ON RECOGNITION OF CIPHER BIT STREAM FROM DIFFERENT SOURCES USING MAJORITY VOTING FUSION RULE

SHRI KANT, VEENA SHARMA, B. K. DASS

Abstract


In the present paper, majority-voting rule has been investigated for its possible application in cryptological sciences. A novel approach is proposed to address the complex identification problem of overlapping classes. The method for representing patterns using different measurements has been discussed and the majority voting rule is used to fuse the results obtained in different measurement spaces. The proposed approach is quite natural and simple to implement in comparison with usual fusion strategies. The
scheme has been implemented for three-class problem and results were tabulated and presented graphically.


Keywords


Decision fusion, Representation space, Pattern space, Expert classifiers, Majority logic, Stream ciphers and Cryptology.

Full Text:

PDF

References


. Lam, L., Suen, C. Y., 1997. Application of majority voting to pattern recognition: an analysis of its behaviour and performance. IEEE transactions on Systems, Man, and Cybernetics 27(5), 553-568.

. Kittler, J., Hatef, M., Duin, R., Matas, J., 1998. On combining classifiers. IEEE Trans. PAMI 20(3), 226-239.

. Alkoot, F. M., Kittler, J., 1999. Experimental evaluation of expert fusion strategies. Pattern Recognition Letters 20, 1361-1369.

. Kuncheva, L., Bazdek, J., Duin, R., 2001. Decision templates for multiple classifier fusion: an experimental comparison. Pattern Recognition Letters 34(2), 299-314.

. Chen, D., Cheng, X., 2001. An asymptotic analysis of some expert fusion methods. Pattern Recognition Letters 22, 901-904.

. Alexandre, Luis A., Campilho, Aurelio C., Kamel, M., 2001. On combining classifiers using sum and product rules. Pattern Recognition Letters 22, 1283-1289.

. Kuncheva, Ludmilla I., 2002. A theoretical study on six classifier fusion strategies. IEEE Trans. PAMI 24(2), 281-286.

. Lee, D. S., Srihari, S. N., 1993. Handprinted digit recognition: A comparison of algorithms. In Proc. 3rd Int. Workshop Frontiers Handwriting Recognition. Buffalo, NY, pp. 153-162.

. Geffe, P. R., 1973. How to protect data with ciphers that are really hard to break. Electronics, 46(1), 99-101.

. Rueppel, R. A., 1986. Analysis & design of stream ciphers. Springer-Verlag.

. Schneier, B., 1996. Applied cryptography, Second Edition John Wiley & Sons, Inc.

. Kumar, I. J., 1997. Cryptology: System identification and key clustering. Agean Park Press, CA, USA.

. Menezes, A. J., Van Oorschot, P. C., Vanstone, S. A., 1997. Handbook applied cryptography. CRC Press, Boca Raton.

. Tou, J. T., Gonzalez, R. C., 1974. Pattern recognition principles. Addison-Wesley Publishing Company.

. Bow, Sing-Tze, 1984. Pattern recognition: Application to large data-set problems. Marcel Dekker, Inc., New York & Basel.

. Kant, S., Sharma, V., 2000. Discrimination among various type of encrypted bitstream. International Conference on Quality Reliability and Information Technology, 21-23 Dec, New Delhi.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2005 Franco Eugeni

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

Ratio Mathematica - Journal of Mathematics, Statistics, and Applications. ISSN 1592-7415; e-ISSN 2282-8214.