The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Exchange of data over the open networks and internet is rapidly growing so security of the data becomes a major concern. One possible solution to this problem is to encrypt the data. The data can be text, image, audio, video etc. In today's world most of the multimedia applications involve images. Image encryption has applications in internet communication, multimedia systems, medical imaging, telemedicine,...
The transmission of data over a common transmission media revolute the world of information sharing from personal desktop to cloud computing. But the risk of the information theft has increased in the same ratio by the third party working on the same channel. The risk can be avoided using the suitable encryption algorithm. Using the best suited algorithm the transmitted data will be encrypted before...
Assigning ASCII values to the plaintext alphabets during transmission of documents is very common, and as we know that the ASCII value of ‘a’ is less than that of ‘z’. But, what would happen if the document contains more ‘z’ as compared to ‘a’. In that case, achieving security through encryption - decryption and compression is very difficult. This paper proposes a technique of assigning codes to plain...
Nath et al had developed multi-level feedback encryption standard ver-1, 2 and 3 where the authors have used feedbacks from forward and backward direction. In all the MWFES versions, the authors used byte level encryption and it was found that the results were quite satisfactory. In the present method (BLMWFES-1), the encryption-decryption process was done in bit-level. The entire plaintext was broken...
Recently Nath et al developed a method Multi Way Feedback Encryption Standard (MWFES) version- I and version-2. In MWFES-I, the authors used simultaneous feedback from Left Hand Side in first pass, and in the second pass, the feedback was provided from the Right Hand Side. The idea of MWFES-I is to propagate some noise from both LHS and RHS in the form forward feedback (FF) and backward feedback (BF)...
The security of digital images attracts much attention recently. For images the transformation can be implemented at two levels, the first one consists of the pixel value permutation and the second one consists of position permutation. In this paper, we propose an encryption scheme for digital images with new pixel position permutation method based on Evolvable Hardware (EHW). In this work, we use...
In this paper, a novel image cheat-encryption algori-thm based on hyper-chaotic Chen-system is proposed. The hyper-chaos is employed to encrypt plain image into cheat-like image. The cheat-image is transferred in network and easily neglected by attackers. If cheat succeeds, it is impossible to decrypt. When the cheat-image fails to cheat the attackers, security and performance analysis shows the cheat-encryption...
The science of Cryptology dates back to Caesar's time. A wide variety of techniques have been employed for encryption and decryption but cryptanalysis has simultaneously cracked these encryption techniques from time to time. The use of a multilingual approach in cryptography is not prevalent. In this paper we propose an algorithm that focuses on encryption of plain text over a range of languages supported...
Smart Grid (SG) is a brand new architecture for the next generation's power grid system. Delivering control, monitoring and management data to grid elements securely in the network is a basic requirement for SG. This paper proposes 256-bit Advanced Encryption Standard (AES) as a security solution for SG network terminals. A pair of prototyping nodes is also implemented via Altera's DE2 boards' Nios...
We consider a method for preventing e-Fraud in which a binary image is encrypted with a floating point cipher using a convolution operation and the output quantized into a 1-bit array generating a binary image ciphertext. The output is then `embedded' in a host image to hide the encrypted information. Embedding is undertaken either in the lowest 1-bit layer or multiple 1-bit layers. Decryption is...
Grid computing architecture was defined to be a complete physical layer. Data transfer in network must be in secure. In this study, encryption and decryption algorithms of a site authentication and its message are developed and applied in each grid node to ensure secure transmitted information. If the site information has been built in supervisor node then it can receive data sent from other grid...
Advanced Encryption Standard (AES), a Federal Information Processing Standard (FIPS), is an approved cryptographic algorithm that can be used to protect electronic data. The AES can be programmed in software or built with pure hardware. However Field Programmable Gate Arrays (FPGAs) offer a quicker and more customizable solution. This paper presents the AES algorithm with regard to FPGA and the Very...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.