Zobrazeno 1 - 4
of 4
pro vyhledávání: '"María Guadalupe González-Novoa"'
Autor:
Maricela Jiménez Rodríguez, María Guadalupe González-Novoa, Juan Carlos Estrada-Gutiérrez, Cuauhtemoc Acosta-Lúa, Octavio Flores-Siordia
Publikováno v:
Dyna, Vol 83, Iss 197, Pp 180-186 (2016)
This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing
Externí odkaz:
https://doaj.org/article/b0bffb46971e4ea3968b7b3337a6d53f
Autor:
Maricela Jiménez Rodríguez, Carlos Eduardo Padilla Leyferman, Juan Carlos Estrada Gutiérrez, María Guadalupe González Novoa, Horacio Gómez Rodríguez, Octavio Flores Siordia
Publikováno v:
Ingeniería e Investigación, Vol 38, Iss 2, Pp 61-69 (2018)
In this work, steganography is implemented in photographs captured by an unmanned aerial vehicle (drone), with the purpose of adding an identifier that indicates which device they are taken from so it works for the recovery of the origin. In the syst
Externí odkaz:
https://doaj.org/article/e4b667d370104949b87341c4b1ebfd12
Autor:
Jorge Aguilar Santiago, Octavio Flores Siordia, José Trinidad Guillen Bonilla, Juan Carlos Estrada Gutierrez, Maricela Jiménez Rodríguez, María Guadalupe González Novoa
Publikováno v:
Security and Communication Networks, Vol 2020 (2020)
In this article, a safe communication system is proposed that implements one or more portable devices denominated SBC (single-board computers), with which photographs are taken and that later utilizes the OpenCV Library for the detection and identifi
Autor:
Cuauhtemoc Acosta-Lua, María Guadalupe González-Novoa, Octavio Flores-Siordia, Juan Carlos Estrada-Gutiérrez, Maricela Jiménez-Rodríguez
Publikováno v:
Dyna, Vol 83, Iss 197, Pp 180-186 (2016)
Repositorio UN
Universidad Nacional de Colombia
instacron:Universidad Nacional de Colombia
Repositorio UN
Universidad Nacional de Colombia
instacron:Universidad Nacional de Colombia
This article presents an alternative for resolving the existing vulnerability of systems that implement masking by means of chaotic synchronization. This system avoids detection of the parameters used as the cipher key by an attacker on implementing