The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This article presents a method of steganographic keys generation for case of embedding many secrets in single container. The most important requirements of proposed algorithm are as follows. The generated keys cannot overlap what means that the positions they indicate in the cover have to be different. An authorized user with known key should be able to easily retrieve any secret from carrier file...
There has been always a need to search new mediums as well as techniques to send the data secretly. Recent research establishes Deoxyribonucleic Acid (DNA) as an interesting medium for Steganography. DNA have various artificial components that can be used for hiding and sending secret information from any source to destination. Genetic information obtained from DNA is encoded as a sequence of nucleotides...
Wireless Sensor Networks (WSNs), comprising of tiny nodes with limited energy, computational and communication resources, are being widely used in various application areas ranging from pollution and weather monitoring to military. Even though every application may not require data to be exchanged in a secure manner, few WSN applications may have certain security requirements. The data is encrypted...
In this paper an improved chaotic switching algorithm based on modified Lozi system is applied. Generally speaking, the main advantage of the switched encrypted model is its robustness to the noise, while the main drawback is the slow processing speed. In this article we propose to gain model productivity by adjusting parameter in Lozi chaotic generator. Chaos generator is sensitive to any structure,...
The project entails the design and engineering of a wireless smoke detector unit and network. The premise of the wireless network is to alert and to set off all of the smoke detectors in the network if one smoke detector is set off. The hardware modules include the PIC microcontroller, temperature sensor, smoke sensor, low battery sensor, transmitter, and receiver. The software component includes...
In this paper, we formalize the notion of identity-based broadcast group-oriented encryption scheme and present a construction for it based on Gentry??s IBE scheme. In our new scheme, the broadcaster could encrypt the message using the designated receive group??s identity and any receiver in the designated group can independently decrypt the ciphertext. The newly proposed scheme has the following...
Steganography, as one of alternative techniques for secure communications, has drawn more and more attentions. This paper presents a covert communication model based on least significant bits (LSB) steganography in Voice over IP (VoIP). The model aims at providing nice security of secret messages and real-time performance that is vital for VoIP. Therefore, we employ a simple encryption of secret messages...
Constant-dimension codes have recently received attention due to their significance to error control in noncoherent random network coding. What the maximal cardinality of any constant-dimension code with finite dimension and minimum distance is and how to construct the optimal constant-dimension code (or codes) that achieves the maximal cardinality both remain open research problems. In this paper,...
In this paper, a novel image encryption algorithm, which based on one dimension cellular automata (1 − D,CA), is proposed. Before encryption an original image is separated into two parts. Accordingly, secret key is also divided into two subkeys in order to encrypt the two parts of the image. Corresponding to the two subsections of image, only obtain two parts of cipher text can a receiver decrypt...
In 2006, Shao et al. showed that Wang et al.'s deniable authentication protocol based on ElGamal cryptography is insecure to a person-in-the-middle attack; that is, in the whole process, the receiver cannot be aware of the existence of this adversary as well as the modification of the messages. Furthermore, they also presented a modification of Wang et al.'s protocol to overcome the security flaw...
This paper discusses the problem of achieving bandwidth and energy-efficient neighborhood group key distributions (NGKD) in tactical wireless sensor networks (TWSNs). We present new techniques that improve NGKD performance while also improving the resilience of TWSNs against attacks that combine node capture with message interception. This is accomplished without introducing additional communications...
In this paper, we focus on the security issue of a chaotic digital communication scheme called chaotic-pulse- position modulation. We design a third party intrusion scheme to test to see if CPPM is as secure as is claimed. Experiments are conducted with various chaotic maps, where CPPM is used to modulate the message at the transmitter and a Kalman filter fed with a polynomial approximation is used...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.