References
[1] Menezes, A. J., van Oorschot, P., and Vanstone, S. A. (1996). “Handbook of applied cryptography”. Boca Raton: CRC Press.
[2] Toru Ohira, “Toward encryption with neural network analog” Bruges (Belgium), 26-28 April 2000, D-Facto public.,ISPN 2-930307-00-5,pp.147-152.
[3] Amera I., “ Using Hebbian network for cipher”, The first scientific conference for information technology SCIT, 2008.
[4] M. Melanie, “An Introduction to Genetic Algorithms”, A Bradford Book The MIT Press Cambridge, Massachusetts • London, England Fifth printing, 1999
[5] Rumelhart, D. E., Hinton, G. E., and Williams, R. J., “Learning internal representations by error propagation”. In D. E. Rumelhart, J. L. McClelland. PDP Research Group, Parallel Distributed Processing, Volume 1: Foundations. MIT Press. 1986.
Tikrit Journal of Engineering Sciences (2010) 17(2) 51 – 57
Multiple Data Type Encryption using Genetic Neural Network
Raid R. Al-Nima | Ali N. Hamed | Ridwaan Y. Srdeeq |
Computer Eng. Dept., Technical Coll., Mosul, Iraq | Power Eng. Dept., Technical Coll., Mosul, Iraq |
Abstract
The aim of this research is to build a ciphering system by using genetic neural network technique to protect data against unauthorized access to the data being transferred. The encryption data includes three stages: first Stage :- Using the genetic algorithm to train backpropagation neural network for obtaining weights. Second Stage:- Encryption data by using the weights obtained from first backpropagation layer and consider its weights as a encrypted key. third Stage:- Decryption data by using the weights obtained from second backpropagation layer and consider its weights as a decrypted key. This system is similar to coding asymmetric, and have the ability of coding a group of data such as:- pictures, waves and texts.
Download Full-text PDF
Keywords: Encryption , decryption , genetic , neural network , genetic neural network.