The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Ductal carcinoma in situ and invasive ductal carcinoma are two major radiological issues which have drawn the attention of not only Medical Practitioners but also Engineers and Scientists. Mammographic images are generally examined visually by radiologists and now-a-days with the help of available image analytics support system. Yet the problems of ‘false negative’ and ‘false positive’ remain unsolved...
The 3-D objects used in 3D video games and virtual reality are hollow polygon meshes with textures applied on them. On the other hand, volume data representation not only stores the outer surface features, but also the features inside the volume. For example, visualization of 3-D MRI/CT data is all about showing the inside parts too. Visualizing volumetric data requires more video memory. Most of...
A 2D honeycomb image is a hexagonal array of what are called pixels and the pixel values represent intensity or color information of the corresponding digital image at various positions addressed by zig-zag and column numbers. A 2D image could also be informally called as image honeycomb or an arrangement of pixel values in a hexagonal array. A 3D hexagonal prism lattice image is viewed as an ordered...
Information security is the rapidly rising area of concern in today's world of network technology. Traditionally, secure access to information is guarded by combination of username and password. The idea of graphical password as an alternative to text based approach was proposed by Blonder in 1996 motivated by the fact called as “picture superiority effect” i.e. tendency of human brain to memorize...
Mobile Ad-Hoc Networks (MANETs) are collections of self-organizing mobile nodes with dynamic topologies and does not have any centralized control in the network. MANET have no clear way of defense mechanism to protect network from security threats, thereby making this network accessible to both legitimate node and authorized node. The absence of centralized administration and openness make MANETs...
With the current emergence of the Internet, there is a need to securely transfer images between systems. In this context, we propose a secure image encryption algorithm that uses both AES and Visual Cryptographic techniques to protect the image. The image is encrypted using AES and an encoding schema has been proposed to convert the key into shares based on Visual Secret Sharing. The cryptanalysis...
Biometric could play an essential role in the future authentication system. So the security of biometric data is becoming a challenging problem now a days. We are proposing a cryptographic algorithm for securing biometric template using double hill cipher with the random permutation of pixels locations and self-invertible key matrix. The random permutation creates diffusion by permuting the location...
Today, the world is moving beyond the imagination of the people, day by day new era in technology comes which create huge impact on their lives. As the invention of the computer takes place, now most of the work is performed with the help of computer. In order to protect the main resource of the people, it is important to make the modification in older technology or create a new one. Level of security...
Botnet is a collection of infected computers i.e. collection of zombie PCs which are remotely controlled by a single person or a group so called botmaster. In the recent years, botnets are becoming stealthier in nature by implanting certain techniques to hide themselves such as fast flux or DGA algorithms to generate the domain names. Generally, the class of botnet can be categorized into two major...
Online healthcare system provides healthcare services remotely to the patient which include telecare medicine system, patient monitoring system, patient healthcare system etc. Authentication schemes plays a significant and crucial role in providing legitimacy of patient and protection to medical resources/services. New trends in cryptography make the online healthcare services feasible solution to...
In the present day scenario security of people is a big issue. Moreover natural disasters occur very often nowadays. In this respect there should be some mechanism by which any person falling into a crisis, can inform about the emergency situation to other person(s) of her choice to seek help. This paper presents a system which deals with the issue of emergency and crisis situations. The system enables...
Wireless Mobile ad-hoc network is quite vulnerable to many security compromising attacks because of their open deployment architecture. These attacks could involve wormhole attack, message replay or tampering, identity spoofing, black hole attack, eavesdropping, and so on. In the Sinkhole attack, malicious node tries to attract data packets of network using its fake routing information in network...
Steganography is a method of hiding a secret message within an ordinary message, where as the goal of cryptography is to make data unreadable by an unauthorized persons. Video steganography is expansion of image steganography where video files can simply viewed in a sequence of images. There are many difference between video and image steganography. As the video content is very dynamic and have less...
Cross site scripting (XSS) is a type of scripting attack on web pages and account as one of the unsafe vulnerability existed in web applications. Once the vulnerability is oppressed, an intruder advances intended access of the authenticate user's web-browser and may perform session-hijacking, cookie-stealing, malicious redirection and malware-spreading. As prevention against such attacks, it is essential...
In today's digitized era almost all data is transferred digitally which is very easy and advantageous but it also has some shortcomings i.e. the security of this data is very important. With the advent of wireless sensor networks in military regions, security of this secret data is very crucial. So Security technique such as steganography can provide the need to be a lightweight and energy efficient...
Feedback with carry shift registers (FCSRs) have been proposed as a promising alternate to the Linear feedback shift registers (LFSRs) in recent years. An approach based on traditional matrix representation has been proposed to design a Word oriented FCSR (WFCSR) automaton in [2], [3]. This automaton always generates a fixed ℓ-sequence, which is not desired for some cryptographic applications. In...
In today's world abundant data travelled from node to node or from cluster head to node or vice versa in a Wireless Sensor Network (WSN). This data can be of any type but it must consists the identity of that particular node where this data actually exist. The identity of that particular node is also as much important as the data. Due to this, there can be some security issues because if the identity...
In this work, a super secure OCDMA system is presented which consists of data randomiser XOR gate and cipher key text generator. A new technique is demonstrated for designing of data randomiser in optical domain by using cheap components. In this a secure transmitter is designed to prevent signal loss by eavesdropper. Randomiser is placed to scramble bits after cipher text and remove sequence of consecutive...
In the current technological perspective, we are witnessing a tremendous increase in the connection of heterogeneous devices and controlling them remotely. One of the latest technologies enabling this concept is “IoT” (Internet of Things). According to historical evidence, anything which is connected to a network is vulnerable to hacking and illegal monitoring. Since the devices which are being connected...
The fifth generation (5G) network would be a key facilitator to keeping up to the future wireless application demands such as ultra-high data rate, ultra-wide radio coverage, ultra — low latency, large number of devices connected etc. Security is a crucial issue in the 5G network as wireless transmissions have the innate quality of vulnerability towards unfriendly breach or hacks. In this paper, security...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.