A new algorithm suggested for audio file encryption and decryption utilizing integer wavelet transform to take advantage of the property for adaptive context-based lossless audio coding. In addition, biometrics are used to give a significant level of classification and unwavering quality because the procedure has numerous qualities and points of interest. The offered algorithm utilized many properties of hand geometry estimations as keys to encode and decode the audio file. Many tests were carried out on a set of audio files and quality metrics such as mean square error and correlations were calculated which in turn confirmed the efficiency and quality of the work.
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
In Wireless sensor networks (WSNs), All communications between different nodes are sent out
in a broadcast fashion. These networks are used in a variety of applications including military,
environmental, and smart spaces. Sensors are susceptible to various types of attack, such as
data modification, data insertion and deletion, or even physical capture and sensor
replacement. Hence security becomes important issue in WSNs. However given the fact that
sensors are resources constrained, hence the traditional intensive security algorithms are not
well suited for WSNs. This makes traditional security techniques, based on data encryption, not
very suitable for WSNs. This paper proposes Linear Kolmogorov watermarking technique for
secure data communication in WSNs. We provide a security analysis to show the robustness of
the proposed techniques against various types of attacks. This technique is robust against data
deletion, packet replication and Sybil attacks
An Approach for Securing Voice Communication via Image Watermarking TechniqueCSCJournals
Nowadays, Internet users use many social websites for communication with each other, and some of the users may live in another part of the world. Thus, communication becomes much easier and faster. However, with internet growing and their users, it becomes more likely to be attacked by hackers and intruders to access people personal data. Also, some professional hackers can detect the entire communication component for instance; text, image, video and voice messages.
In this paper, it is focused on one component, which is voice communication; and the main idea of this work is to hide the voice message that generated from one side and convert to a wave data, then to the binary code consequently on the receiver side. Later, the generated code will hide inside an image before reaching the destination. The final step is to reverse the whole security process that has been done in the source side. Therefore it can provide a safe environment for voice communication among the internet client.
Utilizing distributed storage administrations, clients can store their Information in the cloud to maintain a strategic distance from
the consumption of neighborhood information stockpiling support. To guarantee the uprightness of the information put away in
the Cloud, numerous information, honesty examining plans have been proposed. A client needs to Utilize his private key to
produce the information authenticators for Understanding the information respectability reviewing. In this way, the client needs to
have an equipment token to store his private Key and retain a secret phrase to enact this private key. In the event that this
Equipment token is lost or this secret phrase is overlooked, the majority of the Current information, trustworthiness inspecting
plans would be notable work. We propose another worldview Called information uprightness inspecting without private key
stockpiling and Plan such a plan. In this plan, we use biometric informationas the client's fluffy private key to Abstain from
utilizing the equipment token. In the interim, the plan can at present Successfully complete the information respectability
auditing. We use a direct Sketch with coding and blunder revision procedures to affirm The personality of the client. We use
another mark Conspire which supports blacklist certainty. The security evidence and the Execution examination demonstrates that our proposed plan accomplishes Attractive security andeffectiveness.
In this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information within different media. In this paper, we will discuss how the criminal can use steganography to hide evidence and tracks, and how the steganalysis for computer forensic can be done. There are different types of steganography, such as image, text, video, and audio steganography, all will be discussed in detail. The paper will focus on how the investigator can detect the steganography in all its forms using several techniques. The main goal of this paper is to assist computer forensics investigators in knowing how the criminals can conduct their crimes and obscure evidence from computer systems using steganography techniques.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
The document compares the performance of symmetric data encryption techniques. It analyzes the Blowfish encryption algorithm, which uses a variable key size for encryption. The algorithm is implemented in VHDL hardware description language on an Altera Quartus II platform. Power analysis shows Blowfish consumes less power than AES, IDEA, and Rijndael algorithms for a 128-bit key. Timing analysis also demonstrates Blowfish's superiority over the other algorithms. The VHDL implementation allows encryption and decryption to be performed efficiently in a single clock cycle with minimal cost.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
Secure transmission in wireless sensor networks data using linear kolmogorov ...csandit
In Wireless sensor networks (WSNs), All communications between different nodes are sent out
in a broadcast fashion. These networks are used in a variety of applications including military,
environmental, and smart spaces. Sensors are susceptible to various types of attack, such as
data modification, data insertion and deletion, or even physical capture and sensor
replacement. Hence security becomes important issue in WSNs. However given the fact that
sensors are resources constrained, hence the traditional intensive security algorithms are not
well suited for WSNs. This makes traditional security techniques, based on data encryption, not
very suitable for WSNs. This paper proposes Linear Kolmogorov watermarking technique for
secure data communication in WSNs. We provide a security analysis to show the robustness of
the proposed techniques against various types of attacks. This technique is robust against data
deletion, packet replication and Sybil attacks
An Approach for Securing Voice Communication via Image Watermarking TechniqueCSCJournals
Nowadays, Internet users use many social websites for communication with each other, and some of the users may live in another part of the world. Thus, communication becomes much easier and faster. However, with internet growing and their users, it becomes more likely to be attacked by hackers and intruders to access people personal data. Also, some professional hackers can detect the entire communication component for instance; text, image, video and voice messages.
In this paper, it is focused on one component, which is voice communication; and the main idea of this work is to hide the voice message that generated from one side and convert to a wave data, then to the binary code consequently on the receiver side. Later, the generated code will hide inside an image before reaching the destination. The final step is to reverse the whole security process that has been done in the source side. Therefore it can provide a safe environment for voice communication among the internet client.
Utilizing distributed storage administrations, clients can store their Information in the cloud to maintain a strategic distance from
the consumption of neighborhood information stockpiling support. To guarantee the uprightness of the information put away in
the Cloud, numerous information, honesty examining plans have been proposed. A client needs to Utilize his private key to
produce the information authenticators for Understanding the information respectability reviewing. In this way, the client needs to
have an equipment token to store his private Key and retain a secret phrase to enact this private key. In the event that this
Equipment token is lost or this secret phrase is overlooked, the majority of the Current information, trustworthiness inspecting
plans would be notable work. We propose another worldview Called information uprightness inspecting without private key
stockpiling and Plan such a plan. In this plan, we use biometric informationas the client's fluffy private key to Abstain from
utilizing the equipment token. In the interim, the plan can at present Successfully complete the information respectability
auditing. We use a direct Sketch with coding and blunder revision procedures to affirm The personality of the client. We use
another mark Conspire which supports blacklist certainty. The security evidence and the Execution examination demonstrates that our proposed plan accomplishes Attractive security andeffectiveness.
In this study, we present how digital steganography can be analyzed in computer forensic. Computer forensics is a scientific study of computers in a manner consistent with the principles of the rules of evidence and court rules of procedure.
Steganography is a state of art that is used for hiding information within different media. In this paper, we will discuss how the criminal can use steganography to hide evidence and tracks, and how the steganalysis for computer forensic can be done. There are different types of steganography, such as image, text, video, and audio steganography, all will be discussed in detail. The paper will focus on how the investigator can detect the steganography in all its forms using several techniques. The main goal of this paper is to assist computer forensics investigators in knowing how the criminals can conduct their crimes and obscure evidence from computer systems using steganography techniques.
International Journal of Computer Science and Information Security,IJCSIS ISSN 1947-5500, Pittsburgh, PA, USA
Email: ijcsiseditor@gmail.com
http://sites.google.com/site/ijcsis/
https://google.academia.edu/JournalofComputerScience
https://www.linkedin.com/in/ijcsis-research-publications-8b916516/
http://www.researcherid.com/rid/E-1319-2016
A Survey on Multimedia Content Protection Mechanisms IJECEIAES
Cloud computing has emerged to influence multimedia content providers like Disney to render their multimedia services. When content providers use the public cloud, there are chances to have pirated copies further leading to a loss in revenues. At the same time, technological advancements regarding content recording and hosting made it easy to duplicate genuine multimedia objects. This problem has increased with increased usage of a cloud platform for rendering multimedia content to users across the globe. Therefore it is essential to have mechanisms to detect video copy, discover copyright infringement of multimedia content and protect the interests of genuine content providers. It is a challenging and computationally expensive problem to be addressed considering the exponential growth of multimedia content over the internet. In this paper, we surveyed multimedia-content protection mechanisms which throw light on different kinds of multimedia, multimedia content modification methods, and techniques to protect intellectual property from abuse and copyright infringement. It also focuses on challenges involved in protecting multimedia content and the research gaps in the area of cloud-based multimedia content protection.
The document compares the performance of symmetric data encryption techniques. It analyzes the Blowfish encryption algorithm, which uses a variable key size for encryption. The algorithm is implemented in VHDL hardware description language on an Altera Quartus II platform. Power analysis shows Blowfish consumes less power than AES, IDEA, and Rijndael algorithms for a 128-bit key. Timing analysis also demonstrates Blowfish's superiority over the other algorithms. The VHDL implementation allows encryption and decryption to be performed efficiently in a single clock cycle with minimal cost.
ANALYSIS AND DESIGN OF MULTIPLE WATERMARKING IN A VIDEO FOR AUTHENTICATION AN...Editor Jacotech
Watermarking technique be employ instance & for a second time for
validation and protection of digital data (images, video and audio
files, digital repositories and libraries, web publishing). It is helpful
to copyright protection and illegal copying of digital data like video
frames and making digital data more robust and imperceptible. With
the advent of internet, creation and delivery of digital data has grown
many fold. In that Scenario has to need a technique for transferring
digital data securely without changing their originality and
robustness. In this paper proposed a plan of latest watermarking
method which involves inserting and adding two or more digital data
or pictures in a single video frame for the principle of protection and
replicate the similar procedure for N no video frames for
authentication of entire digital video. After that digital video is
encrypted and decrypted by using motion vector bit-xor encryption
and decryption technique.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now since it was launch officially by the government. This research proposes an independent framework for bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or organization sector. The Framework proposes interoperability framework using novel combination component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent. The framework use federation mode or decentralized data for interoperability, to make sure not breaking the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on the transport between middleware and web service.
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
Several developments in the transfer of data through the internet make it easier to transfer the data faster and accurately to the destination. But in this, anyone can misuse and modify the critical information through hacking. Video steganography is a technique which is used to hide the message and to transfer the message inside a video. Video is an application of many frames of audio, text, and images. The segmentation is known as the advanced technology that provides rich information of an image. The purpose of this paper is to propose a new technique to hide the data using video steganography with the help of artificial intelligence and DWT. This paper focuses on analyzing the various video steganography techniques which were proposed for securing the data transmission. In this paper, artificial intelligence is applied in order to improve the integrity and security of data transfer. The performance of the proposed method is evaluated on the basis of Bit error, mean square error, and PSNR metrics. Shivani Gupta | Gargi Kalia | Preeti Sondhi ""Video Steganography using Discrete Wavelet Transform and Artificial Intelligence"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25067.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/25067/video-steganography-using-discrete-wavelet-transform-and-artificial-intelligence/shivani-gupta
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
This document discusses a proposed lossless encryption technique for finger biometric images. It begins with an abstract that outlines the need for biometric template protection and discusses existing approaches that offer tradeoffs between security and performance. The introduction provides background on encryption algorithms and notes that direct extensions of text-based algorithms are not suitable for images due to their large size and computational overhead of encryption/decryption. The literature review covers requirements for image encryption like security, compression, and efficiency. It describes complete and selective encryption approaches. The proposed methodology involves preprocessing the input fingerprint image, generating an encryption key, and encrypting/decrypting the image using a cryptosystem algorithm. Performance will be evaluated based on encryption time and security parameters like NPCR
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
This document summarizes authentication techniques for mobile systems. It discusses single-factor and multi-factor authentication using passwords, tokens, and biometrics. It also reviews RFID authentication protocols like SRAC and ASRAC for secure and low-cost RFID systems. Public key cryptography models using elliptic curve cryptography are proposed for mobile security. Secure authentication provides benefits like protection, scalability, speed, and availability for mobile enterprises. Both encryption and authentication are needed but encryption requires more processing resources so should only be used for critical information.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
Residential access control system using QR code and the IoT IJECEIAES
This document presents a residential access control system (RACs) using QR codes and the Internet of Things (IoT) that was developed to improve security and convenience for homeowners. The system uses cryptography and QR codes for authentication in two phases - an authentication phase where a QR code is generated from an app, and a verification phase where an access control device scans the QR code. The system was tested and able to automatically lock doors after 30 seconds, notify users through a LINE app, and display device statuses in real-time on a NETPIE network platform. The results showed the system had higher security than other access control methods and an average access speed of 5.63 seconds.
A Unique Approach for Data Hiding Using Audio SteganographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Recognizing of Text and Product Label from Hand Held Entity Intended for Visi...YogeshIJTSRD
Our proposed work involves recognizing text and product label reading from portable entities intended for Visionless Persons using Raspberry Pi 3, ultrasonic sensor. Raspberry Pi 3 is the controller used in the proposed device. GPS is fixed in the system and it is used to find the exact location of the person in terms of longitude and latitude, this information is sent to the caretaker through e mail. The caretaker can use the latitude and longitude to find the address on Google Maps. The camera is used to identify the obstacle or object ahead and the output is told to the blind user in speech form. The camera also identifies objects with words on them, using image processing these images are converted to text, and using Tesseract the text is converted to speech, thus giving the speech output to the blind about what is written on the object. RF ID is used to find the stick using tags. The buzzer goes ON to identify the location of the stick. A threshold value for distance between the user and the stick is set, when the distance is less than the threshold value, the buzzer sound increases. Arunkumar. V | Aswin M. D | Bhavan. S | Gopinath. V | Dr. Kishorekumar. A "Recognizing of Text and Product Label from Hand Held Entity Intended for Visionless Persons" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39808.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/39808/recognizing-of-text-and-product-label-from-hand-held-entity-intended-for-visionless-persons/arunkumar-v
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET Journal
This document discusses improved anonymous identity-based broadcast encryption with chosen ciphertext security. It begins by defining broadcast encryption and how it allows a sender to encrypt messages that can only be decrypted by authorized receivers, without revealing the identities of the receivers. It then discusses previous research on providing anonymity in broadcast encryption systems through techniques like identity-based encryption. The goal of this work is to improve existing anonymous identity-based encryption schemes using bilinear groups and decisional bilinear Diffie-Hellman problems to provide stronger ciphertext security. The methodology uses an object-oriented design approach and implementation is done using PHP and SQL.
Cryptography is where security engineering meets mathematics.The field of studyrelated to encoded
information comes from Greek word for ”secret writing” is cryptography.The art and science of hiding information
by embedding it in some otherdata is Steganography. The secret communication is carried through many
sourceslike image, audio and video files. This technique mainly proposes data hiding by embeddingthe message of
interest using geometric style of cryptographic algorithm,thus providing high security. Wavelet transform
algorithms are used to perform preprocessing of images.
Keywords —Cryptography, Steganography, Geometrical way of embedding, Wavelet transforms,DCT
The document discusses various techniques for audio steganography. It begins by defining steganography and its goal of hiding secret messages in plain sight within carrier files like audio, images or video. Several audio steganography techniques are described, including least significant bit coding, echo hiding, phase coding, and spread spectrum. The document also proposes a two-level security method for audio steganography involving hiding an image file within an audio file using bitwise operations for improved security. It concludes by comparing various audio steganography techniques and their advantages and disadvantages.
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
Measuring memetic algorithm performance on image fingerprints datasetTELKOMNIKA JOURNAL
Personal identification has become one of the most important terms in our society regarding access control, crime and forensic identification, banking and also computer system. The fingerprint is the most used biometric feature caused by its unique, universality and stability. The fingerprint is widely used as a security feature for forensic recognition, building access, automatic teller machine (ATM) authentication or payment. Fingerprint recognition could be grouped in two various forms, verification and identification. Verification compares one on one fingerprint data. Identification is matching input fingerprint with data that saved in the database. In this paper, we measure the performance of the memetic algorithm to process the image fingerprints dataset. Before we run this algorithm, we divide our fingerprints into four groups according to its characteristics and make 15 specimens of data, do four partial tests and at the last of work we measure all computation time.
IRJET- An Overview of Steganography : Data Hiding TechniqueIRJET Journal
This document provides an overview of steganography, which is a data hiding technique used to conceal secret information within other information. It discusses the history and development of steganography, from ancient Greece to modern techniques. It also describes four main types of steganography - text, image, audio, and video steganography - and some specific techniques within each type, such as least significant bit modification and discrete cosine transform domain embedding. The document concludes that steganography is an important technique for securely transmitting confidential information, though proper security measures are still needed to fully conceal data from unauthorized parties.
This document describes an improvement made to the Advanced Encryption Standard (AES) algorithm for encrypting images. The AES algorithm is widely used but suffers from long encryption times, especially when processing large images. The authors implemented an improved version of AES using the VB.NET framework to address these issues. They eliminated the use of an encryption key, which reduced encryption time. Comparisons showed the improved AES encrypted a 1KB image 0.3 milliseconds on average, faster than other recent algorithms. The improvement successfully enhanced AES encryption speed for images.
An Efficient Code-word Substitution Method for Data Embedding Technique in Encrypted H.264/AVC Video Streams Anisha Jose – PG Scholar,
Anu K Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
This document summarizes a research article that proposes a new edge adaptive steganography scheme based on an advanced LSB algorithm. The scheme adaptively selects edge regions in an image for data embedding based on the size of the secret message. For smaller messages, sharper edge regions are selected, while larger messages use more edge regions. It uses LSB matching revisited to embed bits while considering the relationship between image region characteristics and message size. The goal is to preserve higher visual quality in the stego image. Experimental results show the proposed technique achieves higher data hiding capacity and better image quality than some existing techniques.
This document proposes a technique for hiding one image within another image using a combination of two steganography algorithms: the five modulus method (FMM) and least significant bit (LSB) substitution. The secret image is partitioned into two parts, with 75% hidden using FMM and 25% hidden using LSB substitution within the cover image. Additionally, a private stego-key is used with FMM to increase security. This nesting of algorithms along with a password is intended to make unauthorized extraction of the hidden image from the cover image more difficult. The document discusses related work in image steganography techniques and provides details of the proposed methodology. It is expected that this approach will achieve a good balance between security and
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
KAFA: A novel interoperability open framework to utilize Indonesian electroni...TELKOMNIKA JOURNAL
Indonesian people have electronic citizen card called e-KTP. e-KTP is NFC based technology embedded inside Indonesian citizenship identity card. e-KTP technology has never been used until now since it was launch officially by the government. This research proposes an independent framework for bridging the gap between Indonesia regulation for e-KTP and commercial use in the many commercial or organization sector. The Framework proposes interoperability framework using novel combination component, there are e-KTP reader, Middleware and Web Service. KAFA (e-KTP Middleware and Framework) implementing Internet of Things (IoT) concept to make it as open standard and independent. The framework use federation mode or decentralized data for interoperability, to make sure not breaking the law of privacy. Extended development of AES-CBC cipher algorithm was used to encrypt the data on the transport between middleware and web service.
Video Steganography using Discrete Wavelet Transform and Artificial Intelligenceijtsrd
Several developments in the transfer of data through the internet make it easier to transfer the data faster and accurately to the destination. But in this, anyone can misuse and modify the critical information through hacking. Video steganography is a technique which is used to hide the message and to transfer the message inside a video. Video is an application of many frames of audio, text, and images. The segmentation is known as the advanced technology that provides rich information of an image. The purpose of this paper is to propose a new technique to hide the data using video steganography with the help of artificial intelligence and DWT. This paper focuses on analyzing the various video steganography techniques which were proposed for securing the data transmission. In this paper, artificial intelligence is applied in order to improve the integrity and security of data transfer. The performance of the proposed method is evaluated on the basis of Bit error, mean square error, and PSNR metrics. Shivani Gupta | Gargi Kalia | Preeti Sondhi ""Video Steganography using Discrete Wavelet Transform and Artificial Intelligence"" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-4 , June 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25067.pdf
Paper URL: https://www.ijtsrd.com/computer-science/artificial-intelligence/25067/video-steganography-using-discrete-wavelet-transform-and-artificial-intelligence/shivani-gupta
Dual method cryptography image by two force secure and steganography secret m...TELKOMNIKA JOURNAL
With the go on the evolution of both computer and internet technology, videos, sounds, and scripts are used more and more often. It can be used in sundry techniques in ciphering and data concealing. The objective of this paper is leading to the suggestion of a new method of the combination between encryption and concealment of information so as to make it difficult to identify the transmitted datavia networks. This study has used two force secure (2FS) to encrypt the images, in other words, the SF is frequent twice on the image, to obtain powerful encryption then the concealing of the secret message is done inside the cryptography of the image has been performed using a secret key (cosine curve), and this stego-encryption image has been transformed forthe Internet of things storage in the database in IoT (data flow), when the user needs any information can be access inviaof internet of things (IoTs). The outcome of the proposed system is obtained tobe evaluated through different measures, such aspeak signal noise ratio (PSNR), mean square error (MSE), entropy,correlation coefficient, and histogram. The proposed system is good, efficient, fast, has high security, robustness, and transparency.
An Architectural Approach of Data Hiding In Images Using Mobile Communicationiosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
This document discusses a proposed lossless encryption technique for finger biometric images. It begins with an abstract that outlines the need for biometric template protection and discusses existing approaches that offer tradeoffs between security and performance. The introduction provides background on encryption algorithms and notes that direct extensions of text-based algorithms are not suitable for images due to their large size and computational overhead of encryption/decryption. The literature review covers requirements for image encryption like security, compression, and efficiency. It describes complete and selective encryption approaches. The proposed methodology involves preprocessing the input fingerprint image, generating an encryption key, and encrypting/decrypting the image using a cryptosystem algorithm. Performance will be evaluated based on encryption time and security parameters like NPCR
A Review Study on Secure Authentication in Mobile SystemEditor IJCATR
This document summarizes authentication techniques for mobile systems. It discusses single-factor and multi-factor authentication using passwords, tokens, and biometrics. It also reviews RFID authentication protocols like SRAC and ASRAC for secure and low-cost RFID systems. Public key cryptography models using elliptic curve cryptography are proposed for mobile security. Secure authentication provides benefits like protection, scalability, speed, and availability for mobile enterprises. Both encryption and authentication are needed but encryption requires more processing resources so should only be used for critical information.
Steganography is the technique of hiding secret data within an ordinary, non-secret, file or
message in order to avoid detection; the secret data is then extracted at its destination. The use of
steganography can be combined with encryption as an extra step for hiding or protecting data. The
word steganographyis derived from the Greek words steganos(hidden or covered) and the Greek root
graph(write).Steganography is dedicated for covert communication. It changes the image in such a way
that only the sender and the intended receiver can detect the message sent through it. Since it is
invisible, the detection of secret data is not simple.
Residential access control system using QR code and the IoT IJECEIAES
This document presents a residential access control system (RACs) using QR codes and the Internet of Things (IoT) that was developed to improve security and convenience for homeowners. The system uses cryptography and QR codes for authentication in two phases - an authentication phase where a QR code is generated from an app, and a verification phase where an access control device scans the QR code. The system was tested and able to automatically lock doors after 30 seconds, notify users through a LINE app, and display device statuses in real-time on a NETPIE network platform. The results showed the system had higher security than other access control methods and an average access speed of 5.63 seconds.
A Unique Approach for Data Hiding Using Audio SteganographyIJMER
International Journal of Modern Engineering Research (IJMER) is Peer reviewed, online Journal. It serves as an international archival forum of scholarly research related to engineering and science education.
International Journal of Modern Engineering Research (IJMER) covers all the fields of engineering and science: Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Computer Engineering, Agricultural Engineering, Aerospace Engineering, Thermodynamics, Structural Engineering, Control Engineering, Robotics, Mechatronics, Fluid Mechanics, Nanotechnology, Simulators, Web-based Learning, Remote Laboratories, Engineering Design Methods, Education Research, Students' Satisfaction and Motivation, Global Projects, and Assessment…. And many more.
Recognizing of Text and Product Label from Hand Held Entity Intended for Visi...YogeshIJTSRD
Our proposed work involves recognizing text and product label reading from portable entities intended for Visionless Persons using Raspberry Pi 3, ultrasonic sensor. Raspberry Pi 3 is the controller used in the proposed device. GPS is fixed in the system and it is used to find the exact location of the person in terms of longitude and latitude, this information is sent to the caretaker through e mail. The caretaker can use the latitude and longitude to find the address on Google Maps. The camera is used to identify the obstacle or object ahead and the output is told to the blind user in speech form. The camera also identifies objects with words on them, using image processing these images are converted to text, and using Tesseract the text is converted to speech, thus giving the speech output to the blind about what is written on the object. RF ID is used to find the stick using tags. The buzzer goes ON to identify the location of the stick. A threshold value for distance between the user and the stick is set, when the distance is less than the threshold value, the buzzer sound increases. Arunkumar. V | Aswin M. D | Bhavan. S | Gopinath. V | Dr. Kishorekumar. A "Recognizing of Text and Product Label from Hand Held Entity Intended for Visionless Persons" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-3 , April 2021, URL: https://www.ijtsrd.com/papers/ijtsrd39808.pdf Paper URL: https://www.ijtsrd.com/engineering/electronics-and-communication-engineering/39808/recognizing-of-text-and-product-label-from-hand-held-entity-intended-for-visionless-persons/arunkumar-v
IRJET- Improved Identity-based Anonymous Broadcast Encryption with Chosen Cip...IRJET Journal
This document discusses improved anonymous identity-based broadcast encryption with chosen ciphertext security. It begins by defining broadcast encryption and how it allows a sender to encrypt messages that can only be decrypted by authorized receivers, without revealing the identities of the receivers. It then discusses previous research on providing anonymity in broadcast encryption systems through techniques like identity-based encryption. The goal of this work is to improve existing anonymous identity-based encryption schemes using bilinear groups and decisional bilinear Diffie-Hellman problems to provide stronger ciphertext security. The methodology uses an object-oriented design approach and implementation is done using PHP and SQL.
Cryptography is where security engineering meets mathematics.The field of studyrelated to encoded
information comes from Greek word for ”secret writing” is cryptography.The art and science of hiding information
by embedding it in some otherdata is Steganography. The secret communication is carried through many
sourceslike image, audio and video files. This technique mainly proposes data hiding by embeddingthe message of
interest using geometric style of cryptographic algorithm,thus providing high security. Wavelet transform
algorithms are used to perform preprocessing of images.
Keywords —Cryptography, Steganography, Geometrical way of embedding, Wavelet transforms,DCT
The document discusses various techniques for audio steganography. It begins by defining steganography and its goal of hiding secret messages in plain sight within carrier files like audio, images or video. Several audio steganography techniques are described, including least significant bit coding, echo hiding, phase coding, and spread spectrum. The document also proposes a two-level security method for audio steganography involving hiding an image file within an audio file using bitwise operations for improved security. It concludes by comparing various audio steganography techniques and their advantages and disadvantages.
27 5 jun17 28apr 15859 ammar final (edti ari baru))IAESIJEECS
The transition from analog technologies to digital technologies has increased the ever-growing concern for protection and authentication of digital content and data. Owners of digital content of any type are seeking and exploring new technologies for the protection of copyrighted multimedia content. Multimedia protection has become an issue in recent years, and to deal with this issue, researchers are continuously searching for and exploring new effective and efficient technologies. This thesis study has been prepared in order to increase the invisibility and durability of invisible watermarking by using the multilayer Discrete Wavelet Transform (DWT) in the frequency plane and embedding two marks into an image for the purpose of authentication and copyright when digital content travels through an unsecured channel. A novel watermarking algorithm has been proposed based on five active positions and on using two marks. In addition to the extraction process, watermarking images will be subjected to a set of attack tests. The evaluation criteria have been the bases of assessing the value of SNR, PNSR, MAE and RMSE for both the watermarking images and the watermarking images after attacks, followed by the invisibility of the watermarking being measured before and after the attacks. Our lab results show high robustness and high quality images obtaining value for both SNR and PNSR.
Measuring memetic algorithm performance on image fingerprints datasetTELKOMNIKA JOURNAL
Personal identification has become one of the most important terms in our society regarding access control, crime and forensic identification, banking and also computer system. The fingerprint is the most used biometric feature caused by its unique, universality and stability. The fingerprint is widely used as a security feature for forensic recognition, building access, automatic teller machine (ATM) authentication or payment. Fingerprint recognition could be grouped in two various forms, verification and identification. Verification compares one on one fingerprint data. Identification is matching input fingerprint with data that saved in the database. In this paper, we measure the performance of the memetic algorithm to process the image fingerprints dataset. Before we run this algorithm, we divide our fingerprints into four groups according to its characteristics and make 15 specimens of data, do four partial tests and at the last of work we measure all computation time.
IRJET- An Overview of Steganography : Data Hiding TechniqueIRJET Journal
This document provides an overview of steganography, which is a data hiding technique used to conceal secret information within other information. It discusses the history and development of steganography, from ancient Greece to modern techniques. It also describes four main types of steganography - text, image, audio, and video steganography - and some specific techniques within each type, such as least significant bit modification and discrete cosine transform domain embedding. The document concludes that steganography is an important technique for securely transmitting confidential information, though proper security measures are still needed to fully conceal data from unauthorized parties.
This document describes an improvement made to the Advanced Encryption Standard (AES) algorithm for encrypting images. The AES algorithm is widely used but suffers from long encryption times, especially when processing large images. The authors implemented an improved version of AES using the VB.NET framework to address these issues. They eliminated the use of an encryption key, which reduced encryption time. Comparisons showed the improved AES encrypted a 1KB image 0.3 milliseconds on average, faster than other recent algorithms. The improvement successfully enhanced AES encryption speed for images.
An Efficient Code-word Substitution Method for Data Embedding Technique in Encrypted H.264/AVC Video Streams Anisha Jose – PG Scholar,
Anu K Kuriakose – Assistant Professor,
Department of Electronics and Communication,
Federal Institute of Science and Technology, Ernakulam, India
Improved Image Encryption for Real-Time Application over Wireless Communicati...ijeei-iaes
Advances in communication networks have enabled organization to send confidential data such as digital images over wireless networks. However, the broadcast nature of wireless communication channel has made it vulnerable to attack from eavesdroppers. We have developed a hybrid cryptography technique, and we present its application to digital images as a means of improving the security of digital image for transmission over wireless communication networks. The hybrid technique uses a combination of a symmetric (Data Encryption Standard) and asymmetric (Rivest Shamir Adleman) cryptographic algorithms to secure data to be transmitted between different nodes of a wireless network. Three different image samples of type jpeg, png and jpg were tested using this technique. The results obtained showed that the hybrid system encrypt the images with minimal simulation time, and high throughput. More importantly, there is no relation or information between the original images and their encrypted form, according to Shannon’s definition of perfect security, thereby making the system much more secure.
Conceptual design of edge adaptive steganography scheme based on advanced lsb...IAEME Publication
This document summarizes a research article that proposes a new edge adaptive steganography scheme based on an advanced LSB algorithm. The scheme adaptively selects edge regions in an image for data embedding based on the size of the secret message. For smaller messages, sharper edge regions are selected, while larger messages use more edge regions. It uses LSB matching revisited to embed bits while considering the relationship between image region characteristics and message size. The goal is to preserve higher visual quality in the stego image. Experimental results show the proposed technique achieves higher data hiding capacity and better image quality than some existing techniques.
Using SVD and DWT Based Steganography to Enhance the Security of Watermarked ...TELKOMNIKA JOURNAL
Watermarking is the process of embedding information into a carrier file for the protection of ownership/copyright of digital media, whilst steganography is the art of hiding information. This paper presents, a hybrid steganographic watermarking algorithm based on Discrete Wavelet Transform (DWT) and Singular Value Decomposition (SVD) transforms in order to enhance the security of digital fingerprint images. A facial watermark is embedded into fingerprint image using a method of singular value replacement. First, the DWT is used to decompose the fingerprint image from the spatial domain to the frequency domain and then the facial watermark is embedded in singular values (SV’s) obtained by application of SVD. In addition, the original fingerprint image is not required to extract the watermark. Experimental results provided demonstrate the methods robustness to image degradation and common signal processing attacks, such as histogram and filtering, noise addition, JPEG and JPEG2000 compression with various levels of quality.
Fog and Internet of Things Network Security through Blowfish CipherBRNSSPublicationHubI
This document proposes using the Blowfish encryption algorithm to secure data transmitted through fog computing networks for Internet of Things (IoT) devices. It first provides background on fog computing and its advantages over traditional cloud computing for IoT networks. It then describes how the Blowfish encryption algorithm works at a high level before proposing a system where data from IoT devices would be encrypted using Blowfish before being transmitted to fog nodes and cloud storage, and decrypted at the receiving end. The goal is to enhance security for IoT networks using the properties of fog computing along with strong encryption.
Lightweight digital imaging and communications in medicine image encryption f...TELKOMNIKA JOURNAL
Diagnosis in healthcare systems relies heavily on the use of medical images. Images such as X-rays, ultrasounds, computed tomography (CT) scans, magnetic resonance imaging (MRIs), and other scans of the brain and other internal organs of patients include private and personal information. However, these images are vulnerable to unauthorized users who unlawfully use them for non-diagnostic reasons due to the lack of security in communication routes and the gaps in the storage systems of hospitals or medical centers. Image encryption is a prominent technique used to protect medical images from unauthorized access in addition to enhancing the security of communication networks. In this paper, researchers offer a lightweight cryptosystem for the secure encryption of medical images that makes use of the present block cipher and a five-dimensional chaotic map. More than 25 images from the open science framework (OSF) public database of patients with coronavirus disease 2019 (COVID-19) were used to evaluate the proposed system. DICOM stands for “digital imaging and communications in medicine”. The efficiency of the proposed system is proved in terms of adjacent pixels’ correlation analysis, National Institute of Standards and Technology (NIST) analysis, mean square error, information entropy, unified average changing intensity, peak-to-signal noise ratio, entropy, and structure similarity index image.
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHMijcisjournal
Cryptography technology is a security technique used to change plain text to another shape of data or to symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey through public networks. Currently, there are many proposed algorithms that provide this service especially for sensitive data or very important conversations either through mobile or video conferences. In this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is compared to the AES. The algorithm has four different rounds for each quarter of the key container table, and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table are big.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
Cryptography technology is a security technique used to change plain text to another shape of data or to
symbols, which is known as the cipher text. Cryptography aims to keep the data secure during its journey
through public networks. Currently, there are many proposed algorithms that provide this service
especially for sensitive data or very important conversations either through mobile or video conferences. In
this paper, an inventive security symmetric algorithm is implemented and evaluated, and its performance is
compared to the AES. The algorithm has four different rounds for each quarter of the key container table,
and each of them serves to shift the table. The algorithm uses the XOR operation, which, being lightweight
and cheap, is very appropriate for use with Real Time Applications. The result shows that the suggested
algorithm spends less time than AES although it has 16 rounds and the numbers used to mix up the table
are big.
This document presents an adaptive steganography technique based on an enhanced cipher hiding method for secure data transfer. It combines cryptography and audio steganography. The secret message is first encrypted using a modified least significant bit algorithm and 2's complement operations. The encrypted data is then embedded into the least significant bits of an audio file. Keys are generated and sent with the stego audio to the receiver. The receiver uses the keys to extract the encrypted data from the audio and decrypt it back to the original message. The technique aims to provide better security for data transmission over unsecured networks by taking advantage of both cryptography and steganography.
Adaptive Steganography Based Enhanced Cipher Hiding Technique for Secure Data...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Improved method for image security based on chaotic-shuffle and chaotic-diffu...IJECEIAES
In this paper, we propose to enhance the security performance of the color image encryption algorithm which depends on multi-chaotic systems. The current cryptosystem utilized a pixel-chaotic-shuffle system to encode images, in which the time of shuffling is autonomous to the plain-image. Thus, it neglects to the picked plaintext and known-plaintext attacks. Also, the statistical features of the cryptosystem are not up to the standard. Along these lines, the security changes are encircled to make the above attacks infeasible and upgrade the statistical features also. It is accomplished by altering the pixel-chaotic-shuffle component and including another pixel-chaotic-diffusion system to it. The keys for diffusion of pixels are extracted from the same chaotic arrangements created in the past stage. The renovation investigations and studies are performed to exhibit that the refreshed version of cryptosystem has better statistical features and invulnerable to the picked plaintext and known plaintext attacks than the current algorithm.
APPLICATION OF DATA HIDING IN AUDIO-VIDEO USING ANTIN FORENSICS TECHNIQUE FOR...ijiert bestjournal
The document discusses applying data hiding in audio-video files using anti-forensics techniques for authentication and data security. It proposes using steganography, which is hiding secret information in carrier files like audio and video, combined with anti-forensics techniques. The system would hide encrypted data in the least significant bits of frames in audio-video files. Parameters like PSNR and histograms would be analyzed at the transmitter and receiver ends to authenticate the data and ensure security. Common steganography algorithms like LSB and AES encryption would be used. The system aims to provide a more secure way of transferring data between client and server compared to traditional passwords or encryption alone.
PERFORMANCE ANALYSIS OF TEXT AND IMAGE STEGANOGRAPHY WITH RSA ALGORITHM IN CL...ijseajournal
Cloud computing provides a lot of shareable resources payable on demand to the users. The drawback with
cloud computing is the security challenges since the data in the cloud are managed by third party. Steganography and cryptography are some of the security measures applied in the cloud to secure user data. The objective of steganography is to hide the existence of communication from the unintended users whereas cryptography does provide security to user data to be transferred in the cloud. Since users pay for
the services utilize in the cloud, the need to evaluate the performance of the algorithms used in the cloud to
secure user data in order to know the resource consumed by such algorithms such as storage memory, network bandwidth, computing power, encryption and decryption time becomes imperative. In this work, we implemented and evaluated the performance of Text steganography and RSA algorithm and Image steganography and RSA as Digital signature considering four test cases. The simulation results show that, image steganography with RSA as digital signature performs better than text steganography and RSA algorithm. The performance differences between the two algorithms are 10.76, 9.93, 10.53 and 10.53 seconds for encryption time, 60.68, 40.94, 40.9, and 41.85 seconds for decryption time, 8.1, 10.92, 15.2 and 5.17 mb for memory used when hiding data, 5.3, 1.95 and 17.18 mb for memory used when extracting data, 0.93, 1.04, 1.36 and 3.76 mb for bandwidth used, 75.75, 36.2, 36.9 and 37.45 kwh for processing power used when hiding and extracting data respectively. Except in test case2 where Text steganography and RSA algorithm perform better than Image Steganography and RSA as Digital Signature in terms of memory used when extracting data with performance difference of -5.09 mb because of the bit size of the image data when extracted. This research work recommend the use of image steganography and RSA as digital signature to cloud service providers and users since it can secure major data types such as text, image, audio and video used in the cloud and consume less system resources.
This document describes a novel algorithm for image steganography using discrete wavelet transformation on a Beagle Board-XM. The algorithm uses discrete wavelet transformation and a modified AES technique to encrypt and hide a secret payload image in the LH, HL, and HH subbands of a cover image. The discrete wavelet transformation decomposes the cover image into frequency subbands. The secret image is encrypted using a modified AES algorithm before being embedded. This approach aims to provide better image quality and increased security compared to other steganography methods. The algorithm is implemented using the Beagle Board-XM and Open CV for reduced processing delays, costs, and resource requirements.
ADAPTIVE WATERMARKING TECHNIQUE FOR SPEECH SIGNAL AUTHENTICATION ijcsit
Biometrics data recently has become a major role in determining the identity of the person. With such
importance for the use of biometrics data, there are many attacks that threaten the security and integrity of
biometrics data itself. Therefore, it becomes necessary to protect the originality of biometrics data against
manipulation and fraud. This paper presents an authentication technique to achieve the authenticity of
speech signals based on adaptive watermarking technique. The basic idea is depends on extracting the
speech features from the speech signal initially and then using these features as a watermark. The
watermark information embeds into the same speech signal. The short time energy technique is used to
identifying the suitable positions for embedding the watermark in order to avoid the regions that used in
the speech recognition system. After exclusion the important areas that used in speech recognition the
Genetic Algorithm (GA) is used to generate random locations to hide the watermark information in an
intelligent manner. The experimental results have achieved high efficiency in establishing the authenticity
of speech signal and the process of embedding
Ijaems apr-2016-24 A Brief study on Steganography techniques Author(s): INFOGAIN PUBLICATION
As there is a lot of advancement in the field of internet or communication technology, we have various means of storing, accessing and distribution of the data in the digital format. Due to the rapid advancement in this field has also introduced many challenges to the researchers to provide security to the information which is transmitted over the network. The digital information circulating over the network also includes the medical information. In order to provide security, confidentiality and integrity, the steganographic techniques can be employed. In the section 1, it gives the introduction about available hiding techniques; the section 2 explains the various steganography properties, the section 3 gives the types of steganographic techniques, the section 4 gives the applications of steganography, the section 5 gives the quality parameters to be measured for medical information, and the section 6 gives the steganographic algorithms available. Finally the section 7 concludes that to prevent unauthorized access steganography is the suitable technique.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
Similar to Encrypting an audio file based on integer wavelet transform and hand geometry (20)
Amazon products reviews classification based on machine learning, deep learni...TELKOMNIKA JOURNAL
In recent times, the trend of online shopping through e-commerce stores and websites has grown to a huge extent. Whenever a product is purchased on an e-commerce platform, people leave their reviews about the product. These reviews are very helpful for the store owners and the product’s manufacturers for the betterment of their work process as well as product quality. An automated system is proposed in this work that operates on two datasets D1 and D2 obtained from Amazon. After certain preprocessing steps, N-gram and word embedding-based features are extracted using term frequency-inverse document frequency (TF-IDF), bag of words (BoW) and global vectors (GloVe), and Word2vec, respectively. Four machine learning (ML) models support vector machines (SVM), logistic regression (RF), logistic regression (LR), multinomial Naïve Bayes (MNB), two deep learning (DL) models convolutional neural network (CNN), long-short term memory (LSTM), and standalone bidirectional encoder representations (BERT) are used to classify reviews as either positive or negative. The results obtained by the standard ML, DL models and BERT are evaluated using certain performance evaluation measures. BERT turns out to be the best-performing model in the case of D1 with an accuracy of 90% on features derived by word embedding models while the CNN provides the best accuracy of 97% upon word embedding features in the case of D2. The proposed model shows better overall performance on D2 as compared to D1.
Design, simulation, and analysis of microstrip patch antenna for wireless app...TELKOMNIKA JOURNAL
In this study, a microstrip patch antenna that works at 3.6 GHz was built and tested to see how well it works. In this work, Rogers RT/Duroid 5880 has been used as the substrate material, with a dielectric permittivity of 2.2 and a thickness of 0.3451 mm; it serves as the base for the examined antenna. The computer simulation technology (CST) studio suite is utilized to show the recommended antenna design. The goal of this study was to get a more extensive transmission capacity, a lower voltage standing wave ratio (VSWR), and a lower return loss, but the main goal was to get a higher gain, directivity, and efficiency. After simulation, the return loss, gain, directivity, bandwidth, and efficiency of the supplied antenna are found to be -17.626 dB, 9.671 dBi, 9.924 dBi, 0.2 GHz, and 97.45%, respectively. Besides, the recreation uncovered that the transfer speed side-lobe level at phi was much better than those of the earlier works, at -28.8 dB, respectively. Thus, it makes a solid contender for remote innovation and more robust communication.
Design and simulation an optimal enhanced PI controller for congestion avoida...TELKOMNIKA JOURNAL
This document describes using a snake optimization algorithm to tune the gains of an enhanced proportional-integral controller for congestion avoidance in a TCP/AQM system. The controller aims to maintain a stable and desired queue size without noise or transmission problems. A linearized model of the TCP/AQM system is presented. An enhanced PI controller combining nonlinear gain and original PI gains is proposed. The snake optimization algorithm is then used to tune the parameters of the enhanced PI controller to achieve optimal system performance and response. Simulation results are discussed showing the proposed controller provides a stable and robust behavior for congestion control.
Improving the detection of intrusion in vehicular ad-hoc networks with modifi...TELKOMNIKA JOURNAL
Vehicular ad-hoc networks (VANETs) are wireless-equipped vehicles that form networks along the road. The security of this network has been a major challenge. The identity-based cryptosystem (IBC) previously used to secure the networks suffers from membership authentication security features. This paper focuses on improving the detection of intruders in VANETs with a modified identity-based cryptosystem (MIBC). The MIBC is developed using a non-singular elliptic curve with Lagrange interpolation. The public key of vehicles and roadside units on the network are derived from number plates and location identification numbers, respectively. Pseudo-identities are used to mask the real identity of users to preserve their privacy. The membership authentication mechanism ensures that only valid and authenticated members of the network are allowed to join the network. The performance of the MIBC is evaluated using intrusion detection ratio (IDR) and computation time (CT) and then validated with the existing IBC. The result obtained shows that the MIBC recorded an IDR of 99.3% against 94.3% obtained for the existing identity-based cryptosystem (EIBC) for 140 unregistered vehicles attempting to intrude on the network. The MIBC shows lower CT values of 1.17 ms against 1.70 ms for EIBC. The MIBC can be used to improve the security of VANETs.
Conceptual model of internet banking adoption with perceived risk and trust f...TELKOMNIKA JOURNAL
Understanding the primary factors of internet banking (IB) acceptance is critical for both banks and users; nevertheless, our knowledge of the role of users’ perceived risk and trust in IB adoption is limited. As a result, we develop a conceptual model by incorporating perceived risk and trust into the technology acceptance model (TAM) theory toward the IB. The proper research emphasized that the most essential component in explaining IB adoption behavior is behavioral intention to use IB adoption. TAM is helpful for figuring out how elements that affect IB adoption are connected to one another. According to previous literature on IB and the use of such technology in Iraq, one has to choose a theoretical foundation that may justify the acceptance of IB from the customer’s perspective. The conceptual model was therefore constructed using the TAM as a foundation. Furthermore, perceived risk and trust were added to the TAM dimensions as external factors. The key objective of this work was to extend the TAM to construct a conceptual model for IB adoption and to get sufficient theoretical support from the existing literature for the essential elements and their relationships in order to unearth new insights about factors responsible for IB adoption.
Efficient combined fuzzy logic and LMS algorithm for smart antennaTELKOMNIKA JOURNAL
The smart antennas are broadly used in wireless communication. The least mean square (LMS) algorithm is a procedure that is concerned in controlling the smart antenna pattern to accommodate specified requirements such as steering the beam toward the desired signal, in addition to placing the deep nulls in the direction of unwanted signals. The conventional LMS (C-LMS) has some drawbacks like slow convergence speed besides high steady state fluctuation error. To overcome these shortcomings, the present paper adopts an adaptive fuzzy control step size least mean square (FC-LMS) algorithm to adjust its step size. Computer simulation outcomes illustrate that the given model has fast convergence rate as well as low mean square error steady state.
Design and implementation of a LoRa-based system for warning of forest fireTELKOMNIKA JOURNAL
This paper presents the design and implementation of a forest fire monitoring and warning system based on long range (LoRa) technology, a novel ultra-low power consumption and long-range wireless communication technology for remote sensing applications. The proposed system includes a wireless sensor network that records environmental parameters such as temperature, humidity, wind speed, and carbon dioxide (CO2) concentration in the air, as well as taking infrared photos.The data collected at each sensor node will be transmitted to the gateway via LoRa wireless transmission. Data will be collected, processed, and uploaded to a cloud database at the gateway. An Android smartphone application that allows anyone to easily view the recorded data has been developed. When a fire is detected, the system will sound a siren and send a warning message to the responsible personnel, instructing them to take appropriate action. Experiments in Tram Chim Park, Vietnam, have been conducted to verify and evaluate the operation of the system.
Wavelet-based sensing technique in cognitive radio networkTELKOMNIKA JOURNAL
Cognitive radio is a smart radio that can change its transmitter parameter based on interaction with the environment in which it operates. The demand for frequency spectrum is growing due to a big data issue as many Internet of Things (IoT) devices are in the network. Based on previous research, most frequency spectrum was used, but some spectrums were not used, called spectrum hole. Energy detection is one of the spectrum sensing methods that has been frequently used since it is easy to use and does not require license users to have any prior signal understanding. But this technique is incapable of detecting at low signal-to-noise ratio (SNR) levels. Therefore, the wavelet-based sensing is proposed to overcome this issue and detect spectrum holes. The main objective of this work is to evaluate the performance of wavelet-based sensing and compare it with the energy detection technique. The findings show that the percentage of detection in wavelet-based sensing is 83% higher than energy detection performance. This result indicates that the wavelet-based sensing has higher precision in detection and the interference towards primary user can be decreased.
A novel compact dual-band bandstop filter with enhanced rejection bandsTELKOMNIKA JOURNAL
In this paper, we present the design of a new wide dual-band bandstop filter (DBBSF) using nonuniform transmission lines. The method used to design this filter is to replace conventional uniform transmission lines with nonuniform lines governed by a truncated Fourier series. Based on how impedances are profiled in the proposed DBBSF structure, the fractional bandwidths of the two 10 dB-down rejection bands are widened to 39.72% and 52.63%, respectively, and the physical size has been reduced compared to that of the filter with the uniform transmission lines. The results of the electromagnetic (EM) simulation support the obtained analytical response and show an improved frequency behavior.
Deep learning approach to DDoS attack with imbalanced data at the application...TELKOMNIKA JOURNAL
A distributed denial of service (DDoS) attack is where one or more computers attack or target a server computer, by flooding internet traffic to the server. As a result, the server cannot be accessed by legitimate users. A result of this attack causes enormous losses for a company because it can reduce the level of user trust, and reduce the company’s reputation to lose customers due to downtime. One of the services at the application layer that can be accessed by users is a web-based lightweight directory access protocol (LDAP) service that can provide safe and easy services to access directory applications. We used a deep learning approach to detect DDoS attacks on the CICDDoS 2019 dataset on a complex computer network at the application layer to get fast and accurate results for dealing with unbalanced data. Based on the results obtained, it is observed that DDoS attack detection using a deep learning approach on imbalanced data performs better when implemented using synthetic minority oversampling technique (SMOTE) method for binary classes. On the other hand, the proposed deep learning approach performs better for detecting DDoS attacks in multiclass when implemented using the adaptive synthetic (ADASYN) method.
The appearance of uncertainties and disturbances often effects the characteristics of either linear or nonlinear systems. Plus, the stabilization process may be deteriorated thus incurring a catastrophic effect to the system performance. As such, this manuscript addresses the concept of matching condition for the systems that are suffering from miss-match uncertainties and exogeneous disturbances. The perturbation towards the system at hand is assumed to be known and unbounded. To reach this outcome, uncertainties and their classifications are reviewed thoroughly. The structural matching condition is proposed and tabulated in the proposition 1. Two types of mathematical expressions are presented to distinguish the system with matched uncertainty and the system with miss-matched uncertainty. Lastly, two-dimensional numerical expressions are provided to practice the proposed proposition. The outcome shows that matching condition has the ability to change the system to a design-friendly model for asymptotic stabilization.
Implementation of FinFET technology based low power 4×4 Wallace tree multipli...TELKOMNIKA JOURNAL
Many systems, including digital signal processors, finite impulse response (FIR) filters, application-specific integrated circuits, and microprocessors, use multipliers. The demand for low power multipliers is gradually rising day by day in the current technological trend. In this study, we describe a 4×4 Wallace multiplier based on a carry select adder (CSA) that uses less power and has a better power delay product than existing multipliers. HSPICE tool at 16 nm technology is used to simulate the results. In comparison to the traditional CSA-based multiplier, which has a power consumption of 1.7 µW and power delay product (PDP) of 57.3 fJ, the results demonstrate that the Wallace multiplier design employing CSA with first zero finding logic (FZF) logic has the lowest power consumption of 1.4 µW and PDP of 27.5 fJ.
Evaluation of the weighted-overlap add model with massive MIMO in a 5G systemTELKOMNIKA JOURNAL
The flaw in 5G orthogonal frequency division multiplexing (OFDM) becomes apparent in high-speed situations. Because the doppler effect causes frequency shifts, the orthogonality of OFDM subcarriers is broken, lowering both their bit error rate (BER) and throughput output. As part of this research, we use a novel design that combines massive multiple input multiple output (MIMO) and weighted overlap and add (WOLA) to improve the performance of 5G systems. To determine which design is superior, throughput and BER are calculated for both the proposed design and OFDM. The results of the improved system show a massive improvement in performance ver the conventional system and significant improvements with massive MIMO, including the best throughput and BER. When compared to conventional systems, the improved system has a throughput that is around 22% higher and the best performance in terms of BER, but it still has around 25% less error than OFDM.
Reflector antenna design in different frequencies using frequency selective s...TELKOMNIKA JOURNAL
In this study, it is aimed to obtain two different asymmetric radiation patterns obtained from antennas in the shape of the cross-section of a parabolic reflector (fan blade type antennas) and antennas with cosecant-square radiation characteristics at two different frequencies from a single antenna. For this purpose, firstly, a fan blade type antenna design will be made, and then the reflective surface of this antenna will be completed to the shape of the reflective surface of the antenna with the cosecant-square radiation characteristic with the frequency selective surface designed to provide the characteristics suitable for the purpose. The frequency selective surface designed and it provides the perfect transmission as possible at 4 GHz operating frequency, while it will act as a band-quenching filter for electromagnetic waves at 5 GHz operating frequency and will be a reflective surface. Thanks to this frequency selective surface to be used as a reflective surface in the antenna, a fan blade type radiation characteristic at 4 GHz operating frequency will be obtained, while a cosecant-square radiation characteristic at 5 GHz operating frequency will be obtained.
Reagentless iron detection in water based on unclad fiber optical sensorTELKOMNIKA JOURNAL
A simple and low-cost fiber based optical sensor for iron detection is demonstrated in this paper. The sensor head consist of an unclad optical fiber with the unclad length of 1 cm and it has a straight structure. Results obtained shows a linear relationship between the output light intensity and iron concentration, illustrating the functionality of this iron optical sensor. Based on the experimental results, the sensitivity and linearity are achieved at 0.0328/ppm and 0.9824 respectively at the wavelength of 690 nm. With the same wavelength, other performance parameters are also studied. Resolution and limit of detection (LOD) are found to be 0.3049 ppm and 0.0755 ppm correspondingly. This iron sensor is advantageous in that it does not require any reagent for detection, enabling it to be simpler and cost-effective in the implementation of the iron sensing.
Impact of CuS counter electrode calcination temperature on quantum dot sensit...TELKOMNIKA JOURNAL
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
In place of the commercial Pt electrode used in quantum sensitized solar cells, the low-cost CuS cathode is created using electrophoresis. High resolution scanning electron microscopy and X-ray diffraction were used to analyze the structure and morphology of structural cubic samples with diameters ranging from 40 nm to 200 nm. The conversion efficiency of solar cells is significantly impacted by the calcination temperatures of cathodes at 100 °C, 120 °C, 150 °C, and 180 °C under vacuum. The fluorine doped tin oxide (FTO)/CuS cathode electrode reached a maximum efficiency of 3.89% when it was calcined at 120 °C. Compared to other temperature combinations, CuS nanoparticles crystallize at 120 °C, which lowers resistance while increasing electron lifetime.
A progressive learning for structural tolerance online sequential extreme lea...TELKOMNIKA JOURNAL
This article discusses the progressive learning for structural tolerance online sequential extreme learning machine (PSTOS-ELM). PSTOS-ELM can save robust accuracy while updating the new data and the new class data on the online training situation. The robustness accuracy arises from using the householder block exact QR decomposition recursive least squares (HBQRD-RLS) of the PSTOS-ELM. This method is suitable for applications that have data streaming and often have new class data. Our experiment compares the PSTOS-ELM accuracy and accuracy robustness while data is updating with the batch-extreme learning machine (ELM) and structural tolerance online sequential extreme learning machine (STOS-ELM) that both must retrain the data in a new class data case. The experimental results show that PSTOS-ELM has accuracy and robustness comparable to ELM and STOS-ELM while also can update new class data immediately.
Electroencephalography-based brain-computer interface using neural networksTELKOMNIKA JOURNAL
This study aimed to develop a brain-computer interface that can control an electric wheelchair using electroencephalography (EEG) signals. First, we used the Mind Wave Mobile 2 device to capture raw EEG signals from the surface of the scalp. The signals were transformed into the frequency domain using fast Fourier transform (FFT) and filtered to monitor changes in attention and relaxation. Next, we performed time and frequency domain analyses to identify features for five eye gestures: opened, closed, blink per second, double blink, and lookup. The base state was the opened-eyes gesture, and we compared the features of the remaining four action gestures to the base state to identify potential gestures. We then built a multilayer neural network to classify these features into five signals that control the wheelchair’s movement. Finally, we designed an experimental wheelchair system to test the effectiveness of the proposed approach. The results demonstrate that the EEG classification was highly accurate and computationally efficient. Moreover, the average performance of the brain-controlled wheelchair system was over 75% across different individuals, which suggests the feasibility of this approach.
Adaptive segmentation algorithm based on level set model in medical imagingTELKOMNIKA JOURNAL
For image segmentation, level set models are frequently employed. It offer best solution to overcome the main limitations of deformable parametric models. However, the challenge when applying those models in medical images stills deal with removing blurs in image edges which directly affects the edge indicator function, leads to not adaptively segmenting images and causes a wrong analysis of pathologies wich prevents to conclude a correct diagnosis. To overcome such issues, an effective process is suggested by simultaneously modelling and solving systems’ two-dimensional partial differential equations (PDE). The first PDE equation allows restoration using Euler’s equation similar to an anisotropic smoothing based on a regularized Perona and Malik filter that eliminates noise while preserving edge information in accordance with detected contours in the second equation that segments the image based on the first equation solutions. This approach allows developing a new algorithm which overcome the studied model drawbacks. Results of the proposed method give clear segments that can be applied to any application. Experiments on many medical images in particular blurry images with high information losses, demonstrate that the developed approach produces superior segmentation results in terms of quantity and quality compared to other models already presented in previeous works.
Automatic channel selection using shuffled frog leaping algorithm for EEG bas...TELKOMNIKA JOURNAL
Drug addiction is a complex neurobiological disorder that necessitates comprehensive treatment of both the body and mind. It is categorized as a brain disorder due to its impact on the brain. Various methods such as electroencephalography (EEG), functional magnetic resonance imaging (FMRI), and magnetoencephalography (MEG) can capture brain activities and structures. EEG signals provide valuable insights into neurological disorders, including drug addiction. Accurate classification of drug addiction from EEG signals relies on appropriate features and channel selection. Choosing the right EEG channels is essential to reduce computational costs and mitigate the risk of overfitting associated with using all available channels. To address the challenge of optimal channel selection in addiction detection from EEG signals, this work employs the shuffled frog leaping algorithm (SFLA). SFLA facilitates the selection of appropriate channels, leading to improved accuracy. Wavelet features extracted from the selected input channel signals are then analyzed using various machine learning classifiers to detect addiction. Experimental results indicate that after selecting features from the appropriate channels, classification accuracy significantly increased across all classifiers. Particularly, the multi-layer perceptron (MLP) classifier combined with SFLA demonstrated a remarkable accuracy improvement of 15.78% while reducing time complexity.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Heap Sort (SS).ppt FOR ENGINEERING GRADUATES, BCA, MCA, MTECH, BSC STUDENTS
Encrypting an audio file based on integer wavelet transform and hand geometry
1. TELKOMNIKA Telecommunication, Computing, Electronics and Control
Vol. 18, No. 4, August 2020, pp. 2012~2017
ISSN: 1693-6930, accredited First Grade by Kemenristekdikti, Decree No: 21/E/KPT/2018
DOI: 10.12928/TELKOMNIKA.v18i4.14216 2012
Journal homepage: http://journal.uad.ac.id/index.php/TELKOMNIKA
Encrypting an audio file based on integer wavelet transform
and hand geometry
Zeena N. Al-Kateeb, Saja J. Mohammed
Department of Computer Science, College of Computer Science and Mathematics, University of Mosul, Iraq
Article Info ABSTRACT
Article history:
Received Sep 26, 2019
Revised Feb 17, 2020
Accepted Mar 18, 2020
A new algorithm suggested for audio file encryption and decryption utilizing
integer wavelet transform to take advantage of the property for adaptive
context-based lossless audio coding. In addition, biometrics are used to
give a significant level of classification and unwavering quality because
the procedure has numerous qualities and points of interest. The offered
algorithm utilized many properties of hand geometry estimations as keys to
encode and decode the audio file. Many tests were carried out on a set of audio
files and quality metrics such as mean square error and correlations were
calculated which in turn confirmed the efficiency and quality of the work.
Keywords:
An audio file
Decryption
Encryption,
Hand geometry
Integer wavelet transformation This is an open access article under the CC BY-SA license.
Corresponding Author:
Zeena N. Al-Kateeb,
Department of Computer Science,
College of Computer Science and Mathematics,
University of Mosul, Mosul, Iraq.
Email: zeenaalkateeb@yahoo.com, zeenaalkateeb@uomosul.edu.iq
1. INTRODUCTION
Data encryption has a great importance to preserve the real information from detection and forgery
and works on its non-visibility in all of its types. It considered a contributing factor in adding more protection
against reading, hearing, tampering or destruction. The techniques used to encode the information are differed,
also their methods evolved to reach as which it is currently. Because of the extraordinary improvement and the
electronic uprising, the concept of biometric information then it was introduced into secret data encryption
systems has emerged. This led to developing the concept of bio-encryption systems.
Cryptography is the ability and study of keeping significant data from disturber and hackers who try
to utilize them for forbidden usage. What's more, it might be characterized as a procedure that guarantees
the protection of the correspondence between the two gatherings [1, 2]. It chiefly includes two parts: encryption
and decryption. Encryption manages mixed the substance of a safe message to make it disjointed or
undecipherable for any unapproved individual or program. Where decryption is a process of converting
the encrypted message to its identical plaintext [3, 4].
The wavelet space is growing up rapidly. Wavelets have been adequately used as an amazing asset in
numerous various fields such as signal processing, star watching, and cryptography [5]. Integer wavelet
transform is a kind of wavelet transform that map integer data set with another integer data set, the significant
property of the integer wavelet transform (IWT) its coefficients have a similar dynamical range as the first
sign. This makes simpler usage contemplations in regards to the size of the factors to be utilized and the reaches
to accommodate in the coding calculation [6].
2. TELKOMNIKA Telecommun Comput El Control
Encrypting an audio file based on integer wavelet transform and hand geomatry (Zeena N. Al-Kateeb)
2013
Many encryption methods have appeared and many researchers have tried to develop new, modern
and novel ways to encrypt confidential data, such as [7], they used the RSA algorithm in a new way to encrypt
and decrypt audio files, in order to protect its confidential data. In [8] a voice encryption framework is created
as a real-time software application using advanced encryption standards (AES) to perform this cryptography.
Where [9] presented an application to encrypt audio and stereo data samples using single and double dimension
discrete-time chaotic systems were. To enhance security during encryption. [10] gives a complete presentation
about some of the existing cryptographic techniques and their performance for all data types chiefly audio files.
Some researchers have attempted to decrease audio encryption time by choosing parts of the audio
file carefully [11-13], where in [11] the audio files encrypted using the discrete fourier transform (DFT) to
encrypt lower frequency bands, and some researchers perform encoding by employing a shuffle stream cipher
[14]. In [15] the researchers try to use block cipher encryption system with (.wav) file. They mix block ciphers
and chaotic systems to encrypt speech file (.wav) using two of block cipher modes (CBC, CFB). Other scientists
utilized chaotic maps, [16] used deoxyribonucleic acid (DNA) encrypting rules and hybrid chaotic shift
transform (HCST) to perform a novel audio cryptosystem. Nishith Sinha, et al. Embedding encoded data in
the audio files, where the original text message encoded by updating Vigenère cipher, and using LSB encoding
to hide it into the cover audio, next, exposed the audio file to transposition utilizing of Blum Blum Shub
pseudo-random number generator [17].
2. UTILIZING BIOMETRIC TECHNOLOGIES
As of late, a new science (or term) is appeared, it is a concept of biometrics "Biometric technologies".
It is defined as a programmed strategies for verifying/or recognizing. Biometric technologies have grown
and used in different areas of life, the personality of a living individual depends on two types [18, 19]:
- Behavioral biometrics: It can be defined as a scale of human actions such as gait, signature. Behavioral
biometrics, measure human electrocardiograms also such as (ECG) signals which can employ in personality
recognition and authentication
- Physiological biometrics: It can be used to distinguish individual, from one to others, depending on are
the individual physical properties of such as hand geometry, fingerprint, odor, hand vein, ear, iris, palm
print, retina, face, voice, infrared thermogram and DNA.
Biometric technologies must meet the predetermined necessities to be useful and dependable [20, 21]:
Uniqueness: There are no two people who can have this property identically,
Availability: It means, that everyone has this characteristic or property,
Permanence: It means, this characteristic is stable and does not change by time’s factors or that it is slightly
affected by the time’s factors, then the template should be updated periodically,
Collectability: It means the adjective can be quantified by electronic sensors easily,
Performance: that means the use of characteristic gives accurate results at a good speed of distinction, and that
the material resources to use that attribute are available,
Acceptability: It means the collection of this property is accepted by the public and does not meet objections,
Resistance to Circumvent: It means the technology can resist the fraud tactics that hackers can use [20-22].
Biometric encryption systems are an important application of biometric technologies, It combins
the benefits of encryption and biometrics for exploiting the advantages of both [23]. Encryption provides high
levels of security, as well as provids biometrics with a non-disclaimer feature. All of these things saves our
efforts to protect the symbols and saves us from forgetting passwords problems. In biometric cryptosystems,
a cryptographic key is created from the biometric template for a client kept in the database so that the key can't
be found without a fruitful biometric validation [19, 24]. There are many domains deal with encryption and
steganography the audio signal, such as transform domain, temporal domain, and coded domain.
Encryption/steganography in transform domain gives greater security [25, 26]. Other researchers have also
suggested using chaotic and hyperchaotic systems in encryption to increase data security [27-40].
3. INTEGER WAVELET TRANSFORM OF AN AUDIO SIGNAL
Integer wavelet transform (IWT) is a type of discrete wavelet transform (DWT). It has a significant
property that making it better than (DWT), where IWT coefficients have the similar dynamical range as
the original signal. This facilitates the progress, especially, the considerations deal with the size of the variables
to be utilized, and the ranges to accommodate in the coding algorithm [41, 42]. IWT It is used as an efficient
transform that converts and rebuilds data without loss. This provides high efficiency of encryption systems and
makes the decoding process for data retrieval work with high accuracy [43-45].
3. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 2012 - 2017
2014
3.1. Audio file encryption using hand geometry
The proposed algorithm encrypt data of audio file in the frequency domain, where the algorithm first
converts the audio file from the spatial domain into the frequency domain using integer wavelet transform (IWT),
taking advantage of the characteristics and features of this transform, as mention above, the most important of
these properties is converts and rebuilds data without loss. Then the algorithm receives an image of a human hand
in order to deduce the geometry characteristics of its. The hand geometry features used as keys to encrypt
the audio file data. The extracting characteristics of the hand image are reaching to 50 characteristics, such as,
the width of the five fingers in three different regions, the finger lengths, some angles, reference points the and
width of the palm in two areas. We are noting, that the value of each property is a real value that has an integer
part and a fractional part, each part of them will be used as a separate key to encrypt audio data. The encryption
is applied to the integer wavelet transform (IWT) coefficient using the extracted bio_encryption keys. Next,
the IWT two parts are switched to increase randomness and complexity. Final, changes over the encrypted sound
from the frequency domain to the spatial domain and sent from the sender to receiver via the transport channel.
The encrypted message is received by an authorized person and similar activities are performed in reverse order
to get the confidential voice message. In Figure 1 is shown diagram illuminates the encryption and encryption of
the proposed algorithm. By using hand geometric properties in the encryption field, any audio file can be encoded
depending on the hand image of a specific client, that will give us protection, privacy and reliability. Besides, each
part of the audio file is encrypted.
Figure 1. Block diagram of the proposed algorithm
3.2. The steps of the proposed encryption algorithm
We can explain the steps of the proposed encryption algorithm as follows:
Input: Audio file, Hand image
Output: Encrypted audio file.
1. Begin
2. Find the hand properties which are 50 properties, each one of them is a real
number.
3. Split each feature value (say F) to two parts, E_key1 is the integer number of F
and E_key2 is an F fractional part. Note E_key1 and E_key2 must be [1-255]
4. Split the audio file into N of segments, where N is a number of the founded hand
properties.
5. Convert each segment to IWT which will be producing two other portions: CA and CD.
6. All CA segments encrypt by E_key1 and E_key2 depending on CD coefficients,
the following equation show that more clearly:
Encrypted CA = {
((CA ⊕ E_key1) ⊕ E_key2) if CD < 0
((CA ⊕ E_key2) ⊕ E_key1) if CD >= 0
7. Switching locations between the two segments (CA and CD) and usage IWT inverse to
convert the two segments of the special domain.
8. Reconstruct the signal by segment combination.
4. TELKOMNIKA Telecommun Comput El Control
Encrypting an audio file based on integer wavelet transform and hand geomatry (Zeena N. Al-Kateeb)
2015
9. Randomize the resulted signal to guarantee strong security.
10. Keep the encoded data in a new wave file, and send the resulted audio file to the
receiver side via a transmission channel.
11. End.
3.3. The proposed decryption algorithm
Input: Encrypted audio file, Hand image
Output: Decrypted audio file.
1. Begin
2. Find the hand properties, and split each value of them into two parts (D_key1 &
D_key2).
3. Reorganize the encoded audio data.
4. Split audio signal into N of segments, where N is a number of the founded hand
properties.
5. Convert each segment to IWT that will generate two parts: CA and CD.
6. Switching locations between the two segments (CA and CD).
7. Decrypt CA part using D_key1 with D_key2 depending on CD coefficients,
the following equation shows that more clearly:
Decrypted CA = {
((CA ⊕ D_key1) ⊕ D_key2) if CD < 0
((CA ⊕ D_key2) ⊕ D_key1) if CD >= 0
8. Use IWT inverse to convert the encoded segments of the special domain.
9. Collective all segments to construct the retrieved signal and play it.
10. End.
4. EXPERIMENTAL
Some metrics are calculated to measure the efficiency and quality of encryption and decoding
performance. These metrics are: the value of mean square error (Mse1) among the original audio file and
encrypted audio as well as the value of correlation among them (Corrl1). Also calculate the value of mean
square error (Mse2) and the value of the correlation (Corrl2) among the original audio file and decrypted audio.
Figure 2 explain the audio file before encryption then after encryption and last one after decryption process.
Where Table 1 shows the gotten results from applying the proposed algorithm on a set of different size of WAV
type audio files.
Figure 2. The audio file; (a) original sound, (b) encrypt sound, (c) decrypt sound
Table 1. Show the results gotten from the proposed algorithm on
a set of different size of WAV type audio files
File name Mse1 Corrl1 Mse2 Corrl2 File size
Auf 1.wav 0.008026188663009 6.900753870297950e-04 9.711840286945674e-36 1 16000×1
Auf 2.wav 0.043354788896016 -0.005671487632175 5.290580000000001e-04 0.986451026200484 16000×1
Auf 3.wav 0.003572735902461 -0.002034611144430 1.171953761837611e-35 1 32000×1
Auf 4.wav 0.008312414386621 -0.004513955165074 7.877442169342467e-36 1 24000×1
Auf 5.wav 0.008084075614115 0.007854030696005 5.540245934747540e-36 1 40000×1
Auf 6.wav 0.005824275896583 0.006411342208959 5.232360454380166e-37 1 16000×1
5. ISSN: 1693-6930
TELKOMNIKA Telecommun Comput El Control, Vol. 18, No. 4, August 2020: 2012 - 2017
2016
5. CONCLUSION
Due to the growth of information security technology and the fact that it has become a necessity of
life, and the introduction of the concept of biometric technology in all areas of life due to the power and
advantages of that technology, so the research suggested a system to encrypt important audio files and voice
messages using the characteristics of human hand geometry as a kind of Biometrics, 50 of these properties
were extracted and used as keys to encrypt the audio file, First, the audio file is divided into 50 segments,
according to the number of extracted properties. The algorithm suggested that encryption should be in
the frequency domain using the integer wavelet transform to increase the efficiency of the encryption algorithm
and to take advantage of the non-loss property of this transform. The quality measures that were calculated
shows the goodness of work, where the Mse1 between the original file and the encrypted file was a very small
value, and the correlation coefficient between them is also very small value, which indicates that the file is
encrypted in high quality. While the Mse2 between the original file and the retrieved file was very large value
in addition to the fact that the correlation coefficient has a value close to the one, which gives a clear indication
that the recovery process is done almost completely efficiently.
ACKNOWLEDGEMENTS
The authors are very grateful to the University of Mosul/College of Computer Science and
Mathematics for their provided facilities, which helped to improve the quality of this work.
REFERENCES
[1] S. F. Yousif, "Encryption and Decryption of Audio Signal Based on RSA Algorithm," International Journal of
Engineering Technologies and Management Research, vol. 5, pp. 57-64, July 2018.
[2] A. Chadha, et al., "Dual-Layer Video Encryption using RSA Algorithm," International Journal of Computer,
vol. 16, no. 1, pp. 33-40, April 2015.
[3] A.V. Prabu, et al., "Audio Encryption in Handsets," International Journal of Computer Applications, vol. 40, no. 6,
pp. 40-45, February 2012.
[4] E. O. Osaghae, "Replication of Ciphertext in Cryptographic System," Journal of Applied Sciences and Environmental
Management, vol. 22, no. 8, pp. 1193 –1197, August 2018.
[5] M. F. Tolba, et al., "Using Integer Wavelet Transforms in Colored Image-Steganography," International Journal on
Intelligent Cooperative Information Systems, vol. 4, no. 2, pp. 75-85, July 2004.
[6] R. Punidha and M. Sivaram, “Integer Wavelet Transform Based Approach for High Robustness of Audio Signal
Transmission," International Journal of Pure and Applied Mathematics, vol. 116, no. 23, pp. 295-304. Apr 2017.
[7] A. Gambhir and S. Khara, "Integrating RSA cryptography & audio steganography," 2016 International Conference on
Computing, Communication and Automation (ICCCA), Noida, pp. 481-484, 2016.
[8] A. Agarwal, et al., "Secured Audio Encryption Using AES Algorithm," International Journal of Computer Applications,
vol. 178, no. 22, pp. 29-33, June 2019.
[9] A. Akgül, et al., "An Audio Data Encryption with Single and Double Dimension Discrete-Time Chaotic Systems,"
The Online Journal of Science and Technology, vol. 5, pp. 14-23, July 2015.
[10] R. A. Gandhi and A. M. Gosai, "A Study on Current Scenario of Audio Encryption," International Journal of Computer
Applications, vol. 116, no. 7, pp. 13-17, April 2015.
[11] S. Sharma, et al., "Encryption of An Audio File on Lower Frequency Band for Secure Communication," International
Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, pp. 79-84, July 2013.
[12] B. Gadanayak, et al., "Comparative Study of Different Encryption Techniques on MP3 Compression," International
Journal of Computer Applications, vol. 26, no. 3, pp. 28-31, July 2011.
[13] B. Gadanayak, et al., "Secured Partial MP3 Encryption Technique," International Journal of Computer Science
and Information Technologies, vol. 2, pp.1584-1587, 2011.
[14] A. A. Tamimi and A. M. Abdalla, "An Audio Shuffle-Encryption Algorithm," Proceedings of the World Congress on
Engineering and Computer Science (WCECS 2014), vol. I, 2014.
[15] A. Mouafak, et al.” Apply new algorithm for chaotic Encryption using CBC&CFB,” Australian Journal of Basic
and Applied Sciences, vol. 7, no. 12, pp. 221-228, October 2013.
[16] S. J. Sheela, et al., "A Novel Audio Cryptosystem Using Chaotic Maps and DNA Encoding," Journal of Computer
Networks and Communications, vol. 2017, pp.12, August 2017.
[17] N. Sinha, et al., "Encrypted Information Hiding Using Audio Steganography and Audio Cryptography," International
Journal of Computer Applications, vol. 112, no. 5, pp. 49-53, February 2015.
[18] R. Gad and A. El-Sayed, "Multi-Biometric Systems: A State-of-the-Art Survey and Research Directions," International
Journal of Advanced Computer Science and Applications, vol. 6, no. 6, pp. 128-138, 2015.
[19] K. P. Singh, "Biometric based Network Security Using MIPS Cryptography Processor," International Conference
on Emerging & Futuristic Trends in Engineering & Technology, International Journal of Exploration in Engineering
and Technology, 2015.
[20] N. Radha and A. Kavitha, "Rank Level Fusion Using Fingerprint and Iris Biometrics," Indian Journal of Computer
Science and Engineering (IJCSE), vol. 2, no. 6, pp. 917-923, January 2012.
6. TELKOMNIKA Telecommun Comput El Control
Encrypting an audio file based on integer wavelet transform and hand geomatry (Zeena N. Al-Kateeb)
2017
[21] H. AlMahafzah, M. Z. Airwashdeh, "A Survey of Multibiometric Systems," International Journal of Computer
Applications, vol. 43, no. 15, pp. 36-43, April 2012.
[22] T. Kisasondi, et al., "Biometric Cryptography and Network Authentication," Journal of Information and Organizational
Sciences, vol. 31, no. 1, pp. 91-99, 2007.
[23] P. Arul and A. Shanmugam, "Generate a Key for AES Using Biometric for VOIP Network Security," Journal of
Theoretical and Applied Information Technology, vol. 5, no. 2, pp.107-112, 2009.
[24] S. J. Mohammed, "Using biometric watermarking for video file protection based on chaotic principle," International
Journal of Computer Science and Information Security (IJCSIS), vol. 15, no. 12, pp. 201-206, December 2017.
[25] Z. N. Al-Kateeb and M. R. Al-Bazaz, “Steganography in Colored Images Based on Biometrics,” Tikrit Journal of Pure
Science, vol. 24, no. 3, pp. 111-117, May 2019.
[26] F. Djebbar, et al., "Comparative Study of Digital Audio Steganography Techniques," EURASIP Journal on Audio,
Speech, and Music Processing, vol. 25, pp. 1-16, October 2012.
[27] S. F. Al-Azzawi and M. M. Aziz, “Chaos Synchronization of Nonlinear Dynamical Systems via a Novel Analytical
Approach,” Alexandria Engineering Journal, vol. 57, no. 4, pp. 3493-3500, December 2018.
[28] A. S. Al-Obeidi and S. F. Al-Azzawi, "Projective Synchronization for a Class of 6-D Hyperchaotic Lorenz System, "
Indonesian Journal of Electrical Engineering and Computer Science, vol. 16, no. 2, pp. 692-700, November 2019.
[29] A. S. Al-Obeidi and S. F. Al-Azzawi, “Complete Synchronization of a Novel 6-D Hyperchaotic Lorenz System with
Known Parameters,” International Journal of Engineering & Technology, vol. 7, no. 4, pp. 5345-5349, 2018.
[30] A. S. Al-Obeidi and S. F. Al-Azzawi, “Chaos Synchronization of a Class 6-D Hyperchaotic Lorenz System,” Modelling,
Measurement and Control B, vol. 88, no. 1, pp. 17-22, September 2019.
[31] S. F. Al-Azzawi and M. M. Aziz, "Strategies of Linear Feedback Control and its classification," TELKOMNIKA
Telecommunication Computing Electronics and Control, vol. 17, no. 4, pp. 1931-1940, August 2019.
[32] Z. Sh. Al-Talib, S. F. AL-Azzawi, “Projective and Hybrid Projective Synchronization of 4-D Hyperchaotic System via
Nonlinear Controller Strategy,” TELKOMNIKA Telecommunication Computing, Electronics and Control,
vol. 18, no 2, pp. 1012-1020, April 2020.
[33] S. Y. Al-Hayali and S. F. AL-Azzawi, “An Optimal Control for Complete Synchronization of 4D Rabinovich
Hyperchaotic Systems,” TELKOMNIKA Telecommunication Computing Electronics and Control, vol. 18, no 2,
pp. 994-1000, April 2020.
[34] S. Y. Al-Hayali and S. F. AL-Azzawi, “An Optimal Nonlinear Control For Anti-Synchronization of Rabinovich
Hyperchaotic System,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 1,
pp 379-386, July 2020.
[35] S. F. Al-Azzawi, “Stability and Bifurcation of Pan Chaotic System by Using Routh-Hurwitz and Gardan method,”
Applied Mathematics and Computation, vol. 219, no. 3, pp. 1144-1152, October 2012.
[36] M. M. Aziz and S. F. Al-Azzawi, “Anti-synchronization of Nonlinear Dynamical Systems Based on Gardano’s Method,”
Optik, vol. 134, pp. 109-120, April 2017.
[37] M. M. Aziz and S. F. Al-Azzawi, “Hybrid Chaos Synchronization Between Two Different Hyperchaotic Systems via
Two Approaches,” Optik, vol. 138, pp. 328-340, June 2017.
[38] A. S. Al-Obeidi and S. F. Al-Azzawi, “Chaos Synchronization in a 6-D Hyperchaotic System with Self-Excited
Attractor,” TELKOMNIKA Telecommunication, Computing, Electronics and Control, vol. 18, no 3, pp. 1483-1490,
June 2020.
[39] S. F. Al-Azzawi, et al., "Chaotic Lorenz System and it's Suppressed,” Journal of Advanced Research in Dynamical and
Control Systems, vol.12, no. 2, pp. 548-555, 2020.
[40] Z. Sh. Al-Talib and S. F. AL-Azzawi, “Projective Synchronization for 4D Hyperchaotic System Based on Adaptive
Nonlinear Control Strategy,” Indonesian Journal of Electrical Engineering and Computer Science, vol. 19, no. 2,
August 2020.
[41] Z. N. Al-Khateeb and S J. Mohammedand, “A Novel Approach for Audio File Encryption Using Hand Geometry,”
Multimedia Tools and Applications, March 2020.
[42] Z. N. Al-Khateeb, M. F. Jader, “Encryption and Hiding Text Using DNA Coding and Hyperchaotic System,” Indonesian
Journal of Electrical Engineering and Computer Science, vol. 19, no. 2, August 2020.
[43] C. D. G. Aneanu et al., "Integer Wavelet Transforms Based Lossless Audio Compression," Proceedings of
the IEEE-EURASIP Workshop on Nonlinear Signal and Image Processing (NSIP'99), Antalya, Turkey,
June 20-23, 1999.
[44] R. Punidha, "Integer Wavelet Transform Based Approach for High Robustness of Audio Signal Transmission,"
International Journal of Pure and Applied Mathematics, vol. 116, no. 23, pp. 295-304, 2017.
[45] S. Chakravarthy, et al. "Enhanced Playfair Cipher for Image Encryption Using Integer Wavelet Transform,"
Indian Journal of Science and Technology, vol. 9, no. 39, pp. 1-12, October 2016.