Skip to main content

Development of a Neural Net-Based, Personalized Secure Communication Link

  • Conference paper
Artificial Neural Networks – ICANN 2006 (ICANN 2006)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 4131))

Included in the following conference series:

Abstract

This paper describes a novel ultra-secure, unidirectional communication channel for use in public communication networks, which is based on

a) learning algorithms in combination with neural nets for fabrication of a unique pair of modules for encryption and decryption, and

b) in combination with decision trees for the decryption process,

c) signal transformation from spatial to temporal patterns by means of ambiguous spatial-temporal filters (ST filters),

d) absence of public- or private keys, and

e) requirement of biometric data of one of the users for both generation of the pair of hardware/software modules and for the decryption by the receiver.

To achieve these features we have implemented an encryption-unit (EU) using ST filters for encryption and a decryption unit (DU) using learning algorithms and decision trees for decryption.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Baruth, O., Eckmiller, R., Neumann, D.: Retina encoder tuning and data encryption for learning retina implants. In: Proc. of the Int. Joint Conf. on Neural Networks (IJCNN) 2003, Portland, Oregon, vol. 1, pp. 1249–1252 (2003)

    Google Scholar 

  2. Bernardete, E.A., Kaplan, E.: The dynamics of primate M retinal ganglion cells. Visual Neuroscience 16, 355–368 (1999)

    Google Scholar 

  3. Clancy, T.C., Kiyavash, N., Lin, D.J.: Secure Smartcard-Based Fingerprint Authentication. In: ACM SIGMM 2003 Workshop on Biometrics Methods and Applications, pp. 45–52 (2003)

    Google Scholar 

  4. Dong, D.W.: Spatiotemporal Inseparability of Natural Images and Visual Sensitivities. In: Zanker, J.M., Zeil, J. (eds.) Computational, neural and ecological constraints of visual motion processing, pp. 371–380. Springer, Berlin (2001)

    Google Scholar 

  5. Daugman, J.: The importance of being random: statistical principles of iris recognition. Pattern Recognition 36, 279–291 (2003)

    Article  Google Scholar 

  6. Eckmiller, R., Baruth, O., Neumann, D.: Method and Device for Decryption-Secure Transfer of Data. PCT Patent Application, PCT WO 2004021694

    Google Scholar 

  7. Haykin, S. (ed.): Adaptive Filter Theory, 4th edn. Prentice Hall, New Jersey (2002)

    Google Scholar 

  8. McEliece, R.J. (ed.): The Theory of Information and Coding. Cambridge University Press, Cambridge (2002)

    MATH  Google Scholar 

  9. Menezes, A., van Oorschot, P., Vanstone, S. (eds.): Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  10. Mitchel, T.M. (ed.): Machine Learning. McGraw Hill, New York (1997)

    Google Scholar 

  11. Parbhakar, S., Sharath, P., Anil, K.: Biometric Recognition: Security and privacy concerns. IEEE Security and Privacy Magazine 1, 33–42 (2003)

    Google Scholar 

  12. Ratha, N., Bolle, R. (eds.): Automatic Fingerprint Recognition Systems. Springer, New York (2004)

    Google Scholar 

  13. Schneier, B. (ed.): Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sohns, New York (1996)

    MATH  Google Scholar 

  14. Si, J., Barto, A.G., Powell, W.B., Wunsch, I.D.: Handook of Learning and Approximate Dynamic Programming. IEEE Press/Wiley-Interscience, Piscataway/New York (2004)

    Book  Google Scholar 

  15. Soutar, C.: Biometric Encryption. In: Nichols, R.K. (ed.) ICSA Guide to Cryptography, ch. 22. McGraw-Hill, New York (1999)

    Google Scholar 

  16. Rao, K.R., Yip, P.C. (eds.): The Transform and Data Compression Handbook. CRC Press, Boca Raton (2001)

    MATH  Google Scholar 

  17. Wollinger, T., Guadjardo, J., Paar, C.: Security on FPGAs: State-of-the-art implementations and attacks. ACM Transactions in Embedded Computing Systems 3, 534–574 (2004)

    Article  Google Scholar 

  18. Wollinger, T., Paar, C.: Security aspects of FPGAs in cryptographic application. In: Rosenstiel, W., Lysaght, P. (eds.) New Algorithms, Architectures, and Applications for Reconfigurable Computing, ch. 1. Kluwer Academic Publishers, Dordrecht (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2006 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Neumann, D., Eckmiller, R., Baruth, O. (2006). Development of a Neural Net-Based, Personalized Secure Communication Link. In: Kollias, S.D., Stafylopatis, A., Duch, W., Oja, E. (eds) Artificial Neural Networks – ICANN 2006. ICANN 2006. Lecture Notes in Computer Science, vol 4131. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11840817_36

Download citation

  • DOI: https://doi.org/10.1007/11840817_36

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-38625-4

  • Online ISBN: 978-3-540-38627-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics