The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Steganography is the practice of concealing information of one object within other non secret object. We replace least significant bits from enveloped image with the bits of original image at the time of LSB based image steganography. This approach is not as secured as retrieving the least significant bits from the enveloped image will provide all the information of original image. So in the proposed...
The growing research in reversible computation has been duly complimented by several proposals of reversible circuit synthesis algorithms. A certain amount of proposals have also been presented for optimizing reversible circuit designs. This communication proposes a fresh synthesis algorithm for four bit reversible functions based on a pre-defined library of Control Line Sets. The library contains...
Quite often we come across data which is large in size such as the identification numbers of employees working in a multinational firm or climate records of a place over a period of time or the memory addresses of the storage device. These types of relatively large data are often hard to handle and organize. The paper puts forward a new data model aiming to provide efficient organization in storing...
A two-layered hybrid cryptosystem is proposed here. In symmetric key cryptosystem, the shared key is sent over a channel to the receiver. If an encrypted shared key is sent, the chance of intercepting the original key is reduced to some extent. So a hybrid cryptosystem is introduced here which is a combination of both asymmetric key and symmetric key cryptosystem. In the proposed technique, the encryption...
Adders are the main components in digital designs not only in additions but also in filter designing, multiplexing, and division. The circuit performance depends on the design of base adder. The demand of high-performance VLSI (very large scale integration) systems is increasingly rapidly for used in small and portable devices. The speed of operation is depends on the delay of the basic adder and...
In the occupational accident analysis, identification of the interrelationships of the factors behind the accidents is very important. To explore the relationships or the impacts of the causal factors on the accidents and to predict the incident outcomes i.e., injury, near miss, and property damage cases, Bayesian Network (BN) model is used in this paper. The proposed model is validated using the...
Decimal Arithmetic Hardware Research accelerated phenomenally in the last decade with introduction of Decimal Floating Point formats in IEEE 754–2008. ‘Addition’ being one of the primitive arithmetic operations has attracted numerous literary proposals involving the 8421 standard BCD code as well as nonstandard decimal digit representation codes (4221, 5211 etc.). This paper concentrates on Fixed...
This paper proposes a password security system that allows the host not to store the passwords of its users at its end. Instead it creates and stores a derivative of the password with the help of a bitmap image uploaded by the user during the user creation process. During the login attempts of users, the user is required to enter the password and upload the same image. the proposed system verifies...
In the modern digital era, the storage of digital data in multi-users systems and transmission over the internet is prime important in the society. The cryptographic technique is one of the possible solutions for protecting digital information for unauthorized uses. In this technique, the encryption algorithm should be simple to design and implementation. In the proposed article, a novel color image...
This paper proposed a Boolean expression simplification method with reduced complexity. To avoid bulky size of the truth table for multiple input combinational circuits, a reduced truth table is proposed here and this methodology is able to reduce its present size. This paper discusses about the generation of minterms from the SOP form of the Boolean expression. Here any input system is described...
Steganography is a form of secret communication in which a secret message (text, image) is hidden inside a carrier message (text, image). While in cryptography, the goal is to make everything unreadable to the ones who do not know the password, in steganography, on the other hand, the goal is to camouflage a message inside an apparently innocent carrier. In other words, while cryptography conceals...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.