The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Steganography is a form of secret communication in which a secret message (text, image) is hidden inside a carrier message (text, image). While in cryptography, the goal is to make everything unreadable to the ones who do not know the password, in steganography, on the other hand, the goal is to camouflage a message inside an apparently innocent carrier. In other words, while cryptography conceals...
Digital representation of biomedical images and videos has grown enormously in scope and gained importance in recent years. Preserving security and integrity in wireless transmission of biomedical images and videos is an utmost challenge. Manipulation of sensitive biomedical data in the path of transmission can mislead critical diagnosis and treatment. To overcome this, multi-level security is provided...
This work presents images encoding and decoding using the theory of conformal mapping. The conformal mapping theory made changes in the domain of problems without modifying physical characteristics between the domains. Images were utilized and are transported between domains using transformation functions like encrypt keys. Developed method showed to be able to preserve original images characteristics...
Steganography is one of the most important information hiding mechanism, which can be used along with cryptography for providing adequate data security. The common Steganographic mediums used are text, image, audio and video for hiding secret information. In the case of image medium, mostly least significant bits of pixels of a cover image are used for hiding secret information. In this paper, a new...
Although Orthogonal Frequency Division Multiplexing (OFDM) seems to be a solution to achieve the demand of high data rates and immunity to the multipath fading channel, it has some drawbacks. High Peak to average power ratio (PAPR) is the most significant problem of these drawbacks. The main objective of this paper is to introduce a modified PAPR reduction technique named as samples clipping and then...
In this paper we give the first blind signature protocol for code-based cryptography. Our approach is different from the classical original RSA based blind signature scheme, it is done in the spirit of the Fischlin approach [9] which is based on proofs of knowledge. To achieve our goal we consider a new tool for zero-knowledge (ZK) proofs, the Concatenated Stern ZK protocol, which permits to obtain...
This paper studies the communication efficiency of threshold secret sharing schemes. We construct a family of Shamir's schemes with asymptotically optimal decoding bandwidth for arbitrary parameters. We also construct a family of secret sharing schemes with both optimal decoding and optimal repair bandwidth for arbitrary parameters. The construction leads to a family of regenerating codes allowing...
The security of code-based cryptography relies primarily on the hardness of generic decoding with linear codes. The best generic decoding algorithms are all improvements of an old algorithm due to Prange: they are known under the name of information set decoding techniques (ISD). A while ago a generic decoding algorithm which does not belong to this family was proposed: statistical decoding. It is...
Fuzzy commitment and syndrome-based schemes are two well-known helper data schemes used to bind and generate, respectively, a secret key to/from SRAM-PUF observations. To allow the decoder to reconstruct this secret key from a new (verification) observation of an SRAM-PUF, an encoder has to generate so-called helper data. This helper data is a function of an SRAM-PUF enrollment observation and, in...
We study the state-dependent (SD) wiretap channel (WTC) with non-causal channel state information (CSI) at the encoder. This model subsumes all other instances of CSI availability as special cases, and calls for an efficient utilization of the state sequence both for reliability and security purposes. A lower bound on the secrecy-capacity, that improves upon the previously best known result by Chen...
In traditional (k, n) threshold secret image sharing (SIS), a secret image is encrypted into n shadow images (also called shares) distributed to n associated participants. The secret image can be recovered by collecting any k or more shadow images, i.e., SIS is loss-tolerant. In SIS research domain, visual cryptography scheme (VCS) also called visual secret sharing (VSS) and Shamir's polynomial-based...
In this paper we consider a secret-key cryptosystem with a wiretapper who tries to guess the plaintext corresponding to a transmitted ciphertext. We discuss several criteria of secrecy based on the probability of successful guess of a plaintext or a key from a ciphertext. We characterize fundamental properties of a secret-key cryptosystem satisfying such criteria. In particular, we show that in any...
In this paper, we propose a (k, L, n)-threshold ramp secret sharing scheme (SSS) against substitution attacks. This scheme can be applied to a secret SL uniformly distributed over GF(pm)L, where p is a prime satisfying p ≥ L + 2. We extend Koga and Koyano's analysis based on mutual information of shares for (k, n)-threshold SSSs to (k,L,n) ramp SSSs. The proposed scheme can achieve the minimum sizes...
Visual Cryptography Scheme (VCS) is Image Encryption technique Which Generate Share images. An image Steganography is a technique that hide secrete message in image. First selection of image based reCAPTCHA. After that, by applying Visual Cryptography on Black and White (BW) image and generate share1 and share2. In Progressive Visual Cryptography Scheme (PVCS) System share1 hide into reCAPTCHA image...
This paper proposes a new approach for 32 bit Arithmetic and Logic Unit for multifunctional processors. The proposed ALU has a novel instruction set including Parity checker, Parity Generator, Binary to Gray converter, gray to binary converter and Manchester encoder decoder along with conventional ALU operations. This extended ALU caters the need of cryptographic processors where an extended security...
In order to share a secret information among a group of participants, the method of secret sharing is used. The secret sharing method that is used to share or encrypt images is called Visual Cryptography. The main problems that subsist in Visual Cryptography are pixel expansion and poor image quality. Research are being conducted to solve the above mentioned problems. In this research, effective technique...
The paper aims at studying some methods of coding information in text containers. It proposes a method of embedding a digital watermark to the text that is based on biometrical characteristics of the document's author. The information capacity is defined, it is 0.02 in respect of a bit/symbol proportion. A method of checking electronic and paper documents for their authenticity and unauthorized changes...
Coset coding is often used in the study of the physical layer security based on wiretap channel model. As almost every secure coding schemes using coset codes need a precise prediction of the channel state information (CSI), they are much more difficult to implement. To solve this problem, we propose a concatenated coding scheme combined of polar code and fountain code in wiretap channel model on...
The growth of the Internet has paved the way for easy access to information, and has contributed to the rapid development of multimedia based applications. This has made security issues very crucial and challenging. Various types of media carry information like image, audio and video and protecting these from unauthorized access is an important area of active research. This paper proposes a methodology...
Today it is very necessary to protecting Sensitive information from external world. To protecting sensitive information now a day's barcode technique is used. In the real world many industries are using the technique to protect sensitive information form external parties. This paper contains the algorithm which helps to protect the sensitive information. This proposed algorithm is useful to hiding...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.