The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Nowadays the most used applications are the web based applications, for instance long range informal communication, shopping, e-learning, banking and social networking are all an examples of web based applications. It is commonly known that these Web applications are publicly available for all users around the world. This leads us to new challenges in securing these applications and exposing them...
In this paper a novel data hiding method has been proposed which is based on Non-Linear Feedback Shift Register and Tinkerbell 2D chaotic map. So far, the major work in Steganography using chaotic map has been confined to image steganography where significant restrictions are there to increase payload. In our work, 2D chaotic map and NLFSR are used to developed a video steganography mechanism where...
Huge amount of data are generated and transmitted over the world each second. Transmitting the data over the network and using the data in the applications create a need to protect this data from unauthorized entities, especially if this data are sensitive or confidential. Many techniques were used to protect the data such as Encryption. Encryption is a very popular technique was used to protect data...
Algebra is one of the important fields of mathematics. It concerns in the study and manipulates of mathematical symbols. It also concerns with study of abstractions such as groups, rings and fields. Ring theory is the most attractive category of algebra in the area of cryptography. Recently, many algebraic cryptosystem protocols based on non-commutative algebraic structures such as; authentication,...
Cloud computing is an emerging computing tool in which resources accessed as a service over Internet on pay for use basis. Most of the service providers are changing their server storage to cloud storage. It is a great challenge for the service provider to attract the customers to store their sensitive data/file in the cloud storage. Service provisioning with respect to privacy preservation and data...
Barreto-Naehrig (BN) curve is a well studied pairing friendly curve of embedding degree 12, that uses arithmetic in Fpi2. Therefore the arithmetic of Fp12 extension field is well studied. In this paper, we have proposed an efficient approach of arithmetic operation over the extension field of degree 18 by towering. Fp18 extension field arithmetic is considered to be the basis of implementing the next...
Founded in February 2007, the aim of the Research Center for Information Technology Innovation (CITI) at Academia Sinica is to integrate research and development efforts in information technologies by various organizations in Academia Sinica, and also to facilitate and leverage IT-related multidisciplinary research. As a integral part of CITI, Taiwan Information Security Center (TWISC) to conduct...
This article describes the implementation of Twofish — one of the Advanced Encryption Standard (AES) finalists, in Field Programmable Gate Array — FPGA. The core was implemented in Altera Quartus Cyclone board, is totally portable and can be used in any FPGA family. It was developed using the VHDL patterns. The algorithm was implemented for 128-bit word and key. The main goal of this work was the...
Nowadays, it is highly necessary to give precautions aimed to prevent Netizen from creating fake accounts to do criminal offence. One of the means is to use authentication code where it contains activation message. This authentication code is generated through activation message combined with timestamp values which would further be used on One-time Password. Then, it would be encrypted using Advanced...
Animated GIF images consist of a number of frames that displayed in succession as a video. Capacity of hiding messages (or payload) in an animated GIF file is much greater than in a single GIF image. A modified EzStego steganography algorithm has been proposed for GIF images. The modified EzStego is a improved version of the original EzStego so that bits of the message can be embedded randomly in...
Cloud storage is getting popular as it offers flexible service with appealing benefits of on-demand data outsourcing. Putting away files remotely instead of locally boasts an array of preferences for both home and professional clients. In this paper we are trying to secure all kind of private data into cloud by providing some security levels which includes encryption, digital signature and visual...
DNA computing is the back bone of the DNA cryptography. DNA cryptography is becoming an alternative to the traditional cryptographic approach that exists in our day-today life. In spite security breaches overwhelm the traditional security techniques that are provided to a system. Thus, to increase the security feature with less cost and reduced computational time, we go for techniques utilizing the...
Steganography has always been competent in the field of data hiding by ensuring its remarkable behavior of preserving the secrecy of data. In order to maintain the secrecy of private data, the host data is being exploited to hide the information in such a way that it is unrecognizable to the human visual system thereby meeting the goals of steganography which are high embedding capacity, imperceptibility...
Cloud computing is recent emerging Internet based technology in IT industry. With rapid development of cloud computing over Internet, security became major issue that garnered attention of researchers from academic as well as industry. Data Security is a great barrier in adaptation of cloud computing. Traditional standard encryption methods provide security to data in storage state and transmission...
In this paper, we have proposed a new (t, n) secret image sharing scheme. In the proposed method the secret image is pre-processed block wise so that image becomes more suitable for arithmetic coding. The pre-processed information along with compressed bit stream, given by arithmetic coding, are used in secret sharing process. Finally, the generated shares are embedded into the cover images and for...
Linear (k,n) secret sharing scheme is a class of (k,n) secret sharing, where all the n shares of a secret satisfy a linear relationship. It plays an important role in other cryptographic systems, such as multi-party computation and function sharing schemes. On the other hand, cheating problem in (k,n) secret sharing is an important issue, such that cheaters (dishonest players) submit forged shares...
The articles in this special issue highlight recent advances along with the remaining challenges in the field of physical-layer communications security.
Message are send through encrypter, no one can read the text without having the encrypted software and key that has been used. If any user intends to send a open massage to many people(family, friends, colleagues, etc.) and if it being read by many people at other end too(public mail server, ICQ, etc.), discussed method will come in to play. Experiences of using encryptors and steganographers for...
This paper proposes three multiple messages embedding (MME) methods as extension for reversible data embedding using reflective blocks [1]. MME is realized by exploiting the data representation scheme in [1] while maintaining the reversibility and scalability of [1]. In particular, Method I utilizes block range to embed multiple messages while Method II utilizes bit representation to realize MME....
Both Gaussian integers and Lucas sequences have been applied in cryptography. This paper presents the mathematical relationship between Lucas sequences and Gaussian integers. It also explores the complexity of Discrete Logarithm Problem (DLP) for Gaussian integers modulo prime by reducing it to Lucas Sequences DLP and real integer DLP. We demonstrate that the algorithms based on the Gaussian Integer...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.