{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,29]],"date-time":"2025-01-29T05:48:45Z","timestamp":1738129725958,"version":"3.33.0"},"reference-count":35,"publisher":"SAGE Publications","issue":"3","license":[{"start":{"date-parts":[[1989,9,1]],"date-time":"1989-09-01T00:00:00Z","timestamp":620611200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIMULATION"],"published-print":{"date-parts":[[1989,9]]},"abstract":"<jats:p> Random noise obscuring digit ized images or text can be removed by a new technique that recognizes the appearance o f randomness in short bit strings. This test makes uses binary derivatives. The derivative of a bit string is formed by recur sively XORing the bits pair- wise. The measure of random ness depends is the maximum range of the one's ratio (p) among various order deriva tives. Random pixel strings in digital images can be zeroed out leaving outlined regions where image details can be recovered by edge-detection or other tech niques. Binary derivatives can also assist cryptographers and cryptanalysts. And they can help simulationists avoid selecting random-number generator seeds that would bias their results. <\/jats:p>","DOI":"10.1177\/003754978905300307","type":"journal-article","created":{"date-parts":[[2008,3,29]],"date-time":"2008-03-29T17:23:43Z","timestamp":1206811423000},"page":"129-135","source":"Crossref","is-referenced-by-count":3,"title":["The binary derivative test: noise filter, crypto aid, and random-number seed selector"],"prefix":"10.1177","volume":"53","author":[{"given":"John M.","family":"Carroll","sequence":"first","affiliation":[{"name":"Department of Computer Science The University of Western Ontario London, Canada, N6A 5B7"}]}],"member":"179","published-online":{"date-parts":[[1989,9,1]]},"reference":[{"key":"atypb1","doi-asserted-by":"publisher","DOI":"10.1145\/321160.321163"},{"key":"atypb2","doi-asserted-by":"publisher","DOI":"10.2307\/2986302"},{"volume-title":"Binary Random Sequences: Derivative Sequences and Multi-Level Alpha-Typical Randomness, Internal Report","author":"Barbe, A.","key":"atypb3"},{"volume-title":"4th Benelux Symposium on Information Theory","author":"Barbe, A.","key":"atypb4"},{"volume-title":"Electrical Noise","year":"1960","author":"Bennett, W.R.","key":"atypb5"},{"key":"atypb6","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4684-0167-7"},{"volume-title":"Comparative Evaluation of Cryptographic Strategies","year":"1987","author":"Carroll, J.M.","key":"atypb7"},{"key":"atypb8","doi-asserted-by":"publisher","DOI":"10.1080\/0161-118891862945"},{"volume-title":"An Introduction to Probability Theory and its Applications","year":"1950","author":"Feller, W.","key":"atypb9"},{"volume-title":"Principles of Discrete Event Simulation","year":"1978","author":"Fishman, G.S.","key":"atypb10"},{"key":"atypb11","doi-asserted-by":"publisher","DOI":"10.1017\/S030500410002836X"},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177707053"},{"volume-title":"Elements of Stochastic Process Simulation","year":"1984","author":"Gottfried, B.S.","key":"atypb13"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1145\/321203.321208"},{"volume-title":"The Art of Computer Programming","year":"1960","author":"Knuth, D.E.","key":"atypb15"},{"volume-title":"Introduction to Probability Theory and Statistical Inference","year":"1982","author":"Larsen, H.J.","key":"atypb16"},{"volume-title":"How to Use the McGill Random Number Package Superduper, School of Computer Science","year":"1973","author":"Marsaglia, G.","key":"atypb17"},{"key":"atypb18","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(76)90074-0"},{"volume-title":"Efficient Fortran Coding of a Random Number Generator","year":"1982","author":"Mcleod, I.","key":"atypb19"},{"key":"atypb20","doi-asserted-by":"publisher","DOI":"10.2307\/2347378"},{"key":"atypb21","unstructured":"Siegel, S., Nonparametric Statistics for the Behavioral Sciences, McGraw-Hill, New York, 1956. pp. 213-238."},{"key":"atypb22","unstructured":"\"Specification for the Data Encryption Standard\", Federal Informatino Processing Standard Publication No. 46, Washington, DC, Jan. 15, 1977."},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.2307\/2347988"},{"volume-title":"Information Theory","year":"1965","author":"Ash, R.","key":"atypb24"},{"volume-title":"On Random and Hard-to-Describe-Numbers","author":"Bennett, C.H.","key":"atypb25"},{"volume-title":"Normal Approximations and Asymptotic Expansions","year":"1976","author":"Bhattacharya, R.","key":"atypb26"},{"key":"atypb27","volume-title":"Computer Security","author":"Carroll, J.M.","year":"1987","edition":"2"},{"key":"atypb28","doi-asserted-by":"publisher","DOI":"10.1145\/321008.321018"},{"volume-title":"Monte Carlo Methods","year":"1964","author":"Hammingsley, J.M.","key":"atypb29"},{"key":"atypb30","doi-asserted-by":"publisher","DOI":"10.1145\/321250.321257"},{"volume-title":"Computer Simulation Techniques","year":"1966","author":"Naylor, T.H.","key":"atypb31"},{"key":"atypb32","volume-title":"Probability, Random Variables, and Stochastic Processes","author":"Papoulis, A.","year":"1984","edition":"2"},{"key":"atypb33","doi-asserted-by":"publisher","DOI":"10.1063\/1.3056709"},{"key":"atypb34","unstructured":"\"Random Number Generation and Testing\" IBM Reference Manual C20-S011, New York,1959."},{"key":"atypb35","doi-asserted-by":"publisher","DOI":"10.1145\/355826.355828"}],"container-title":["SIMULATION"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/003754978905300307","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/003754978905300307","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,28]],"date-time":"2025-01-28T18:08:47Z","timestamp":1738087727000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/003754978905300307"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1989,9]]},"references-count":35,"journal-issue":{"issue":"3","published-print":{"date-parts":[[1989,9]]}},"alternative-id":["10.1177\/003754978905300307"],"URL":"https:\/\/doi.org\/10.1177\/003754978905300307","relation":{},"ISSN":["0037-5497","1741-3133"],"issn-type":[{"type":"print","value":"0037-5497"},{"type":"electronic","value":"1741-3133"}],"subject":[],"published":{"date-parts":[[1989,9]]}}}