1) The document proposes a technique that allows cryptography and steganography to be combined by encrypting text data and hiding it within the least significant bits of pixels in an image.
2) It discusses using the Advanced Encryption Standard (AES) algorithm to encrypt the text before embedding it in the selected areas of an image.
3) For decryption, the receiver must know the correct encryption key in order to extract the hidden text from the stego-image and decrypt it back to the original plaintext.
A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSIONIJCNCJournal
This paper proposes a fractal-based image encryption algorithm which follows permutation-substitution structure to maintain confusion and diffusion properties. The scheme consists of three phases: key generation process; pixel permutation using the Knuth shuffle method; and the dynamic diffusion of scrambled image. A burning ship fractal function is employed to generate a secret key sequence which is further scanned using the Hilbert transformation method to increase the randomness. The chaotic behavior of the fractal strengthens the key sensitivity towards its initial condition. In the permutation phase, the Knuth shuffle method is applied to a noisy plain image to change the index value of each pixel. To substitute the pixel values, a dynamic diffusion is suggested in which each scrambled pixel change its value by using the current key pixel and the previously ciphered image pixel. To enhance the security of the cryptosystem, the secret key is also modified at each encryption step by performing algebraic transformations. The visual and numerical analysis demonstrates that the proposed scheme is reliable to secure transmission of gray as well as color images.
Convolutional Deep Belief Networks for Scalable Unsupervised Learning of Hier...Mad Scientists
Convolutional Deep Belief Networks for Scalable Unsupervised Learning of Hierarchical Representations, Honglak Lee(ICML 2009)
석사과정 세미나 발표를 위해 논문을 읽고 분석한 내용입니다. CDBN은 CNN와 DBN의 장점을 결합하여 translation invariance와 computational competence를 확보하였고, probabilistic max-pooling을 통해 image restoration을 할 수 있는 undirected DBM을 구성할 수 있게 합니다.
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
A FRACTAL BASED IMAGE CIPHER USING KNUTH SHUFFLE METHOD AND DYNAMIC DIFFUSIONIJCNCJournal
This paper proposes a fractal-based image encryption algorithm which follows permutation-substitution structure to maintain confusion and diffusion properties. The scheme consists of three phases: key generation process; pixel permutation using the Knuth shuffle method; and the dynamic diffusion of scrambled image. A burning ship fractal function is employed to generate a secret key sequence which is further scanned using the Hilbert transformation method to increase the randomness. The chaotic behavior of the fractal strengthens the key sensitivity towards its initial condition. In the permutation phase, the Knuth shuffle method is applied to a noisy plain image to change the index value of each pixel. To substitute the pixel values, a dynamic diffusion is suggested in which each scrambled pixel change its value by using the current key pixel and the previously ciphered image pixel. To enhance the security of the cryptosystem, the secret key is also modified at each encryption step by performing algebraic transformations. The visual and numerical analysis demonstrates that the proposed scheme is reliable to secure transmission of gray as well as color images.
Convolutional Deep Belief Networks for Scalable Unsupervised Learning of Hier...Mad Scientists
Convolutional Deep Belief Networks for Scalable Unsupervised Learning of Hierarchical Representations, Honglak Lee(ICML 2009)
석사과정 세미나 발표를 위해 논문을 읽고 분석한 내용입니다. CDBN은 CNN와 DBN의 장점을 결합하여 translation invariance와 computational competence를 확보하였고, probabilistic max-pooling을 통해 image restoration을 할 수 있는 undirected DBM을 구성할 수 있게 합니다.
A novel secure image steganography method based on chaos theory in spatial do...ijsptm
This paper presents a novel approach of building a secure data hiding technique in digital images. The
image steganography technique takes the advantage of limited power of human visual system (HVS). It uses
image as cover media for embedding secret message. The most important requirement for a steganographic
algorithm is to be imperceptible while maximizing the size of the payload. In this paper a method is
proposed to encrypt the secret bits of the message based on chaos theory before embedding into the cover
image. A 3-3-2 LSB insertion method has been used for image steganography. Experimental results show a
substantial improvement in the Peak Signal to Noise Ratio (PSNR) and Image Fidelity (IF) value of the
proposed technique over the base technique of 3-3-2 LSB insertion.
Implementation of Image Steganography Using 2-Level DWT Technique .............................................1
Aayushi Verma, Rajshree Nolkha, Aishwarya Singh and Garima Jaiswal
Efficient Neighbor Routing in Wireless Mesh Networks.......................................................................1
V. Lakshmi Praba and A. Mercy Rani
Content Based Messaging Model for Library Information System........................................................1
Surbhi Agarwal, Chandrika Chanda and Senthil Murugan B.
Building an Internal Cloud for IT Support Organisations: A Preview .....................................................1
S. M. M. M Kalyan Kumar and Dr S. C. Pradhan
Use of Intelligent Business, a Method for Complete Fulfillment of E-government ................................1
M. Nili Ahmadabadi, Masoud Najafi and Peyman Gholami
Comparison of Swarm Intelligence Techniques ...................................................................................1
Prof. S. A. Thakare
An Efficient Rough Set Approach in Querying Covering Based Relational Databases.............................1
P. Prabhavathy and Dr. B. K. Tripathy
STEGANOGRAPHIC SUBSTITUTION OF THE LEAST SIGNIFICANT BIT DETERMINED THROUGH A...ijcsit
ABSTRACT
The present workproposes to perform an analysis of the similarities between the least significant two bits of the cover image and multiple series of two-bit-length encrypted frames, all of them from the cryptomessage. After finding the most similar frame, we proceed to substitute it into the cover image; nevertheless, to provide a proof of the improvement from using itor the least similar one, the statistics from both cases are obtained.Providing information that the more similar the frame is, the better statistics the stego-image has. Moreover, the statistics obtained from our work are also compared with other works, finding that we provide a good scheme for hiding information.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
In this paper, a fruit image data set is used to compare the efficiency and accuracy of two widely used Convolutional Neural Network, namely the ResNet and the DenseNet, for the recognition of 50 different kinds of fruits. In the experiment, the structure of ResNet-34 and DenseNet_BC-121 (with bottleneck layer) are used. The mathematic principle, experiment detail and the experiment result will be explained through comparison.
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSICS Design
Advanced Encryption Standard (AES) Algorithm has been extensively applied in the present financial
applications. Sub-channel attacks are one of the main problems occurred n the AES Algorithm.
Asynchronous AES Architecture is one of the leading solutions of the sub-channel attacks due to its natural
properties. The AES architecture with the enhanced mix column to be proposed with reduced number of
transistor counts.. Then, the Verilog A modeling is used to evaluate the performance of the proposed AES
Architecture. Finally, the VLSI Implementations of the AES Processor is implemented with CMOS
technology 0.25 µm. By using the net list generations, the proposed AES Architecture is analyzed regarding
the VLSI design environment. The simulation results of the proposed structure are performed with the
minimum number of transistor counts as well as power utilizations. Moreover, the proposed CMOS
technology based AES Algorithm is integrated into the backend based chip technology.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
Soft computing based cryptographic technique using kohonen's selforganizing m...ijfcstjournal
In this paper a novel soft computing based cryptographic technique based on synchronization of two
Kohonen's Self-Organizing Feature Map (KSOFM) between sender and receiver has been proposed. In this
proposed technique KSOFM based synchronization is performed for tuning both sender and receiver. After
the completion of the tuning identical session key get generates at the both sender and receiver end with the
help of synchronized KSOFM. This synchronized network can be used for transmitting message using any
light weight encryption/decryption algorithm with the help of identical session key of the synchronized
network. Exhaustive parametric tests are done and results are compared with some existing classical
techniques, which show comparable results for the proposed system.
The paper proposes a new image encryption scheme based on chaotic encryption. It provides a fast
encryption algorithm based on coupled chaotic map. The image is encrypted using a pseudorandom key
stream generator. The image is partially encrypted by selecting most important components of image. To
obtain most important components of an image, discrete wavelet transform is applied.
This presentation consists of Authenticated Encryption Decryption Scheme Project Idea, implementation and complete information. This Presentation was given at VLSI DESIGN CONFERENCE 2016 in Kolkata.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
An authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
The graphical-password approach is sometimes called graphical user authentication (GUI).
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Ppt for graphical password authentication using cued click pointsHari Krishnan
this ppt will give you more information abt. graphical password authentication using cued click points.
email id: harikrishnan89@yahoo.co.in
download and edit it..the upload had some problem with fonts.
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
In this paper, a fruit image data set is used to compare the efficiency and accuracy of two widely used Convolutional Neural Network, namely the ResNet and the DenseNet, for the recognition of 50 different kinds of fruits. In the experiment, the structure of ResNet-34 and DenseNet_BC-121 (with bottleneck layer) are used. The mathematic principle, experiment detail and the experiment result will be explained through comparison.
VLSI ARCHITECTURE FOR NANO WIRE BASED ADVANCED ENCRYPTION STANDARD (AES) WITH...VLSICS Design
Advanced Encryption Standard (AES) Algorithm has been extensively applied in the present financial
applications. Sub-channel attacks are one of the main problems occurred n the AES Algorithm.
Asynchronous AES Architecture is one of the leading solutions of the sub-channel attacks due to its natural
properties. The AES architecture with the enhanced mix column to be proposed with reduced number of
transistor counts.. Then, the Verilog A modeling is used to evaluate the performance of the proposed AES
Architecture. Finally, the VLSI Implementations of the AES Processor is implemented with CMOS
technology 0.25 µm. By using the net list generations, the proposed AES Architecture is analyzed regarding
the VLSI design environment. The simulation results of the proposed structure are performed with the
minimum number of transistor counts as well as power utilizations. Moreover, the proposed CMOS
technology based AES Algorithm is integrated into the backend based chip technology.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
TEXT STEGANOGRAPHY USING LSB INSERTION METHOD ALONG WITH CHAOS THEORYIJCSEA Journal
The art of information hiding has been around nearly as long as the need for covert communication. Steganography, the concealing of information, arose early on as an extremely useful method for covert information transmission. Steganography is the art of hiding secret message within a larger image or message such that the hidden message or an image is undetectable; this is in contrast to cryptography, where the existence of the message itself is not disguised, but the content is obscure. The goal of a steganographic method is to minimize the visually apparent and statistical differences between the cover data and a steganogram while maximizing the size of the payload. Current digital image steganography presents the challenge of hiding message in a digital image in a way that is robust to image manipulation and attack. This paper explains about how a secret message can be hidden into an image using least significant bit insertion method along with chaos.
Information Hiding using LSB Technique based on Developed PSO Algorithm IJECEIAES
Generally, The sending process of secret information via the transmission channel or any carrier medium is not secured. For this reason, the techniques of information hiding are needed. Therefore, steganography must take place before transmission. To embed a secret message at optimal positions of the cover image under spatial domain, using the developed particle swarm optimization algorithm (Dev.-PSO) to do that purpose in this paper based on Least Significant Bits (LSB) using LSB substitution. The main aim of (Dev. -PSO) algorithm is determining an optimal paths to reach a required goals in the specified search space based on disposal of them, using (Dev.-PSO) algorithm produces the paths of a required goals with most efficient and speed. An agents population is used in determining process of a required goals at search space for solving of problem. The (Dev.-PSO) algorithm is applied to different images; the number of an image which used in the experiments in this paper is three. For all used images, the Peak Signal to Noise Ratio (PSNR) value is computed. Finally, the PSNR value of the stego-A that obtained from blue sub-band colo is equal (44.87) dB, while the stego-B is equal (44.45) dB, and the PSNR value for the stego-C is (43.97)dB, while the vlue of MSE that obtained from the same color subbans is (0.00989), stego-B equal to (0.01869), and stego-C is (0.02041). Furthermore, our proposed method has ability to survive the quality for the stego image befor and after hiding stage or under intended attack that used in the existing paper such as Gaussian noise, and salt & pepper noise.
Soft computing based cryptographic technique using kohonen's selforganizing m...ijfcstjournal
In this paper a novel soft computing based cryptographic technique based on synchronization of two
Kohonen's Self-Organizing Feature Map (KSOFM) between sender and receiver has been proposed. In this
proposed technique KSOFM based synchronization is performed for tuning both sender and receiver. After
the completion of the tuning identical session key get generates at the both sender and receiver end with the
help of synchronized KSOFM. This synchronized network can be used for transmitting message using any
light weight encryption/decryption algorithm with the help of identical session key of the synchronized
network. Exhaustive parametric tests are done and results are compared with some existing classical
techniques, which show comparable results for the proposed system.
The paper proposes a new image encryption scheme based on chaotic encryption. It provides a fast
encryption algorithm based on coupled chaotic map. The image is encrypted using a pseudorandom key
stream generator. The image is partially encrypted by selecting most important components of image. To
obtain most important components of an image, discrete wavelet transform is applied.
This presentation consists of Authenticated Encryption Decryption Scheme Project Idea, implementation and complete information. This Presentation was given at VLSI DESIGN CONFERENCE 2016 in Kolkata.
Using this software any 50 sec audio message can be decrypted into image file and then original message can again be recovered from image file. This project is coded in Matlab and gui is also built in Matlab.
An authentication system that works by having the user select from images, in a specific order, presented in a graphical user interface (GUI).
The graphical-password approach is sometimes called graphical user authentication (GUI).
This is a project dealing with securing images over a network.
Image is a delicate piece of information shared between clients across the world.Cryptography plays a huge role during secure connections.Applying simple Gaussian elimination to achieve highly secured image encryption decryption technique is a interesting challenge.
Ppt for graphical password authentication using cued click pointsHari Krishnan
this ppt will give you more information abt. graphical password authentication using cued click points.
email id: harikrishnan89@yahoo.co.in
download and edit it..the upload had some problem with fonts.
Cryptography is the science of using mathematics to encrypt and decrypt data.
Cryptography enables you to store sensitive information or transmit it across insecure networks so that it cannot be read by anyone except the intended recipient.
A New Approach of Cryptographic Technique Using Simple ECC & ECFIJAEMSJORNAL
Cryptography is the technique in which usually a file is converted into unreadable format by using public key and private key system called as public key cryptosystem. Then as per the user requirement that file is send to another user for secure data transmission. In this paper we purposed an image based cryptography that Elliptic Curve Function (ECF) techniques and pseudo random encoding technique on images to enhance the security of RFID communication. In the ECF approach, the basic idea is to replace the Elliptic Curve Function (ECF) of the cover image with the Bits of the messages to be hidden without destroying the property of the cover image significantly. The ECF based technique is the most challenging one as it is difficult to differentiate between the cover object and Crypto object if few ECF bits of the cover object are replaced. In Pseudo Random technique, a random key is used as seed for the Pseudo Random Number Generator in needed in the embedding process. Both the techniques used a Crypto key while embedding messages inside the cover image. By using the key, the chance of getting attacked by the attacker is reduced.
Steganography is the technique of hiding the fact that communication is taking place,by hiding data in other data. Many different carrier file formats such as image, audio, video, DNA etc can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in images, there exist a large variety of steganographic techniques. In this paper different steganographic techniques are described.
Steganography is the technique of hiding the fact that communication is taking place,
by hiding data in other data. Many different carrier file formats can be used, but digital images
are the most popular because of their frequency on the Internet. For hiding secret information in
images, there exist a large variety of steganographic techniques. Steganalysis, the detection of this
hidden information, is an inherently difficult problem.In this paper,I am going to cover different
steganographic techniques researched by different researchers.
Keywords — Cryptography, Steganography, LSB, Hash-LSB, RSA Encryption –Decryption
In recent years the topic of steganography has become
very popular and a lot of research is being done in this field.
Reversible data hiding is a method in which the image in which
the encrypted data is hidden is losslessly recovered. In this paper
we have proposed such a method that the previous work done
limitations can be overcome. In this paper, we embed the
encrypted data in the image by using LSB matching technique for
reserving room, so that fast, optimal and lossless steganography
is achieved. The proposed method provides total reversibility,
that is, data extraction and image recovery.
Reversible data hiding in encrypted images by reserving room before encryptionIEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Secure Image Transmission for Cloud Storage System Using Hybrid SchemeIJERD Editor
- Data over the cloud is transferred or transmitted between servers and users. Privacy of that
data is very important as it belongs to personal information. If data get hacked by the hacker, can be
used to defame a person’s social data. Sometimes delay are held during data transmission. i.e. Mobile
communication, bandwidth is low. Hence compression algorithms are proposed for fast and efficient
transmission, encryption is used for security purposes and blurring is used by providing additional
layers of security. These algorithms are hybridized for having a robust and efficient security and
transmission over cloud storage system.
Reversible Data Hiding in Encrypted color images by Reserving Room before Enc...ijceronline
International Journal of Computational Engineering Research (IJCER) is dedicated to protecting personal information and will make every reasonable effort to handle collected information appropriately. All information collected, as well as related requests, will be handled as carefully and efficiently as possible in accordance with IJCER standards for integrity and objectivity.
A New hybrid method in watermarking using DCT and AESIJERD Editor
In this paper I'm trying to make a combination between the encryption by using one of the most
powerful algorithm called Advanced Encryption Standard (AES) to encrypt a secret message another word logo
and then embed it in the digital image in frequency domain by using the Discrete Cosine Transform (DCT) in
low frequency to increase the robustness and then applying some attacks to check it.
AN ENHANCED SEPARABLE REVERSIBLE DATA HIDING IN ENCRYPTED IMAGES USING SIDE M...Editor IJMTER
This paper proposes a scheme for Enhanced Separable Reversible Data Hiding in
Encrypted images Using Side Match. In the first step the original image is encrypted using an
encryption key. Then additional data is embedded into the image by modifying a small portion of the
encrypted image using a data hiding key. With an encrypted image containing additional data, if a
receiver has the data hiding key, he can extract the additional data. If the receiver has the encryption
key, he can decrypt the image, but cannot extract the additional data. If the receiver has both the data
hiding key and encryption key, he can extract the additional data and recover the original content by
exploiting the spatial correlation in natural images. The accuracy of data extraction is improved by
using a better scheme for measuring the smoothness of the received image, and uses the Side Match
scheme to further decrease the error rate of extracted bits.
Exploring the Experiences of Gender-Based Violence
and The Associated Psychosocial and Mental Health
Issues of Filipino HIV-Positives: Implications for
Psychological Practice
Evangeline R Castronuevo-Ruga1, Normita A Atrillano2
Abstract: The phenomenon of gender-based violence has generated attention from research practitioners and helping professionals since
the surge of the women’s movement three or so decades ago in the Philippines. At about the same time, the HIV-AIDS gained similar
attention with the disclosure of the first ever case of the country in the mid-80s. Only recently, however, has the intersectionality of these
two phenomena been looked into by the research community in other countries and has yet to see parallel response locally. This research,
therefore, attempts to map out the lived experiences of People Living with Human Immuno Deficiency Virus (PLHIV) who have undergone
gender-based violence (GBV). It specially looks into the consequent psychosocial and mental health issues. Using focus group discussion with
24 purposively sampled participants from the highly vulnerable groups based in three major Philippine cities, thematic analysis reveals that
the participants experienced various forms of gender-based violence, e.g., sexual, emotional/psychological, economic, verbal, physical) and
expressions of stigma and discrimination, which in turn, led to manifestations of different emotional and psychological trauma, depression,
internalized homophobia, greater health risks and risk-taking behaviours, among others. It might be worthwhile to consider the possibility
that the consequent risk-taking and self-injurious tendencies played a role in their eventual contraction of HIV.
Estimation of Storage-Draft Rate Characteristics of
Rivers in Selangor Region
Farah Syazana Abd Latif1, Siti Fatin Mohd Razali2
1,2Faculty of Engineering & Built Environment, Universiti Kebangsaan Malaysia
Abstract: Drought is a phenomenon of extreme water shortage that has significant economic, social, environmental and human life
impact. Streamflow drought characteristics and properties are useful in the design of hydro-technical projects, water resources planning and
management purposes. Information on low flow magnitude, frequency, probability and return period are very crucial in analysing
streamflow drought at the operational level in public water supply. The objectives of this study are to determine the characteristics of low
flow for every streamflow station in the Selangor region. The estimation of minimum storage draft-rate with the probability of low flow
return periods of 2, 5, 10, 20, and 50 years is presented in this paper.
Awwal-Awwal Tampat Budjang Journey Back to
Pre-Islamic Epoch: A Cultural Semiotic
Helen G Juaini1
Abstract: Cultural background plays a significant role in the sphere of semiotics. Semiotics as a discipline is recognized as a useful tool in
gauging cultural background and identifying signs that might represent the message of a certain work. Given the rich cultural context of
Tawi-Tawi oral literature this can be used in studying semiotics. Semiotic tools were employed to interpret the awwal-awwal as provided by
the respondents and to formulate a subsequent understanding of this oral literature in relation to the Sama’s claim of sacredness of Tampat
Budjang.
Politeness and Intimacy in Application Letters of
Three Cultural Groups in Mindanao
Helen G Juaini1
Abstract: 150 application letters from the three cultural groups in Mindano, namely Sinama, Subanen, and Tausug have been analysed
in a mixed-method design. The focus of the study is on the two features of politeness and intimacy. In the quantitative analysis, the model
proposed by Brown & Levinson (1987) and that of Columns (2005) which have drawn upon the features of indirectness in requesting and
the length of letters as the indicators of politeness are used. In the qualitative and descriptive analysis formality in salutation and opening
clause as well as the use of abbreviated forms are taken into account. The result shows that Tausug use the politest style in their application
letters, followed by Sinama and Subanen respectively. On the other hand, Sinama, Subanen, and Tausug use the least intimate style in their
business letters. The findings are hoped to help better inter-cultural understanding, especially with respect to written rhetorical
characteristics.
New Authentication Algorithm for IoT Environment
based on Non-Commutative Algebra and Its
Implementation
Maki Kihara1, Satoshi Iriyama2
1,2Tokyo University of Science
Abstract: Recently, IoT devices such as robots, speakers, domestic electrical appliances and smart devices are provided everywhere for
everyone. While their authentication request is quite ubiquitously, namely, an authentication for sharing services, the actual
implementations are patchy schemes of variety security policies. In this study, we propose the new authentication scheme for IoT devices
without certificate authority which is fast enough as well as secure. The verification algorithm is based on suitable ciphered metric. We
define a class of such verifiable encryption and give an example for authentication. Moreover, we show the implementation which keeps
perfect secrecy by means of Shannon’s theory.
Developing a Strategic Organisational Learning
Framework to Improve Caribbean Disaster
Management Performance
Joanne Persad1
Abstract: Disasters are social constructs and require an agility and adaptability from national disaster organisations (NDOs). The
environment in which NDOs operate are complex adaptive systems environment, and organisational learning as a key approach is considered
fundamental to strengthening the ability of an NDO to perform at its best. With the potential for loss of lives, the destruction of critical
infrastructure and housing and to the risk of setting back a country’s economic development by many years, learning from the lessons of the
past, to reduce the negative impacts is critical for the onward growth of Caribbean countries which, for the most part, are small island
developing states. The Caribbean Region is the one of the most hazard prone regions in the world (Walbrent College 2012). Lessons from
disaster impacts are identified, gaps are well documented, and failures are sometimes exposed. But learning, in terms of making changes to
improve systems, performance and resilience, is questionable. The lessons must be applied for change to occur, this is part of the knowledge
management process in the context of disaster organisations. The purpose of this study is to explore the apparent inability of national
disaster organizations in the Caribbean to apply the lessons learnt from previous disasters. Three (3) Caribbean countries have been selected
for this research. It is a multiple case study where the unit of analysis is the national disaster organisation. This study is based on an
interpretive paradigm.
Combating Climate Change and Land Degradation in
The West African Sahel: A Multi-Country Study of
Mali, Niger and Senegal
S A Igbatayo1
1Head, Department of Economics & Management Studies, AFE Babalola University, Nigeria
Abstract: The West African Sahel is a vast ecological zone separating the Sahara Desert to the north and Sudanian savannah to the
south; traversing Senegal, Mali, Burkina Faso, Niger, northern Nigeria and Chad. With a population estimated at more than 60 million
people, the region features a multiplicity of development challenges. It is home to some of the world’s most impoverished people, whose
livelihoods are mostly reliant on rain-fed agriculture. Characterized by semi-arid vegetation, the West African Sahel is one of the most
environmentally degraded ecosystems in the world. The region faces severe and recurring bouts of droughts since the 1980s, jeopardizing
environmental sustainability. During the past four decades, the West African Sahel has witnessed below-average annual precipitation, with
two severe drought periods in 1972-1973 and 1983–1984, in a development that undermined agricultural productivity and spawned
severe land degradation. Various studies have predicted even more severe climate variability and change in the region, with drier and more
frequent dry periods expected. The intergovernmental Panel on climate change (IPCC, 2007) revealed a decline in annual rainfall in West
Africa since the end of the 1960s, with a reduction of 20% to 40% observed in the periods 1931-1960 and 1968–1990. Repeated
droughts, fuelled by climate change, have undermined land productivity, turning arable soils into marginal lands, and rendering land
resources vulnerable to such anthropogenic activities as over-grazing, agricultural intensification and deforestation, which are common
practices across the region. The major objective of this paper is to shed light on climate change and land degradation patterns in the West
African Sahel. It employs empirical data to analyse the trends, with particular emphasis on Mali, Niger and Senegal. The study reveals
considerable threats posed by the twin scourges of climate change and land degradation to food security, environmental sustainability and
regional stability.
Combating Climate Change and Land Degradation in
The West African Sahel: A Multi-Country Study of
Mali, Niger and Senegal
S A Igbatayo1
1Head, Department of Economics & Management Studies, AFE Babalola University, Nigeria
Abstract: The West African Sahel is a vast ecological zone separating the Sahara Desert to the north and Sudanian savannah to the
south; traversing Senegal, Mali, Burkina Faso, Niger, northern Nigeria and Chad. With a population estimated at more than 60 million
people, the region features a multiplicity of development challenges. It is home to some of the world’s most impoverished people, whose
livelihoods are mostly reliant on rain-fed agriculture. Characterized by semi-arid vegetation, the West African Sahel is one of the most
environmentally degraded ecosystems in the world. The region faces severe and recurring bouts of droughts since the 1980s, jeopardizing
environmental sustainability. During the past four decades, the West African Sahel has witnessed below-average annual precipitation, with
two severe drought periods in 1972-1973 and 1983–1984, in a development that undermined agricultural productivity and spawned
severe land degradation. Various studies have predicted even more severe climate variability and change in the region, with drier and more
frequent dry periods expected. The intergovernmental Panel on climate change (IPCC, 2007) revealed a decline in annual rainfall in West
Africa since the end of the 1960s, with a reduction of 20% to 40% observed in the periods 1931-1960 and 1968–1990. Repeated
droughts, fuelled by climate change, have undermined land productivity, turning arable soils into marginal lands, and rendering land
resources vulnerable to such anthropogenic activities as over-grazing, agricultural intensification and deforestation, which are common
practices across the region. The major objective of this paper is to shed light on climate change and land degradation patterns in the West
African Sahel. It employs empirical data to analyse the trends, with particular emphasis on Mali, Niger and Senegal. The study reveals
considerable threats posed by the twin scourges of climate change and land degradation to food security, environmental sustainability and
regional stability. It also presents a policy framework underpinned by climate change mitigation and adaptation strategies, formalizing land
rights for farmers, subsidizing farm inputs, creating grazing reserves for pastoralists and deepening poverty reduction strategies.
A Study on Factor Affecting Textile
Entrepreneurship – A Special Emphasis on Tirupur
District
P Anbuoli1
1Assistant Professor, Department of Business Administration, Mannar Thirumalai Naicker College, India
Abstract: Entrepreneurial success depends on various factors associated with the business, the entrepreneurs’ wishes to start. Entrepreneurs
need some sort of inspirations to succeed in their business ventures. Being a versatile industry, textile attracts many entrepreneurs both urban
and rural peoples and requires minimal investment to start. Textile entrepreneurs have to face several challenges and prospects associated
with their business. This study has been commenced with the objectives to check demographic profile, factors affecting textile entrepreneurs,
encouragement of external factors and personal reason behind to become textile business entrepreneurs. This study has been carried out with
100 textile entrepreneurs; the sample has been selected by using simple random sampling. This study is also carried out with non-disguised
and structured questionnaire; which consists of four parts with seeking information on demographic profile, factors affecting textile
entrepreneurs, external encouraging factors and personal reason to become textile entrepreneurs. This study uses percentage analysis, factor
analysis, Garrett score ranking, and t-test to analyse the data collected. It was concluded that textile entrepreneurs have been encouraged by
various factors and moreover several factors significantly affect their business.
Factors Affecting Consumer Purchase Behaviour
towards Online Clothing Products in Bangladesh
T Islam1
1BRAC Business School, BRAC University, Dhaka, Bangladesh
Abstract: The online clothing businesses have seen a considerable rise in recent times, with a high and growing demand. The purpose of
this study is to determine the factors that play significant roles in creating purchase intention towards the online clothing products in
Bangladesh. Secondary research was used to build the model of customer purchase intention. A structured questionnaire was employed to
gather data and test the model. Factor analysis and regression were used to test the model. The regression model suggested that customer
purchase intention was induced most by the online marketing activities of the online retailers, followed by pricing strategy implemented and
sense of security provided (in that order). To understand customer purchase intentions better, it may be important to look at additional
factors or seek better measures of the constructs. The study suggests that online retailers should heavily focus on online promotions and
pricing.
Improvement Measures on Wage System of
Construction Skilled Worker in South Korea
Kun-Hyung Lee1, Byung-Uk Jo2, Kyeoung-Min Han3, Chang-Baek Son4
1,2,3Graduate, School of Architectural Engineering, Semyung University, Jecheon-si, South Korea
4Professor, Department of Architectural Engineering, Semyung University, Jecheon-si, South Korea
Abstract: Unlike other industries, the construction industry is characterized by its heavy dependence on labour force with most work done
by workers. Still, the industry is witnessing the declining influx of young workers and the rising turnover rates of skilled workers due to such
issues as the advancement of 3D industry, negative image and absence of an established wage system. Hence, this paper proposes an
alternative scheme that would help improve the wage system and work environment for skilled construction workers in Korea.
Mastering the Recycling of Masonry while building
Tadao Ando’s Private Gallery in Lincoln Park,
Chicago
Daniel Joseph Whittaker1
Abstract: The notion of a great presence of masonry rarely conjures up the likes of buildings by master architect, Tadao Ando san of
Osaka, Japan, who is better known for his sublime shaping of space with planar forms of site-cast concrete. Perhaps though, one may recall
the ‘historical intervention’ on a grand scale—the now nine-year-old Punta Della Dogan a project (2009) in Venice, Italy, as prima facie
evidence of his dialogue with a vast quantity of ancient masonry in the Laguna. However, a new project by Ando, recently opened in
Chicago, Illinois (October 2018), presents the private-museum-gallery-going public with a new North American delight. Here, the senses
are able to indulge in a hybrid set of experiences shaped by masonry, concrete, and white painted plaster surfaces. This paper explores how
the modern concrete master has expanded his dynamic architectural vocabulary utilizing what is known as Chicago common brick: a soft,
Lake Michigan-sand and clay based fired brick, and incorporated it into his most recent private commission located in Lincoln Park,
Chicago.
RRI Buffer Based Energy and Computation Efficient
Cache Replacement Algorithm
Muhammad Shahid1
1Computer Science Department, National University of Computer and Emerging Sciences, Islamabad
Abstract: Energy consumption is an important factor of com-mutational power these days. Large scale energy consumption results in bad
system performance and high cost. To access frequently used data, we place it in Cache. Cache provides us opportunity to access that data in
a small time. Cache memory helps in retrieving data in minimum time improving the system performance and reducing power consumption.
Due to limited size of Cache, replacement algorithms used to make space for new data. There are many existing cache replacement
algorithms for example LRU, LFU, MRU, FIFO etc. Existing algorithms consume a lot of energy while replacing cold blocks of data.
Replacement algorithms are usually designed to reduce miss rate and increase hit rate. These algorithms replace cold blocks (not going to use
in future) and due to large number of cold blocks, they consume lot of energy. This paper proposes an energy and computation efficient cache
replacement algorithm that put only hot blocks in action instead of removing cold blocks. This paper also discusses different replacement
algorithms proposed in different papers and compare these algorithms on basis of different parameters mainly energy consumption. In our
experiments we have found LRU and FIFO as best replacement algorithms for Increased hit rates and Energy efficiency respectively.
Key Performance Index of Increasing Air Quality
with Construction Schedule Control
Hyoung-Chul Lim1, Dongheon Lee2, Dong-Eun Lee3, Daeyoung Kim4
1Professor, 2Doctorial Course, School of Architectural Engineering, Changwon National University, Korea
3Professor, School of Architecture & Civil Engineering, Kyungpook National University, Korea
4Professor, Department of Architecture, Kyungnam University, Korea
Abstract: Recently, air quality in residential spaces has been major concern. In particular, the indoor air quality of residential facility
before occupancy, which is related to the interior material, is a serious problem. existing research has mainly focused on pollution control
after construction, but this research has derived I key performance index I about increasing air quality and priority of management with a
controlling schedule. That is the objectives of research. The results show the relative priority of the four major items in wall‐based apartment
buildings and in column‐based apartment buildings. An analysis of the parties responsible for improvement based on the IAQ results shows
more efforts to improve IAQ are needed in material factories and engineering/design companies.
Exploring Revitalization Solutions: Engaging
Community through Media Architecture
Behzad Shojaedingivi1
1University of Tehran
Abstract: This paper aims to investigate Media Architecture and its potentials for culturally based revitalization. Media Architecture
presents a new approach based on Augmentation concepts, in which projects are designed and implemented adopting contemporary mediums
in an aesthetic way in order to attract the presence of a more cultural audience and increase the participation of the local residents.
Ultimately this will lead to an increase of interaction between different classes in neglected areas and strengthen their connection to their
built environment. This is an interdisciplinary approach in which architecture and contemporary mediums are combined aesthetically with
the aim of creating revival solutions in neglected areas.
Criteria of Creating Social Interaction for Green
Open Space in Karkh, Iraq
Sarah Abdulkareem Salih1, Sumarni Ismail2
1Master Student, 2Lecturer, Department of Architecture, Universiti Putra Malaysia, Malaysia
Abstract: This paper outlines the issue on open spaces, which led to decrease social interaction among residents in Baghdad city
nowadays. The main objective of the paper is to identify the criteria of green open spaces to achieve sound social interaction in Baghdad city,
Iraq. This paper employed quantitative method, in the form of survey, for data collection. Data were obtained from questionnaires, through
the selection of 270 respondents in a single-stage random procedure from ten specific neighbourhoods in Karkh district. The study findings
confirm that open spaces and parks is essential to enhance social interaction by implementing appropriate criteria in that open spaces or
parks. The results of this study are useful reference for urban and landscape planners, architects, social psychologists, the Municipality of
Baghdad, and researchers in this field.
The CoreConferences 2019 held on 20th – 21st March, 2019, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at Taipei, Taiwan. CoreConferences 2019 provides a chance for Academic and Industry professionals to discuss the recent progress in the area of Multiple. The outcome of the conference will trigger for the further related research and future technological improvement. This conference highlights the novel concepts and improvements related to the research and technology.
ICCOTWT 2018 will be the most comprehensive conference focused on the various aspects of Cloud of Things and Wearable Technologies. This Conference provides a chance for academic and industry professionals to discuss recent progress in the area of Cloud of Things and Wearable Technologies. Furthermore, we expect that the conference and its publications will be a trigger for further related research and technology improvements in this important subject.
The goal of this conference is to bring together the researchers from academia and industry as well as practitioners to share ideas, problems and solutions relating to the multifaceted aspects of Cloud of Things and Wearable Technologies.
The International Conference on Computer, Engineering, Law, Education and Management (ICCELEM 2017)” held on 28 - 29th September 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at The Westin Chosun Seoul, Seoul, South Korea.
The Third International Conference on “Systems, Science, Control, Communication, Engineering and Technology (ICSSCCET 2017)” held on 16 - 17th February 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at Teegala Krishna Reddy Engineering College, Hyderabad, India, Asia.
The First International Conference on “Advanced Innovations in Engineering and Technology (ICAIET 2017)” held on 14th - 15th Feb 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at Rohini College of Engineering and Technology, Tamilnadu, India, Asia.
The First International Conference on “Intelligent Computing and Systems (ICICS 2017)” held on 13th - 14th February 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at NSN College of Engineering and Technology, Karur, Tamilnadu, India, Asia.
The First International Conference on “Advances & Challenges in Interdisciplinary Engineering and Management 2017 (ICACIEM 2017)” held on 11 – 12th February 2017, in collaboration with Association of Scientists, Developers and Faculties (ASDF), an International body, at Vidyaa Vikas College of Engineering and Technology, Tiruchengode, Tamilnadu, India, Asia.
Wireless sensor networks can provide low cost solution accompanied with limited storage, computational capability and power for verity of real-world problems and become essential factor when sensor nodes are arbitrarily deployed in a hostile environment. The cluster head selection technique is also one of the good approaches to reduce energy consumption in wireless sensor networks. The lifetime of wireless sensor networks is extended by using the uniform cluster head selection and balancing the network loading among the clusters. We have reviewed various energy efficient schemes apply in WSNs of which we concentrated on selection of cluster head approach and proposed an new method called Sleep Scheduling Routing with in clusters for Energy Efficient [SSREE]in which some nodes in clusters are usually put to sleep to conserve energy, and this helps to prolong the network lifetime. EASSR selects a node as a cluster head if its residual energy is more than system average energy and have less energy consumption rate in previous round. Then, an Performance analysis and compared statistic results of SSREE shows of the significant improvement over existing protocol LEACH, SEP and M-GEAR protocol in terms of lifetime of network and data units gathered at BS.
Due to rapid urbanization the manufacturing processes of conventional building materials pollutes air, water and land. Hence in order to fulfil the increasing demand it is required to adopt a cost effective, eco-friendly technologies by improving the traditional techniques with the usage of available local materials. Agro – industrial and other solid waste disposal is another serious issue of concern in most of developing countries. The present paper explores the potential application of agro-waste as an ingredient for alternate sustainable construction materials.
There has been an ever-increasing interest in big data due to its rapid growth and since it covers diverse areas of applications. Hence, there seems to be a need for an analytical review of recent developments in the big data technology. This paper aims to provide a comprehensive review of the big data state of the art, conceptual explorations, major benefits, and research challenging aspects. In addition to that, several future directions for big data research are highlighted.
A correct node operation and power administration are significant issues in the wireless sensor network system. Ultrasonic, dead reckoning, and radio frequency information is obtained by using localization mechanism and worked through a specific filter algorithm. In this paper, a well-organized grid deployment method is applied to split the nodes into multiple individual grids. The tiny grids are used for improved resolution and bigger grids are used to decrease the complexity of processing. The efficiency of each grid is obtained by environmental factors such as redeployed nodes, boundaries, and obstacles. To decrease the power usage, asynchronous power management method is designed. In network communication, power management method is applied by using an asynchronous awakening scheme and n-duplicate coverage algorithm is engineered for the coverage of nodes.
More from Association of Scientists, Developers and Faculties (20)
"Impact of front-end architecture on development cost", Viktor TurskyiFwdays
I have heard many times that architecture is not important for the front-end. Also, many times I have seen how developers implement features on the front-end just following the standard rules for a framework and think that this is enough to successfully launch the project, and then the project fails. How to prevent this and what approach to choose? I have launched dozens of complex projects and during the talk we will analyze which approaches have worked for me and which have not.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Connector Corner: Automate dynamic content and events by pushing a buttonDianaGray10
Here is something new! In our next Connector Corner webinar, we will demonstrate how you can use a single workflow to:
Create a campaign using Mailchimp with merge tags/fields
Send an interactive Slack channel message (using buttons)
Have the message received by managers and peers along with a test email for review
But there’s more:
In a second workflow supporting the same use case, you’ll see:
Your campaign sent to target colleagues for approval
If the “Approve” button is clicked, a Jira/Zendesk ticket is created for the marketing design team
But—if the “Reject” button is pushed, colleagues will be alerted via Slack message
Join us to learn more about this new, human-in-the-loop capability, brought to you by Integration Service connectors.
And...
Speakers:
Akshay Agnihotri, Product Manager
Charlie Greenberg, Host
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Key Trends Shaping the Future of Infrastructure.pdfCheryl Hung
Keynote at DIGIT West Expo, Glasgow on 29 May 2024.
Cheryl Hung, ochery.com
Sr Director, Infrastructure Ecosystem, Arm.
The key trends across hardware, cloud and open-source; exploring how these areas are likely to mature and develop over the short and long-term, and then considering how organisations can position themselves to adapt and thrive.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Epistemic Interaction - tuning interfaces to provide information for AI support
ICIECA 2014 Paper 20
1. VLSI Realization of a Secure
Cryptosystem
and Steganography in Image
Encryption and Decryption
by
VANMATHI.R
&
PRABAVATHI.M 1
2. Abstract
♦ In this paper I present a technique that allows
cryptography to inherit some features from
steganography in such a way that the information
is encrypted as well as hidden. The proposed
solution is to use image cryptography to hide
textual data. The process is to transfer encrypted
textual data but in image format..
2
3. Literature Survey
Image Steganography
♦ Methods
– Replacing Least Significant Bit: The Embedding data is
hidden by replacing the least significant bit (LSB) of
each pixel in the cover image
– Replacing Moderate Significant Bit: The Embedding
data is hidden by replacing the moderate significant bit
(MSB) of each pixel in the cover image
– Transformation Domain Techniques: Other familiar
data hiding techniques use the transformation domain
of digital media to hide information. These methods
hide the messages in the significant areas of the cover
image which makes them robust against compression,
cropping and other image processing attacks
3
4. 4
Cryptography
♦ In Cryptography, the meaning of the message is
hidden, not its existence
– Kryptos = “hidden” in Greek
– Cryptography is the fundamental technique to counter
these threats because the outsider does not understand
the meaning of messages
♦ Cryptanalyst: Person working for unauthorized
interceptor
♦ Cryptographer: Person working for legitimate
sender or receiver
♦ Cryptology: Study of encryption and decryption,
including cryptography and cryptanalysis
5. 5
Modern Encryption Principles
♦ An encryption scheme has 5 ingredients
– Plaintext, Encryption Algorithm, Key, Ciphertext, and
Decryption Algorithm
– Security depends on secrecy of the key, not algorithm
7. Selection of image area for
hiding textual data
♦ In this step we propose to insert the secret text on
the selected image. We have two basic
assumptions in this step:
– firstly, the sender and the receiver know which image is
being transmitted and
– secondly, the area in the image that is used for hiding
secret data. Selecting a proper portion in the image is a
very essential step because we are going to modify the
pixels in the spatial domain. After selecting a proper
portion in an image the text can be inserted.
7
8. Information hiding by modifying
image within the Spatial Domain
♦ In this step i propose to use:
♦ Replacing Least Significant Bit: The Embedding data is
hidden by replacing the least significant bit (LSB) of each
pixel in the cover image
8
9. Advanced Encryption Standard (AES)
♦ The Advanced Encryption Standard (AES) specifies a
approved cryptographic algorithm that can be used to
protect electronic data.
♦ The AES algorithm is a symmetric block cipher that can
encrypt (encipher) and decrypt (decipher) information.
♦ Encryption converts data to an unintelligible form called
ciphertext.
♦ Decrypting the ciphertext converts the data back into its
original form, called plaintext.
♦ The AES algorithm is capable of using cryptographic keys
of 128, 192, and 256 bits to encrypt and decrypt data in
blocks of 128
9
10. 10
There a four basic step, called layers, that are used to
form the rounds:
(1) The ByteSub (SB) Transformation: This non-
linear layer is for resistance to differential and
linear cryptanalysis attacks.
(2) The ShiftRow (SR) Transformation: This linear
mixing step causes diffusion of the bits over
multiple rounds.
(3) The MixColumn (MC) Transformation: This
layer has a purpose similar to ShiftRow.
(4) AddRoundKey (ARK) Transformation: The
round key is XORed with the result of the above
layer.
11. Decryption
Each of the steps Byte Sub, Shift Row, Mix Column, and
AddRoundKey is inversible:
(1) The inverse of Byte Sub is another lookup table, called
InvByteSub (IBS).
(2) The inverse of Shift Row is obtained by shifting the rows
to the right instead of to the left, yielding InvShiftRow
(ISR)
(3) The transformation InvMixColumn (IMC) is given by
multiplication by the matrix
(4) AddRoundKey is its own inverse.
11
14. Steganalysis meets Cryptanalysis
♦ Knowing the steganography program used to hide
the message can be extremely handy when
attempting to reveal the actual hidden message
♦ Identifying and cracking the algorithm
– Unfortunately, some of these programs use strong
encryption 256-bit or stronger
♦ Reveal or Crack the password, seed, or secret key
– Practically all Steganography programs use a
password to hide the message
14
22. Conclusion
♦ In this paper i proposed a new technique of
using image as a cover medium for
concealing cryptographic communication.
♦ This is a new technique, which can be used
to disguise the use of encrypted
communication as well as keep the hidden
information secret
22