10-02-2017, 10:07 AM
It is the time to improve our military technology due to border problems. So here we suggest a new method for the air force for the automatic unit so that the pilot can only control the weapon selection and launch, and there is no need for the co-pilot. Our method is not fully automatic, we can also take control, but in critical situations we can leave our control to the machine. In this method we are using the technology of robots GPS and swarm for the implementation in real time. We are using GPS to get the map and drive the flight to the destination; In this case we can take the control manually or we can deliver it to the system. If we leave our control to the system, we will take the shortest route possible to the destination. We are using swarm robot technology to prevent random movement occurring between the same side air craft. During that time systems in different aircraft communicate with each other and maintain an optimal distance, and align. Also using swarm technology any mechanically failed combat aircraft can be carried by another enemy zone aircraft to your area thus minimising both life and loss of material on your side. Therefore, by applying these two technologies will greatly enhance the air force so pilots can be well trained for weapon selection and launch. They are not needed to concentrate on the route they are going or worry about the trajectory of the movement that flights take.
It is now common to transfer multimedia data over the Internet. It is necessary to solve the problem of ensuring the security of information in the increasingly open network environment of today. Traditional cryptography encryption technologies are generally used to protect the security of information. With these technologies, the data becomes disordered after being encrypted and then can be retrieved by a correct key. Without the correct key, the contents of the encrypted source can not be detected even if unauthorised persons steal the data. Naor and Shamir proposed a new area of cryptography, visual cryptography in 1994. The most notable feature of this approach is that it explores the human visual system to read the secret message of some overlapping parts, thus overcoming the disadvantage of the complex computation required in The traditional Cryptography.
The threshold scheme makes the application of visual cryptography more flexible. In a k-out-of-n scheme of VC, a secret binary image is cryptographic-ally encoded in n parts of random binary patterns. The n actions are xeroxed in n transparencies, respectively, and distributed among n participants, one for each participant. No participant knows the part given to another participant. Any k or more participants can visually reveal the secret image by superimposing any k transparencies together. The secret can not be decoded by any k-1 or less participants, even if infinite computational power is available to them. Apart from the obvious applications of information hiding, there are many VC applications, which include general access structures, copyright protection, watermarks, visual authentication and identification, print and scan applications, and so on.
Many studies of visual cryptography have been published. Most of them, however, have concentrated on discussing black and white images, and only a few of them have proposed methods for processing Gray and colour images. There is a general method for the VC scheme based on the general access structure. The access structure is a specification of qualified and prohibited subsets of actions. Participants in a qualified subset can retrieve the secret image while participants in a prohibited subset can not. The concept of VC scheme has been extended to shared images in grayscale instead of sharing binary images. Although the secret image is grayscale, the parts are still constructed by random binary patterns that carry visual information that can lead to the suspicion of secret encryption. The concept of extended visual cryptography (EVC) is developed in which actions contain not only the secret information, but also significant images.
Hyper graphic colours are used in building meaningful images using randomly distributed pixels, resulting binary actions contain strong white noise that leads to inadequate results. This document introduces a VC colour coding method to generate meaningful actions. It is based on two fundamental concepts used in the generation of actions that are the diffusion of errors and the synchronisation of pixels. The diffusion of errors is a procedure that produces pleasant images of semitones to the human vision. The synchronisation of the pixels of the secret image and the coverage images through the colour channels improves the visual quality of the actions. Visual information Pixel synchronisation (VIP) prevents the colours and contrast of the original parts from being degraded even with the permutation of the matrix and also maintains the position of the pixels in all channels.
It is now common to transfer multimedia data over the Internet. It is necessary to solve the problem of ensuring the security of information in the increasingly open network environment of today. Traditional cryptography encryption technologies are generally used to protect the security of information. With these technologies, the data becomes disordered after being encrypted and then can be retrieved by a correct key. Without the correct key, the contents of the encrypted source can not be detected even if unauthorised persons steal the data. Naor and Shamir proposed a new area of cryptography, visual cryptography in 1994. The most notable feature of this approach is that it explores the human visual system to read the secret message of some overlapping parts, thus overcoming the disadvantage of the complex computation required in The traditional Cryptography.
The threshold scheme makes the application of visual cryptography more flexible. In a k-out-of-n scheme of VC, a secret binary image is cryptographic-ally encoded in n parts of random binary patterns. The n actions are xeroxed in n transparencies, respectively, and distributed among n participants, one for each participant. No participant knows the part given to another participant. Any k or more participants can visually reveal the secret image by superimposing any k transparencies together. The secret can not be decoded by any k-1 or less participants, even if infinite computational power is available to them. Apart from the obvious applications of information hiding, there are many VC applications, which include general access structures, copyright protection, watermarks, visual authentication and identification, print and scan applications, and so on.
Many studies of visual cryptography have been published. Most of them, however, have concentrated on discussing black and white images, and only a few of them have proposed methods for processing Gray and colour images. There is a general method for the VC scheme based on the general access structure. The access structure is a specification of qualified and prohibited subsets of actions. Participants in a qualified subset can retrieve the secret image while participants in a prohibited subset can not. The concept of VC scheme has been extended to shared images in grayscale instead of sharing binary images. Although the secret image is grayscale, the parts are still constructed by random binary patterns that carry visual information that can lead to the suspicion of secret encryption. The concept of extended visual cryptography (EVC) is developed in which actions contain not only the secret information, but also significant images.
Hyper graphic colours are used in building meaningful images using randomly distributed pixels, resulting binary actions contain strong white noise that leads to inadequate results. This document introduces a VC colour coding method to generate meaningful actions. It is based on two fundamental concepts used in the generation of actions that are the diffusion of errors and the synchronisation of pixels. The diffusion of errors is a procedure that produces pleasant images of semitones to the human vision. The synchronisation of the pixels of the secret image and the coverage images through the colour channels improves the visual quality of the actions. Visual information Pixel synchronisation (VIP) prevents the colours and contrast of the original parts from being degraded even with the permutation of the matrix and also maintains the position of the pixels in all channels.