Posts

Showing posts from March, 2019

IMAGE ENCRYPTION USING FIBONACCI-LUCAS TRANSFORMATION

Image
IMAGE ENCRYPTION USING FIBONACCI-LUCAS TRANSFORMATION Minati Mishra 1 , Priyadarsini Mishra 2 , M.C. Adhikary 3 and Sunit Kumar 4 1 P.G. Department of Information & Communication Technology, F.M. University, Balasore, Odisha, India 2 District Rural Development Agency, Balasore, Odisha, India 3 Department of Applied Physics and Ballistics, Fakir Mohan University, Balasore, Odisha, India 4 Jamshedpur Co-operative College, Kolhan University, Jharkhand, India ABSTRACT  Secret communication techniques are of great demand since last 3000 years due to the need of information security and confidentiality at various levels of communication such as while communicating confidential personal data , patients’ medical data, countries’ defence and intelligence information, data related to examinations etc. With advancements in image processing research, Image encryption and Steganographic techniques have gained popularity over other forms of hidden communication techniq...

ARCHITECTURAL OPTIMIZATION OF AES TRANSFORMATIONS AND KEYEXPANSION

Image
ARCHITECTURAL OPTIMIZATION OF AES TRANSFORMATIONS AND KEYEXPANSION K. Rahimunnisa 1 , M. Priya Zach 1 , S. Suresh Kumar 2 , J.Jayakumar 3 1 Department of Electronics and Communication Engineering, Karunya University, Coimbatore, India. 2 Department of Electronics and Communication Engineering, Dr. N.G.P Institute of Technology, Coimbatore, India. 3 Department of Electrical and Electronics Engineering, Karunya University, Coimbatore, India. ABSTRACT Advanced Encryption Standard (AES), is a cryptographic algorithm used for data protection. Designing an efficient hardware architecture for AES with small hardware resource usage is a challenge. Many works are going on for the efficient implementation of AES. The cost and power consumption of the AES can be reduced considerably by optimizing the architecture of AES. AES uses different data transformations such as AddRoundKey, SubByte, ShiftRow and MixColumn transformation and KeyExpansion block. In that, the two expens...

A SECURE ENCRYPTION LOGIC FOR COMMUNICATION IN WIRELESS SENSOR NETWORKS

Image
A SECURE ENCRYPTION LOGIC FOR COMMUNICATION IN WIRELESS SENSOR NETWORKS Shanta Mandal and Rituparna Chaki Department of Computer Science and Engineering, West Bengal University of Technology, Salt Lake, Kolkata, India Department of Computer Science and Engineering, West Bengal University of Technology, Salt Lake, Kolkata, India ABSTRACT This paper presents an encryption scheme suitable for direct diffusion protocols. We have calculated computational and communication overheads in terms of energy consumption using Directed Diffusion protocol. Public-key cryptography has been observed to suffer from high computational complexity and overhead. The symmetric-key schemes can be utilized more efficiently in order to provide more security. The proposed scheme overcomes the limitations of public-key and symmetric-key protocols for wireless sensor networks in respect of low energy consumption. The symmetric-key function is used to guarantee secure communications between the n...

A novel approach for cryptography technique on Perturbed data for Distributed Environment

Image
A novel approach for cryptography technique on Perturbed data for Distributed Environment  Nishant Doshi  National Institute of Technology, Surat, India  Abstract  Using the methods of data mining, one can search for large patterns in the huge database system. Now with the amassed evolution of technology, the data requirements and the amount of the data will significantly increase. Therefore, the data mining users,uses new methods for pattern matching which can be used for decision making. The data stored by the organizations are in a bulk. Therefore, when user gives a particular query, the amount of important or secure data can also be revealed as an answer of a query. This can harm to reputation of an organization. Therefore, privacy can concern to the above issue that not reveals any such kind of information about data provider and vice versa. Therefore, data needs to be modified without losing the data integrity. This paper outlines a method tha...

A DEFENSE MECHANISM FOR CREDIT CARD FRAUD DETECTION

Image
A DEFENSE MECHANISM FOR CREDIT CARD FRAUD DETECTION   M.Sasirekha , Sumaiya Thaseen   and Saira Banu School of Computing Science and Engineering, VIT University, Tamil Nadu, India. ABSTRACT Computer security is one of the key areas where lot of research is being done. Many intrusion detection techniques are proposed to ensure the network security, protect network resources and network infrastructures. Intrusion detection systems (IDS) attempt to detect attacks by gathering network data and analyze the information from various areas to identify the possible intrusions. This paper proposes a defense mechanism combining three approaches such as anomaly, misuse and decision making model to produce better detection accuracy and a decreased false positive rate. The defense mechanism can be built to detect the attacks in credit card system using Hidden Markov approach in the anomaly detection module. The credit card holder’s behaviours are taken as attributes and t...

Blind Image Steganalysis Based on Contourlet Transform

Image
Blind Image Steganalysis Based on Contourlet Transform  Natarajan V and R Anitha Department of Applied Mathematics and Computational Sciences, PSG College of Technology, Coimbatore, India.  ABSTRACT  This paper presents a new blind approach of image Steganalysis based on contourlet transform and non linear support vector machine. Properties of Contourlet transform are used to extract features of images, and non linear support vector machine is used to classify the stego and cover images. The important aspect of this paper is that, it uses the minimum number of features in the transform domain and gives a better accuracy than many of the existing stegananlysis methods. The efficiency of the proposed method is demonstrated through experimental results. Also its performance is compared with the state of the art wavelet based steganalyzer (WBS), Feature based steganalyzer (FBS) and Contourlet based steganalyzer (WBS). Finally, the results show that the propo...

ENHANCING SECURITY OF QUALITY SONG WITH EMBEDDING ENCRYPTED HIDDEN CODE IN TOLERANCE LEVEL (SQHTL)

Image
ENHANCING SECURITY OF QUALITY SONG WITH EMBEDDING ENCRYPTED HIDDEN CODE IN TOLERANCE LEVEL (SQHTL) Uttam Kr. Mondal 1 and J.K.Mandal 2   1 Dept. of CSE & IT, College of Engg. & Management, Kolaghat, W.B, India 2 Dept. of CSE, University of Kalyani, Nadia (W.B.), India ABSTRACT Embedding secret information with song signal may hamper its audible quality as well as originality also would be infringed. Therefore, passing secret code with song signal precisely needs to measure the embedded data volume with song signal within embedding tolerance level. In this paper, embedded secret data with linear coding principles has been applied, enhanced security criteria has been maintained with the help of elliptic curve cryptographic application. Hiding information into audio signals and audible quality is maintained only by calculating the acceptance ratio of embedding data using human perception, modulation of channel capacity in modified form is used to determin...

NOVEL ELLIPTIC CURVE SCALAR MULTIPLICATION ALGORITHMS FOR FASTER AND SAFER PUBLIC-KEY CRYPTOSYSTEMS

Image
NOVEL ELLIPTIC CURVE SCALAR MULTIPLICATION ALGORITHMS FOR FASTER AND SAFER PUBLIC-KEY CRYPTOSYSTEMS Vinay S. Iyengar Oregon Episcopal School, Portland, Oregon, USA ABSTRACT Efficient and secure public-key cryptosystems are essential in today’s age of rapidly growing Internet communications. Elliptic curve scalar multiplication in particular, which refers to the operation of multiplying a large integer by a point on an elliptic curve, is crucial for both data encryption technology as well as testing the security of cryptographic systems. The purpose of this project was to design and implement an elliptic curve scalar multiplication algorithm 10% faster than one of the best algorithms currently used: the binary double-add algorithm. The algorithm designed was based off of an operation that allowed for the tripling of a point and was derived from point doubling and addition operations. The algorithm was further optimized using an integer representation in both ternary a...

TRIPARTITE KEY AGREEMENT PROTOCOL USING TRIPLE DECOMPOSITION SEARCH PROBLEM

Image
TRIPARTITE KEY AGREEMENT PROTOCOL USING TRIPLE DECOMPOSITION SEARCH PROBLEM   T.Isaiyarasi 1 , Dr.K.Sankarasubramanian 2 1 Research Scholar, Bharathiar University &Assistant Professor Department of Mathematics, Valliammai Engineering College S.R.M.Nagar ,Kattankulathur, Tamil Nadu -603203, India   2 Research Supervisor, Bharathiar University & Professor, Department of Mathematics, Sri Sairam Engineering College. SaiLeo Nagar –West Tambaram ,Tamilnadu-600044 ,India ABSTRACT A Key Agreement Protocol is a tool by which two parties can share a common key for their subsequent communication .Many cryptographic protocols are based on the hardness of Integer Factorization and Discrete Logarithm Problem. Very few Protocols are based on search problems in non – abelian groups. In this paper we present a Tripartite Key Agreement Protocol Using Triple Decomposition Search Problem using which three parties may agree on a common shared key in two rounds. We hav...

LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY

Image
LANGUAGE-BASED SECURITY TO APPLY COMPUTER SECURITY Ali Ahmadian Ramaki 1 and Reza Ebrahimi Atani 2   1 Department of Computer Engineering, Guilan University, Rasht, Iran 2 Department of Computer Engineering, Guilan University, Rasht, Iran ABSTRACT Language-based security is a mechanism for analysis and rewriting applications toward guaranteeing security policies. By use of such mechanism issues like access control by employing a computing base would run correctly. Most of security problems in software applications were previously handled by this component due to low space of operating system kernel and complicacy. These days this task by virtue of increasing space of OS applications and their natural complicacy is fulfilled by novel proposed mechanisms which one of them is treated as security establishment or using programming languages techniques to apply security policies on a specific application. Language-based security includes subdivisions such as In-lined...

SAFETY MEASURES AND PRIVACY IN E-PASSPORT SCHEME USING CRYPTOGRAPHIC PROTOCOLS AND BIOMETRICS TECHNOLOGY

Image
SAFETY MEASURES AND PRIVACY IN E-PASSPORT SCHEME USING CRYPTOGRAPHIC PROTOCOLS AND BIOMETRICS TECHNOLOGY V.K. Narendira Kumar 1 and B. Srinivasan 2 1 Assistant Professor, Department of Information Technology, 2 Associate Professor, PG & Research Department of Computer Science, Gobi Arts & Science College (Autonomous), Gobichettipalayam – 638 453, Erode District, Tamil Nadu, India   ABSTRACT The goal of the adoption of the electronic passport is not only to expedite dealing out at border crossings, but also to increase safety measures and privacy. Important in their own right, electronic passports are also the harbinger of a wave of nextgeneration electronic passports: numerous national governments plan to set up electronic passport integrating cryptography safety measures algorithm and biometrics. We walk around the privacy and safety measures implications of this impending worldwide experiment in biometrics certification technology. We describe privacy ...

VIDEO SURVEILLANCE IN THE CLOUD?

Image
VIDEO SURVEILLANCE IN THE CLOUD?  DJ Neal 1 and Syed (Shawon) Rahman, Ph.D. 2 1 Information Assurance and Security, Capella University, Minneapolis, MN, USA 2 Assistant Professor, University of Hawaii-Hilo, HI USA and Adjunct Faculty, Capella University, Minneapolis, MN, USA syed. ABSTRACT  A high-resolution video surveillance management system incurs huge amounts of storage and network bandwidth. The current infrastructure required to support a high-resolution video surveillance management system (VMS) is expensive and time consuming to plan, implement and maintain. With the recent advances in cloud technologies, opportunity for the utilization of virtualization and the opportunity for distributed computing techniques of cloud storage have been pursued on the basis to find out if the various cloud computing services that are available can support the current requirements to a highresolution video surveillance management system. The research concludes,...

DEPLOYMENT OF REVERSE PROXY FOR THE MITIGATION OF SQL INJECTION ATTACKS USING INPUT-DATA CLEANSING ALGORITHM

Image
DEPLOYMENT OF REVERSE PROXY FOR THE MITIGATION OF SQL INJECTION ATTACKS USING INPUT-DATA CLEANSING ALGORITHM S. Fouzul Hidhaya 1, 2 and Angelina Geetha 1, 3   1 Department of Computer science and Engineering, B.S. Abdur Rahman University, Chennai, Tamilnadu, India. ABSTRACT  Internet has eased the life of human in numerous ways, but the drawbacks like the intrusions that are attached with the Internet applications sustains the growth of these applications. Hackers find new methods to intrude the applications and the web application vulnerability reported is increasing year after year. One such major vulnerability is the SQL Injection attacks (SQLIA). Since SQLIA contributes 25% of the total Internet attacks, much research is being carried out in this area. In this paper we propose a method to detect the SQL injection. We deploy a Reverse proxy that uses the input-data cleansing algorithm to mitigate SQL Injection Attack. This system has been tested on stan...

AN IMPROVED CERTIFIED E MAIL PROTOCOL BASED ON AUTHOR BASED SELECTIVE RECEIPT

Image
AN IMPROVED CERTIFIED E MAIL PROTOCOL BASED ON AUTHOR BASED SELECTIVE RECEIPT Ranadeep Mukherjee, Ambar Dutta Department of Computer Science and Engineering, Birla Institute of Technology ABSTRACT The paper proposes improvements to the Certified E mail Protocol proposed by Imamoto and Sakurai in terms of implementing the ‘No Author Selective receipt’ concept. It also aims to provide complete anonymity for the communicating parties as well as protecting the sender from being adversely effected by the collusion between the Receiver and the Notice Board. KEYWORDS Certified E mail, Notice Board, Selective Receipt SOURCE URL https://wireilla.com/papers/ijcis/V2N4/2412ijcis07.pdf VOLUME LINK https://wireilla.com/ijcis/vol2.html

AUTHENTICATION SCHEMES USING POLYNOMIALS OVER NON-COMMUTATIVE RINGS

Image
AUTHENTICATION SCHEMES USING POLYNOMIALS OVER NON-COMMUTATIVE RINGS Maheswara Rao Valluri School of Mathematical &Computing Sciences, College of Engineering, Science & Technology Fiji National University, P.O.Box:7222, Derrick Campus, Suva, Fiji ABSTRACT Authentication is a process by which an entity, which could be a person or intended computer, establishes its identity to another entity. In private and public computer networks including the Internet, authentication is commonly done through the use of logon passwords. Knowledge of the password is assumed to guarantee that the user is authentic. Internet business and many other transactions require a more stringent authentication process. The aim of this paper is to propose two authentication schemes based on general non-commutative rings. The key idea of the schemes is that for a given non-commutative ring; one can build polynomials on additive structure and takes them as underlying work structure. By doing ...

IMPROVED CAESAR CIPHER WITH RANDOM NUMBER GENERATION TECHNIQUE AND MULTISTAGE ENCRYPTION S

Image
IMPROVED CAESAR CIPHER WITH RANDOM NUMBER GENERATION TECHNIQUE AND MULTISTAGE ENCRYPTION  S G Srikantaswamy 1 and Dr. H D Phaneendra 2 1 Research scholar, National Institute of Engineering, Mysore 2 Professor and Research Guide, National Institute of Engineering, Mysore ABSTRACT : Hence in this paper we have proposed a method to improve Caesar cipher with random number generation technique for key generation operations. The Caesar cipher has been expanded so as to include alphabets, numbers and symbols. The original Caesar cipher was restricted only for alphabets. The key used for Caesar Substitution has been derived using a key Matrix Trace value restricted to Modulo 94. The Matrix elements are generated using recursive random number generation equation, the output of which solely depends on the value of seed selected . In this paper, we made an effort to incorporate modern cipher properties to classical cipher. The second stage of encryption has been performe...