-
Electromyogram (EMG) Removal by Adding Sources of EMG (ERASE) -- A novel ICA-based algorithm for removing myoelectric artifacts from EEG -- Part 2
Authors:
Yongcheng Li,
Po T. Wang,
Mukta P. Vaidya,
Charles Y. Liu,
Marc W. Slutzky,
An H. Do
Abstract:
Extraction of the movement-related high-gamma (80 - 160 Hz) in electroencephalogram (EEG) from traumatic brain injury (TBI) patients who have had hemicraniectomies, remains challenging due to a confounding bandwidth overlap with surface electromyogram (EMG) artifacts related to facial and head movements. In part 1, we described an augmented independent component analysis (ICA) approach for removal…
▽ More
Extraction of the movement-related high-gamma (80 - 160 Hz) in electroencephalogram (EEG) from traumatic brain injury (TBI) patients who have had hemicraniectomies, remains challenging due to a confounding bandwidth overlap with surface electromyogram (EMG) artifacts related to facial and head movements. In part 1, we described an augmented independent component analysis (ICA) approach for removal of EMG artifacts from EEG, and referred to as EMG Reduction by Adding Sources of EMG (ERASE). Here, we tested ERASE on EEG recorded from six TBI patients with hemicraniectomies while they performed a thumb flexion task. ERASE removed a mean of 52 +/- 12% (mean +/- S.E.M) (maximum 73%) of EMG artifacts. In contrast, conventional ICA removed a mean of 27 +/- 19\% (mean +/- S.E.M) of EMG artifacts from EEG. In particular, high-gamma synchronization was significantly improved in the contralateral hand motor cortex area within the hemicraniectomy site after ERASE was applied. We computed fractal dimension (FD) of EEG high-gamma on each channel. We found relative FD of high-gamma over hemicraniectomy after applying ERASE were strongly correlated to the amplitude of finger flexion force. Results showed that significant correlation coefficients across the electrodes related to thumb flexion averaged 0.76, while the coefficients across the homologous electrodes in non-hemicraniectomy areas were nearly 0. Across all subjects, an average of 83% of electrodes significantly correlated with force was located in the hemicraniectomy areas after applying ERASE. After conventional ICA, only 19% of electrodes with significant correlations were located in the hemicraniectomy. These results indicated that the new approach isolated electrophysiological features during finger motor activation while selectively removing confounding EMG artifacts.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Electromyogram (EMG) Removal by Adding Sources of EMG (ERASE) -- A novel ICA-based algorithm for removing myoelectric artifacts from EEG -- Part 1
Authors:
Yongcheng Li,
Po T. Wang,
Mukta P. Vaidya,
Charles Y. Liu,
Marc W. Slutzky,
An H. Do
Abstract:
Electroencephalographic (EEG) recordings are often contaminated by electromyographic (EMG) artifacts, especially when recording during movement. Existing methods to remove EMG artifacts include independent component analysis (ICA), and other high-order statistical methods. However, these methods can not effectively remove most of EMG artifacts. Here, we proposed a modified ICA model for EMG artifa…
▽ More
Electroencephalographic (EEG) recordings are often contaminated by electromyographic (EMG) artifacts, especially when recording during movement. Existing methods to remove EMG artifacts include independent component analysis (ICA), and other high-order statistical methods. However, these methods can not effectively remove most of EMG artifacts. Here, we proposed a modified ICA model for EMG artifacts removal in the EEG, which is called EMG Removal by Adding Sources of EMG (ERASE). In this new approach, additional channels of real EMG from neck and head muscles (reference artifacts) were added as inputs to ICA in order to "force" the most power from EMG artifacts into a few independent components (ICs). The ICs containing EMG artifacts (the "artifact ICs") were identified and rejected using an automated procedure. Simulation results showed ERASE removed EMG artifacts from EEG significantly more effectively than conventional ICA. Subsequently, EEG was collected from 8 healthy participants while they moved their hands to test the realistic efficacy of this approach. Results showed that ERASE successfully removed EMG artifacts (on average, about 75% of EMG artifacts were removed when using real EMGs as reference artifacts) while preserving the expected EEG features related to movement. We also tested the ERASE procedure using simulated EMGs as reference artifacts (about 63% of EMG artifacts removed). Compared to conventional ICA, ERASE removed on average 26% more EMG artifacts from EEG. These results indicate that using additional real or simulated EMG sources can increase the effectiveness of ICA in removing EMG artifacts from EEG. Combined with automated artifact IC rejection, ERASE also minimizes potential user bias.
△ Less
Submitted 6 July, 2020;
originally announced July 2020.
-
Subterahertz spin pum** from an insulating antiferromagnet
Authors:
Priyanka Vaidya,
Sophie A. Morley,
Johan van Tol,
Yan Liu,
Ran Cheng,
Arne Brataas,
David Lederman,
Enrique del Barco
Abstract:
Spin-transfer torque and spin Hall effects combined with their reciprocal phenomena, spin-pum** and inverse spin Hall (ISHE) effects, enable the reading and control of magnetic moments in spintronics. The direct observation of these effects remains elusive in antiferromagnetic-based devices. We report sub-terahertz spin-pum** at the interface of a uniaxial insulating antiferromagnet MnF2 and p…
▽ More
Spin-transfer torque and spin Hall effects combined with their reciprocal phenomena, spin-pum** and inverse spin Hall (ISHE) effects, enable the reading and control of magnetic moments in spintronics. The direct observation of these effects remains elusive in antiferromagnetic-based devices. We report sub-terahertz spin-pum** at the interface of a uniaxial insulating antiferromagnet MnF2 and platinum. The measured ISHE voltage arising from spin-charge conversion in the platinum layer depends on the chirality of the dynamical modes of the antiferromagnet, which is selectively excited and modulated by the handedness of the circularly polarized sub-THz irradiation. Our results open the door to the controlled generation of coherent pure spin currents at THz frequencies.
△ Less
Submitted 3 May, 2020;
originally announced May 2020.
-
Nematic superconductivity in the topological semimetal CaSn$_{3}$
Authors:
H. Siddiquee,
R. Munir,
C. Dissanayake,
P. Vaidya,
C. Nickle,
E. Del Barco,
G. Lamura,
C. Baines,
S. Cahen,
C. Hérold,
P. Gentile,
T. Shiroka,
Y. Nakajima
Abstract:
The superconducting behavior of the topological semimetal CaSn$_{3}$ was investigated by means of magnetotransport and muon spectroscopy $μ$SR measurements, both providing strong evidence of nematic behavior. Magnetotransport detects an anisotropic upper critical field, characterized by a twofold symmetry about $C_{4}$ axis, thus breaking the rotational symmetry of the underlying cubic lattice. Tr…
▽ More
The superconducting behavior of the topological semimetal CaSn$_{3}$ was investigated by means of magnetotransport and muon spectroscopy $μ$SR measurements, both providing strong evidence of nematic behavior. Magnetotransport detects an anisotropic upper critical field, characterized by a twofold symmetry about $C_{4}$ axis, thus breaking the rotational symmetry of the underlying cubic lattice. Transverse-field $μ$SR data support such picture, with the muon depolarization rate depending strongly on the magnetic field direction, here applied along the [110] or [001] crystal directions. In the former case, the absence of any additional muon depolarization suggests an unconventional vortex lattice. In the latter case, a vortex lattice encompassing a sample volume of at least 52% indicates the bulk nature of CaSn$_{3}$ superconductivity. The resulting superfluid density in the (001) planes shows a gapped low-temperature behavior, with a superconducting gap value $Δ(0)\simeq 0.61(7)$ meV. Additional zero-field $μ$SR results indicate that the superconducting state is time-reversal-invariant. This fact and the breaking of rotational symmetry in a fully-gapped superconductor are consistent with an unconventional pairing state in a multi-dimensional representation, thus making CaSn$_{3}$ an important example of nematic superconductor.
△ Less
Submitted 17 March, 2022; v1 submitted 7 January, 2019;
originally announced January 2019.
-
A novel Topological Model for Nonlinear Analysis and Prediction for Observations with Recurring Patterns
Authors:
Sa**i Anand P S,
Prabhakar G Vaidya
Abstract:
The paper introduces a novel topological method for prediction and modeling for a nonlinear time--series that exhibit recurring patterns. According to the model, global manifold of the reconstructed state--space can be approximated by a few overlap** recurrence neighborhoods. The inherent redundancy structure of the delay embedding procedure and the property of recurrence are used to reduce the…
▽ More
The paper introduces a novel topological method for prediction and modeling for a nonlinear time--series that exhibit recurring patterns. According to the model, global manifold of the reconstructed state--space can be approximated by a few overlap** recurrence neighborhoods. The inherent redundancy structure of the delay embedding procedure and the property of recurrence are used to reduce the computational load, which is inevitable in nonlinear analysis. The modeling and prediction possibilities of the model are demonstrated using (i) a numerical data generated by a dynamical system: the Duffing oscillator and (ii) a real--life data: Electrocardiogram ECG data of a healthy human. A potential application of the proposed model is demonstrated for a multivariate cardiovascular data set that exhibits the property of recurrence. Real--time monitoring of cardiovascular signals are essential in clinical research and corruption of data are very common. It is a challenging task for a model to perform cognitive functions based on the contextual information, explicitly predicting gaps or loss of data and identifying noises in the physiological data. Paper concludes with an application of the proposed model in addressing some of these the issues.
△ Less
Submitted 18 November, 2017;
originally announced November 2017.
-
Face Recognition Using Discrete Cosine Transform for Global and Local Features
Authors:
Aman R. Chadha,
Pallavi P. Vaidya,
M. Mani Roja
Abstract:
Face Recognition using Discrete Cosine Transform (DCT) for Local and Global Features involves recognizing the corresponding face image from the database. The face image obtained from the user is cropped such that only the frontal face image is extracted, eliminating the background. The image is restricted to a size of 128 x 128 pixels. All images in the database are gray level images. DCT is appli…
▽ More
Face Recognition using Discrete Cosine Transform (DCT) for Local and Global Features involves recognizing the corresponding face image from the database. The face image obtained from the user is cropped such that only the frontal face image is extracted, eliminating the background. The image is restricted to a size of 128 x 128 pixels. All images in the database are gray level images. DCT is applied to the entire image. This gives DCT coefficients, which are global features. Local features such as eyes, nose and mouth are also extracted and DCT is applied to these features. Depending upon the recognition rate obtained for each feature, they are given weightage and then combined. Both local and global features are used for comparison. By comparing the ranks for global and local features, the false acceptance rate for DCT can be minimized.
△ Less
Submitted 6 November, 2011;
originally announced November 2011.
-
A robust, low-cost approach to Face Detection and Face Recognition
Authors:
Divya Jyoti,
Aman Chadha,
Pallavi Vaidya,
M. Mani Roja
Abstract:
In the domain of Biometrics, recognition systems based on iris, fingerprint or palm print scans etc. are often considered more dependable due to extremely low variance in the properties of these entities with respect to time. However, over the last decade data processing capability of computers has increased manifold, which has made real-time video content analysis possible. This shows that the ne…
▽ More
In the domain of Biometrics, recognition systems based on iris, fingerprint or palm print scans etc. are often considered more dependable due to extremely low variance in the properties of these entities with respect to time. However, over the last decade data processing capability of computers has increased manifold, which has made real-time video content analysis possible. This shows that the need of the hour is a robust and highly automated Face Detection and Recognition algorithm with credible accuracy rate. The proposed Face Detection and Recognition system using Discrete Wavelet Transform (DWT) accepts face frames as input from a database containing images from low cost devices such as VGA cameras, webcams or even CCTV's, where image quality is inferior. Face region is then detected using properties of L*a*b* color space and only Frontal Face is extracted such that all additional background is eliminated. Further, this extracted image is converted to grayscale and its dimensions are resized to 128 x 128 pixels. DWT is then applied to entire image to obtain the coefficients. Recognition is carried out by comparison of the DWT coefficients belonging to the test image with those of the registered reference image. On comparison, Euclidean distance classifier is deployed to validate the test image from the database. Accuracy for various levels of DWT Decomposition is obtained and hence, compared.
△ Less
Submitted 4 November, 2011;
originally announced November 2011.
-
Tunguska: Comets, Contagion and the Vernadskiy Mission to NEA 2005NB56
Authors:
Pushkar Ganesh Vaidya
Abstract:
On June 30th, 1908, there was a massive explosion over Tunguska, in Central Siberia. A number of scientists have proposed that this Tunguska Phenomenon was caused due to the tangential passage of an astral body that grazed the Earths' atmosphere, underwent a partial explosion and later entered a heliocentric orbit. It has also been argued that astral bodies might deposit microbes and viruses on Ea…
▽ More
On June 30th, 1908, there was a massive explosion over Tunguska, in Central Siberia. A number of scientists have proposed that this Tunguska Phenomenon was caused due to the tangential passage of an astral body that grazed the Earths' atmosphere, underwent a partial explosion and later entered a heliocentric orbit. It has also been argued that astral bodies might deposit microbes and viruses on Earth (contributing to evolution and diseases) and may become contaminated with Earthly microbes. The identity of the Tunguska Space Body (TSB) is unknown though several likely candidates have been identified including NEA 2005NB56, a known Near Earth Asteroid (NEA). NEA 2005NB56 made a close approach to Earth when it was discovered in 2005 and will again cross Earth orbit in 2045. This gives us a unique opportunity to send a Stardustlike mission, the proposed Vernadskiy Mission, to analyze materials from NEA 2005NB56. We might be able to find some tell-tale components of Earth's atmosphere and even Earth's microorganisms incorporated in NEA 2005NB56 thereby proving beyond doubt the transfer of life from Earth to outer space.
△ Less
Submitted 29 June, 2010;
originally announced July 2010.
-
Critique on Vindication of Panspermia
Authors:
Pushkar Ganesh Vaidya
Abstract:
In January 2001, air samples were collected from Earth's stratosphere. From these air samples, cultures of three microorganisms were obtained. It was reasoned that these microorganisms are of cometary origin and thereby cometary panspermia stood vindicated. The fact that these microorganisms had essentially the same characteristics as terrestrial microorganisms was explained using cometary pansp…
▽ More
In January 2001, air samples were collected from Earth's stratosphere. From these air samples, cultures of three microorganisms were obtained. It was reasoned that these microorganisms are of cometary origin and thereby cometary panspermia stood vindicated. The fact that these microorganisms had essentially the same characteristics as terrestrial microorganisms was explained using cometary panspermia. Here, the findings are reinterpreted in the light of niche ecology and adaptations. It is asserted that the microorganisms captured from the stratosphere cannot be of cometary origin as they are contrary to the kind of microorganisms one would expect to find in a cometary niche.
△ Less
Submitted 27 August, 2009;
originally announced August 2009.
-
Separating a mixture of chaotic signals
Authors:
Prabhakar G. Vaidya
Abstract:
Chaos is popularly associated with its property of sensitivity to initial conditions. In this paper we will show that there can be a flip side to this property which is quite fascinating and highly useful in many applications. As a result, we can mix a large number of chaotic signals and one completely arbitrary signal and later a recipient of this transformed and weighted mixture can separate e…
▽ More
Chaos is popularly associated with its property of sensitivity to initial conditions. In this paper we will show that there can be a flip side to this property which is quite fascinating and highly useful in many applications. As a result, we can mix a large number of chaotic signals and one completely arbitrary signal and later a recipient of this transformed and weighted mixture can separate each of the signals, one by one. The chaotic signals, could be generated by various maps which belong to the logistic family. The arbitrary signal, could be a message, some random noise, some periodic signal or a chaotic signal generated by a source, either belonging or not belonging to the family. The key behind this procedure is a family of maps which can dovetail into each other without altering each of their predecessor's symbolic sequence.
△ Less
Submitted 2 May, 2009;
originally announced May 2009.
-
Stardust findings. Implications for panspermia
Authors:
Pushkar Ganesh Vaidya
Abstract:
In January 2004, the Stardust spacecraft flew through the dust of comet 81P/Wild 2 and captured specks of the cometary dust. On analysis of the comet 81P/Wild 2 samples, it was found that they contain materials found in the coldest and hottest region of the early solar nebula, strongly suggesting 'mixing' on the grandest scale. Here it is suggested that if microorganisms were present in the earl…
▽ More
In January 2004, the Stardust spacecraft flew through the dust of comet 81P/Wild 2 and captured specks of the cometary dust. On analysis of the comet 81P/Wild 2 samples, it was found that they contain materials found in the coldest and hottest region of the early solar nebula, strongly suggesting 'mixing' on the grandest scale. Here it is suggested that if microorganisms were present in the early solar nebula, as required by the hypothesis of cometary panspermia, then in the light of the Stardust findings, life was already present in the very material that formed the planetary bodies.
△ Less
Submitted 28 March, 2009;
originally announced March 2009.
-
Increasing Average Period Lengths by Switching of Robust Chaos Maps in Finite Precision
Authors:
Nithin Nagaraj,
Mahesh C. Shastry,
Prabhakar G. Vaidya
Abstract:
Grebogi, Ott and Yorke (Phys. Rev. A 38(7), 1988) have investigated the effect of finite precision on average period length of chaotic maps. They showed that the average length of periodic orbits ($T$) of a dynamical system scales as a function of computer precision ($ε$) and the correlation dimension ($d$) of the chaotic attractor: $T \sim ε^{-d/2}$. In this work, we are concerned with increasi…
▽ More
Grebogi, Ott and Yorke (Phys. Rev. A 38(7), 1988) have investigated the effect of finite precision on average period length of chaotic maps. They showed that the average length of periodic orbits ($T$) of a dynamical system scales as a function of computer precision ($ε$) and the correlation dimension ($d$) of the chaotic attractor: $T \sim ε^{-d/2}$. In this work, we are concerned with increasing the average period length which is desirable for chaotic cryptography applications. Our experiments reveal that random and chaotic switching of deterministic chaotic dynamical systems yield higher average length of periodic orbits as compared to simple sequential switching or absence of switching. To illustrate the application of switching, a novel generalization of the Logistic map that exhibits Robust Chaos (absence of attracting periodic orbits) is first introduced. We then propose a pseudo-random number generator based on chaotic switching between Robust Chaos maps which is found to successfully pass stringent statistical tests of randomness.
△ Less
Submitted 22 November, 2008; v1 submitted 12 November, 2008;
originally announced November 2008.
-
Multiplexing of discrete chaotic signals in presence of noise
Authors:
Nithin Nagaraj,
Prabhakar G. Vaidya
Abstract:
In this paper, multiplexing of discrete chaotic signals in the presence of noise is investigated. Existing methods are based on chaotic synchronization which is susceptible to noise and parameter mismatch. Furthermore, these methods fail for multiplexing more than two discrete chaotic signals. We propose two novel methods to multiplex multiple discrete chaotic signals based on the principle of s…
▽ More
In this paper, multiplexing of discrete chaotic signals in the presence of noise is investigated. Existing methods are based on chaotic synchronization which is susceptible to noise and parameter mismatch. Furthermore, these methods fail for multiplexing more than two discrete chaotic signals. We propose two novel methods to multiplex multiple discrete chaotic signals based on the principle of symbolic sequence invariance in the presence of noise and finite precision implementation of finding the initial condition of an arbitrarily long symbolic sequence of a chaotic map.
△ Less
Submitted 29 October, 2008;
originally announced October 2008.
-
One-Time Pad, Arithmetic Coding and Logic Gates: An unifying theme using Dynamical Systems
Authors:
Nithin Nagaraj,
Prabhakar G. Vaidya
Abstract:
In this letter, we prove that the perfectly secure One-Time Pad (OTP) encryption can be seen as finding the initial condition on the binary map under a random switch based on the perfectly random pad. This turns out to be a special case of Grangetto's randomized arithmetic coding performed on the Binary Map. Furthermore, we derive the set of possible perfect secrecy systems using such an approac…
▽ More
In this letter, we prove that the perfectly secure One-Time Pad (OTP) encryption can be seen as finding the initial condition on the binary map under a random switch based on the perfectly random pad. This turns out to be a special case of Grangetto's randomized arithmetic coding performed on the Binary Map. Furthermore, we derive the set of possible perfect secrecy systems using such an approach. Since OTP encryption is an XOR operation, we thus have a dynamical systems implementation of the XOR gate. We show similar implementations for other gates such as NOR, NAND, OR, XNOR, AND and NOT. The dynamical systems framework unifies the three areas to which Shannon made foundational contributions: lossless compression (Source Coding), perfect encryption (Cryptography), and design of logic gates (Computation)
△ Less
Submitted 1 March, 2008;
originally announced March 2008.
-
A Non-linear Generalization of Singular Value Decomposition and its Application to Cryptanalysis
Authors:
Prabhakar G. Vaidya,
Sa**i Anand P. S,
Nithin Nagaraj
Abstract:
Singular Value Decomposition (SVD) is a powerful tool in linear algebra.We propose an extension of SVD for both the qualitative detection and quantitative determination of nonlinearity in a time series. The paper illustrates nonlinear SVD with the help of data generated from nonlinear maps and flows (differential equations).
Singular Value Decomposition (SVD) is a powerful tool in linear algebra.We propose an extension of SVD for both the qualitative detection and quantitative determination of nonlinearity in a time series. The paper illustrates nonlinear SVD with the help of data generated from nonlinear maps and flows (differential equations).
△ Less
Submitted 11 February, 2009; v1 submitted 30 November, 2007;
originally announced November 2007.
-
A non-linear dynamical systems approach to source compression for constrained sources
Authors:
Nithin Nagaraj,
Prabhakar G. Vaidya,
Rajesh Sundaresan
Abstract:
We have recently established a strong connection between the Tent map (also known as Generalized Luroth Series or GLS which is a chaotic, ergodic and lebesgue measure preserving non-linear dynamical system) and Arithmetic coding which is a popular source compression algorithm used in international compression standards such as JPEG2000 and H.264. This was for independent and identically distribu…
▽ More
We have recently established a strong connection between the Tent map (also known as Generalized Luroth Series or GLS which is a chaotic, ergodic and lebesgue measure preserving non-linear dynamical system) and Arithmetic coding which is a popular source compression algorithm used in international compression standards such as JPEG2000 and H.264. This was for independent and identically distributed binary sources. In this paper, we address the problem of compression of ergodic Markov binary sources with certain words forbidden from the message space. We shall show that GLS can be modified suitably to achieve Shannon's entropy rate for these sources.
△ Less
Submitted 11 September, 2007;
originally announced September 2007.
-
Are We Alone in the Multiverse?
Authors:
Pushkar Ganesh Vaidya
Abstract:
It has long been proposed that black hole singularities bounce to deliver daughter universes. Here the consequences of such a scenario are explored in light of Lee Smolin's hypothesis of Cosmological Natural Selection and Weak Anthropic Principle. The explorations lead towards the answer to the question Are We Alone in the Multiverse?
It has long been proposed that black hole singularities bounce to deliver daughter universes. Here the consequences of such a scenario are explored in light of Lee Smolin's hypothesis of Cosmological Natural Selection and Weak Anthropic Principle. The explorations lead towards the answer to the question Are We Alone in the Multiverse?
△ Less
Submitted 3 June, 2007;
originally announced June 2007.
-
Cosmic Contact Censorship
Authors:
Pushkar Ganesh Vaidya
Abstract:
Till date we have not made Contact with any Extraterrestrial civilizations. The Fermi Paradox remains a paradox - the Great Silence prevails. In the light of the Rare Earth hypothesis, it seems that advanced life is exceedingly rare in the universe. Also, if there does exist some Extraterrestrial civilizations then still achieving Contact is extremely difficult as the very nature of the universe…
▽ More
Till date we have not made Contact with any Extraterrestrial civilizations. The Fermi Paradox remains a paradox - the Great Silence prevails. In the light of the Rare Earth hypothesis, it seems that advanced life is exceedingly rare in the universe. Also, if there does exist some Extraterrestrial civilizations then still achieving Contact is extremely difficult as the very nature of the universe discourages Contact. It's as if there is a Cosmic Contact Censorship in place.
△ Less
Submitted 20 February, 2007;
originally announced February 2007.
-
Joint Entropy Coding and Encryption using Robust Chaos
Authors:
Nithin Nagaraj,
Prabhakar G Vaidya,
Kishor G Bhat
Abstract:
We propose a framework for joint entropy coding and encryption using Chaotic maps. We begin by observing that the message symbols can be treated as the symbolic sequence of a discrete dynamical system. For an appropriate choice of the dynamical system, we could back-iterate and encode the message as the initial condition of the dynamical system. We show that such an encoding achieves Shannon's e…
▽ More
We propose a framework for joint entropy coding and encryption using Chaotic maps. We begin by observing that the message symbols can be treated as the symbolic sequence of a discrete dynamical system. For an appropriate choice of the dynamical system, we could back-iterate and encode the message as the initial condition of the dynamical system. We show that such an encoding achieves Shannon's entropy and hence optimal for compression. It turns out that the appropriate discrete dynamical system to achieve optimality is the piecewise-linear Generalized Luroth Series (GLS) and further that such an entropy coding technique is exactly equivalent to the popular Arithmetic Coding algorithm. GLS is a generalization of Arithmetic Coding with different modes of operation.
GLS preserves the Lebesgue measure and is ergodic. We show that these properties of GLS enable a framework for joint compression and encryption and thus give a justification of the recent work of Grangetto et al. and Wen et al. Both these methods have the obvious disadvantage of the key length being equal to the message length for strong security. We derive measure preserving piece-wise non-linear GLS (nGLS) and their skewed cousins, which exhibit Robust Chaos. We propose a joint entropy coding and encryption framework using skewed-nGLS and demonstrate Shannon's desired sensitivity to the key parameter. Potentially, our method could improve the security and key efficiency over Grangetto's method while still maintaining the total compression ratio. This is a new area of research with promising applications in communications.
△ Less
Submitted 22 August, 2006;
originally announced August 2006.
-
The B-Exponential Map: A Generalization of the Logistic Map, and Its Applications In Generating Pseudo-random Numbers
Authors:
Mahesh C Shastry,
Nithin Nagaraj,
Prabhakar G Vaidya
Abstract:
A 1-dimensional generalization of the well known Logistic Map is proposed. The proposed family of maps is referred to as the B-Exponential Map. The dynamics of this map are analyzed and found to have interesting properties. In particular, the B-Exponential Map exhibits robust chaos for all real values of the parameter B >= e^(-4). We then propose a pseudo-random number generator based on the B-E…
▽ More
A 1-dimensional generalization of the well known Logistic Map is proposed. The proposed family of maps is referred to as the B-Exponential Map. The dynamics of this map are analyzed and found to have interesting properties. In particular, the B-Exponential Map exhibits robust chaos for all real values of the parameter B >= e^(-4). We then propose a pseudo-random number generator based on the B-Exponential Map by chaotically hop** between different trajectories for different values of B. We call this BEACH (B-Exponential All-Chaotic Map Hop**) pseudo-random number generator. BEACH successfully passes stringent statistical randomness tests such as ENT, NIST and Diehard. An implementation of BEACH is also outlined.
△ Less
Submitted 17 July, 2006; v1 submitted 14 July, 2006;
originally announced July 2006.
-
Predicting equation from Chaotic data by Nonlinear Singular Value Decomposition
Authors:
Prabhakar G. Vaidya,
P. S. Sa**i Anand
Abstract:
Singular Value Decomposition can be considered as an effective method for Signal Processing/especially data compression. In this short paper we investigate the application of SVD to predict data equation from data. The method is similar to nonlinear ARMA method for fitting a nonlinear equation to the data.
Singular Value Decomposition can be considered as an effective method for Signal Processing/especially data compression. In this short paper we investigate the application of SVD to predict data equation from data. The method is similar to nonlinear ARMA method for fitting a nonlinear equation to the data.
△ Less
Submitted 24 May, 2006;
originally announced May 2006.
-
Separating the influence of Brain Signals from the Dynamics of Heart
Authors:
P G Vaidya
Abstract:
ECG signals appear to be quite complex. In this paper, we present results, which show that a normal ECG signal, which is a function of time can be transformed into a relatively simpler signal by stretching the time in a predetermined way. Before such a transformation, if you were to analyze various packets of the data for the Trans-Spectral Coherence (TSC) you could confirm that the signal indee…
▽ More
ECG signals appear to be quite complex. In this paper, we present results, which show that a normal ECG signal, which is a function of time can be transformed into a relatively simpler signal by stretching the time in a predetermined way. Before such a transformation, if you were to analyze various packets of the data for the Trans-Spectral Coherence (TSC) you could confirm that the signal indeed is very complicated. This is because the TSC gives us an idea of how various harmonics in a spectrum are related to one another. The coherence dramatically improved once we found an intermediate variable.. However, there was one hurdle. To find this variable, we needed to postulate that the complexified data lies on a 4-sheeted Riemann-Surface. With this insight, we could identify a proper time transformation which led to extremely high TSC.
The transformed signal is quite simple. We can now rearrange the ECG data in terms of a set of functions in an affine space, which we can explicitly calculate from the data. This reveals that the dynamics of the heart, if freed from the external influence is quite simple.
△ Less
Submitted 23 August, 2005;
originally announced August 2005.
-
Re-visiting the One-Time Pad
Authors:
Nithin Nagaraj,
Vivek Vaidya,
Prabhakar G Vaidya
Abstract:
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system,also popularly known as the One-Time Pad (OTP). Since then, it has been believed that the perfectly random and uncompressible OTP which is transmitted needs to have a length equal to the message length for this result to be true. In this paper, we prove that the length of the transmitted OTP which actually contains us…
▽ More
In 1949, Shannon proved the perfect secrecy of the Vernam cryptographic system,also popularly known as the One-Time Pad (OTP). Since then, it has been believed that the perfectly random and uncompressible OTP which is transmitted needs to have a length equal to the message length for this result to be true. In this paper, we prove that the length of the transmitted OTP which actually contains useful information need not be compromised and could be less than the message length without sacrificing perfect secrecy. We also provide a new interpretation for the OTP encryption by treating the message bits as making True/False statements about the pad, which we define as a private-object. We introduce the paradigm of private-object cryptography where messages are transmitted by verifying statements about a secret-object. We conclude by suggesting the use of Formal Axiomatic Systems for investing N bits of secret.
△ Less
Submitted 18 August, 2005;
originally announced August 2005.