The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This work presents images encoding and decoding using the theory of conformal mapping. The conformal mapping theory made changes in the domain of problems without modifying physical characteristics between the domains. Images were utilized and are transported between domains using transformation functions like encrypt keys. Developed method showed to be able to preserve original images characteristics...
The incorrect use of cryptography is a common source of critical software vulnerabilities. As developers lack knowledge in applied cryptography and support from experts is scarce, this situation is frequently addressed by adopting static code analysis tools to automatically detect cryptography misuse during coding and reviews, even if the effectiveness of such tools is far from being well understood...
The steganography is the art of hidden; its main aim is to pass unnoticed data in another data. There are many types of data that used in steganography, such as message, image, and video. In this work, we are interested in hiding a message inside an image. Our work focuses on the study of three approaches based on least significant bit (LSB) techniques that mean put the bits of the message in the...
By hiding messages inside existing network protocols, anti-censorship tools could empower censored users to visit blocked websites. However, existing solutions generally suffer from two limitations. First, they usually need the support of ISP or the deployment of many customized hosts to conceal the communication between censored users and blocked websites. Second, their manipulations of normal network...
Increasingly developers are becoming aware of the importance of software security, as frequent high-profile security incidents emphasize the need for secure code. Faced with this new problem, most developers will use their normal approach: web search. But are the resulting web resources useful and effective at promoting security in practice? Recent research has identified security problems arising...
The paper specifies the value of evaluation of accuracy necessary for correct operation of number conversion algorithm from residue number system in weighted number system with use of the approximate method. On the basis of the approximate method the method of computation of residue number system bases extension is offered. Simulation shows that when checking large prime numbers the check algorithm...
It has been developed a method for through selective processing of aerial photographs in order to improve the of video information security containing data on critical infrastructure objects for a given quality of interpretation. A comparative evaluation of the developed and known methods of processing video information is carried out.
A cryptographic security scheme is proposed for a subsystem of the integrated computer-aided system that is intended for holding elections and counting the election returns. The main idea is to use two modern quantum cryptographic technologies: quantum bit commitment and quantum secret sharing. The scheme of information security of vote count procedure, and also the quantum bit commitment protocol...
In this paper we give a steganographical application inspired from the Moroccan's history of sciences, based on Al Khalil Models of poetry and the numerical coding of the Arabic letters in Morocco. This method is based on the position of letters in a given poetry written in grid.
Need for end-to-end secure voice communication under the cyber security threats are increasing day by day. This paper describes a method of establishing secure VOIP system in which the voice encoded with the SYMPES [1] coding technique and encryption set with an open standard encryption algorithm. Voice can be transmitted from point to point within a secure IP network. A Graphic Processing Unit (GPU)...
Quantum secure direct communication is one of the major branches of quantum cryptography. In quantum secure direct communication, secret information can be transmitted directly through a quantum channel without the use of a private key. Quantum secure direct communication(QSDC) offers higher security and instantaneousness in communication. Because it does not use private key, key management is dispensed...
Proximity detection is one of the critical components in Location-based Social Networks (LBSNS), which has attracted much attention recently. With the advent of LBSNS, more and more users' location information will be collected by the service providers. However, with a potentially untrusted server, such a proximity detection service may threaten the privacy of users. In this paper, aiming at achieving...
We consider the setting of a master server who possesses confidential data (genomic, medical data, etc.) and wants to run intensive computations on it, as part of a machine learning algorithm for example. The master wants to distribute these computations to untrusted workers who have volunteered or are incentivized to help with this task. However, the data must be kept private (in an information theoretic...
This paper studies the communication efficiency of threshold secret sharing schemes. We construct a family of Shamir's schemes with asymptotically optimal decoding bandwidth for arbitrary parameters. We also construct a family of secret sharing schemes with both optimal decoding and optimal repair bandwidth for arbitrary parameters. The construction leads to a family of regenerating codes allowing...
We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result by Chen...
The ubiquity of wireless connectivity between an ever-increasing number of devices has confirmed dire past predictions of widespread eavesdropping (among other security concerns) in wireless networks, further promoting the need for secure communications. Of particular interest are physical layer techniques which exploit error-correction coding intrinsic to digital transceivers and which offer two...
Nowadays, video steganography has become important in many security applications. The performance of any steganographic method ultimately relies on the imperceptibility, hiding capacity, and robustness. In the past decade, many video steganography methods have been proposed; however, the literature lacks of sufficient survey articles that discuss all techniques. This paper presents a comprehensive...
Protection of information achieves keeping confidentiality, integrity, and availability of the data. These features are essential for the proper operation of modern industrial technologies, like Smart Grid. The complex grid system integrates many electronic devices that provide an efficient way of exploiting the power systems but cause many problems due to their vulnerabilities to attacks. The aim...
The urgent task of the organization of confidential calculations in crucial objects of informatization on the basis of domestic TPM technologies (Trusted Platform Module) is considered. The corresponding recommendations and architectural concepts of the special hardware TPM module (Trusted Platform Module) which is built in a computing platform are proposed and realize a so-called “root of trust”...
Generally lossless compression techniques can give lower compression ratio. In this paper, an alternative scheme is tailored to compress generation scheduling information. It can reduce the data volume by 90% or even more for majority of the available scheduling data. While approaching towards the formation of smart grid, data management is extremely important. This low computational novel algorithm,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.