Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
The paper proposes a RGB channel based steganographic technique for images imparting better information security. This technique inserts the information into deeper layers of the selected RGB channel and the position is determined depending on the status of channel and value of the secret key. Pixels of the cover image are selected depending on the environment of the channels and hidden information...
Lately researches are going on to combine both cryptography and biometric systems for more reliability and security of a system. It can be accomplished using fuzzy vault technique. Fuzzy vault stores the secret key. Unlocking phase of fuzzy vault is based on construction of polynomial over a finite field system GF(2n). As the size of a key increases, the time taken for construction of polynomial increases...
Pseudo random sequences (PN-sequences) are widely used in communication systems. They are often generated by discrete time binary automata like the LFSR (linear feedback shift register). Chaotic maps were considered as an effective alternative for generating PN- sequences. One specific motivation for this choice is the theoretically infinite state space expected to produce infinitely long periods...
The Cryptography is very good area for research now a days. As we know that security is very primary requirement for the any business. And for that we need very strong and unbreakable algorithm which provides high security. For that we need encryption and decryption algorithm which is having very high security with very good throughput. If we look at the real world, there are lots of organizations...
Steganography refers to information or a file that has been concealed inside a digital picture, video or audio file. If a person views the object in which the information is hidden inside, he or she will have no indication that there is any hidden information. So the person will not try to decrypt the information. Steganography can be divided into Text Steganography, Image Steganography, Audio/Video...
In the presented paper, we consider initial values entering into an element ‘zero’ with period one for logistic maps over integers. First, we derive the logistic map over integers. Second, we describe that only two elements, namely zero and the maximum value in domain of the logistic map, enter into the loop with zero, respectively, for control parameters less than 4. Last, we show that three elements,...
We have described in previous work the generation of PN-sequence by employing a 4-bit shifted Linear Feedback Shift Register (LFSR) for application into Direct Sequence Spread Spectrum (DSSS) system by simulation. In this paper, is proposed a pseudo random number generator (PRNG) circuit consisting of 24-bit shift registers (LFSR) which has much longer period to improve statistical properties. We...
To reach the high depths of knowledge and expertise which are required nowadays, scientists focus their attention on minute areas of study. However, the most complex problems faced by scientists still need the application of different disciplines to tackle them, which creates a necessity for multi-disciplinary collaboration. Cryptology is naturally multidisciplinary field, drawing techniques from...
The popularity of web services has largely influenced the way in which enterprise business is conducted. Since web services enable easy accessibility of data, dynamic connections, and relatively less human interventions, ensuring confidentiality and integrity of data that is transmitted via web services protocols becomes more significant. If a single service does not fulfill the service consumer requirements,...
Access Control over large scale distributed system like Cloud computing are one of the most debated topics of computer security. Despite the common use and the popularity of the Cloud computing paradigm, significant risks and challenges are inherent to this new concept, especially when we talk about storage of sensitive data via insecure network. In this paper we look at the problem of protecting...
Since the beginning of study of the Secure Hash function (SHA), it has been thoroughly studied by designers with the goal of reducing the area, frequency, throughput and power consumption of the hardware implementation of this cryptosystem. The Secure Hash function algorithm has become the default choice for security services in numerous applications. Following the attacks considerable standard SHA-2,...
Based on aggregation techniques associated with the arrow form matrix, to derive the stability property of dynamic discrete-time complex systems, a new strategy of control is formulated for chaos hybrid synchronization of two identical 3D Henon maps. The designed state feedback controller ensures that the state variables of both controlled hyperchaotic slave system globally synchronize, in hybrid...
This paper, present Pizer hash function based on elliptic curve and expander graph. First it describes how a Pizer hash function is used to hash a message. then, it presents the different steps to sign a message, already hash with Pizer hash function, using Elliptic Curve Digital Signature Algorithm (ECDSA). Finally, examples and results have been elaborated under the MATLAB environment and an explication...
We present stego-marbling-texture, a new and unique texture design method which allows users to deliver personalized messages with beautiful marbling textures. Our approach is inspired by the success of the recent work on modeling traditional marbling operations as mathematical functions. The encrypter transforms an input image or a text message into an intricate marbling pattern using marbling operations...
Information Technology, when implemented in healthcare, has the potential to radically improve the quality and efficiency of services being made available to patients. With the advent of mobile computing and wireless sensor networks, data acquisition and processing has become much faster and less expensive. Since there is an increase in possible software attacks on privacy and safety of health applications,...
Network services, ranging from simple network paths to complex packet processing and content storage, are envisioned as a core aspect of the future Internet. One key challenge is to limit access to these services to traffic that is authorized to use them. In this work, we describe a novel design for data plane capabilities that can provide efficient access control at high-data rates.
One of our investigation purposes is to give a design guide of a pseudorandom number generator using the logistic map with finite precision. In the present paper, we show that two sequences for slightly different parameters are completely different from each other, even if the logistic map has the same computational precision and the same initial values. First, we decide the arithmetic precision and...
Many shopping malls provide free parking service to attract customers because car owners usually have high spending power. Typically a customer is entitled to free parking after spending a certain amount in the shopping mall and he redeems free parking by presenting the sales receipts to a staff in a service counter. The staff manually processes these sales receipts (e.g., checks the date and calculates...
Smart card is a widely accepted user authentication tool to ensure only authorized access to resources available via open networks. In 2010, Sood et al. and Song independently examined a smart card based authentication scheme proposed by Xu et al. They showed that in Xu et al.'s scheme an internal user of the system could turn hostile to impersonate other users of the system. Sood et al. and Song...
Cyber threats and the field of computer cyber defense are gaining more and more an increased importance in our lives. Starting from our regular personal computers and ending with thin clients such as netbooks or smartphones we find ourselves bombarded with constant malware attacks. In this paper we will present a new and novel way in which we can detect these kind of attacks by using elements of modern...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.