ترجمه مقاله نقش ضروری ارتباطات 6G با چشم انداز صنعت 4.0
- مبلغ: ۸۶,۰۰۰ تومان
ترجمه مقاله پایداری توسعه شهری، تعدیل ساختار صنعتی و کارایی کاربری زمین
- مبلغ: ۹۱,۰۰۰ تومان
ABSTRACT
This paper discusses the foundations of cognitive cryptography used to secure information by splitting it and distributing the split parts among selected groups of secret trustees. The process of concealing data by its splitting and distributing secret parts (shadows) with the use of cognitive techniques will be discussed. Cognitive cryptography describes the possibilities of using personal information contained in individual biometric traits. At the same time, it will be presented as an innovative solution allowing the holder of a secret shadow to be identified based on their characteristic biometrics and their semantic features. Cognitive cryptography is used to manage strategic information. By using techniques for splitting and sharing this type of data as well as utilising individual biometric traits in the entire process of distributing all shadows of the concealed and split information makes the proposed cognitive cryptography techniques an innovative, extremely useful tool for securing data of major importance.
5. Conclusions
Cognitive cryptographic techniques are dedicated to protecting and securing datasets of particularly high and material significance. They are dedicated to protecting data that is classified, confidential, strategic and frequently called a secret because of its significance. In cognitive cryptography, it is particularly legitimate to use personal information contained in biometric information sets, as well as semantic information which is unambiguously used to identify the individual features of all protocol users.
Personal information is contained in the datasets held by each protocol participant, because they are embedded in individual biometrics. During the personal identification process, these biometrics and their features are unambiguously used to properly assign the biometric features to the specific person. Then, in the personal verification process, they are used to assess whether the specific biometric features characterise the correct protocol participant.
Hence cognitive cryptography is used to protect information based on the biometric analysis of individual features used to conceal this information. The ability to utilise biometric features and description to identify and verify protocol participants in secret data management allows the shares to be correctly assigned to secret holders, and conversely, the holders to their features. These types of solutions used for managing information of great significance indicate the areas in which intelligent information management can be applied. The word ‘intelligent' applies to semantic solutions which use non-standard biometric features that can be described and interpreted in processes of the semantic interpretation of personal traits.