This paper presents the development of an application for the encryption of photographs on Smartphones with
the Android operating system, understanding how that image captured by the camerawithin the device , in order
to ensure the privacy of this content to the user. The significance lies that the image data are encrypted before
stored, improving the level of safety. The encryption algorithm used to encrypt the photographs is AES with a
key of 256 bits. The results show that encryption time is imperceptible for the user and the decoded image is not
at least changed from the original.
In this paper, text information is encoded behind the Image cover object at the sender and decoded at the receiver, provided by additional security features in the application. In this paper, we propose an In this paper, we propose an In this paper, we propose an object by changing the least significant bits of the image pixels because the image acts as the best source to hide the message that is invisible to the human eye. In this application, the text message is encrypted on the back of the senders image card object and decoded on the receiver, which is provided with additional security features in the application. Ragul M | Dr. Lakshmi J. V. N "Android Based Image Steganography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35733.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35733/android-based-image-steganography/ragul-m
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers
with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion
because it encrypts each block independently. To compensate for this, each block of the encrypted
information should be encrypted dependently. The encrypted information should be operated with a
special mode. The operation mode should be changed. This paper analysis what an operational mode of
block ciphers needs to feedback exactly and proposes a simple real-time changing operation mode
technique that extends the existing mode changing opportunity. The new change operation mode
technique considers the sign differences between the intra-feedback information and the public-feedback
information, and then adaptively determines the corresponding change operation mode factor for each
data block. This mode hopping technique for mobile streaming security is highly suitable for recent block
computing in future various environments.
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGIJNSA Journal
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second level is for secure access of information from the device. In the first level, encryption of the data is done using the location coordinates as key. Location Coordinates are rounded up figures of longitude and latitude information. In the second phase the password entry differs from conventional schemes. Here we have used the patterns of traditional Rangoli for specifying the password and gaining access, thus minimising the chances of data leak in hostile situations. The proposed structure would be a better trade off in comparison with the previous models which use Bio Metric authentication – a relatively costly way of
authentication.
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
The challenge faced in public cloud computing is to provide privacy and security to the data shared among the group members. In this paper, an enhanced secure group sharing framework has been proposed. As the cloud has a semi-trust relationship it is in need of a security model so that no classified information is being presented to cloud suppliers and aggressors. Another critical variable in giving protection and security is a periodical evacuation of undesirable records which if not done consistently then, might turn into a piece of enthusiasm for assailants and can be abused. By applying the proxy signature procedure, the grouping pioneer can adequately concede the benefit of grouping administration to one or more grouped individuals.
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
Cryptography is the scientific study of mathematical and algorithmic techniques relating to information security. Cryptographic techniques will help to protect information in cases where an attacker can have physical access to the bits representing the information, ex. When the information has to be sent over a communication channel that can be eaves dropped on by an attacker. Cryptographic primitives are the basic building blocks for constructing cryptographic solutions to information protection problems. A cryptographic primitive consists of one or more algorithms that achieve a number of protection goals. There is no well-agreed upon complete list of cryptographic primitives, nor are all cryptographic primitives independent, it is often possible to realize one primitive using a combination of other primitives.
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...CSCJournals
A biometric security is a technique by means of which digital contents are protected by a cryptographic key generated from the biometric features of a person like Retina, Iris, Fingerprint, Face, Voice and so on. Normally the digital contents like documents are protected by a cryptographic key generated from a unique password. The process in irreversible, i.e the key can be generated from the password but not the vice versa. Passwords are relatively easy to hack as most of the users keep their personal information like date of birth as password and also password length has a limit as human beings cannot remember a password of significantly large length. Hence guessing the password of a user, whose significant information is available, is easier. Therefore off late lot of emphasis has been given to biometric features. Biometric features of no two people are same. For example the finger prints or the face of any two people differ. Hence if a template (alphanumeric or binary representation of features from a biometric data) is selected for the key generation than cracking them for accessing information becomes significantly difficult. But as with every advantage comes certain limitations also. The keys are not time invariant. Templates tends to change based on the data acquisition, or with time. For example the finger prints or palm prints changes with ages. Iris, retina and face features changes with change in light intensity during the acquisition phase. Fingerprint features changes with change in the orientation of the finger while scanning. In a classic authentication problem, such variability’s can be easily dealt with by keeping a threshold for the acceptance of the features. Such acceptance threshold is not applicable for the case of biometric templates. Even slightest of the variability in the templates changes the generated key, therefore causing a high false rejection rate. Hence in this work we analyze the most accepted biometric features and techniques for key generation and propose the most invariable technique in terms of data acquisition invariability. The work analyzes Iris, Face, Fingerprint and Palm prints for analysis of the biometric template generation and key generation form the templates. Further a unique benchmark analysis technique is proposed for quantifying the quality of a biometric model or features.
In this paper, text information is encoded behind the Image cover object at the sender and decoded at the receiver, provided by additional security features in the application. In this paper, we propose an In this paper, we propose an In this paper, we propose an object by changing the least significant bits of the image pixels because the image acts as the best source to hide the message that is invisible to the human eye. In this application, the text message is encrypted on the back of the senders image card object and decoded on the receiver, which is provided with additional security features in the application. Ragul M | Dr. Lakshmi J. V. N "Android Based Image Steganography" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-4 | Issue-6 , October 2020, URL: https://www.ijtsrd.com/papers/ijtsrd35733.pdf Paper Url: https://www.ijtsrd.com/computer-science/computer-security/35733/android-based-image-steganography/ragul-m
REAL-TIME MODE HOPPING OF BLOCK CIPHER ALGORITHMS FOR MOBILE STREAMINGijwmn
It has been shown that the encrypted information or ciphertext produced by symmetric-key block ciphers
with Electronic codebook mode is vulnerable to ciphertext searching, replay, insertion and deletion
because it encrypts each block independently. To compensate for this, each block of the encrypted
information should be encrypted dependently. The encrypted information should be operated with a
special mode. The operation mode should be changed. This paper analysis what an operational mode of
block ciphers needs to feedback exactly and proposes a simple real-time changing operation mode
technique that extends the existing mode changing opportunity. The new change operation mode
technique considers the sign differences between the intra-feedback information and the public-feedback
information, and then adaptively determines the corresponding change operation mode factor for each
data block. This mode hopping technique for mobile streaming security is highly suitable for recent block
computing in future various environments.
DATA SECURITY IN MOBILE DEVICES BY GEO LOCKINGIJNSA Journal
In this paper we present a way of hiding the data in mobile devices from being compromised. We use two level data hiding technique, where in its first level data is encrypted and stored in special records and the second level being a typical password protection scheme. The second level is for secure access of information from the device. In the first level, encryption of the data is done using the location coordinates as key. Location Coordinates are rounded up figures of longitude and latitude information. In the second phase the password entry differs from conventional schemes. Here we have used the patterns of traditional Rangoli for specifying the password and gaining access, thus minimising the chances of data leak in hostile situations. The proposed structure would be a better trade off in comparison with the previous models which use Bio Metric authentication – a relatively costly way of
authentication.
ENHANCED INTEGRITY AUDITING FOR DYNAMIC AND SECURE GROUP SHARING IN PUBLIC CLOUDIAEME Publication
The challenge faced in public cloud computing is to provide privacy and security to the data shared among the group members. In this paper, an enhanced secure group sharing framework has been proposed. As the cloud has a semi-trust relationship it is in need of a security model so that no classified information is being presented to cloud suppliers and aggressors. Another critical variable in giving protection and security is a periodical evacuation of undesirable records which if not done consistently then, might turn into a piece of enthusiasm for assailants and can be abused. By applying the proxy signature procedure, the grouping pioneer can adequately concede the benefit of grouping administration to one or more grouped individuals.
ARTIFICIAL NEURAL CRYPTOGRAPHY DATAGRAM HIDING TECHNIQUES FOR COMPUTER SECURI...IAEME Publication
Cryptography is the scientific study of mathematical and algorithmic techniques relating to information security. Cryptographic techniques will help to protect information in cases where an attacker can have physical access to the bits representing the information, ex. When the information has to be sent over a communication channel that can be eaves dropped on by an attacker. Cryptographic primitives are the basic building blocks for constructing cryptographic solutions to information protection problems. A cryptographic primitive consists of one or more algorithms that achieve a number of protection goals. There is no well-agreed upon complete list of cryptographic primitives, nor are all cryptographic primitives independent, it is often possible to realize one primitive using a combination of other primitives.
A Novel Biometric Technique Benchmark Analysis For Selection Of Best Biometri...CSCJournals
A biometric security is a technique by means of which digital contents are protected by a cryptographic key generated from the biometric features of a person like Retina, Iris, Fingerprint, Face, Voice and so on. Normally the digital contents like documents are protected by a cryptographic key generated from a unique password. The process in irreversible, i.e the key can be generated from the password but not the vice versa. Passwords are relatively easy to hack as most of the users keep their personal information like date of birth as password and also password length has a limit as human beings cannot remember a password of significantly large length. Hence guessing the password of a user, whose significant information is available, is easier. Therefore off late lot of emphasis has been given to biometric features. Biometric features of no two people are same. For example the finger prints or the face of any two people differ. Hence if a template (alphanumeric or binary representation of features from a biometric data) is selected for the key generation than cracking them for accessing information becomes significantly difficult. But as with every advantage comes certain limitations also. The keys are not time invariant. Templates tends to change based on the data acquisition, or with time. For example the finger prints or palm prints changes with ages. Iris, retina and face features changes with change in light intensity during the acquisition phase. Fingerprint features changes with change in the orientation of the finger while scanning. In a classic authentication problem, such variability’s can be easily dealt with by keeping a threshold for the acceptance of the features. Such acceptance threshold is not applicable for the case of biometric templates. Even slightest of the variability in the templates changes the generated key, therefore causing a high false rejection rate. Hence in this work we analyze the most accepted biometric features and techniques for key generation and propose the most invariable technique in terms of data acquisition invariability. The work analyzes Iris, Face, Fingerprint and Palm prints for analysis of the biometric template generation and key generation form the templates. Further a unique benchmark analysis technique is proposed for quantifying the quality of a biometric model or features.
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
Technology has elevated to grab an important position in humans life, the best example is smartphones. They offer access to network as well as online banking transactions, where simplification of human labour affects security and user authentication, and passwords are first line of defense, it’s crucial to pick a strong password. Online banking applications currently use alphanumerical usernames and passwords for authentication, which are exposed to eves dropping, attacks, and shoulder surfing. Users often choose either easy to remember passwords, which can be easily guessed or difficult ones, which tend to be forgotten. The paper revolves around the views, limitation of current system and offers a dynamic biometrics, as it can be easily integrated into the existing computer security systems with minimal alteration and user intervention. The main objective is to secure using cued click point (CCP), which is one click based graphical password scheme for sequence of images and measuring, assessing humans typing rhythm, it’s based upon the human tendency to memorize graphical passwords more comfortably.
Online Payment System using Steganography and Visual CryptographyIJCERT
In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
This paper introduces the idea of hierarchical visual
cryptography. Authentication is the important issue over the
internet. This paper describes a secured authentication
mechanism with the help of visual cryptography. Visual
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted
over the network and at the receiving end secrets are revealed
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a day’s widely using
visual cryptography for authentication purpose.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
IJRET : International Journal of Research in Engineering and Technology is an international peer reviewed, online journal published by eSAT Publishing House for the enhancement of research in various disciplines of Engineering and Technology. The aim and scope of the journal is to provide an academic medium and an important reference for the advancement and dissemination of research results that support high-level learning, teaching and research in the fields of Engineering and Technology. We bring together Scientists, Academician, Field Engineers, Scholars and Students of related fields of Engineering and Technology.
Graphical Based Password for Android Phones using Keystroke Dynamics - A SurveyIJSRD
Technology has elevated to grab an important position in humans life, the best example is smartphones. They offer access to network as well as online banking transactions, where simplification of human labour affects security and user authentication, and passwords are first line of defense, it’s crucial to pick a strong password. Online banking applications currently use alphanumerical usernames and passwords for authentication, which are exposed to eves dropping, attacks, and shoulder surfing. Users often choose either easy to remember passwords, which can be easily guessed or difficult ones, which tend to be forgotten. The paper revolves around the views, limitation of current system and offers a dynamic biometrics, as it can be easily integrated into the existing computer security systems with minimal alteration and user intervention. The main objective is to secure using cued click point (CCP), which is one click based graphical password scheme for sequence of images and measuring, assessing humans typing rhythm, it’s based upon the human tendency to memorize graphical passwords more comfortably.
Online Payment System using Steganography and Visual CryptographyIJCERT
In recent time there is rapid growth in E-Commerce market. Major concerns for customers in online shopping are debit card or credit card fraud and personal information security. Identity theft and phishing are common threats of online shopping. Phishing is a method of stealing personal confidential information such as username, passwords and credit card details from victims. It is a social engineering technique used to deceive users. In this paper new method is proposed that uses text based steganography and visual cryptography. It represents new approach which will provide limited information for fund transfer. This method secures the customer's data and increases customer's confidence and prevents identity theft.
Secure Message Transmission using Image Steganography on Desktop Basedijtsrd
The rapid increase in our technology has made easier for us to send and receive data over internet at most affordable way. There are many transmission medias like emails, facebook, twitter, etc” ¦ which led way for the intruders to modify and misuse the information what we share over the internet. So in order to overcome these kinds of issues many methods has been implemented such as Cryptography, Steganography and Digital watermarking to safeguard our data transmissions in a most prominent way. In this paper, hiding text inside a digital image using Stegano tool for secure data transmissions has been described. Sidharth Sai S | N. Priya "Secure Message Transmission using Image Steganography on Desktop Based" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-1 , December 2020, URL: https://www.ijtsrd.com/papers/ijtsrd38067.pdf Paper URL : https://www.ijtsrd.com/computer-science/computer-security/38067/secure-message-transmission-using-image-steganography-on-desktop-based/sidharth-sai-s
An Intelligent System for Secured Authentication using Hierarchical Visual Cr...IDES Editor
This paper introduces the idea of hierarchical visual
cryptography. Authentication is the important issue over the
internet. This paper describes a secured authentication
mechanism with the help of visual cryptography. Visual
cryptography simply divides secret information in to number
of parts called shares. These shares are further transmitted
over the network and at the receiving end secrets are revealed
by superimposition. Many layers of visual cryptography exist
in proposed system hence called hierarchical visual
cryptography. Remote voting systems now a day’s widely using
visual cryptography for authentication purpose.
International Journal of Engineering Research and Development (IJERD)IJERD Editor
journal publishing, how to publish research paper, Call For research paper, international journal, publishing a paper, IJERD, journal of science and technology, how to get a research paper published, publishing a paper, publishing of journal, publishing of research paper, reserach and review articles, IJERD Journal, How to publish your research paper, publish research paper, open access engineering journal, Engineering journal, Mathemetics journal, Physics journal, Chemistry journal, Computer Engineering, Computer Science journal, how to submit your paper, peer reviw journal, indexed journal, reserach and review articles, engineering journal, www.ijerd.com, research journals,
yahoo journals, bing journals, International Journal of Engineering Research and Development, google journals, hard copy of journal
An Advanced Automatic Prior Notification of Locomotives And Its Steering Cond...IJRES Journal
The previous papers produced a study on the estimation of the post accident scenarios, their solution either record commercial or beneficial to authorities. In this paper we work on the pre notification which helps in the reduction of the extreme impacts of the mishap/vehicle collision. This pre notification is calculated in concern with both the distinct on the steering as well as the vehicle. This paper can play an important role in the advancement of the intelligent system of the chore automotives. The previous paper study has been focusing on the naval scenarios, fleet management. In this paper, we propose a safety not only in terms of the road risks but also on an individual’s intoxication by using health sensors, we have developed this idea on the reference of PBHR base paper to bring an advancement in the prior notification of the driver’s health condition.
Busca en la base de datos Lilacs información sobre el siguiente tema:
“Actuación del fisioterapeúta durante la gestación, parto y posparto”
Exportar a tu cuenta de Mendeley y realizar la bibliografía en formato Vancouver.
The project proposes the enhancement of security system for secret data
communication through video file using adaptive data hiding with cryptographic
technique. A given input video file is converted into frame sequences and then
Encrypted the video using Chaos Encryption algorithm. And one of frame will be
selected to conceal the secret data for secured data communication. The proposed
technique also uses RC7 Encryption for encrypting a secret text data into cipher text
to avoid data hacking issues. After data encryption, the data hider will conceal the
secret encrypted data into the selected frame using adaptive LSB embedding
algorithm. Although encryption achieves certain security effects, they make the secret
messages unreadable and unnatural or meaningless. These unnatural messages
usually attract some unintended observers’ attention. The data hiding technique uses
the adaptive LSB replacement algorithm for concealing the secret message bits into
the image. In the data extraction module, the secret data will be extracted by using
relevant key for choosing the pixel coefficients and it will be decrypted to get original
data using encryption key. Finally the performance of this proposal in data encryption
and hiding will be analysed based on image and data recovery.
Highly Secure Cryptography Algorithm Method to Safeguard Audios and Visualsijcisjournal
Internet hacking has become common now a days and is increasing day by day. It is a high time to safeguard our data. There are several cryptographic methods and algorithms that are evolved and already exist. How about additional protection makes us stress free? In this paper, I present a unique design of cryptographic algorithm which is specifically designed for Auditory cryptography and visual cryptography to make the encryption and decryption technique stronger. The purpose is to make it very difficult to decode the file when an unauthorized user accesses the data. This algorithm is a combination of multiple techniques such as Ant Algorithm, Logical Gates Technique, Dual authorization PINs, Indexed Arrays. Combination of these techniques makes the algorithm unique and strong to secure the data. This research was implemented on audio files, images and video files. The study of the result shows effective way of masking the data as it is hard to decode without PINs. Also, performance of the algorithm is efficient during encryption and decryption process.
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijcisjournal
Internet hacking has become common now a days and is increasing day by day. It is a high time to safeguard our data. There are several cryptographic methods and algorithms that are evolved and already exist. How about additional protection makes us stress free? In this paper, I present a unique design of cryptographic algorithm which is specifically designed for Auditory cryptography and visual cryptography to make the encryption and decryption technique stronger. The purpose is to make it very difficult to decode the file when an unauthorized user accesses the data. This algorithm is a combination of multiple techniques such as Ant Algorithm, Logical Gates Technique, Dual authorization PINs, Indexed Arrays. Combination of these techniques makes the algorithm unique and strong to secure the data. This research was implemented on audio files, images and video files. The study of the result shows effective way of masking the data as it is hard to decode without PINs. Also, performance of the algorithm is efficient during encryption and decryption process.
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijdms
Internet hacking has become common now a days and is increasing day by day. It is a high time to
safeguard our data. There are several cryptographic methods and algorithms that are evolved and already
exist. How about additional protection makes us stress free? In this paper, I present a unique design of
cryptographic algorithm which is specifically designed for Auditory cryptography and visual cryptography
to make the encryption and decryption technique stronger. The purpose is to make it very difficult to decode
the file when an unauthorized user accesses the data. This algorithm is a combination of multiple
techniques such as Ant Algorithm, Logical Gates Technique, Dual authorization PINs, Indexed Arrays.
Combination of these techniques makes the algorithm unique and strong to secure the data. This research
was implemented on audio files, images and video files. The study of the result shows effective way of
masking the data as it is hard to decode without PINs. Also, performance of the algorithm is efficient
during encryption and decryption process.
HIGHLY SECURE CRYPTOGRAPHY ALGORITHM METHOD TO SAFEGUARD AUDIOS AND VISUALSijcisjournal
Internet hacking has become common now a days and is increasing day by day. It is a high time to
safeguard our data. There are several cryptographic methods and algorithms that are evolved and already
exist. How about additional protection makes us stress free? In this paper, I present a unique design of
cryptographic algorithm which is specifically designed for Auditory cryptography and visual cryptography
to make the encryption and decryption technique stronger. The purpose is to make it very difficult to decode
the file when an unauthorized user accesses the data. This algorithm is a combination of multiple
techniques such as Ant Algorithm, Logical Gates Technique, Dual authorization PINs, Indexed Arrays.
Combination of these techniques makes the algorithm unique and strong to secure the data. This research
was implemented on audio files, images and video files. The study of the result shows effective way of
masking the data as it is hard to decode without PINs. Also, performance of the algorithm is efficient
during encryption and decryption process.
Unified Approach With Neural Network for Authentication, Security and Compres...CSCJournals
The Present demands of scientific and social life forced image processing based applications to have a tremendous growth. This growth at the same time has given numbers of challenges to researcher to meet the desired objectives of either users or from solution perspectives. Among the various challenges, the most dominating areas are: reduction in required memory spaces for storage or taken transmission time from one location to other, protection of image contents to maintain the privacy and to facilitate the mechanism to identify the malicious modification if there is any either in storage or in transmission channel. Even though there are number of methods proposed by various researchers and are existed as solutions, questions are remain open in terms of quality, cost and complexity. In this paper we have proposed the concept based on neural network to achieve the quality of compression, protection and authentication all together using the ability of universal approximation by learning, one way property and one to one mapping characteristics correspondingly. With the proposed methods not only we can authenticate the image but also positions of malicious activity given in the image can be located with high precision. Proposed methods are very efficient in performance as well as carry the features of simplicity and cost effectiveness.
SECURING DIGITAL IMAGES USING WATERMARKING TECHNIQUE AND TRIPLE DES ALGORITHMJournal For Research
Multimedia security is very important issue for the today's internet technology because of duplication, distribution and exchanging if multimedia data. Digital watermarking is the method of shielding digital data in multimedia.Multimedia consist of image, audio, video, text, etc. In watermarking the secret information are implanted into the original data for protecting the ownership rights of the multimedia data. Basically watermarking has three domains.1) Spatial domain 2) Transform domain 3) Wavelet domain. This paper consist Discrete Cosine Transform which is the frequency domain works on the transform coefficient of the image. Three different keys are generated using Triple DES algorithm.
A NUMERICAL METHOD BASED ENCRYPTION ALGORITHM WITH STEGANOGRAPHYcscpconf
Now-a-days many encryption algorithms have been proposed for network security. In this
paper, a new cryptographic algorithm for network security is proposed to assist the
effectiveness of network security. Here symmetric key concept instead of public key is
considered to develop the encryption – decryption algorithm. Also, to give more security in the
algorithm, the idea of one way function alongwith Newton’s method is applied as a secret key to
the proposed work as well as Digital Signature Standard (DSS) technology is used to send the
key. Moreover, steganography is used to hide the cipher within a picture in encryption
algorithm. In brief, a numerical method based secret key encryption – decryption algorithm is
developed using steganography to enhance the network security.
Review paper on Data Security using Cryptography and Steganographyvivatechijri
One of the major problems faced by this digital world is Data Security. Data Security plays an important role in the field of information technology. As there are large advancements in internet technology, there has been huge text as well as multimedia data transfer over the internet. The communication channel available for data transfer from the transmitter to receiver is highly insecure. As the security of electronic data is a major issue and to achieve high security and confidentiality, the public and the private sectors use different kinds of techniques and methods to protect the data from unauthorized users. Cryptography and Steganography are the most popular and widely used technologies for security. Cryptography is the art of hiding information by encryption and steganography is a technique to hides data in the cover medium. Cryptography hides the readable and meaningful contents of the data. And the existence of the data is hidden by the Steganography technique.
One of the reasons that intruders can be successful is that most of the information they acquire from a system is in a form that they can read and comprehend. Intruders may reveal the information to others, modify it to misrepresent an individual or organization, or use it to launch an attack. One solution to this problem is, through the use of Steganography. Steganography is a technique of hiding information in digital media. In contrast to cryptography, it is not to keep others from knowing the hidden information but it is to keep others from thinking that the information even exists. In this review paper we will understand what Steganography, Cryptography is and what are the advantages of using them? In last we will discuss our goal of this paper that what types of techniques worked on video Steganography?
Hybrid information security system via combination of compression, cryptogra...IJECEIAES
Today, the world is experiencing a new paradigm characterized by dynamism and rapid change due to revolutions that have gone through information and digital communication technologies, this raised many security and capacity concerns about information security transmitted via the Internet network. Cryptography and steganography are two of the most extensively that are used to ensure information security. Those techniques alone are not suitable for high security of information, so in this paper, we proposed a new system was proposed of hiding information within the image to optimize security and capacity. This system provides a sequence of steps by compressing the secret image using discrete wavelet transform (DWT) algorithm, then using the advanced encryption standard (AES) algorithm for encryption compressed data. The least significant bit (LSB) technique has been applied to hide the encrypted data. The results show that the proposed system is able to optimize the stego-image quality (PSNR value of 47.8 dB) and structural similarity index (SSIM value of 0.92). In addition, the results of the experiment proved that the combination of techniques maintains stego-image quality by 68%, improves system performance by 44%, and increases the size of secret data compared to using each technique alone. This study may contribute to solving the problem of the security and capacity of information when sent over the internet.
Image Encryption-Then-Compression System via Prediction Error Clustering and ...AM Publications,India
The images have to be encrypted before compression to give high level security. We design a highly efficient image encryption-the –compression system using lossless and lossy compression. The image encryption design to operate in the prediction error domain to provide in a sensible way to give high level security. An arithmetic coding based approach can be exploited to efficiently compress the encrypted images. The proposed compression approach applied to encrypted images is only slightly worse, in terms of compression efficiency than the disambiguation lossless/lossy image coders which take original unencrypted images as inputs. In existing Encryption then compression induced the significant penalty on compression efficiency. The password generation and encryption are all done by the system itself after clicking the encryption button with transparency to the user. The same encryption password is also used to decrypt the encrypted binary file. The application uses simple key generation methods of random number generation and combination.
Survey on Different Image Encryption Techniques with Tabular Formijsrd.com
Rapid growth of digital communication and multimedia application increases the need of security and it becomes an important issue of communication and storage of multimedia. Image Encryption is one of the techniques that are used to ensure high security. Various fields such as medical science military in which image encryption can be used. Recent cryptography provides necessary techniques for securing information and protective multimedia data. In last some years, encryption technology has been developed quickly and many image encryption methods have been used to protect confidential image data from illegal way in. Within this paper survey of different image encryption techniques have been discussed from which researchers can get an idea for efficient techniques to be used.
Similar to Photography Capture and Encryption on Smart Phones with Android Operating System (20)
Exploratory study on the use of crushed cockle shell as partial sand replacem...IJRES Journal
The increasing demand for natural river sand supply for the use in construction industry along
with the issue of environmental problem posed by the dumping of cockle shell, a by-product from cockle
business have initiated research towards producing a more environmental friendly concrete. This research
explores the potential use of cockle shell as partial sand replacement in concrete production. Cockle shell used
in this experimental work were crushed to smaller size almost similar to sand before mixed in concrete. A total
of six concrete mixtures were prepared with varying the percentages of cockle shell viz. 0%, 5%, 10%, 15%,
20% and 25%. All the specimens were subjected to continuous water curing. The compressive strength test was
conducted at 28 days in accordance to BS EN 12390. Finding shows that integration of suitable content of
crushed cockle shell of 10% as partial sand replacement able to enhance the compressive strength of concrete.
Adopting crushed cockle shell as partial sand replacement in concrete would reduce natural river sand
consumption as well as reducing the amount of cockle shell disposed as waste.
Congenital Malaria: Correlation of Umbilical Cord Plasmodium falciparum Paras...IJRES Journal
The vertical (trans-placental) transmission of the parasite Plasmodium falciparum from
pregnant mother to fetus during gestational period was investigated in a clinical research involving 43 full term
pregnant women in selected Hospitals in Jimeta Yola, Adamawa State Nigeria. During the observational study,
parasitemia was determined by light microscopic examination of umbilical and maternal peripheral blood film
for the presence of the trophozoites of Plasmodium falciparum. Correlational analysis was then carried on the
result obtained at p<0.05.><0.05) was established between maternal peripheral blood and umbilical cord
blood parasitemia with Pearson’s correlation coefficient of 0.762. Thus, in a malaria endemic area like Yola,
Adamawa State, Nigeria, with a stable transmission of parasite, there is a high probability of vertical
transmission of Plasmodium falciparum parasite from mother to fetus during gestation that can be followed by
the presentation of the symptoms of malaria by the newborn and other malaria related complications. Families
are advised to consistently sleep under appropriately treated insecticide mosquito net to avoid mosquito bite and
subsequent infestation.
Review: Nonlinear Techniques for Analysis of Heart Rate VariabilityIJRES Journal
Heart rate variability (HRV) is a measure of the balance between sympathetic mediators of heart
rate that is the effect of epinephrine and norepinephrine released from sympathetic nerve fibres acting on the
sino-atrial and atrio-ventricular nodes which increase the rate of cardiac contraction and facilitate conduction at
the atrio-ventricular node and parasympathetic mediators of heart rate that is the influence of acetylcholine
released by the parasympathetic nerve fibres acting on the sino-atrial and atrio-ventricular nodes leading to a
decrease in the heart rate and a slowing of conduction at the atrio-ventricular node. Sympathetic mediators
appear to exert their influence over longer time periods and are reflected in the low frequency power(LFP) of
the HRV spectrum (between 0.04Hz and 0.15 Hz).Vagal mediators exert their influence more quickly on the
heart and principally affect the high frequency power (HFP) of the HRV spectrum (between 0.15Hz and 0.4
Hz). Thus at any point in time the LFP:HFP ratio is a proxy for the sympatho- vagal balance. Thus HRV is a
valuable tool to investigate the sympathetic and parasympathetic function of the autonomic nervous system.
Study of HRV enhance our understanding of physiological phenomenon, the actions of medications and disease
mechanisms but large scale prospective studies are needed to determine the sensitivity, specificity and predictive
values of heart rate variability regarding death or morbidity in cardiac and non-cardiac patients. This paper
presents the linear and nonlinear to analysis the HRV.
Dynamic Modeling for Gas Phase Propylene Copolymerization in a Fluidized Bed ...IJRES Journal
A two-phase model is proposed for describing the dynamics of a fluidized bed reactor used for
polypropylene production. In the proposed model, the fluidized bed is divided into an emulsion and bubble
phase where the flow of gas is considered to be plug flow through the bubbles and perfectly mixed through the
emulsion phase. Similar previous models, consider the reaction in the emulsion phase only. In this work the
contribution of reaction in the bubble phase is considered and its effect on the overall polypropylene production
is investigated the kinetic model is combined with hydrodynamic model in order to develop a comprehensive
model for gas-phase propylene copolymerization reactor. Simulation profiles of the proposed model were
compared with those of well mixed model for the emulsion phase temperature. The simulated temperature
profile showed a lower rate of change compared to the previously reported models due to lower polymerization
rate. Model simulation showed that about 13% of the produced polymer comes from the bubble phase and this
considerable amount of polymerization in the bubbles should not be neglected in any modeling attempt.
Study and evaluation for different types of Sudanese crude oil propertiesIJRES Journal
Sudanese crude oil is regarded as one of the sweet types of crude in the world, Sulphur containing
compounds are un desirable in petroleum because they de activate the catalyst during the refining processes and
are the main source of acid rains and environmental pollution.(Mark Cullen 2001),Since it contains considerable
amount of salts and acids, it negatively impact the production facilities and transportation lines with corrosive
materials. However it suffers other problems in flow properties represented by the high viscosity and high
percentage of wax. Samples were collected after the initial and final treatment at CPF, and tested for
physical and chemical properties.wax content is in the range 23-31 weight % while asphalting content is about
0.1 weight% . Resin content is 13-7 weight % and deposits are 0.01 weight%. The carbon number distribution in
the crude is in the range 7-35 carbon atoms. The pour point vary between 39°C-42°C and the boiling point is in
the range 70 °C - 533 °C.
A Short Report on Different Wavelets and Their StructuresIJRES Journal
This article consists of basics of wavelet analysis required for understanding of and use of wavelet
theory. In this article we briefly discuss about HAAR wavelet transform their space and structures.
A Case Study on Academic Services Application Using Agile Methodology for Mob...IJRES Journal
Recently, Mobile Cloud Computing reveals many modern development areas in the Information
Technology industry. Several software engineering frameworks and methodologies have been developed to
provide solutions for deploying cloud computing resources on mobile application development. Agile
methodology is one of the most commonly used methodologies in the field. This paper presents the MCCAS a
Web and Mobile application that provide feature for the Palestinian higher education/academic institutions. An
Agile methodology was used in the development of the MCCAS but in parallel with emphasis on Cloud
computing resources deployment. Also many related issues is discussed such as how software engineering
modern methodologies (advances) influenced the development process.
Wear Analysis on Cylindrical Cam with Flexible RodIJRES Journal
Firstly, the kinetic equation of spatial cylindrical cam with flexible rod has been established. Then, an
accurate cylindrical cam mechanism model has been established based on the spatial modeling software
Solidworks. The dynamic effect of flexible rod on mechanical system was studied in detail based on the
mechanical system dynamics analytical software Adams, and Archard wear model is used to predict the wear of
the cam. We used Ansys to create finite element model of the cam link, extracted the first five order mode to
export into Adams. The simulation results show that the dynamic characteristics of spatial cylindrical cam
mechanical system with flexible rod is closed to ideal mechanism. During the cam rotate one cycle, the collision
in the linkage with a clearance occurs in some special location, others still keep a continuous contact, and the
prediction of wear loss is smaller than rigid body.
DDOS Attacks-A Stealthy Way of Implementation and DetectionIJRES Journal
Cloud Computing is a new paradigm provides various host service [paas, saas, Iaas over the internet.
According to a self-service,on-demand and pay as you use business model,the customers will obtain the cloud
resources and services.It is a virtual shared service.Cloud Computing has three basic abstraction layers System
layer(Virtual Machine abstraction of a server),Platform layer(A virtualized operating system, database and
webserver of a server and Application layer(It includes Web Applications).Denial of Service attack is an attempt
to make a machine or network resource unavailable to the intended user. In DOS a user or organization is
deprived of the services of a resource they would normally expect to have.A Successful DOS attack is a highly
noticeable event impacting the entire online user base.DOS attack is found by First Mathematical Metrical
Method (Rate Controlling,Timing Window,Worst Case and Pattern Matching)DOS attack not only affect the
Quality of the service and also affect the performance of the server. DDOS attacks are launched from Botnet-A
large Cluster of Connected device(cellphone,pc or router) infected with malware that allow remote control by an
attacker. Intruder using SIPDAS in DDOS to perform attack.SIPDAS attack strategies are detected using Heap
Space Monitoring Algorithm.
An improved fading Kalman filter in the application of BDS dynamic positioningIJRES Journal
Aiming at the poor dynamic performance and low navigation precision of traditional fading
Kalman filter in BDS dynamic positioning, an improved fading Kalman filter based on fading factor vector is
proposed. The fading factor is extended to a fading factor vector, and each element of the vector corresponds to
each state component. Based on the difference between the actual observed quantity and the predicted one, the
value of the vector is changed automatically. The memory length of different channel is changed in real time
according to the dynamic property of the corresponding state component. The actual observation data of BDS is
used to test the algorithm. The experimental results show that compared with the traditional fading Kalman filter
and the method of the third references, the positioning precision of the algorithm is improved by 46.3% and
23.6% respectively.
Positioning Error Analysis and Compensation of Differential Precision WorkbenchIJRES Journal
Positioning error is a widely problem exists in mechanism, the important factors affecting machining
precision. In order to reduce the error caused by positioning problem processing, based on the differential
workbench as the research object, using the method of theoretical analysis and experimental verification, the
analysis of positioning error mechanism and source of complete differential precision workbench error
compensation, improve the accuracy of the device, provides a method for the application of modern machine
tools. table.
Status of Heavy metal pollution in Mithi river: Then and NowIJRES Journal
The Mithi River runs through the heart of suburban Mumbai. Its path of flow has been severely
damaged due to industrialization and urbanization. The quality of water has been deteriorating ever since. The
Municipal and industrial effluents are discharged in unchecked amounts. The municipal discharge comprises
untreated domestic and sewage wastes whereas the industries are majorly discharge chemicals and other toxic
effluents which are responsible in increasing the metal load of the river. In the current study, the water is
analysed for heavy metals- Copper, Cadmium, Chromium, Lead and Nickel. It also includes a brief
understanding on the fluctuations that have occurred in the heavy metal pollution, through the compilation of
studies carried out in the area previously.
The Low-Temperature Radiant Floor Heating System Design and Experimental Stud...IJRES Journal
In order to analyze the temperature distribution of the low-temperature radiant floor heating system
that uses the condensing wall-hung boiler as the heat source, the heating system is designed according to a typical
house facing south in Shanghai. The experiments are carried out to study the effects of the supply water
temperature on the thermal comfort of the system. Eventually, the supply water temperature that makes people in
the room feel more comfortable is obtained. The result shows that in the condition of that the outside temperature
is 8~15℃ and the relative humidity is 30~70%RH, the temperature distribution in the room is from high to low
when the height is from bottom to top. The floor surface temperature is highest, but its uniformity is very poor.
When the heating system reaches the steady state, the air temperature of the room is uniform. When the supply
water temperature is 63℃ The room is relatively comfortable at the above experimental condition.
Experimental study on critical closing pressure of mudstone fractured reservoirsIJRES Journal
In the process of oil and gas exploitation of mudstone-fractured reservoir in Daqing oilfield, the
permeability of fracture is easily affected by the influence of stress change, which is shown by the sensitivity of
the permeability to the stress. With the extension of time mining in the fractured mudstone reservoir, fracture
stress sensitivity is obvious in vast decline of production and great influence on reduced yields. In order to
reasonably determine the way of developing method, working system and the exploitation rate of the reservoir,
correspondingly protecting reservoir productivity, improve ultimate recovery. On the basis of the previous
research on the stress sensitivity of fractured mudstone, this essay studied the critical closing pressure of the
simulated underground fractured mudstone under the laboratory condition.
Correlation Analysis of Tool Wear and Cutting Sound SignalIJRES Journal
With the classic signal analysis and processing method, the cutting of the audio signal in time
domain and frequency domain analysis. We reached the following conclusions: in the time domain analysis,
cutting audio signals mean and the variance associated with tool wear state change occurred did not change
significantly, and tool wear is not high degree of correlation, and the mean-square value of the audio signal
changes in the size and tool wear the state has a good relationship.
Reduce Resources for Privacy in Mobile Cloud Computing Using Blowfish and DSA...IJRES Journal
Mobile cloud computing in light of the increasing popularity among users of mobile smart
technology which is the next indispensable that enables users to take advantage of the storage cloud computing
services. However, mobile cloud computing, the migration of information on the cloud is reliable their privacy
and security issues. Moreover, mobile cloud computing has limitations in resources such as power energy,
processor, Memory and storage. In this paper, we propose a solution to the problem of privacy with saving and
reducing resources power energy, processor and Memory. This is done through data encryption in the mobile
cloud computing by symmetric algorithm and sent to the private cloud and then the data is encrypted again and
sent to the public cloud through Asymmetric algorithm. The experimental results showed after a comparison
between encryption algorithms less time and less time to decryption are as follows: Blowfish algorithm for
symmetric and the DSA algorithm for Asymmetric. The analysis results showed a significant improvement in
reducing the resources in the period of time and power energy consumption and processor.
Resistance of Dryland Rice to Stem Borer (Scirpophaga incertulas Wlk.) Using ...IJRES Journal
Rice stem borer is one of the important pests that attack plants so as to reduce production. One way
to control pests is to use organic fertilizers that make the plant stronger and healthier. This study was conducted
to determine the effects of organic fertilizers with various doses without the use of pesticides in controlling stem
borer, Scirpophaga incertulas. Methods using split-split plot design which consists of two levels of the whole
plot factor (solid and liquid organic fertilizers), two levels of the subplot factor (conventional and industry,
Tiens and Mitraflora), and four levels of the sub-subplot factor of conventional and industry (5, 10, 15, 20
tonnes/ha), and one level of the sub-subplot factor of Tiens and Mitraflora (each 2 ml/l). Based on the results
Statistical analysis there were no significant differences among treatments and this shows that the use of organic
fertilizers that only a dose of 5 tonnes/ha is sufficient available nutrients that make plants more robust and
resistant to control stem borer, besides that can reduce production costs and friendly to the environment when
compared with using inorganic fertilizers.
A novel high-precision curvature-compensated CMOS bandgap reference without u...IJRES Journal
A novel high-precision curvature-compensated bandgap reference (BGR) without using op-amp
is presented in this paper. It is based on second-order curvature correction principle, which is a weighted sum of
two voltage curves which have opposite curvature characteristic. One voltage curve is achieved by first-order
curvature-compensated bandgap reference (FCBGR) without using op-amp and the other found by using W
function is achieved by utilizing a positive temperature coefficient (TC) exponential current and a linear
negative TC current to flow a linear resistor. The exponential current is gained by using anegative TC voltage to
control a MOSFET in sub-threshold region. In the temperature ranging from -40℃ to 125℃, experimental
results implemented with SMIC 0.18μm CMOS process demonstrate that the presented BGR can achieve a TC
as low as 2.2 ppm/℃ and power-supply rejection ratio(PSRR)is -69 dB without any filtering capacitor at 2.0 V.
While the range of the supply voltage is from 1.7 to 3.0 V, the output voltage line regulation is about1 mV/ V
and the maximum TC is 3.4 ppm/℃.
Structural aspect on carbon dioxide capture in nanotubesIJRES Journal
In this work we reported the carbon dioxide adsorption (CO2) in six different nanostructures in order
to investigate the capturing capacity of the materials at nanoscale. Here we have considered the three different
nanotubes including zinc oxide nanotube (ZnONT), silicon carbide nanotube (SiCNT) and single walled carbon
nanotube (SWCNT). Three different chiralities such as zigzag (9,0), armchair (5,5) and chiral (6,4) having
approximately same diameter are analyzed. The adsorption binding energy values under various cases are
estimated with density functional theory (DFT). We observed CO2 molecule chemisorbed on ZnONT and
SiCNT’s whereas the physisorption is predominant in CNT. To investigate the structural aspect, the tubes with
defects are studied and compared with defect free tubes. We have also analyzed the electrical properties of tubes
from HOMO, LUMO energies. Our results reveal the defected structure enhance the CO2 capture and is
predicted to be a potential candidate for environmental applications.
Thesummaryabout fuzzy control parameters selected based on brake driver inten...IJRES Journal
In this paper, the brake driving intention identification parameters based on the fuzzy control are
summarized and analyzed, the necessary parameters based on the fuzzy control of the brake driving intention
recognition are found out, and I pointed out the commonly corrupt parameters, and through the relevant
parameters , I establish the corresponding driving intention model.
About
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Technical Specifications
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
Key Features
Indigenized remote control interface card suitable for MAFI system CCR equipment. Compatible for IDM8000 CCR. Backplane mounted serial and TCP/Ethernet communication module for CCR remote access. IDM 8000 CCR remote control on serial and TCP protocol.
• Remote control: Parallel or serial interface
• Compatible with MAFI CCR system
• Copatiable with IDM8000 CCR
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
Application
• Remote control: Parallel or serial interface.
• Compatible with MAFI CCR system.
• Compatible with IDM8000 CCR.
• Compatible with Backplane mount serial communication.
• Compatible with commercial and Defence aviation CCR system.
• Remote control system for accessing CCR and allied system over serial or TCP.
• Indigenized local Support/presence in India.
• Easy in configuration using DIP switches.
Student information management system project report ii.pdfKamal Acharya
Our project explains about the student management. This project mainly explains the various actions related to student details. This project shows some ease in adding, editing and deleting the student details. It also provides a less time consuming process for viewing, adding, editing and deleting the marks of the students.
Explore the innovative world of trenchless pipe repair with our comprehensive guide, "The Benefits and Techniques of Trenchless Pipe Repair." This document delves into the modern methods of repairing underground pipes without the need for extensive excavation, highlighting the numerous advantages and the latest techniques used in the industry.
Learn about the cost savings, reduced environmental impact, and minimal disruption associated with trenchless technology. Discover detailed explanations of popular techniques such as pipe bursting, cured-in-place pipe (CIPP) lining, and directional drilling. Understand how these methods can be applied to various types of infrastructure, from residential plumbing to large-scale municipal systems.
Ideal for homeowners, contractors, engineers, and anyone interested in modern plumbing solutions, this guide provides valuable insights into why trenchless pipe repair is becoming the preferred choice for pipe rehabilitation. Stay informed about the latest advancements and best practices in the field.
Hybrid optimization of pumped hydro system and solar- Engr. Abdul-Azeez.pdffxintegritypublishin
Advancements in technology unveil a myriad of electrical and electronic breakthroughs geared towards efficiently harnessing limited resources to meet human energy demands. The optimization of hybrid solar PV panels and pumped hydro energy supply systems plays a pivotal role in utilizing natural resources effectively. This initiative not only benefits humanity but also fosters environmental sustainability. The study investigated the design optimization of these hybrid systems, focusing on understanding solar radiation patterns, identifying geographical influences on solar radiation, formulating a mathematical model for system optimization, and determining the optimal configuration of PV panels and pumped hydro storage. Through a comparative analysis approach and eight weeks of data collection, the study addressed key research questions related to solar radiation patterns and optimal system design. The findings highlighted regions with heightened solar radiation levels, showcasing substantial potential for power generation and emphasizing the system's efficiency. Optimizing system design significantly boosted power generation, promoted renewable energy utilization, and enhanced energy storage capacity. The study underscored the benefits of optimizing hybrid solar PV panels and pumped hydro energy supply systems for sustainable energy usage. Optimizing the design of solar PV panels and pumped hydro energy supply systems as examined across diverse climatic conditions in a developing country, not only enhances power generation but also improves the integration of renewable energy sources and boosts energy storage capacities, particularly beneficial for less economically prosperous regions. Additionally, the study provides valuable insights for advancing energy research in economically viable areas. Recommendations included conducting site-specific assessments, utilizing advanced modeling tools, implementing regular maintenance protocols, and enhancing communication among system components.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Photography Capture and Encryption on Smart Phones with Android Operating System
1. International Journal of Research in Engineering and Science (IJRES)
ISSN (Online): 2320-9364, ISSN (Print): 2320-9356
www.ijres.org Volume 3 Issue 11 ǁ November. 2015 ǁ PP.53-58
www.ijres.org 53 | Page
Photography Capture and Encryption on Smart Phones with
Android Operating System
C. Cortés1
, D. Zamorano2
, C. Aguilar3
1
Esime Culhuacan, National Polytechnic Institute.
2
Esime Culhuacan, National Polytechnic Institute.
3
Esime Culhuacan, National Polytechnic Institute.
ABSTRACT
This paper presents the development of an application for the encryption of photographs on Smartphones with
the Android operating system, understanding how that image captured by the camerawithin the device , in order
to ensure the privacy of this content to the user. The significance lies that the image data are encrypted before
stored, improving the level of safety. The encryption algorithm used to encrypt the photographs is AES with a
key of 256 bits. The results show that encryption time is imperceptible for the user and the decoded image is not
at least changed from the original.
Keywords: AES, Android, cryptography, Informatics security
I. INTRODUCTION
Currently the technology in cell phones has evolved to such a degree that even they have been denominated
as intelligentphones (smartphones) since besides fulfilling the basic functions of a conventional telephone, they
give the opportunity to perform tasks that were previously possible only by using a computer. Including
alsointegrated functionality from other devices such as a PGS browser, video game console, television, and
digital camera, among others.
Within the market for Android smartphones is the (OS) operating system that has more presence. According
to a study by the web monitoring company "Pingdom," during the period from October 2011 to October 2012,
the number of smartphones in the world increased a 39%, and Android with an 88%, being found in the 70% of
the devices (Pingdom, 2013). The information before mentioned can be seen in Figure 1.
On the other hand, the ability to take high-resolution photographs on these devices, notes how cameras are
being replace by smartphones that mainly use the Android OS. Nevertheless since it is an article that is usually
carried to all sorts of places, you may take the risk of being robbed or losing it.
Figure 1. Growth of Smartphones with Android
According to the type of user, the loss of their Smartphone represents a level of danger; for example, there
are activities such as the ones that perform agents, police or insurance companies, where the images captured by
the camera in the device contain sensitive or careful information. Therefore it requires a mechanism that may
allow maintaining the confidentiality of such images as they should not be exposed to people who might misuse
them.
In the official Android store called "Play Store" many applications designed to protect the confidentiality
of images or photographs may be found. Table I shows some examples according to the method of protection
implemented.
2. Photography Capture And Encryption On Smartphones With Android Operating System
www.ijres.org 54 | Page
Table 1. Applications for confidentiality of images
However these applications have some drawbacks, the first method, the device can be connected to a
computer and check the folders to find the hidden image. The use of steganography is a better alternative
because it is intended to not perceive the existence of a secret image, however, these applications retain the
original file, in such a way that the image remains exposed to persons with bad intentions, on the other hand
you can extract the hidden image by relatively simple means. In the case of cryptography it offers the best level
of security because it is only possible to unprotect or check out the image only if you know if the key or
password used for the encryption which does not occur in steganography as it is known.
The problem with most applications that use cryptography is that they only allow you to work with stored
images in the permanent memory of the device. Therefore the action of taking a photograph and then encrypt it
with some of these applications would have to be done with different applications and has certain
vulnerabilities since:
There is a lapse of time since the user captures a photography until he chooses to encrypt it, meanwhile the
phone can be exposed to theft or lost.
Although the original image is deleted or overwritten with the encrypted image, it is still possible to
reconstruct it using data recovery techniques.
They retain the original file, causing a vulnerability if this is not erased.
Based on the above, this paper shows the development of an application for smartphones with Android
operating system to keep confidential those photographs with sensitive information. This is done at the moment
of capturing, encrypting the image data that are returned by the camera through an array of bytes. The resulting
arrangement, it may be said, the one containing the encrypted data, is the one stored in a file.
II. CRYPTOGRAPHY
Cryptography is the science that deals with the study of techniques to transform the information in such a
way that it may not be understood at a simple glance. Usually to encrypt a file it is necessary to establish a clue
or a key, also known as password. The key should only be known by the person or persons who wish to have an
access to the encrypted information (Aguillon, 2012).
When it is required to keep certain information secret so that only the person who knows the correct password
may be able to have access to it, the symmetric key cryptography that consists in performing the encryption
and decryption of a message using the same secret clue or key is used (Stallings, 2011: 33), as shown in Figure
2.
Figure2. Symmetric scheme of the cryptographic key
Among the symmetric key algorithms are:
DES (Data Encryption Standard)
TripleDES o TDES
AES (Advanced Encryption Standard)
IDEA (International Data Encryption Algorithm)
Blowfish
Twofish
RC4
Applications Method of protection
KeepSafe
Smart Gallery Lock
By modifying the properties of the image,
move the image to a hidden folder and
change its extension .
Super silent spy camera
Camopic
Using steganography, they hide the data of
the secret a image in such a way that
cannot be noticed the existence of the first.
Photo Locker
SafeCamera
Using cryptography they generate an
encrypted or secret image by applying a
cryptographic algorithm and a secret key .
3. Photography Capture And Encryption On Smartphones With Android Operating System
www.ijres.org 55 | Page
For this project AES was used that works with blocks of 256 bits in length, this algorithm was published in
2001 by the National Institute of Standards and Technology (NIST) as FIPS PUB 197, It was later adopted as
standard encryption by the government of the United States. Its main features are:
Key of 128, 192 and 256 bits. This meets the security needs of the user.
It is of common knowledge that it has been studied and tested by cryptanalysts worldwide, positioning
itself as a highly reliable algorithm.
In the PKCS#5 (standard password-based encryption) a standardized symmetric key encryption is described
called PBES2 (Password-Based Cryptography Standard 2) which can involve selection of parameters such as an
initialization vector and a refilledmethod. A bypass function based key password is combined which should be
PBKDF2 (Password-Based Key Derivation Function 2) . (Kaliski, 2000: 9).
It is a fact that the length of the information needed to encrypt not always will be a multiple of 256 bits (16
bytes) for that, padding or filling methods are employed in order to achieve the required length. The method
specified in PBES2 known as padding and consists of adding N number of bytes as needed, where the value of
each byte is equal to N (Kaliski, 2000: 11), this can be viewed in Figure 3.
As already mentioned AES works 256-bit blocks, thus to encrypt greater length information it is necessary
to use what is known as the operating mode. The most widely used is the CBC (Cipher Block Chaining) that
consists of applying the XOR operation on the plaintext and cipher text of the previous block.
As in the first block, cipher text is not available from a previous cipher text block, an initialization vector
containing random values is introduced. Thus it is achieved that two identical messages will not generate the
same ciphertext (Stallings, 2011: 199),. The operation is described in Figure 3.
Figure 3. Encryption in CBC mode
To generate the 128, 192 or 256 bits that form the encryption key used with AES, key derivation functions
are used. These receive as input besides the user's password, a number of iterations and a string of randomly
generated bytes, this helps mitigate dictionary attacks and rainbow tables. The function used is PBKDF2
(Password-Based Key Derivation Function 2) (Kaliski, 2000: 11), which is described as follows:
DK = PBKDF2(PRF, P, S, c, dkLen) (1)
Where:
PRF: pseudorandom function used
P: User password
S: Sal, generated randomly
c: Number of iterations
dKLen: Length of the derived key
DK: Derivative key
III. MATERIALS AND METHODS
The software used for the design and programming was Eclipse v4.2 along Android SDK was integrated,
the programming languages used were Java and XML. We worked with the spiral software development model
in such a way that in the first stage will have the basic operation of encrypting a photograph, and in later stages
the interaction would improve and perfection its interaction with the user.
The application is divided into five activity’s or windows:
Menu
Request of the password for encryption
Camera Interface
File Browser
Request of the password for decryption
The overall operation and the flow of information is illustrated in Fig. 4.
The menu is what is first shown when the application starts, it is made up of two buttons, the first one calls the
activity "Password request." The idea is to work with a password by session of photography, this means that the
4. Photography Capture And Encryption On Smartphones With Android Operating System
www.ijres.org 56 | Page
photographs taken at one point or at the same time should be encrypted with the same password, this provides
a balance of security and productivity. The second button calls for the "File Explorer" so that the user may
choose the picture he needs to decipher. In Figure 5 this section is observed.
Figura 4. Application scheme
Figure 5. Screen where the menu is displayed
Next the user is asked to enter a password for the photography session. It requires that the word entered has
a minimum length of 8 characters according to letters and numbers. When the word entered meets these
characteristics the activity is called "Camera interface" sending as a parameter the password entered.
Figure 6 The design is shown
Figure 6. Screen where the password is required
Subsequently, the interface lets you view what the camera sensor captures. It has a button that activates
capture processes and encryption as shown in Figure 7. Once the user presses this button, is generated in the
RAM of the phone, a vector of bytes with the photo information in format JPEG. The vector and the user's
password enter the encryption process comprising the following phases:
Key derivation:. Added to the PBKDF2 function is the password, a number of 1000 iterations and the salt
consisting of MD5 hash of the photography that yield an output a 256-bit key length.
Encryption: It is performed with the AES-256 algorithm in CBC mode and PKCS5Padding, for this, the key
is introduced, the vector containing the photograph information and an initialization vector that just as the salt
consists in the MD5 hash of the picture.
5. Photography Capture And Encryption On Smartphones With Android Operating System
www.ijres.org 57 | Page
After the contents of the vector encryption with the MD5 hash of the unencrypted image is stored in the
multimedia default directory /mnt/sdcard/ DCIM with the extension .jpg. After this process is ended we may
have the possibility for more captures. When you want to encrypt with another password you only have to
return to the start menu and start a new photo session.
Figure 7. Camera’s interface.
Once you have encrypted photographs and the user wants to view its contents, you can access the file
browser, it allows you to navigate through folders and select a file with the extension .jpg, when this is done you
call the activity "Petition password for decryption "sending the path of the selected file. Figure 8.
Figure 8. File Browser.
Once the file is selected a password is requested, validating the user to enter at least one character. Once the
password is entered the data file is read and inserted into a vector, the vector and password are sent to the
decryption process. If the password is correct, the vector will contain the photo data which are stored in the
same directory as the encrypted file.
IV. RESULTS
Two types of tests were conducted, the first of which was to estimate the time of encryption and decryption
in the second the integrity of photography that means that the image data unencrypted (original) were the same
data of the decoded image.
V. TIME OF ENCRYPTION AND DECRYPTION
By the "LogCat" tool integrated in Eclipse, the times that take the application to perform the encryption
and decryption of a photograph measured in milliseconds, they were measured.The results are shown in Table
II.
6. Photography Capture And Encryption On Smartphones With Android Operating System
www.ijres.org 58 | Page
TableII. Measuring time encryption and decryption
Num. Encryption Decryption
1 586 586
2 742 742
3 710 625
4 687 548
5 734 656
The average time duration of the encryption process is 692 milliseconds, and the average time for the
decryption process is 632. This covers the time occupied by the PBKDF2 function and AES. The tests were
conducted in 2-megapixel images captured with a Samsung Galaxy Y phone, which is one of the phones with
the lowest processing power.
VI. INTEGRIDAD DE LA FOTOGRAFÍA
This test was to verify that the data of the unencrypted image and that of the decoded image are exactly the
same, in order to do, this application was modified in such a way that photography was stored unencrypted and
also its cryptogram. The test consisted in realizing several shots and after deciphering the cryptograms
generated, the images obtained were analyzed with the "MD5 & SHA-1 Checksum Utility" and "ExifTool"
programs. The results showed that no bit was modified in the decoded image, since the hash of the original
image and the encrypted one were identical and there was no change in their metadata of creation.
VII. CONCLUSIONS
The developed application is very useful for those who require confidential use of photographs, having the
confidence that these images are protected by reliable mechanisms, plus the time needed for the encryption
process is virtually imperceptible, the user can also be sure that the photograph did not suffer any alterations.
REFERENCES
[1] Royal Pingdom. (2013). El aplastante dominio de Android, en cinco gráficos. 14-05-2015, Website of The Economist:
http://www.eleconomista.es/CanalPDA/2013/42591/el-aplastante-dominio-de-android-en-cinco-graficos/
[2] William Stallings. (2011). CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE FIFTH
EDITION. United States of America: Prentice Hall.
[3] Erika Aguillón Martínez. (2012). Servicios de Seguridad de OSI. 14-04-2015, de UNIVERSIDAD NACIONAL AUTÓNOMA
DE MÉXICO Sitio web: http://redyseguridad.fi-p.unam.mx/proyectos/criptografia/criptografia/index.php/1-panorama-
general/11-concepto-de-criptografia.
[4] B. Kaliski. (2000). PKCS #5: Password-Based Cryptography Specification Version 2.0. RSA Laboratories: Network Working
Group.
[5] H. Maiorano. (2009). Criptografía: técnicas de desarrollo para profesionales. Buenos Aires: Alfaomega.
AUTHOR PROFILE:
Carlos Cortés Bazán, Computer Systems Engineer from Tecnologico de Estudios Superiores
del Oriente Mexico State in 2006 with honors. From 2006-2009 he worked in the development
of various relevant software projects for the National Polytechnic Institute. He is an academic
member of the International Network for Engineering Education since 2011. In 2013 he
receives the Master degree in Engineering and Safety Information Technology. He is currently a
full-time research professor in the Department of Computer Engineering in ESIME Culhuacan I.P.N. His
research interests include the development of systems, databases, computer forensics, cryptography and analysis
of algorithms.
Dolores Zamorano Saavedra. She is a methodological research and hasmaster's degree in
Educational Sciences. Now a days it is a research professor at the School of Mechanical and
Electrical Engineering (ESIME) in Mexico. Her areas of development are assessment and project
development, scientific writing and methodology of science
Celedonio Enrique Aguilar Meza wasborn in Mexico on march 3, 1959andholds a degree in
communications and electronicsfrom theNationalPolytechnic Institute IPN, is currentlyre search
professoranddevelopment areas are the processing and handling, coding and compression, safety
and efficient transmission.