
s
io
n
s
)
.
I
f
t
h
e
d
im
e
n
s
io
n
o
f
t
h
e
im
ag
e
is
2
5
5
×2
5
5
,
t
h
en
th
e
n
u
m
b
er
o
f
p
ix
els
p
r
ese
n
t
in
th
e
im
a
g
e
is
65
,
0
2
5
p
ix
els.
A
p
ix
el
is
a
p
o
in
t
o
n
th
e
im
a
g
e
wh
ich
tak
es
a
r
ed
,
g
r
ee
n
,
an
d
b
l
u
e
(
R
GB
)
c
o
lo
r
.
E
ac
h
p
i
x
el
is
ca
p
ab
le
o
f
s
to
r
i
n
g
th
r
ee
b
in
a
r
y
c
o
d
es
o
f
r
ed
,
g
r
ee
n
,
an
d
b
lu
e
(
R
GB
)
wh
ich
tak
es
8
b
it
an
d
th
is
will
b
e
m
u
ltip
lied
b
y
n
u
m
b
er
o
f
p
ix
el
s
p
r
esen
t
in
an
im
ag
e.
T
h
is
is
s
h
o
wn
in
th
e
Fig
u
r
e
2
.
d
is
p
la
y
s
an
im
ag
e
wh
ich
r
ep
r
esen
ts
th
e
p
ix
els
o
f
t
h
e
g
iv
en
im
ag
e
a
n
d
Fig
u
r
e
3
.
d
is
p
lay
s
th
e
R
GB
v
alu
e
tak
en
b
y
ea
ch
p
ix
el
i
n
th
e
im
ag
e.
T
h
ese
r
ep
r
esen
tatio
n
s
ar
e
ca
r
r
ied
o
u
t u
s
in
g
MA
T
L
AB
.
Fig
u
r
e
2
.
Pix
el
r
e
p
r
esen
tatio
n
o
f
th
e
im
ag
e
Fig
u
r
e
3
.
R
GB
v
alu
e
o
f
ea
ch
p
ix
el
in
th
e
im
ag
e
4.
I
M
AG
E
CRYP
T
O
G
RAP
H
Y
I
m
ag
e
c
r
y
p
to
g
r
a
p
h
y
a
p
p
lies
th
e
p
r
o
ce
s
s
o
f
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
to
th
e
g
iv
e
n
im
ag
e
d
ata.
E
n
cr
y
p
tio
n
o
f
im
a
g
e
is
a
p
i
v
o
tal
co
m
p
o
n
e
n
t
o
f
i
n
f
o
r
m
atio
n
s
ec
u
r
ity
an
d
im
ag
e
cr
y
p
t
o
g
r
ap
h
y
t
h
at
f
o
cu
s
ex
p
licitly
o
n
s
tr
o
n
g
h
o
ld
in
g
t
h
e
in
teg
r
ity
an
d
co
n
f
id
e
n
tiality
o
f
d
ig
ital
im
a
g
e.
I
t
is
a
p
r
o
ce
s
s
wh
ich
co
n
v
e
r
ts
an
o
r
ig
in
al
im
ag
e
in
t
o
an
en
c
r
y
p
ted
im
ag
e
u
s
in
g
s
ec
r
et
k
ey
.
Ob
tain
in
g
th
e
o
r
ig
i
n
al
im
ag
e
b
ac
k
u
s
in
g
s
ec
r
e
t
k
ey
is
ca
lled
as d
ec
r
y
p
tio
n
.
Fi
g
u
r
e
4
s
h
o
ws th
e
o
v
e
r
v
iew
o
f
im
ag
e
en
cr
y
p
tio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
B
o
ls
teri
n
g
ima
g
e
en
cryp
tio
n
t
ec
h
n
iq
u
es w
ith
b
lo
ck
ch
a
in
tec
h
n
o
lo
g
y
…
(
N
a
r
ma
d
h
a
A
n
n
a
d
u
r
a
i
)
597
Fig
u
r
e
4
.
I
m
ag
e
e
n
cr
y
p
tio
n
o
v
er
v
iew
Ma
th
em
atica
l
alg
o
r
ith
m
s
an
d
f
u
n
ctio
n
s
ar
e
u
s
in
g
s
o
m
e
k
ey
v
alu
es
ar
e
ap
p
lied
o
n
th
e
im
a
g
e
d
ata
to
en
cr
y
p
t a
n
d
d
ec
r
y
p
t it.
T
h
e
p
r
o
ce
s
s
es a
r
e
r
ep
r
esen
ted
b
y
,
E
ek
(
PI
)
=
CI
(
1
)
D
dk
(
CI
)
=
PI
(
2
)
w
h
er
e
E
an
d
D
r
ep
r
esen
ts
en
cr
y
p
tio
n
an
d
d
ec
r
y
p
tio
n
,
ek
an
d
d
k
r
ep
r
esen
ts
en
cr
y
p
tio
n
k
ey
a
n
d
d
ec
r
y
p
tio
n
k
ey
an
d
PI
a
n
d
C
I
r
e
p
r
esen
t
p
lai
n
im
ag
e
a
n
d
ci
p
h
er
im
a
g
e
r
e
s
p
ec
tiv
ely
.
E
ek
(
PI
)
=
CI
d
en
o
tes
th
e
e
n
cr
y
p
tio
n
m
eth
o
d
a
p
p
lied
o
n
th
e
p
lain
o
r
ig
in
al
im
ag
e
(
PI)
an
d
o
b
tain
e
d
th
e
cip
h
e
r
co
n
v
er
ted
im
ag
e
(
C
I
)
.
D
d
k
(
CI
)
=
PI
r
ep
r
esen
ts
th
e
d
ec
r
y
p
tio
n
m
eth
o
d
ap
p
lied
o
n
th
e
cip
h
er
im
a
g
e
C
I
to
r
eg
ain
th
e
o
r
ig
in
al
p
la
in
im
ag
e.
5.
NE
E
D
F
O
R
E
NCRY
P
T
I
NG
I
M
AG
E
I
m
ag
e
en
ci
p
h
er
m
e
n
t
f
o
c
u
s
es
o
n
c
o
n
v
er
ti
n
g
an
im
ag
e
d
ata
in
to
in
d
ec
ip
h
er
ab
le
an
d
en
ig
m
atic
s
tr
u
ctu
r
e,
m
a
k
in
g
it
ab
s
tr
u
s
e
t
o
illeg
itima
te
in
d
iv
i
d
u
als.
E
n
c
r
y
p
tio
n
o
f
d
ig
ital
im
a
g
es
ar
e
c
ar
r
ied
o
u
t
f
o
r
th
r
ee
im
p
o
r
tan
t
r
ea
s
o
n
s
th
e
f
ir
s
t
is
t
o
s
to
r
e
t
h
e
im
a
g
es
s
ec
u
r
ely
,
s
ec
o
n
d
is
to
attain
im
ag
e
d
ata
co
n
f
id
en
tiality
wh
ic
h
allo
ws
o
n
ly
th
e
au
th
o
r
ized
p
e
r
s
o
n
to
g
ain
ac
ce
s
s
o
v
er
th
e
i
m
ag
e
d
ata
wh
ile
b
ein
g
tr
a
n
s
m
itted
o
v
er
n
etwo
r
k
an
d
th
e
th
ir
d
r
ea
s
o
n
is
to
estab
lis
h
in
teg
r
ity
th
at
h
elp
s
to
ea
s
ily
d
etec
t
u
n
au
th
o
r
ized
alter
atio
n
s
an
d
m
o
d
if
icatio
n
s
to
th
e
im
a
g
e
d
a
ta.
T
h
o
u
g
h
t
h
e
illeg
itima
te
u
s
er
g
ain
s
co
n
tr
o
l
o
v
er
th
e
im
a
g
e
d
ata,
it
wo
u
ld
b
e
d
if
f
icu
lt to
d
ec
r
y
p
t it
with
o
u
t
k
n
o
win
g
t
h
e
en
cr
y
p
tio
n
k
ey
.
6.
I
M
AG
E
E
NC
RYP
T
I
O
N
P
E
RF
O
RM
ANC
E
M
E
A
SURE
S
6
.
1
.
K
ey
s
pa
ce
a
na
ly
s
is
T
h
is
an
aly
s
is
is
co
n
s
id
er
e
d
as
a
p
r
ed
o
m
in
an
t
s
ec
u
r
ity
m
ea
s
u
r
e
f
o
r
an
y
en
cr
y
p
tio
n
tech
n
iq
u
e.
T
h
is
is
b
ec
au
s
e
a
b
etter
im
ag
e
en
cr
y
p
tio
n
tech
n
iq
u
e
ta
k
es
a
k
ey
s
p
ac
e
o
f
at
least
2
100
[
1
4
]
.
A
g
o
o
d
en
cr
y
p
tio
n
alg
o
r
ith
m
m
a
k
es u
s
e
o
f
lar
g
e
k
ey
s
p
ac
e
wh
ich
m
ak
es it m
o
r
e
s
ec
u
r
e
f
r
o
m
b
r
u
te
f
o
r
ce
attac
k
.
6
.
2
.
H
is
t
o
g
ra
m
a
na
ly
s
is
T
o
n
al
d
is
s
em
in
atio
n
o
f
p
ix
els
o
f
a
n
y
im
ag
e
is
d
ef
in
ed
as
h
is
to
g
r
am
.
C
h
i
-
s
q
u
ar
e
test
is
ca
r
r
ied
o
u
t
ch
ec
k
th
e
h
is
to
g
r
am
.
I
t is ev
al
u
ated
as
(
3
)
.
ᵪ
2
=
∑
(
−
)
2
255
=
0
(
3
)
W
h
er
e,
=
f
r
eq
u
e
n
cy
o
f
th
e
p
ix
e
l v
alu
e
i
.
S=
d
im
en
s
io
n
o
f
im
a
g
e,
h
er
e
it is
2
5
5
.
6
.
3
.
E
ntr
o
py
a
na
l
y
s
is
I
t is th
e
m
ea
s
u
r
e
o
f
h
o
w
th
e
p
i
x
el
v
alu
es o
f
t
h
e
im
ag
e
is
r
an
d
o
m
ly
d
is
tr
ib
u
ted
.
H=
−
∑
(
)
2
−
1
=
0
(
(
)
)
(
4
)
Her
e,
H=
e
n
tr
o
p
y
.
G=
g
r
a
y
v
al
u
e
o
f
th
e
im
ag
e
g
i
v
en
as in
p
u
t
.
P(k
)
=
p
r
o
b
ab
ilit
y
o
f
s
y
m
b
o
l k
o
cc
u
r
r
e
d
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
14
,
No
.
2
,
A
u
g
u
s
t
20
25
:
594
-
604
598
6
.
4
.
Co
rr
el
a
t
io
n
c
o
e
f
f
icient
C
o
r
r
elatio
n
co
ef
f
icien
t
(
r
)
is
d
ef
in
ed
as
th
e
s
tatis
tical
m
ea
s
u
r
es
o
r
th
e
r
elatio
n
s
h
ip
s
b
etwe
en
th
e
ad
jace
n
t p
ix
el
v
al
u
es o
f
an
im
ag
e.
r=
∑
(
−
)
(
−
)
=
1
∑
(
−
)
2
=
1
∑
(
−
)
2
=
1
(
5
)
W
h
er
e,
x
i
an
d
y
i
=i
th
p
ix
el
in
te
n
s
ity
in
im
ag
es.
x
m
an
d
y
m
=
m
ea
n
in
ten
s
ity
o
f
t
h
e
im
ag
es.
6
.
5
.
M
ea
n
s
qu
a
re
d e
rr
o
r
(
M
SE
)
C
alcu
lates
th
e
d
if
f
er
en
ce
b
e
twee
n
en
cip
h
er
e
d
an
d
d
ec
ip
h
er
ed
im
a
g
es.
I
t
is
u
s
ed
to
f
in
d
th
e
co
r
r
ec
tn
ess
o
f
th
e
d
ec
r
y
p
tio
n
alg
o
r
ith
m
an
d
th
e
im
ag
e
o
b
tain
e
d
o
n
th
e
r
ec
eiv
er
’
s
en
d
h
as
b
ee
n
r
etr
iev
e
d
with
o
u
t d
is
to
r
tio
n
.
MSE
=
∑
[
[
1
(
,
)
−
2
(
,
)
]
2
,
(
∗
)
(
6
)
W
h
er
e,
I
1
an
d
I
2
=
t
h
e
g
iv
e
n
p
la
in
an
d
cip
h
er
im
ag
e
r
esp
ec
tiv
e
ly
.
m
an
d
n=
im
ag
e
d
im
en
s
io
n
s
.
6
.
6
.
P
e
a
k
s
ig
na
l t
o
no
is
e
ra
t
i
o
(
P
SNR)
I
t is an
ex
p
r
ess
io
n
o
f
s
ig
n
al
p
o
wer
to
n
o
is
e
p
o
we
r
in
r
atio
.
PS
NR
=
10
l
og
10
(
2
/
(
)
)
(
7
)
W
h
er
e,
R=
p
o
wer
o
f
s
ig
n
al
.
MSE
=p
o
wer
o
f
n
o
is
e
.
E
x
p
r
ess
ed
as d
b
.
6
.
7
.
Dif
f
er
ent
ia
l
a
t
t
a
ck
s
C
r
y
p
to
s
y
s
tem
s
ar
e
ex
p
o
s
ed
to
d
if
f
er
en
tial
attac
k
wh
ich
i
n
f
er
s
to
f
in
d
o
u
t
t
h
e
s
ec
r
et
k
ey
o
r
th
e
o
r
ig
in
al
im
ag
e.
NPC
R
an
d
UACI
ar
e
th
e
m
ea
s
u
r
es u
s
ed
to
s
tr
en
g
th
o
f
t
h
e
cr
y
p
to
s
y
s
tem
a
g
ain
s
t th
is
attac
k
.
6
.
8
.
Num
ber
o
f
pix
el
cha
ng
e
(
NP
CR)
Help
s
to
id
en
tify
th
e
n
u
m
b
er
o
f
v
alu
e
an
d
p
o
s
itio
n
ch
an
g
es in
p
ix
els o
f
im
a
g
e
d
ata.
NPC
R
=
∑
∑
(
,
)
=
1
=
1
∗
∗
100%
(
8
)
W
h
er
e,
D
(
i,
j)
=
{
1
,
1
≠
2
0
,
1
=
2
}
C
1
an
d
C
2
=c
ip
h
er
im
a
g
es
.
M
an
d
N=
h
eig
h
t
an
d
wid
t
h
o
f
t
h
e
im
ag
es.
6.
9
.
Unifie
d
a
v
er
a
g
e
cha
ng
i
ng
inte
ns
it
y
(
UACI)
I
d
en
tifie
s
th
e
ch
an
g
es in
th
e
p
ix
el
in
ten
s
ities
in
th
e
im
ag
es.
UACI
=
∑
∑
|
1
(
,
)
−
2
(
,
)
|
=
1
=
1
255
∗
∗
∗
100%
(
9
)
M
an
d
N=
h
eig
h
t a
n
d
wid
t
h
o
f
th
e
8
-
b
it im
ag
e
.
7.
B
L
O
CK
CH
A
I
N
T
E
CH
NO
L
O
G
Y
B
asically
,
b
lo
ck
ch
ain
is
a
d
ec
en
tr
alize
d
co
m
p
u
tatio
n
a
n
d
in
f
o
r
m
atio
n
s
h
ar
in
g
p
latf
o
r
m
.
T
h
is
p
latf
o
r
m
en
ab
les
in
d
iv
id
u
als
f
r
o
m
h
eter
o
g
e
n
eo
u
s
d
o
m
ai
n
s
to
m
ak
e
co
h
er
en
t
d
ec
is
io
n
s
.
T
h
is
tech
n
o
lo
g
y
was
in
tr
o
d
u
ce
d
to
o
v
er
c
o
m
e
th
e
p
r
o
b
lem
s
in
tr
ad
itio
n
al
an
d
ce
n
tr
alize
d
in
f
o
r
m
atio
n
s
h
ar
in
g
m
eth
o
d
s
.
Fig
u
r
e
5
d
ep
icts
th
e
b
lo
ck
d
iag
r
am
o
f
d
if
f
er
e
n
t
d
o
c
u
m
en
t
an
d
o
t
h
er
d
ata
s
h
ar
in
g
m
o
d
els
in
d
ata
m
an
ag
em
e
n
t.
I
n
tr
a
d
itio
n
al
m
et
h
o
d
(
Fig
u
r
e
5
(
a
)
)
o
f
in
f
o
r
m
atio
n
s
h
ar
in
g
if
th
e
s
en
d
er
wa
n
ts
to
s
h
ar
e
a
d
o
cu
m
en
t,
id
ea
lly
th
e
s
en
d
er
will
wr
ite
th
e
co
n
te
n
t
in
h
is
/h
er
o
w
n
d
o
c
u
m
en
t
a
n
d
s
h
ar
es
it
with
th
e
r
ec
eiv
e
r
.
T
h
e
r
ec
eiv
e
r
will
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
B
o
ls
teri
n
g
ima
g
e
en
cryp
tio
n
t
ec
h
n
iq
u
es w
ith
b
lo
ck
ch
a
in
tec
h
n
o
lo
g
y
…
(
N
a
r
ma
d
h
a
A
n
n
a
d
u
r
a
i
)
599
u
p
d
ate
th
e
d
o
c
u
m
en
t
with
h
is
o
wn
co
n
ten
t
an
d
s
h
ar
es
b
ac
k
t
h
e
d
o
cu
m
e
n
t
to
t
h
e
s
en
d
er
.
T
h
e
m
aj
o
r
d
is
ad
v
an
tag
e
in
th
is
m
eth
o
d
is
th
at
th
e
s
en
d
er
an
d
th
e
r
ec
eiv
er
ca
n
n
o
t
s
im
u
ltan
eo
u
s
ly
ed
it
th
e
d
o
cu
m
en
t.
T
o
o
v
e
r
co
m
e
th
is
p
r
o
b
lem
,
ce
n
tr
alize
d
p
latf
o
r
m
(
Fig
u
r
e
5
(
b
)
)
was
d
ev
elo
p
ed
wh
er
e
t
h
e
s
en
d
er
an
d
th
e
r
ec
eiv
er
ca
n
ed
it
an
d
wo
r
k
o
n
th
e
s
am
e
d
o
cu
m
en
t
s
im
u
ltan
eo
u
s
ly
.
T
h
e
d
is
ad
v
an
ta
g
e
h
e
r
e
is
th
at
it
ac
ts
as
a
s
in
g
le
p
o
in
t
o
f
f
ailu
r
e
wh
er
e
t
h
e
p
er
s
o
n
ca
n
’
t
w
o
r
k
u
s
in
g
in
s
u
f
f
icien
t
b
an
d
wid
th
o
r
m
an
a
g
e
th
e
d
ata
lo
s
s
th
at
o
cc
u
r
s
d
u
e
s
y
s
tem
f
ailu
r
e.
T
h
ese
ar
e
th
e
is
s
u
es
wh
ich
m
ak
es
r
esear
ch
er
s
to
m
o
v
e
f
r
o
m
a
ce
n
tr
alize
d
s
y
s
tem
to
a
d
ec
e
n
tr
alize
d
a
n
d
d
is
tr
ib
u
ted
s
y
s
tem
.
I
n
d
ec
en
tr
al
ized
s
y
s
tem
(
Fig
u
r
e
5
(
c
)
)
m
u
ltip
le
p
o
in
ts
o
f
co
o
r
d
in
atio
n
will b
e
th
er
e
.
I
n
d
is
tr
ib
u
ted
s
y
s
tem
en
v
ir
o
n
m
e
n
t e
v
er
y
o
n
e
co
llectiv
ely
ex
ec
u
tes a
jo
b
.
(
a
)
(
b
)
(
c)
Fig
u
r
e
5
.
Sh
ar
i
n
g
m
o
d
els in
d
ata
m
an
ag
em
en
t
:
(
a)
tr
ad
itio
n
a
l d
o
cu
m
e
n
t,
(
b
)
ce
n
tr
alize
d
d
o
cu
m
en
t,
an
d
(
c)
d
ec
en
tr
alize
d
an
d
d
is
tr
ib
u
t
ed
d
o
c
u
m
en
t
Ad
v
an
tag
es
o
f
b
lo
ck
ch
ain
o
v
er
im
ag
e
d
ata
:
b
lo
ck
c
h
ain
t
ec
h
n
o
lo
g
y
o
f
f
er
s
m
an
y
ad
v
a
n
tag
es
f
o
r
im
ag
e
d
ata.
I
m
ag
e
en
cr
y
p
tio
n
is
an
a
r
ea
with
wh
ich
b
lo
ck
ch
ain
c
o
n
n
ec
ts
its
elf
to
g
u
ar
an
tee
in
c
r
ea
s
ed
r
eliab
ilit
y
.
I
n
g
en
er
al,
a
n
im
a
g
e
is
v
iewe
d
in
two
o
r
th
r
ee
d
im
en
s
io
n
s
wh
ich
c
o
n
tain
s
v
er
y
s
en
s
itiv
e
an
d
us
ef
u
l
in
f
o
r
m
atio
n
.
Sin
ce
m
o
s
t
o
f
th
e
co
n
v
en
tio
n
al
m
ec
h
an
i
s
m
s
ar
e
ce
n
tr
al,
b
lo
ck
ch
ai
n
ca
n
b
e
r
elied
to
s
o
l
v
e
th
e
s
ec
u
r
ity
p
r
o
b
lem
s
.
I
m
m
e
n
s
e
lev
el
o
f
s
ec
u
r
ity
ca
n
b
e
ac
h
iev
ed
f
o
r
h
ig
h
m
ag
n
itu
d
e
im
ag
es.
Mo
r
e
o
v
er
,
m
o
r
p
h
i
n
g
o
f
im
a
g
es
s
to
r
ed
i
n
a
b
l
o
ck
ch
ai
n
is
im
p
o
s
s
ib
le
.
I
n
cr
ea
s
ed
p
o
s
s
ib
ilit
y
in
ac
c
ess
in
g
th
e
r
em
o
t
e
im
ag
es
b
ec
au
s
e
th
e
b
lo
c
k
ch
ai
n
d
o
es
n
o
t
h
av
e
a
ce
n
tr
al
s
er
v
er
.
W
h
en
it
co
m
es
to
ac
ce
s
s
ib
ilit
y
,
th
e
au
th
o
r
ized
p
er
s
o
n
is
g
iv
en
ac
ce
s
s
to
m
o
n
i
to
r
th
e
d
ata.
Fig
u
r
e
6
e
x
p
lain
s
th
e
g
en
e
r
al
f
r
am
ewo
r
k
o
n
h
o
w
b
lo
ck
c
h
ain
b
ased
im
ag
e
en
cr
y
p
tio
n
s
tr
ateg
ies
ar
e
in
ter
s
p
er
s
ed
f
o
r
i
m
ag
es.
I
m
ag
es
tak
en
f
r
o
m
d
if
f
e
r
en
t
d
o
m
ain
s
lik
e
im
ag
es
f
r
o
m
I
o
T
,
I
I
o
T
d
ev
ices,
m
ed
ic
al
im
ag
es,
an
d
im
ag
es
f
r
o
m
s
o
cial
m
ed
ia,
ar
e
co
n
s
id
er
ed
.
First
th
e
tak
en
im
ag
e
is
s
u
b
jecte
d
to
an
y
o
n
e
o
r
c
o
m
b
in
atio
n
o
f
d
if
f
e
r
en
t ty
p
es o
f
p
er
m
u
tatio
n
o
r
s
u
b
s
titu
tio
n
tech
n
iq
u
es a
d
o
p
ted
b
y
th
e
r
esear
ch
er
.
T
h
is
m
eth
o
d
p
r
o
d
u
ce
s
a
d
is
to
r
ted
s
h
u
f
f
led
i
m
ag
e.
T
h
e
s
h
u
f
f
le
d
im
ag
e
o
b
tain
ed
is
en
cr
y
p
te
d
u
s
in
g
an
y
o
f
th
e
en
cr
y
p
tio
n
o
r
h
ash
in
g
alg
o
r
ith
m
,
t
h
e
r
esu
l
t
will
b
e
an
en
cr
y
p
ted
im
ag
e.
T
h
e
c
r
y
p
to
g
r
ap
h
ic
p
ix
el
v
alu
es
o
f
th
e
o
b
tain
e
d
e
n
cr
y
p
ted
im
ag
e
ar
e
s
to
r
ed
in
b
lo
ck
ch
ain
.
T
h
is
r
esu
lts
in
a
t
am
p
er
p
r
o
o
f
s
ec
u
r
ed
im
ag
es.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
14
,
No
.
2
,
A
u
g
u
s
t
20
25
:
594
-
604
600
Fig
u
r
e
6
.
B
lo
ck
d
iag
r
am
o
f
b
lo
ck
ch
ain
b
ased
im
ag
e
e
n
cr
y
p
tio
n
f
r
am
ew
o
r
k
8.
O
VE
RVI
E
W
O
F
VAR
I
O
US
B
L
O
CK
CH
AI
N
B
A
SE
D
E
NCRY
P
T
I
O
N
T
E
CH
NIQU
E
S
Pre
v
io
u
s
s
tu
d
ies
h
av
e
e
x
ten
s
iv
ely
ex
p
lo
r
ed
b
o
th
im
ag
e
e
n
cr
y
p
tio
n
an
d
b
lo
ck
c
h
ain
tech
n
o
lo
g
y
as
in
d
iv
id
u
al
d
o
m
ain
s
.
T
r
ad
itio
n
al
en
cr
y
p
tio
n
m
eth
o
d
s
,
s
u
c
h
as
ad
v
an
ce
d
en
cr
y
p
tio
n
s
tan
d
ar
d
(
AE
S
)
,
d
ata
en
cr
y
p
tio
n
s
tan
d
ar
d
(
DE
S
)
,
a
n
d
R
iv
est
-
Sh
am
ir
-
Ad
lem
an
(
R
SA
)
, a
r
e
co
m
m
o
n
ly
u
s
ed
f
o
r
s
ec
u
r
in
g
d
i
g
ital d
ata,
in
clu
d
in
g
im
a
g
es.
Ho
wev
er
,
t
h
eir
ap
p
licatio
n
i
n
lar
g
e
-
s
ca
le
s
y
s
tem
s
,
s
u
ch
as
I
o
T
,
I
I
o
T
,
a
n
d
m
ed
ical
im
ag
in
g
,
is
o
f
ten
lim
ited
b
y
th
e
co
m
p
u
tatio
n
al
o
v
er
h
ea
d
a
n
d
r
ea
l
-
tim
e
p
r
o
ce
s
s
in
g
r
eq
u
ir
em
e
n
ts
.
Similar
ly
,
b
lo
ck
c
h
ai
n
tech
n
o
lo
g
y
h
as
b
ee
n
em
p
lo
y
ed
in
v
ar
i
o
u
s
s
ec
to
r
s
t
o
s
ec
u
r
e
d
ig
ital
tr
an
s
ac
tio
n
s
,
m
ai
n
tain
d
ec
e
n
tr
alize
d
r
ec
o
r
d
s
,
an
d
en
s
u
r
e
d
ata
in
teg
r
ity
.
T
h
e
co
m
b
in
atio
n
o
f
im
a
g
e
en
cr
y
p
tio
n
with
b
lo
c
k
ch
ain
is
r
elativ
ely
n
ew
an
d
u
n
d
er
ex
p
lo
r
ed
.
So
m
e
s
tu
d
ies h
av
e
p
r
o
p
o
s
ed
en
cr
y
p
t
in
g
d
ig
ital im
ag
es a
n
d
s
to
r
in
g
th
e
en
cr
y
p
te
d
d
ata
o
n
a
b
lo
ck
c
h
ain
.
Fo
r
ex
am
p
le,
Li
et
a
l.
[
1
6
]
p
r
o
p
o
s
ed
a
b
lo
ck
ch
ain
-
b
ased
s
ec
u
r
e
im
a
g
e
s
to
r
ag
e
s
y
s
tem
f
o
r
I
o
T
en
v
ir
o
n
m
en
ts
.
Ho
wev
e
r
,
th
ese
s
tu
d
ies
o
f
ten
r
ely
o
n
cl
ass
ical
en
cr
y
p
tio
n
tech
n
iq
u
es
an
d
lac
k
f
o
c
u
s
o
n
d
o
m
ain
-
s
p
ec
if
ic
r
eq
u
ir
e
m
en
ts
lik
e
th
o
s
e
in
h
ea
lth
ca
r
e
o
r
i
n
d
u
s
tr
ial
s
ettin
g
s
.
W
h
i
l
e
s
e
v
e
r
a
l
r
e
v
i
e
w
p
a
p
e
r
s
h
a
v
e
b
e
e
n
p
u
b
l
i
s
h
e
d
o
n
e
i
t
h
e
r
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
o
r
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
,
f
e
w
f
o
c
u
s
o
n
t
h
e
i
n
t
e
g
r
a
t
i
o
n
o
f
t
h
e
s
e
t
w
o
f
i
e
l
d
s
.
M
o
s
t
e
x
i
s
t
i
n
g
r
e
v
i
e
w
s
t
e
n
d
t
o
l
i
m
i
t
t
h
e
i
r
s
c
o
p
e
t
o
i
n
d
i
v
i
d
u
a
l
a
d
v
a
n
c
e
m
e
n
t
s
i
n
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
a
l
g
o
r
i
t
h
m
s
o
r
b
l
o
c
k
c
h
a
i
n
i
m
p
l
e
m
e
n
t
a
t
i
o
n
s
i
n
d
e
c
e
n
t
r
a
l
i
z
e
d
s
y
s
t
e
m
s
.
F
o
r
i
n
s
t
a
n
c
e
,
s
u
r
v
e
y
s
b
y
Z
h
a
n
g
e
t
a
l
.
[
2
3
]
a
n
d
K
u
m
a
r
e
t
a
l
.
[6
]
h
a
v
e
d
i
s
c
u
s
s
e
d
t
r
a
d
i
t
i
o
n
a
l
e
n
c
r
y
p
t
i
o
n
t
e
c
h
n
i
q
u
e
s
,
s
u
c
h
a
s
A
E
S
a
n
d
R
S
A
,
a
s
w
e
l
l
a
s
t
h
e
i
r
a
p
p
l
i
c
a
t
i
o
n
s
t
o
s
e
c
u
r
e
i
m
a
g
e
t
r
a
n
s
m
i
s
s
i
o
n
.
S
i
m
i
l
a
r
l
y
,
b
l
o
c
k
c
h
a
i
n
-
f
o
c
u
s
e
d
r
e
v
i
e
w
s
,
l
i
k
e
t
h
o
s
e
b
y
G
u
p
t
a
e
t
a
l
.
[
2
0
]
,
h
i
g
h
l
i
g
h
t
t
h
e
u
s
e
o
f
d
e
c
e
n
t
r
a
l
i
z
e
d
l
e
d
g
e
r
s
y
s
t
e
m
s
i
n
a
p
p
l
i
c
a
t
i
o
n
s
s
u
c
h
a
s
c
r
y
p
t
o
c
u
r
r
e
n
c
i
e
s
a
n
d
s
e
c
u
r
e
d
a
t
a
s
t
o
r
a
g
e
.
H
o
w
e
v
e
r
,
n
o
n
e
o
f
t
h
e
s
e
r
e
v
i
e
w
s
e
x
p
l
o
r
e
t
h
e
p
o
t
e
n
t
i
a
l
f
o
r
i
n
t
e
g
r
a
t
i
n
g
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
w
i
t
h
b
l
o
c
k
c
h
a
i
n
i
n
d
o
m
a
i
n
s
l
i
k
e
I
o
T
,
m
e
d
i
c
a
l
i
m
a
g
i
n
g
,
a
n
d
i
n
d
u
s
t
r
i
a
l
s
y
s
t
e
m
s
.
−
Ou
r
co
n
tr
i
b
u
tio
n
:
th
is
r
ev
iew
f
ills
a
cr
itical
g
ap
in
th
e
liter
a
tu
r
e
b
y
p
r
o
v
id
in
g
a
c
o
m
p
r
e
h
e
n
s
iv
e
s
u
r
v
ey
o
f
th
e
m
eth
o
d
s
th
at
in
teg
r
ate
im
ag
e
en
cr
y
p
tio
n
with
b
lo
ck
ch
ain
tech
n
o
lo
g
y
.
W
e
cr
itically
ex
am
in
e
th
e
ex
is
tin
g
tech
n
iq
u
es,
ca
teg
o
r
iz
e
th
em
b
ased
o
n
th
eir
s
ec
u
r
ity
p
r
o
to
co
ls
an
d
ef
f
icien
cy
in
r
e
al
-
tim
e
s
y
s
tem
s
,
an
d
p
r
o
p
o
s
e
a
n
o
v
el
class
if
icatio
n
f
r
am
ew
o
r
k
th
at
f
o
cu
s
es o
n
:
−
Use
-
ca
s
e
ap
p
licab
ilit
y
: m
ed
ical
im
ag
in
g
,
I
I
o
T
,
a
n
d
lar
g
e
-
s
ca
le
s
ec
u
r
e
d
ata
tr
an
s
m
is
s
io
n
.
−
Secu
r
ity
p
er
f
o
r
m
an
ce
m
etr
i
cs:
m
ea
s
u
r
in
g
th
e
tr
ad
e
-
o
f
f
s
b
etwe
en
en
cr
y
p
tio
n
s
tr
en
g
th
,
b
lo
ck
c
h
ain
tr
an
s
ac
tio
n
s
p
ee
d
,
an
d
s
ca
lab
ilit
y
.
−
Sy
n
er
g
is
tic
in
n
o
v
atio
n
s
:
id
e
n
tify
in
g
p
r
o
m
is
in
g
ap
p
r
o
ac
h
es
wh
er
e
th
e
s
y
n
er
g
y
b
etw
ee
n
en
cr
y
p
tio
n
tech
n
iq
u
es a
n
d
b
lo
ck
c
h
ain
ca
n
im
p
r
o
v
e
s
ec
u
r
ity
an
d
ef
f
icien
cy
.
T
h
i
s
p
a
p
e
r
a
ls
o
h
i
g
h
l
i
g
h
t
s
t
h
e
g
a
p
s
a
n
d
c
h
a
l
l
e
n
g
es
i
n
t
h
e
c
u
r
r
e
n
t
b
o
d
y
o
f
l
i
t
e
r
a
t
u
r
e
,
p
a
r
t
i
c
u
l
a
r
l
y
w
it
h
r
e
s
p
e
c
t
t
o
t
h
e
p
e
r
f
o
r
m
a
n
c
e
t
r
ad
e
-
o
f
f
s
b
e
t
w
e
e
n
e
n
c
r
y
p
t
i
o
n
c
o
m
p
l
e
x
i
t
y
a
n
d
b
l
o
c
k
c
h
a
i
n
s
c
a
lab
i
l
i
t
y
,
a
n
d
s
u
g
g
e
s
t
s
a
v
e
n
u
e
s
f
o
r
f
u
t
u
r
e
r
e
s
ea
r
c
h
i
n
t
h
i
s
e
m
e
r
g
i
n
g
f
i
e
l
d
.
T
a
b
le
1
p
r
o
v
i
d
e
s
t
h
e
s
u
m
m
a
r
y
o
f
v
a
r
i
o
u
s
i
m
a
g
e
e
n
c
r
y
p
ti
o
n
t
e
c
h
n
i
q
u
e
s
p
r
o
p
o
s
e
d
b
y
d
i
f
f
er
e
n
t
a
u
t
h
o
r
s
o
n
t
h
e
i
m
a
g
es
o
b
t
a
i
n
e
d
f
r
o
m
h
e
t
e
r
o
g
e
n
e
o
u
s
s
o
u
r
c
e
s
.
Al
l
t
h
es
e
e
n
c
r
y
p
t
i
o
n
t
e
c
h
n
i
q
u
e
s
i
n
t
e
g
r
at
e
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
a
f
te
r
e
n
c
r
y
p
t
i
n
g
t
h
e
i
m
a
g
e
d
a
ta
.
T
h
e
r
e
s
u
l
ts
a
n
d
o
b
s
e
r
v
a
t
i
o
n
s
a
r
e
s
u
m
m
a
r
i
ze
d
al
o
n
g
w
i
t
h
t
h
e
li
m
i
t
at
i
o
n
s
a
n
d
t
h
e
f
u
t
u
r
e
e
n
h
a
n
c
e
m
e
n
t
s
d
is
c
u
s
s
ed
b
y
t
h
e
a
u
t
h
o
r
s
.
9.
SE
CUR
I
T
Y
AND
CO
M
P
L
E
XIT
Y
A
NAL
YSI
S O
F
B
L
O
CK
CH
AIN AN
D
I
M
AG
E
E
NCRY
P
T
I
O
N
T
E
CH
NO
L
O
G
I
E
S
I
n
an
y
cr
y
p
to
g
r
ap
h
ic
s
y
s
tem
o
r
s
ec
u
r
e
co
m
m
u
n
icatio
n
f
r
am
ewo
r
k
,
b
o
th
s
ec
u
r
ity
p
r
o
o
f
s
an
d
co
m
p
lex
ity
ass
ess
m
en
ts
ar
e
cr
u
cial
f
o
r
e
v
alu
atin
g
th
e
r
o
b
u
s
tn
ess
an
d
f
ea
s
ib
ilit
y
o
f
th
e
p
r
o
p
o
s
ed
tech
n
iq
u
es.
T
h
is
r
ev
iew
s
y
n
th
esizes
th
e
cu
r
r
en
t
s
tate
o
f
th
e
ar
t
b
y
an
a
ly
zin
g
th
e
s
ec
u
r
ity
p
r
o
o
f
s
an
d
co
m
p
u
tatio
n
al
co
m
p
lex
ities
f
o
r
b
o
th
b
lo
ck
c
h
ain
-
b
ased
s
y
s
tem
s
an
d
im
a
g
e
en
cr
y
p
tio
n
tech
n
o
lo
g
ies.
I
n
th
e
liter
atu
r
e
o
n
b
lo
ck
ch
ain
an
d
im
ag
e
e
n
cr
y
p
tio
n
,
s
ec
u
r
ity
p
r
o
o
f
s
ar
e
cr
u
cial
f
o
r
d
em
o
n
s
tr
atin
g
th
at
m
eth
o
d
s
m
ee
t
c
o
r
e
s
ec
u
r
i
ty
r
eq
u
ir
em
en
ts
s
u
ch
a
s
co
n
f
id
en
tiality
,
in
teg
r
ity
,
a
n
d
au
th
e
n
ticity
.
Pro
v
a
b
le
s
ec
u
r
ity
m
o
d
els
ar
e
co
m
m
o
n
l
y
u
s
ed
f
o
r
im
ag
e
en
cr
y
p
tio
n
tech
n
iq
u
es,
s
h
o
wca
s
in
g
th
eir
r
esis
tan
ce
to
k
n
o
w
n
attac
k
s
lik
e
b
r
u
te
f
o
r
ce
o
r
d
if
f
e
r
en
tial
cr
y
p
tan
al
y
s
is
.
Fo
r
ex
am
p
le,
en
c
r
y
p
tio
n
alg
o
r
ith
m
s
lik
e
R
SA,
DE
S,
an
d
AE
S
p
r
o
v
id
e
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
B
o
ls
teri
n
g
ima
g
e
en
cryp
tio
n
t
ec
h
n
iq
u
es w
ith
b
lo
ck
ch
a
in
tec
h
n
o
lo
g
y
…
(
N
a
r
ma
d
h
a
A
n
n
a
d
u
r
a
i
)
601
well
-
estab
lis
h
ed
p
r
o
o
f
s
o
f
s
ec
u
r
ity
b
ased
o
n
c
o
m
p
u
tatio
n
al
h
ar
d
n
ess
,
s
u
ch
as
th
e
d
i
f
f
icu
lt
y
o
f
f
ac
t
o
r
in
g
lar
g
e
p
r
im
es
(
R
SA)
o
r
s
o
lv
in
g
s
p
ec
if
ic
p
r
o
b
lem
s
(
AE
S).
I
n
b
lo
ck
ch
ain
s
ec
u
r
ity
,
p
r
o
to
c
o
ls
o
f
te
n
r
ely
o
n
b
y
za
n
tin
e
f
au
lt
to
ler
a
n
ce
(
B
FT)
an
d
ze
r
o
-
k
n
o
wled
g
e
p
r
o
o
f
s
(
Z
KPs
)
to
s
ec
u
r
e
th
e
n
etwo
r
k
,
esp
e
cially
in
s
ce
n
a
r
io
s
in
teg
r
atin
g
im
ag
e
en
cr
y
p
tio
n
,
s
u
ch
as
in
h
ea
lth
ca
r
e
an
d
I
o
T
.
R
esear
ch
b
y
Z
h
an
g
et
a
l.
[
2
3
]
h
ig
h
lig
h
ts
th
e
u
s
e
o
f
Z
KPs
to
p
r
o
tect
m
ed
ical
i
m
ag
e
p
r
iv
ac
y
wh
ile
u
s
in
g
b
lo
ck
ch
ain
f
o
r
s
ec
u
r
e
t
r
an
s
m
is
s
io
n
,
th
o
u
g
h
m
an
y
s
y
s
tem
s
s
till
lack
f
o
r
m
al
p
r
o
o
f
s
ag
ain
s
t
is
s
u
es
l
ik
e
d
o
u
b
le
-
s
p
en
d
in
g
o
r
Sy
b
il
attac
k
s
,
esp
e
cially
in
r
eso
u
r
ce
-
co
n
s
tr
ain
ed
I
o
T
e
n
v
ir
o
n
m
en
ts
.
Ad
d
itio
n
ally
,
th
e
i
n
teg
r
atio
n
o
f
h
o
m
o
m
o
r
p
h
ic
en
c
r
y
p
tio
n
with
b
lo
ck
ch
ai
n
h
as
em
er
g
ed
as
a
s
o
l
u
tio
n
f
o
r
s
ec
u
r
e
im
ag
e
tr
a
n
s
m
is
s
io
n
,
wh
er
e
s
ec
u
r
ity
p
r
o
o
f
s
en
s
u
r
e
t
h
at
en
cr
y
p
ted
im
a
g
es
ca
n
b
e
p
r
o
ce
s
s
ed
with
o
u
t r
ev
ea
lin
g
th
eir
co
n
ten
t,
a
v
ital f
ea
t
u
r
e
in
p
r
iv
ac
y
-
s
en
s
itiv
e
f
ield
s
lik
e
h
ea
lth
ca
r
e.
C
o
m
p
lex
ity
as
s
ess
m
en
t
is
ess
en
tial
in
d
eter
m
i
n
in
g
th
e
f
ea
s
ib
ilit
y
o
f
d
e
p
lo
y
in
g
e
n
cr
y
p
tio
n
an
d
b
lo
ck
ch
ain
s
o
lu
tio
n
s
,
p
ar
ticu
l
ar
ly
in
r
ea
l
-
tim
e
an
d
r
eso
u
r
c
e
-
co
n
s
tr
ain
ed
en
v
i
r
o
n
m
e
n
ts
l
ik
e
I
o
T
an
d
I
I
o
T
.
Fo
r
im
ag
e
e
n
cr
y
p
tio
n
,
m
eth
o
d
s
s
u
ch
as
ch
a
o
tic
m
ap
s
an
d
ellip
tic
cu
r
v
e
c
r
y
p
to
g
r
ap
h
y
(
E
C
C
)
p
r
o
v
id
e
h
ig
h
s
ec
u
r
ity
b
u
t
ar
e
o
f
ten
co
m
p
u
t
atio
n
ally
in
ten
s
iv
e,
p
o
s
in
g
ch
allen
g
es
f
o
r
r
ea
l
-
tim
e
im
p
lem
en
tatio
n
.
Stu
d
ies
b
y
Ku
m
ar
an
d
Ma
th
ew
[
1
7
]
in
d
ic
ate
th
at
wh
ile
E
C
C
o
f
f
er
s
s
tr
o
n
g
er
s
ec
u
r
ity
p
er
b
it th
an
R
SA
,
its
k
ey
g
en
er
atio
n
an
d
en
c
r
y
p
tio
n
p
r
o
ce
s
s
es
ar
e
s
lo
wer
,
esp
ec
ially
with
lar
g
e
im
ag
e
d
atasets
.
C
h
ao
tic
en
cr
y
p
tio
n
tec
h
n
iq
u
es
,
s
u
ch
as
lo
g
is
tic
m
ap
s
,
h
av
e
lo
wer
co
m
p
u
tatio
n
al
co
m
p
l
ex
ity
b
u
t
m
ay
b
e
less
s
ec
u
r
e,
p
r
o
m
p
tin
g
th
e
d
ev
elo
p
m
e
n
t
o
f
h
y
b
r
id
m
eth
o
d
s
th
at
co
m
b
in
e
ch
ao
tic
e
n
cr
y
p
ti
o
n
with
tr
ad
itio
n
al
alg
o
r
ith
m
s
to
b
alan
ce
s
ec
u
r
ity
an
d
c
o
m
p
lex
ity
.
B
lo
ck
ch
ain
’
s
co
m
p
lex
ity
p
r
im
ar
ily
ar
is
es f
r
o
m
its
co
n
s
en
s
u
s
m
ec
h
an
is
m
s
.
T
ab
le
1
.
Su
m
m
a
r
y
o
f
th
e
s
u
r
v
ey
o
n
v
ar
io
u
s
im
a
g
e
en
cr
y
p
tio
n
ca
r
r
ied
o
u
t w
ith
b
l
o
ck
ch
ain
R
e
f
e
r
e
n
c
e
s
A
l
g
o
r
i
t
h
ms
u
s
e
d
A
p
p
l
i
e
d
on
R
e
s
u
l
t
/
o
b
s
e
r
v
a
t
i
o
n
Li
mi
t
a
t
i
o
n
s
P
r
o
p
o
se
d
f
u
t
u
r
e
e
n
h
a
n
c
e
me
n
t
s
K
h
a
n
a
n
d
B
y
u
n
[
1
]
I
mag
e
e
n
c
r
y
p
t
i
o
n
b
a
s
e
d
o
n
b
l
o
c
k
c
h
a
i
n
I
I
o
T
I
d
e
a
l
e
n
t
r
o
p
y
v
a
l
u
e
c
l
o
se
t
o
8
i
s
o
b
t
a
i
n
e
d
w
h
i
c
h
mak
e
s i
t
s
a
f
e
f
r
o
m
b
r
u
t
e
f
o
r
c
e
a
t
t
a
c
k
.
U
sag
e
o
f
se
n
so
r
s
w
i
t
h
l
o
w
m
e
mo
r
y
a
n
d
t
r
a
n
s
a
c
t
i
o
n
sp
e
e
d
W
e
b
a
n
d
c
l
o
u
d
ser
v
i
c
e
s
c
a
n
r
e
s
o
l
v
e
t
h
i
s
p
r
o
b
l
e
m
o
f
d
e
f
i
c
i
e
n
t
s
e
n
s
o
r
m
e
mo
r
y
B
h
a
sk
a
r
a
n
et
al
.
[
2
]
BC
-
LW
C
I
E
t
e
c
h
n
i
q
u
e
l
i
g
h
t
w
e
i
g
h
t
c
r
y
p
t
o
g
r
a
p
h
y
t
e
c
h
n
i
q
u
e
I
I
o
T
A
c
c
o
m
p
l
i
s
h
e
d
h
i
g
h
e
r
N
P
C
R
a
n
d
P
S
N
R
O
n
l
y
i
ma
g
e
s
o
f
2
5
6
p
i
x
e
l
s
i
s c
o
n
si
d
e
r
e
d
.
A
t
t
r
i
b
u
t
e
b
a
se
d
e
n
c
r
y
p
t
i
o
n
a
n
d
d
i
g
i
t
a
l
s
i
g
n
a
t
u
r
e
a
p
p
r
o
a
c
h
e
s
c
a
n
b
e
i
mp
l
e
m
e
n
t
e
d
f
o
r
se
c
u
r
i
t
y
p
e
r
f
o
r
m
a
n
c
e
D
u
r
g
a
et
al
.
[
3
]
C
h
a
o
t
i
c
e
n
c
r
y
p
t
i
o
n
s
c
h
e
me
(
C
ES)
b
l
o
c
k
c
h
a
i
n
m
o
d
e
I
o
T
-
med
i
c
a
l
i
ma
g
e
s
S
e
c
u
r
e
f
r
o
m
b
r
u
t
e
f
o
r
c
e
a
t
t
a
c
k
Li
mi
t
e
d
c
o
m
p
u
t
i
n
g
r
e
so
u
r
c
e
s
a
n
d
l
a
c
k
o
f
mem
o
r
y
.
F
o
r
t
e
st
i
n
g
s
e
c
u
r
i
t
y
i
mp
l
e
m
e
n
t
i
n
g
5
G
w
i
l
l
b
e
e
f
f
i
c
i
e
n
t
i
n
f
u
t
u
r
e
.
K
h
a
y
y
a
t
et
al
.
[
4
]
B
l
o
c
k
c
h
a
i
n
-
e
n
a
b
l
e
d
mo
d
e
l
w
i
t
h
S
S
O
-
H
C
N
N
I
I
o
T
R
e
s
u
l
t
e
d
i
n
g
o
o
d
e
n
t
r
o
p
y
,
m
i
n
i
m
u
m
M
S
E
a
n
d
m
a
x
i
m
u
m
P
S
R
N
a
n
d
C
C
O
p
t
i
mi
z
a
t
i
o
n
t
e
c
h
n
i
q
u
e
s
i
s
t
e
d
i
o
u
s
LWC
w
i
t
h
b
i
o
me
t
r
i
c
sch
e
mes
c
a
n
b
e
a
d
o
p
t
e
d
t
o
e
n
s
u
r
e
s
e
c
u
r
i
t
y
.
B
r
a
b
i
n
e
t
a
l
.
[
5
]
R
D
H
sc
h
e
m
e
w
i
t
h
b
l
o
c
k
o
r
s
t
r
e
a
m
c
i
p
h
e
r
A
l
l
d
i
g
i
t
a
i
ma
g
e
s
A
c
h
i
e
v
e
d
h
i
g
h
P
S
N
R
O
r
i
g
i
n
a
l
i
ma
g
e
s
i
s
n
o
t
o
b
t
a
i
n
e
d
a
t
t
h
e
d
e
c
o
d
i
n
g
p
h
a
se
d
u
e
t
o
c
o
mp
r
e
ssi
o
n
a
n
d
d
e
c
o
m
p
r
e
ss
i
o
n
o
f
JP
EG
i
ma
g
e
.
R
e
p
l
i
c
a
t
i
o
n
o
f
t
h
e
o
r
i
g
i
n
a
l
i
ma
g
e
w
i
t
h
o
u
t
d
a
t
a
l
o
s
s
h
a
s
t
o
b
e
f
o
c
u
se
d
i
n
d
e
c
o
d
i
n
g
p
h
a
se
K
u
mar
et
al
.
[
6
]
B
l
o
c
k
c
h
a
i
n
a
n
d
h
o
m
o
m
o
r
p
h
i
c
B
G
V
e
n
c
r
y
p
t
i
o
n
s
c
h
e
me
M
e
d
i
c
a
l
i
ma
g
e
s
A
c
h
i
e
v
e
d
a
mo
d
e
l
w
h
i
c
h
i
s
h
i
g
h
l
y
r
e
si
st
a
n
t
t
o
d
a
t
a
l
e
a
k
a
g
e
Tr
a
i
n
i
n
g
t
h
e
mo
d
e
l
c
o
n
su
mes
mo
r
e
Ti
me
a
n
d
c
o
st
A
i
m t
o
p
r
o
v
i
d
e
a
c
o
st
e
f
f
e
c
t
i
v
e
s
o
l
u
t
i
o
n
S
h
a
r
e
e
f
et
al
.
[
7
]
A
ES t
e
c
h
n
i
q
u
e
i
n
t
e
r
p
l
a
n
e
t
a
r
y
f
i
l
e
s
y
st
e
m
(
I
P
F
S
)
i
s u
se
d
t
o
e
n
c
r
y
p
t
a
n
d
g
e
n
e
r
a
t
e
h
a
s
h
v
a
l
u
e
Tr
a
n
sf
e
r
r
e
d
i
ma
g
e
s
a
r
e
st
o
r
e
d
i
n
mu
l
t
i
p
l
e
n
o
d
e
s,
mak
e
s i
t
d
i
f
f
i
c
u
l
t
f
o
r
t
h
e
h
a
c
k
e
r
s
t
o
a
c
c
e
ss
I
mag
e
k
e
y
g
e
n
e
r
a
t
i
o
n
i
s
t
e
d
i
o
u
s
F
o
c
u
s
t
o
i
n
t
r
o
d
u
c
e
n
e
w
b
l
o
c
k
c
h
a
i
n
h
a
s
h
i
n
g
.
A
c
h
a
r
y
a
a
n
d
S
h
a
r
ma
[
8
]
B
l
o
c
k
c
h
a
i
n
a
n
d
f
e
e
d
b
a
c
k
c
a
r
r
y
s
h
i
f
t
r
e
g
i
s
t
e
r
(
F
C
S
R
)
A
l
l
d
i
g
i
t
a
l
i
ma
g
e
s
F
e
e
d
b
a
c
k
c
a
r
r
y
s
h
i
f
t
r
e
g
i
s
t
e
r
w
i
t
h
A
r
n
o
l
d
map
i
s
i
mp
l
e
m
e
n
t
e
d
.
S
e
c
u
r
e
f
r
o
m
st
a
t
i
st
i
c
a
l
a
t
t
a
c
k
s
M
o
r
e
s
h
u
f
f
l
i
n
g
t
e
c
h
n
i
q
u
e
s
c
a
n
b
e
i
mp
l
e
me
n
t
e
d
G
h
a
z
a
l
et
al
.
[
9
]
C
o
m
p
u
t
a
t
i
o
n
a
l
i
n
t
e
l
l
i
g
e
n
c
e
a
p
p
r
o
a
c
h
w
i
t
h
e
n
c
r
y
p
t
i
o
n
f
r
a
mew
o
r
k
u
si
n
g
p
r
i
v
a
t
e
b
l
o
c
k
c
h
a
i
n
.
I
o
M
T
W
o
r
k
s
i
n
t
h
r
e
e
p
h
a
ses
,
t
r
a
i
n
i
n
g
,
v
a
l
i
d
a
t
i
o
n
a
n
d
p
r
i
v
a
t
e
b
l
o
c
k
c
h
a
i
n
,
Tr
a
i
n
i
n
g
p
h
a
se
a
n
d
a
c
c
u
r
a
c
y
i
n
v
a
l
i
d
a
t
i
o
n
i
s
h
i
g
h
l
y
e
f
f
i
c
i
e
n
t
.
N
e
e
d
t
o
p
r
o
v
i
d
e
e
f
f
e
c
t
i
v
e
t
r
a
i
n
i
n
g
m
e
t
h
o
d
s f
o
r
d
a
t
a
se
t
t
o
i
n
c
r
e
a
se
e
f
f
i
c
i
e
n
c
y
A
l
o
h
a
l
i
e
t
al
.
[
1
0
]
I
mag
e
e
n
c
r
y
p
t
i
o
n
p
r
o
c
e
ss w
i
t
h
AOA
d
r
i
v
e
n
b
y
b
l
o
c
k
c
h
a
i
n
A
l
l
d
i
g
i
t
a
l
i
ma
g
es
B
l
o
c
k
c
h
a
i
n
,
i
ma
g
e
e
n
c
r
y
p
t
i
o
n
a
n
d
o
p
t
i
m
a
l
k
e
y
g
e
n
e
r
a
t
i
o
n
i
s
u
se
d
R
e
s
u
l
t
e
d
i
n
M
S
E
o
f
0
.
0
4
3
0
a
n
d
P
S
N
R
6
1
.
8
0
d
B
K
e
y
g
e
n
e
r
a
t
i
o
n
i
s
t
e
d
i
o
u
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
14
,
No
.
2
,
A
u
g
u
s
t
20
25
:
594
-
604
602
10.
DIS
CU
SS
I
O
N
T
a
b
l
e
1
c
at
e
r
s
t
h
e
l
i
t
e
r
at
u
r
e
r
e
v
i
e
w
o
f
t
h
e
s
t
u
d
y
c
a
r
r
i
e
d
o
u
t
b
y
v
a
r
i
o
u
s
a
u
t
h
o
r
s
t
h
a
t
is
o
b
s
e
r
v
ed
c
a
r
e
f
u
l
l
y
t
o
f
u
r
n
i
s
h
t
h
e
s
i
g
n
i
f
i
ca
n
c
e
o
f
im
a
g
e
e
n
c
r
y
p
t
i
o
n
te
c
h
n
i
q
u
e
s
an
d
b
l
o
c
k
c
h
a
i
n
t
ec
h
n
o
l
o
g
y
i
n
p
r
o
t
e
c
t
i
n
g
t
h
e
i
m
a
g
e
d
a
t
a
.
I
t
i
s
o
b
s
e
r
v
e
d
f
r
o
m
t
h
e
a
b
o
v
e
r
e
v
i
e
w
t
h
a
t
m
a
n
y
a
u
t
h
o
r
s
a
r
e
f
o
c
u
s
i
n
g
o
n
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
a
l
o
n
g
w
i
t
h
b
l
o
c
k
c
h
a
i
n
.
A
s
p
r
e
s
e
n
te
d
a
b
o
v
e
K
h
a
n
a
n
d
B
y
u
n
[
1
]
h
a
s
s
u
g
g
e
s
t
e
d
a
m
e
t
h
o
d
w
h
i
c
h
s
t
o
r
es
t
h
e
p
i
x
e
l
v
a
l
u
e
s
o
f
t
h
e
i
m
a
g
e
w
h
i
c
h
i
s
o
b
t
ai
n
e
d
u
s
i
n
g
p
r
o
p
o
s
e
d
c
r
y
p
t
o
g
r
a
p
h
i
c
t
e
c
h
n
iq
u
e
i
n
a
b
l
o
c
k
c
h
a
i
n
.
H
as
h
i
n
g
is
p
e
r
f
o
r
m
e
d
o
n
t
h
e
c
o
l
l
e
c
t
e
d
d
a
t
a
a
n
d
s
t
o
r
e
d
o
v
e
r
t
h
e
b
l
o
c
k
c
h
a
i
n
.
B
h
a
s
k
a
r
a
n
et
al
.
[
2
]
h
a
s
d
i
s
c
u
s
s
e
d
a
b
o
u
t
l
i
g
h
t
w
e
i
g
h
t
c
r
y
p
t
o
g
r
a
p
h
y
w
h
i
c
h
i
s
e
n
a
b
l
e
d
w
i
t
h
b
l
o
c
k
c
h
a
i
n
.
K
e
y
i
s
g
e
n
e
r
a
t
e
d
b
y
c
h
i
c
k
e
n
s
w
a
r
m
o
p
t
i
m
i
z
a
ti
o
n
(
C
S
O
)
a
l
g
o
r
i
t
h
m
.
D
u
r
g
a
et
al
.
[
3
]
h
as
p
r
o
p
o
s
e
d
a
n
o
v
e
l
c
h
a
o
t
i
c
e
n
c
r
y
p
t
i
o
n
(
C
E
S
)
w
h
i
c
h
u
s
es
p
er
m
u
t
a
t
i
o
n
t
e
c
h
n
i
q
u
e
b
a
s
e
d
o
n
b
l
o
c
k
c
h
a
i
n
s
y
s
t
e
m
.
K
h
a
y
y
a
t
et
al
.
[
4
]
h
a
s
i
n
t
r
o
d
u
c
e
d
n
e
u
r
a
l
n
e
t
w
o
r
k
w
h
i
c
h
is
i
m
p
l
e
m
e
n
t
e
d
u
s
i
n
g
c
h
a
o
t
i
c
m
a
p
s
f
o
r
k
e
y
g
e
n
e
r
a
t
i
o
n
,
e
n
a
b
l
e
d
w
i
t
h
b
l
o
c
k
c
h
a
i
n
a
n
d
o
p
t
i
m
i
z
a
ti
o
n
b
y
a
p
p
l
y
i
n
g
s
h
a
r
k
s
m
e
l
l
t
e
c
h
n
i
q
u
e
.
B
r
a
b
i
n
e
t
al
.
[
5
]
h
as
p
r
o
p
o
s
e
d
r
e
v
e
r
s
i
b
l
e
d
a
ta
h
i
d
i
n
g
t
e
c
h
n
i
q
u
e
w
h
i
c
h
i
s
s
t
o
r
e
d
i
n
b
l
o
c
k
c
h
ai
n
.
T
h
e
o
t
h
e
r
a
u
t
h
o
r
s
h
a
v
e
p
r
o
p
o
s
e
d
h
o
m
o
m
o
r
p
h
i
c
e
n
c
r
y
p
t
i
o
n
t
e
c
h
n
i
q
u
e
,
A
E
S
te
ch
n
i
q
u
e
w
i
t
h
i
n
t
e
r
p
l
a
n
e
ta
r
y
f
i
le
s
y
s
t
e
m
,
f
e
e
d
b
a
c
k
c
a
r
r
y
s
h
i
f
t
r
e
g
i
s
t
e
r
s
w
i
t
h
b
l
o
c
k
c
h
a
i
n
,
A
r
n
o
l
d
m
a
p
w
i
t
h
b
l
o
c
k
c
h
a
i
n
.
T
h
e
a
b
o
v
e
s
t
u
d
y
h
a
s
f
u
r
n
i
s
h
e
d
f
e
w
b
l
o
c
k
c
h
a
i
n
b
a
s
e
d
te
c
h
n
i
q
u
e
s
f
o
r
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
.
I
n
f
u
t
u
r
e
t
h
e
f
o
l
l
o
w
i
n
g
ca
n
b
e
c
o
n
s
i
d
e
r
e
d
.
N
e
w
e
n
c
r
y
p
t
i
o
n
t
e
c
h
n
i
q
u
e
s
c
a
n
b
e
p
r
o
p
o
s
e
d
a
n
d
e
x
p
l
o
r
e
d
b
y
i
n
t
e
g
r
a
t
i
n
g
w
i
t
h
b
l
o
c
k
c
h
a
i
n
t
o
p
r
o
v
i
d
e
b
e
t
t
e
r
r
es
u
l
ts
.
i)
Dee
p
lear
n
in
g
k
ey
g
e
n
er
atio
n
tech
n
iq
u
es
ca
n
b
e
im
p
lem
en
ted
in
s
tead
o
f
tr
a
d
itio
n
k
e
y
g
en
er
atio
n
f
o
r
en
cr
y
p
tio
n
.
ii)
Div
er
s
e
im
ag
e
d
ataset
m
ay
en
h
an
ce
th
e
s
tu
d
y
.
I
n
th
e
a
b
o
v
e
s
tu
d
y
o
n
ly
im
a
g
es
f
r
o
m
I
o
T
d
ev
ices
ar
e
co
n
s
id
er
ed
.
iii)
C
o
m
p
ar
ativ
e
s
tu
d
y
o
f
v
a
r
io
u
s
tech
n
iq
u
es c
an
b
e
p
r
esen
ted
to
id
en
tify
th
e
m
o
s
t e
f
f
icien
t te
c
h
n
iq
u
es.
iv
)
C
o
m
p
ar
is
o
n
o
n
d
if
f
er
en
t
s
e
cu
r
ity
m
ea
s
u
r
es
m
a
y
b
e
ca
r
r
ied
o
u
t
to
a
n
aly
s
es
an
d
u
n
d
er
s
tan
d
th
e
p
er
f
o
r
m
an
ce
o
f
ea
ch
a
n
d
e
v
er
y
tech
n
iq
u
e.
v)
Sin
ce
p
r
o
ce
s
s
in
g
im
ag
e
d
ata
co
n
s
u
m
es
m
o
r
e
tim
e
an
d
s
p
ac
e,
f
o
cu
s
in
g
o
n
d
ev
elo
p
in
g
a
n
ew
alg
o
r
ith
m
b
ased
o
n
th
ese
p
ar
am
eter
s
to
r
ed
u
ce
co
m
p
lex
ity
will b
e
v
e
r
y
u
s
ef
u
l.
v
i)
C
o
s
t e
f
f
ec
tiv
e
m
eth
o
d
s
h
as to
b
e
id
en
tifie
d
wh
e
n
in
teg
r
atin
g
with
b
lo
ck
ch
ain
.
v
ii)
R
ep
r
o
d
u
cin
g
th
e
o
r
ig
in
al
im
ag
e
with
o
u
t d
ata
lo
s
s
h
as to
b
e
c
o
n
ce
n
tr
ated
i
n
th
e
u
p
co
m
i
n
g
r
esear
ch
es.
T
o
th
at
d
o
m
ain
s
h
o
u
ld
b
e
c
o
n
d
u
cted
.
11.
CO
NCLU
SI
O
N
T
h
i
s
s
u
r
v
e
y
p
r
e
s
e
n
t
s
t
h
e
e
x
is
t
in
g
b
l
o
c
k
c
h
a
i
n
b
a
s
e
d
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
s
c
h
e
m
e
s
w
h
i
c
h
a
r
e
a
p
p
l
i
e
d
w
i
th
v
a
r
i
o
u
s
p
e
r
m
u
t
a
t
i
o
n
t
e
c
h
n
i
q
u
es
b
e
f
o
r
e
e
n
c
r
y
p
t
i
o
n
.
I
t
h
a
s
b
e
e
n
o
b
s
e
r
v
e
d
t
h
a
t
a
p
l
a
i
n
i
m
a
g
e
i
s
c
o
n
s
i
d
e
r
e
d
a
s
g
r
o
u
p
o
f
p
i
x
e
l
s
a
n
d
t
h
es
e
p
ix
e
l
s
h
as
a
h
i
g
h
l
e
v
e
l
o
f
c
o
r
r
e
l
a
t
i
o
n
b
et
w
e
e
n
e
a
c
h
o
t
h
e
r
.
A
l
l
t
h
e
e
n
c
r
y
p
ti
o
n
t
e
c
h
n
i
q
u
e
s
a
p
p
l
i
e
d
b
y
m
o
s
t
o
f
t
h
e
a
u
t
h
o
r
s
m
a
i
n
l
y
a
i
m
t
o
r
e
d
u
c
e
t
h
i
s
c
o
r
r
e
l
a
t
i
o
n
t
h
a
t
e
x
i
s
t
b
e
t
w
ee
n
t
h
e
n
e
i
g
h
b
o
r
i
n
g
p
i
x
e
l
s
.
F
i
n
a
ll
y
,
t
o
m
a
k
e
d
i
g
i
t
a
l
i
m
a
g
es
h
i
g
h
l
y
s
e
cu
r
e
t
h
e
r
e
s
e
a
r
c
h
e
r
s
f
o
c
u
s
o
n
s
to
r
i
n
g
t
h
e
e
n
c
r
y
p
t
e
d
p
i
x
e
l
v
a
l
u
es
o
f
t
h
e
i
m
a
g
e
s
in
s
i
d
e
b
l
o
c
k
c
h
ai
n
.
M
o
r
e
i
n
t
en
s
e
r
e
s
e
a
r
c
h
c
a
n
b
e
a
c
c
o
m
p
li
s
h
e
d
i
n
t
h
e
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
d
o
m
a
i
n
u
s
i
n
g
b
l
o
ck
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
.
A
p
p
l
y
i
n
g
b
l
o
c
k
c
h
a
i
n
f
o
r
i
m
a
g
e
s
i
s
s
ti
l
l
a
n
o
p
e
n
a
r
e
a
f
o
r
t
h
e
r
e
s
e
a
r
c
h
e
r
s
.
I
m
a
g
e
d
at
a
i
s
o
b
t
ai
n
e
d
f
r
o
m
v
a
r
i
o
u
s
s
o
u
r
c
es
o
n
w
h
i
c
h
e
n
c
r
y
p
t
i
o
n
c
a
n
b
e
f
o
c
u
s
e
d
o
n
e
v
e
r
y
s
e
p
a
r
a
t
e
a
r
e
a
i
n
f
u
t
u
r
e
.
M
o
r
e
f
o
c
u
s
c
a
n
b
e
s
t
r
e
s
s
e
d
o
n
d
i
r
e
c
t
l
y
e
n
c
r
y
p
t
i
n
g
i
m
a
g
e
s
u
s
i
n
g
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
w
i
t
h
o
u
t
a
p
p
l
y
i
n
g
a
n
y
t
r
a
d
it
i
o
n
a
l
,
m
o
d
e
r
n
a
n
d
n
o
v
e
l
e
n
c
r
y
p
ti
o
n
t
e
c
h
n
i
q
u
e
s
.
F
r
o
m
t
h
is
s
y
s
t
e
m
a
ti
c
r
e
v
i
e
w
,
i
t
h
as
b
ee
n
p
e
r
c
e
i
v
e
d
t
h
a
t
e
n
c
r
y
p
t
i
o
n
o
f
im
a
g
e
s
a
r
e
e
i
t
h
e
r
c
a
r
r
i
e
d
o
u
t
i
n
o
n
e
o
f
t
h
e
f
o
l
l
o
w
i
n
g
tw
o
w
a
y
s
.
Fi
r
s
t
b
y
a
p
p
l
y
i
n
g
v
a
r
i
o
u
s
t
y
p
e
s
o
f
t
r
a
d
i
t
i
o
n
a
l
a
n
d
m
o
d
e
r
n
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
s
c
h
e
m
e
s
a
n
d
s
t
o
r
i
n
g
t
h
e
c
r
y
p
t
o
g
r
a
p
h
i
c
p
i
x
e
l
v
a
l
u
e
s
.
T
h
e
s
e
c
o
n
d
m
e
t
h
o
d
i
s
b
y
d
ir
e
c
t
l
y
a
p
p
l
y
i
n
g
b
l
o
c
k
c
h
a
i
n
b
a
s
e
d
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
t
o
t
h
e
i
m
a
g
e
s
d
u
e
t
o
i
ts
d
e
c
e
n
t
r
a
l
i
z
e
d
s
t
o
r
i
n
g
.
B
o
t
h
o
f
t
h
e
a
b
o
v
e
-
m
e
n
t
i
o
n
e
d
t
e
c
h
n
i
q
u
e
s
h
a
v
e
t
h
e
i
r
o
w
n
a
d
v
a
n
t
a
g
e
s
a
n
d
d
i
s
a
d
v
a
n
t
a
g
e
s
.
T
h
i
s
o
p
e
n
s
u
p
n
e
w
a
v
e
n
u
es
f
o
r
t
h
e
r
e
s
e
a
r
c
h
e
r
s
t
o
e
n
h
a
n
c
e
i
m
ag
e
e
n
c
r
y
p
t
i
o
n
b
y
i
n
t
e
g
r
a
t
i
n
g
w
it
h
b
l
o
c
k
c
h
a
i
n
.
F
UNDING
I
NF
O
R
M
A
T
I
O
N
Au
th
o
r
s
s
tate
n
o
f
u
n
d
in
g
in
v
o
lv
ed
in
th
is
m
an
u
s
cr
ip
t.
AUTHO
R
CO
NT
RI
B
UT
I
O
NS ST
A
T
E
M
E
N
T
Nar
m
ad
h
a
A:
C
o
n
ce
p
tu
aliza
tio
n
,
m
eth
o
d
o
lo
g
y
,
liter
atu
r
e
r
ev
iew,
d
ata
co
llectio
n
,
m
an
u
s
cr
ip
t
d
r
af
tin
g
,
So
f
twar
e,
Data
an
aly
s
is
,
in
ter
p
r
etatio
n
o
f
r
esu
lts
,
m
an
u
s
cr
ip
t
ed
itin
g
,
an
d
cr
itical
r
ev
is
io
n
s
.
Ag
u
s
th
iy
ar
R
:
T
ec
h
n
ical
v
alid
atio
n
,
Fin
al
An
aly
s
is
,
I
n
v
est
ig
atio
n
an
d
m
an
u
s
cr
ip
t
p
r
o
o
f
r
ea
d
in
g
,
r
ev
iew
an
d
ed
itin
g
,
Su
p
er
v
is
io
n
,
p
r
o
ject
a
d
m
in
is
tr
atio
n
,
a
n
d
f
in
al
ap
p
r
o
v
al
o
f
th
e
m
an
u
s
cr
ip
t.
All
au
t
h
o
r
s
h
a
v
e
r
ea
d
a
n
d
ap
p
r
o
v
ed
t
h
e
f
i
n
al
v
e
r
s
io
n
o
f
th
is
m
an
u
s
cr
ip
t
an
d
a
g
r
ee
to
b
e
ac
co
u
n
tab
le
f
o
r
t
h
e
w
o
r
k
'
s
ac
cu
r
ac
y
a
n
d
in
teg
r
ity
.
T
h
e
au
th
o
r
’
s
co
n
tr
i
b
u
tio
n
is
g
iv
en
b
elo
w
in
th
e
f
o
r
m
o
f
tab
le
f
o
r
r
ef
er
en
ce
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
B
o
ls
teri
n
g
ima
g
e
en
cryp
tio
n
t
ec
h
n
iq
u
es w
ith
b
lo
ck
ch
a
in
tec
h
n
o
lo
g
y
…
(
N
a
r
ma
d
h
a
A
n
n
a
d
u
r
a
i
)
603
Na
m
e
o
f
Aut
ho
r
C
M
So
Va
Fo
I
R
D
O
E
Vi
Su
P
Fu
Nar
m
ad
h
a
A
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
✓
Ag
u
s
th
iy
ar
R
✓
✓
✓
✓
✓
✓
✓
C
:
C
o
n
c
e
p
t
u
a
l
i
z
a
t
i
o
n
M
:
M
e
t
h
o
d
o
l
o
g
y
So
:
So
f
t
w
a
r
e
Va
:
Va
l
i
d
a
t
i
o
n
Fo
:
Fo
r
mal
a
n
a
l
y
s
i
s
I
:
I
n
v
e
s
t
i
g
a
t
i
o
n
R
:
R
e
so
u
r
c
e
s
D
:
D
a
t
a
C
u
r
a
t
i
o
n
O
:
W
r
i
t
i
n
g
-
O
r
i
g
i
n
a
l
D
r
a
f
t
E
:
W
r
i
t
i
n
g
-
R
e
v
i
e
w
&
E
d
i
t
i
n
g
Vi
:
Vi
su
a
l
i
z
a
t
i
o
n
Su
:
Su
p
e
r
v
i
s
i
o
n
P
:
P
r
o
j
e
c
t
a
d
mi
n
i
st
r
a
t
i
o
n
Fu
:
Fu
n
d
i
n
g
a
c
q
u
i
si
t
i
o
n
CO
NF
L
I
C
T
O
F
I
N
T
E
R
E
S
T
ST
A
T
E
M
E
NT
T
h
e
au
th
o
r
(
s
)
d
ec
lar
e
th
at
th
er
e
ar
e
n
o
co
n
f
licts
o
f
in
ter
e
s
t
r
elate
d
to
th
is
r
esear
ch
.
N
o
f
in
an
cial,
p
er
s
o
n
al,
o
r
p
r
o
f
ess
io
n
al
r
elatio
n
s
h
ip
s
h
av
e
in
f
lu
en
ce
d
th
e
w
o
r
k
p
r
esen
ted
in
th
is
p
a
p
er
.
Al
l
r
esear
ch
f
in
d
in
g
s
an
d
in
ter
p
r
etatio
n
s
ar
e
s
o
lely
b
ased
o
n
o
b
jectiv
e
an
aly
s
is
an
d
s
cien
tific
in
q
u
ir
y
.
DATA AV
AI
L
AB
I
L
I
T
Y
-
T
h
e
d
ata
th
at
s
u
p
p
o
r
t
th
e
f
in
d
in
g
s
o
f
th
is
s
tu
d
y
ar
e
o
p
en
l
y
av
ailab
le
in
[
Data
So
u
r
ce
s
I
m
ag
es
-
Fre
e
Do
wn
lo
ad
o
n
Fre
ep
ik
]
at
h
ttp
s
://www.
f
r
ee
p
ik
.
co
m
/f
r
ee
-
p
h
o
t
o
s
-
v
ec
to
r
s
/d
ata
-
s
o
u
r
ce
s
.
-
T
h
e
d
ata
th
at
s
u
p
p
o
r
t
th
e
f
in
d
in
g
s
o
f
th
is
s
tu
d
y
ar
e
also
f
r
ee
av
ailab
le
in
[
Fre
e
Sto
ck
Ph
o
to
s
,
R
o
y
alty
Fre
e
Sto
ck
I
m
ag
es &
C
o
p
y
r
ig
h
t Fr
ee
Pictu
r
es ·
Pex
els]
at
h
t
tp
s
://www.
p
ex
els.co
m
/.
-
T
h
e
Fo
r
m
u
la
f
o
r
im
a
g
e
s
ec
u
r
ity
m
ea
s
u
r
es
o
f
th
is
r
esear
c
h
is
av
ailab
le
in
h
ttp
s
://o
n
lin
elib
r
ar
y
.
wiley
.
c
o
m
/d
o
i/fu
ll/1
0
.
1
1
5
5
/2
0
1
6
/6
7
1
4
1
6
4
.
-
T
h
e
au
t
h
o
r
s
c
o
n
f
ir
m
t
h
at
all
th
e
b
lo
ck
d
ia
g
r
am
s
ar
e
cr
ea
te
d
b
y
th
e
au
th
o
r
its
elf
with
th
e
h
el
p
o
f
Mir
o
to
o
l
at
m
ir
o
.
co
m
a
n
d
also
with
th
e
h
elp
o
f
i
n
s
er
tin
g
s
h
ap
es u
s
in
g
MS
wo
r
d
.
-
T
h
e
p
ix
el
v
alu
e
ca
lc
u
latio
n
o
f
th
e
im
a
g
e
d
ata
is
d
er
iv
ed
u
s
in
g
o
n
lin
e
M
atlab
to
o
l
at
h
ttp
s
://www.
m
a
th
wo
r
k
s
.
co
m
/p
r
o
d
u
cts/
m
atlab
-
o
n
lin
e.
h
t
m
l
.
RE
F
E
R
E
NC
E
S
[
1
]
P
.
W
.
K
h
a
n
a
n
d
Y
.
B
y
u
n
,
“
A
b
l
o
c
k
c
h
a
i
n
-
b
a
s
e
d
sec
u
r
e
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
s
c
h
e
me
f
o
r
t
h
e
i
n
d
u
s
t
r
i
a
l
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s,”
En
t
r
o
p
y
,
v
o
l
.
2
2
,
n
o
.
2
,
p
.
1
7
5
,
F
e
b
.
2
0
2
0
,
d
o
i
:
1
0
.
3
3
9
0
/
e
2
2
0
2
0
1
7
5
.
[
2
]
R
.
B
h
a
sk
a
r
a
n
,
R
.
K
a
r
u
p
p
a
t
h
a
l
,
M
.
K
a
r
t
h
i
c
k
,
J
.
V
i
j
a
y
a
l
a
k
sh
m
i
,
S
.
K
a
d
r
y
,
a
n
d
Y
.
N
a
m
,
“
B
l
o
c
k
c
h
a
i
n
e
n
a
b
l
e
d
o
p
t
i
ma
l
l
i
g
h
t
w
e
i
g
h
t
c
r
y
p
t
o
g
r
a
p
h
y
b
a
s
e
d
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
t
e
c
h
n
i
q
u
e
f
o
r
I
I
o
T,
”
I
n
t
e
l
l
i
g
e
n
t
Au
t
o
m
a
t
i
o
n
a
n
d
S
o
f
t
C
o
m
p
u
t
i
n
g
,
v
o
l
.
3
3
,
n
o
.
3
,
p
p
.
1
5
9
3
–
1
6
0
6
,
2
0
2
2
,
d
o
i
:
1
0
.
3
2
6
0
4
/
i
a
sc.
2
0
2
2
.
0
2
4
9
0
2
.
[
3
]
R
.
D
u
r
g
a
,
E.
P
o
o
v
a
mm
a
l
,
K
.
R
a
m
a
n
a
,
R
.
H
.
J
h
a
v
e
r
i
,
S
.
S
i
n
g
h
,
a
n
d
B
.
Y
o
o
n
,
“
C
ES
b
l
o
c
k
s
—
a
n
o
v
e
l
c
h
a
o
t
i
c
e
n
c
r
y
p
t
i
o
n
sc
h
e
mes
-
b
a
s
e
d
b
l
o
c
k
c
h
a
i
n
s
y
st
e
m
f
o
r
a
n
I
o
T
e
n
v
i
r
o
n
me
n
t
,
”
I
EE
E
Ac
c
e
ss
,
v
o
l
.
1
0
,
p
p
.
1
1
3
5
4
–
1
1
3
7
1
,
2
0
2
2
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
2
.
3
1
4
4
6
8
1
.
[
4
]
M
.
M
.
K
h
a
y
y
a
t
,
M
.
M
.
K
h
a
y
y
a
t
,
S
.
A
b
d
e
l
-
K
h
a
l
e
k
,
a
n
d
R
.
F
.
M
a
n
s
o
u
r
,
“
B
l
o
c
k
c
h
a
i
n
e
n
a
b
l
e
d
o
p
t
i
m
a
l
h
o
p
f
i
e
l
d
c
h
a
o
t
i
c
n
e
u
r
a
l
n
e
t
w
o
r
k
b
a
se
d
se
c
u
r
e
e
n
c
r
y
p
t
i
o
n
t
e
c
h
n
i
q
u
e
f
o
r
i
n
d
u
st
r
i
a
l
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
e
n
v
i
r
o
n
m
e
n
t
,
”
A
l
e
x
a
n
d
r
i
a
E
n
g
i
n
e
e
ri
n
g
J
o
u
r
n
a
l
,
v
o
l
.
6
1
,
n
o
.
1
2
,
p
p
.
1
1
3
7
7
–
1
1
3
8
9
,
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
a
e
j
.
2
0
2
2
.
0
5
.
0
0
2
.
[
5
]
D
.
B
r
a
b
i
n
,
C
.
A
n
a
n
t
h
,
a
n
d
S
.
B
o
j
j
a
g
a
n
i
,
“
B
l
o
c
k
c
h
a
i
n
b
a
se
d
sec
u
r
i
t
y
f
r
a
m
e
w
o
r
k
f
o
r
sh
a
r
i
n
g
d
i
g
i
t
a
l
i
ma
g
e
s
u
si
n
g
r
e
v
e
r
si
b
l
e
d
a
t
a
h
i
d
i
n
g
a
n
d
e
n
c
r
y
p
t
i
o
n
,
”
Mu
l
t
i
m
e
d
i
a
T
o
o
l
s
a
n
d
Ap
p
l
i
c
a
t
i
o
n
s
,
v
o
l
.
8
1
,
n
o
.
1
7
,
p
p
.
2
4
7
2
1
–
2
4
7
3
8
,
2
0
2
2
,
d
o
i
:
1
0
.
1
0
0
7
/
s
1
1
0
4
2
-
022
-
1
2
6
1
7
-
5.
[
6
]
R
.
K
u
m
a
r
e
t
a
l
.
,
“
B
l
o
c
k
c
h
a
i
n
a
n
d
h
o
mo
mo
r
p
h
i
c
e
n
c
r
y
p
t
i
o
n
b
a
s
e
d
p
r
i
v
a
c
y
-
p
r
e
s
e
r
v
i
n
g
mo
d
e
l
a
g
g
r
e
g
a
t
i
o
n
f
o
r
med
i
c
a
l
i
m
a
g
e
s,”
C
o
m
p
u
t
e
r
i
ze
d
Me
d
i
c
a
l
I
m
a
g
i
n
g
a
n
d
G
ra
p
h
i
c
s
,
v
o
l
.
1
0
2
,
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
m
p
me
d
i
ma
g
.
2
0
2
2
.
1
0
2
1
3
9
.
[
7
]
A
.
A
.
A
.
S
h
a
r
e
e
f
,
P
.
L
.
Y
a
n
n
a
w
a
r
,
A
.
S
.
H
.
A
b
d
u
l
-
Q
a
w
y
,
a
n
d
M
.
G
.
A
l
m
u
s
h
a
r
r
e
f
,
“
S
h
a
r
e
a
n
d
r
e
t
r
i
e
v
e
i
m
a
g
e
s
s
e
c
u
r
e
l
y
u
s
i
n
g
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
,
”
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
n
T
e
c
h
n
i
c
a
l
a
n
d
P
h
y
s
i
c
a
l
P
r
o
b
l
e
m
s
o
f
E
n
g
i
n
e
e
r
i
n
g
,
v
o
l
.
1
4
,
n
o
.
3
,
p
p
.
2
0
7
–
2
1
1
,
2
0
2
2
.
[
8
]
M
.
A
c
h
a
r
y
a
a
n
d
R
.
S
.
S
h
a
r
ma,
“
A
n
o
v
e
l
i
ma
g
e
e
n
c
r
y
p
t
i
o
n
b
a
s
e
d
o
n
f
e
e
d
b
a
c
k
c
a
r
r
y
s
h
i
f
t
r
e
g
i
s
t
e
r
a
n
d
b
l
o
c
k
c
h
a
i
n
f
o
r
s
e
c
u
r
e
c
o
mm
u
n
i
c
a
t
i
o
n
,
”
I
n
t
e
rn
a
t
i
o
n
a
l
J
o
u
rn
a
l
o
f
A
p
p
l
i
e
d
E
n
g
i
n
e
e
ri
n
g
Re
s
e
a
rc
h
,
v
o
l
.
1
6
,
n
o
.
6
,
p
p
.
4
6
6
–
4
7
7
,
2
0
2
1
.
[
9
]
T.
M
.
G
h
a
z
a
l
,
M
.
K
.
H
a
sa
n
,
S
.
N
.
H
.
S
.
A
b
d
u
l
l
a
h
,
K
.
A
.
A
.
B
a
k
a
r
,
a
n
d
H
.
A
l
H
a
ma
d
i
,
“
P
r
i
v
a
t
e
b
l
o
c
k
c
h
a
i
n
-
b
a
se
d
e
n
c
r
y
p
t
i
o
n
f
r
a
mew
o
r
k
u
s
i
n
g
c
o
mp
u
t
a
t
i
o
n
a
l
i
n
t
e
l
l
i
g
e
n
c
e
a
p
p
r
o
a
c
h
,
”
Eg
y
p
t
i
a
n
I
n
f
o
rm
a
t
i
c
s
J
o
u
r
n
a
l
,
v
o
l
.
2
3
,
n
o
.
4
,
p
p
.
6
9
–
7
5
,
2
0
2
2
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
e
i
j
.
2
0
2
2
.
0
6
.
0
0
7
.
[
1
0
]
M
.
A
.
A
l
o
h
a
l
i
e
t
a
l
.
,
“
B
l
o
c
k
c
h
a
i
n
-
d
r
i
v
e
n
i
m
a
g
e
e
n
c
r
y
p
t
i
o
n
p
r
o
c
e
s
s
w
i
t
h
a
r
i
t
h
me
t
i
c
o
p
t
i
m
i
z
a
t
i
o
n
a
l
g
o
r
i
t
h
m
f
o
r
sec
u
r
i
t
y
i
n
e
merg
i
n
g
v
i
r
t
u
a
l
e
n
v
i
r
o
n
m
e
n
t
s,
”
S
u
s
t
a
i
n
a
b
i
l
i
t
y
(
S
w
i
t
zer
l
a
n
d
)
,
v
o
l
.
1
5
,
n
o
.
6
,
2
0
2
3
,
d
o
i
:
1
0
.
3
3
9
0
/
s
u
1
5
0
6
5
1
3
3
.
[
1
1
]
M
.
P
.
M
c
B
e
e
a
n
d
C
.
W
i
l
c
o
x
,
“
B
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
y
:
p
r
i
n
c
i
p
l
e
s
a
n
d
a
p
p
l
i
c
a
t
i
o
n
s
i
n
m
e
d
i
c
a
l
i
m
a
g
i
n
g
,
”
J
o
u
r
n
a
l
o
f
D
i
g
i
t
a
l
I
m
a
g
i
n
g
,
v
o
l
.
3
3
,
n
o
.
3
,
p
p
.
7
2
6
–
7
3
4
,
2
0
2
0
,
d
o
i
:
1
0
.
1
0
0
7
/
s1
0
2
7
8
-
0
1
9
-
0
0
3
1
0
-
3.
[
1
2
]
B
.
P
a
t
r
i
c
k
so
n
,
“
W
h
a
t
d
o
b
l
o
c
k
c
h
a
i
n
t
e
c
h
n
o
l
o
g
i
e
s
i
mp
l
y
f
o
r
d
i
g
i
t
a
l
c
r
e
a
t
i
v
e
i
n
d
u
s
t
r
i
e
s
?
,
”
C
re
a
t
i
v
i
t
y
a
n
d
I
n
n
o
v
a
t
i
o
n
M
a
n
a
g
e
m
e
nt
,
v
o
l
.
3
0
,
n
o
.
3
,
p
p
.
5
8
5
–
5
9
5
,
2
0
2
1
,
d
o
i
:
1
0
.
1
1
1
1
/
c
a
i
m.
1
2
4
5
6
.
[
1
3
]
M
.
K
a
u
r
,
S
.
S
i
n
g
h
,
a
n
d
M
.
K
a
u
r
,
“
C
o
mp
u
t
a
t
i
o
n
a
l
i
ma
g
e
e
n
c
r
y
p
t
i
o
n
t
e
c
h
n
i
q
u
e
s:
a
c
o
mp
r
e
h
e
n
si
v
e
r
e
v
i
e
w
,
”
Ma
t
h
e
m
a
t
i
c
a
l
Pr
o
b
l
e
m
s i
n
En
g
i
n
e
e
ri
n
g
,
v
o
l
.
2
0
2
1
,
2
0
2
1
,
d
o
i
:
1
0
.
1
1
5
5
/
2
0
2
1
/
5
0
1
2
4
9
6
.
[
1
4
]
S
.
T.
K
a
m
a
l
,
K
.
M
.
H
o
sn
y
,
T.
M
.
El
g
i
n
d
y
,
M
.
M
.
D
a
r
w
i
s
h
,
a
n
d
M
.
M
.
F
o
u
d
a
,
“
A
n
e
w
i
ma
g
e
e
n
c
r
y
p
t
i
o
n
a
l
g
o
r
i
t
h
m
f
o
r
g
r
e
y
a
n
d
c
o
l
o
r
m
e
d
i
c
a
l
i
m
a
g
e
s,
”
I
EEE
A
c
c
e
ss
,
v
o
l
.
9
,
p
p
.
3
7
8
5
5
–
3
7
8
6
5
,
2
0
2
1
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
1
.
3
0
6
3
2
3
7
.
[
1
5
]
C
.
T
i
k
e
n
a
n
d
R
.
S
a
m
l
i
,
“
A
co
mp
r
e
h
e
n
si
v
e
r
e
v
i
e
w
a
b
o
u
t
i
ma
g
e
e
n
c
r
y
p
t
i
o
n
met
h
o
d
s
,
”
H
a
rr
a
n
Ü
n
i
v
e
rsi
t
e
s
i
Mü
h
e
n
d
i
s
l
i
k
D
e
r
g
i
si
,
v
o
l
.
7
,
n
o
.
1
,
p
p
.
2
7
–
4
9
,
2
0
2
2
,
d
o
i
:
1
0
.
4
6
5
7
8
/
h
u
m
d
e
r
.
1
0
6
6
5
4
5
.
Evaluation Warning : The document was created with Spire.PDF for Python.