The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The Security and Consistency of data are integral parts of Database maintenance. The modification, addition and/or alteration of data types in the database system without having to change the physical and overall structure of the database schema. In this paper, the authors have proposed the creation of a Generic database system to address the rapidly growing complexities of today's systems in which...
In confidential data transmission data security is an important factor. Advance Encryption Standard is symmetric cryptography standard used for confidential data transmission. However, some faults are injected during implementation of AES to reduce its reliability and may cause information leakage. Fault detection scheme includes the details of each transformation in AES algorithm. Simulation results...
DNA cryptography is one of the promising fields in cryptographic research which emerged with the evolution of DNA computing. In this era, end to end transmission of secure data by ensuring confidentiality and authenticity over the networks is a real challenge. Even though various DNA based cryptographic algorithms exists, they are not secure enough to provide better security as required with today's...
Digital watermarking technique is used to provide the intellectual property rights. This technique proves the proprietor of the content. The authentication and identification of the ownership protect the data from intruders. The copyright protection protects the multimedia data from modifying, illegal copying and removing the data. The binary image is taken as the watermark, it scrambles first and...
Play Fairal gorithm has been enhanced in various ways. One of the methods is to increase the confusion rates by transforming the algorithm into 3D-playfair which has four tables of 4×4 and accepts trigraph rather than digraph. This paper further enhances the 3D-playfair algorithm by extending its tables and hereby increasing the security level as well as supporting the characters of all the world's...
With the rapid increase of the Internet users, network security becomes very essential. Cryptography plays a major role in network security. However, cryptographic systems consume considerable amounts of resources, like memory, CPU time, encryption and decryption time. In this paper, we compared the most common block cipher modes of operation on AES according to the recommendations of the National...
Elliptic curve cryptography is used as a public‐key cryptosystem for encryption and decryption in such a way that if one has to encrypt a message, then they attempt to map the message to some distinct point on the elliptic curve by modifying the message using a mapping algorithm. Although the arithmetic involved in elliptic curve cryptography is computationally less complex than other cryptographic...
In optical encryption systems, speckle noise is one major challenge in obtaining high quality decrypted images. This problem can be addressed by employing a QR code based noise-free scheme. Previous works have been conducted for optically encrypting a few characters or a short expression employing QR codes. This paper proposes a practical scheme for optically encrypting and decrypting a gray-scale...
The usage of cloud computing has greatly increased over the last few years. Cloud computing is a way or a technique to store, share and access data. It is the most efficient way, it is even cheaper than the conventional way of having physical servers or physical storage devices present at the company premises. It is faster and more efficient. The concept of cloud computing is that there is expandable...
The usability of smartphones has been changing our living style significantly. Along with great convenience and efficiency, there are new challenges in protecting the data carried in these devices. Thus, nowadays the mobile data security has become a buzz word among every mobile user in real time. The key security feature for protecting data on the mobile device is encryption system. There are several...
Mobile phone is an important source of evidence for judicial staff, but the research of mobile phone forensics system is quite deficient compared with computer forensics. Toward this end, this paper proposed an integrated framework of the mobile phone forensics system, which is based on the characteristic and difficulties of mobile phone forensics. To begin with, the inner structure and forensic process...
Encryption is one of many methods that have been used to secure storage and transmit images over unsecured and open networks. The asymmetric cryptography need more time for encryption and decryption. In this paper we suggested new method for image encryption that has the potential to overcome many of encryption problems. The proposed algorithm based on the concept of scrambling the positions of pixels,...
In current digital world, more victims are affected by cybercrime. Cyber world are wide open and it is very easy to target to access data or financial information from any individual, public and private organizations etc., since, internet and web are open, it is very easy to steal data on the unsecured medium of channel. Therefore, protecting financial data required further layers of security counter...
Data Deduplication provides lots of benefits to security and privacy issues which can arise as user's sensitive data at risk of within and out of doors attacks. Traditional secret writing that provides knowledge confidentiality is incompatible with knowledge deduplication. Ancient secret writing wants completely different users to encode their knowledge with their own keys. Thus, identical knowledge...
Mobile computing works on the principle of broadcasting so that the information is radiated to everyone within the wave range which increases security threats and cyber attacks replicated quickly and easily. Thus, care must be taken in handling those types of attacks to provide information security while the user roams through different networks with heterogeneous security infrastructure. For that...
In today's world, where everyone wants to keep their valuables safe and secure, video surveillance for observing a particular area has become the need of the hour. To address this problem, we have come up with a solution of smart surveillance system for certain places like bank vaults, homes where the human presence is not available. At such places, it is not worth to continuously monitor the area...
E-health is becoming an ideal, alternative approach to the traditional approach of handling and giving health care. This paper offers a solution for good health by observing and recording the details of each and every consultation made for a patient on the cloud and not merely the storage of milestone observations. The cloud provides a virtualized source of resources including hardware and software...
Cloud computing is boon in technology field which provide on-demand services in IT enterprises. With storage of data on cloud the challenge of its security and authentication threats occurring. Authentication in cloud computing is a major concerned. The main objective of these technique is to authenticate at client side, server side, or as third party using different method to keep the data in secure...
In the present situation huge advancement of android programming and equipment innovations, the world has been digitized. Security issues are a major test to all concerned. The quick development of the advanced mobile phone and getting to different types of touchy substance has prompted to the rise of another and continually changing risk scene. Most of the attackers are using hacking techniques to...
In recent world, the way of transferring the secured information particularly in public sectors, has faced more challenges. To minimize these challenges, cryptographic concepts has been introduced. Cryptography is the art of technique that is used to changing the information in to unreadable format based on the user's key. Various cryptographic concepts have been introduced for text and image. Due...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.