Application of Chaotic Neural Network for Authentication using the Database | ||
AL-Rafidain Journal of Computer Sciences and Mathematics | ||
Article 14, Volume 11, Issue 1, June 2014, Pages 81-95 PDF (680.26 K) | ||
Document Type: Research Paper | ||
DOI: 10.33899/csmj.2014.163740 | ||
Author | ||
Ammar Thaher Yaseen Abd Alazeez | ||
College of Computer Science and Mathematics University of Mosul, Mosul, Iraq | ||
Abstract | ||
In this paper a new algorithm is suggested to encrypt data, since it was to take advantage of properties of the chaotic, so it was entered as a key in encryption and hiding by entering values to the artificial neural network for training as well as hide in the picture, beside use the database for storage and retrieval information and increase the secret system. Through the overlap between the results of stages encryption and hide and artificial neural network algorithm was obtained exciting new strength from where you can not detect secret text only after obtaining random values of the chaotic algorithm and information about neural network algorithm as well as algorithm of work. | ||
Keywords | ||
neural network; Security; database; authentication | ||
Statistics Article View: 176 PDF Download: 254 |