Posts

Showing posts from September, 2022
Image
 Submit Your Articles Now..! 6th International Conference on Networks and Security (NSEC 2022) December 22 ~ 23, 2022, Sydney, Australia https://inwes2022.org/nsec/index Contact Us Here's where you can reach us : nsec@inwes2022.org (or) nsecconfe@yahoo.com #Internetofthings,#Algorithum,#Bigdatasecurity,#Datamining,#Blockchain,#Networksecurity
Image
  Paper Title A SECURE BLOCK PERMUTATION IMAGE STEGANOGRAPHY ALGORITHM Author Hussein Al-Bahadili Abstract Steganography is the art of hiding confidential information (secret) within any media file (cover media) to produce an amalgamated secret-cover media called stego media, so that the secret cannot be recognized or recovered by unauthorized recipients. Many steganalysis techniques have been developed enabling recognition of the existence of secrets within stego media and recovering it. Therefore, it is necessary to develop more secure steganography algorithms. This paper presents a detailed description of a new secure Block Permutation Image Steganography (BPIS) algorithm. The algorithm converts the secret message to a binary sequence, divides the binary sequence into blocks, permutes the block using a key-based randomly generated permutation, concatenates the permuted blocks forming a permuted binary sequence, and then utilizes the Least-Significant-Bit (LSB) approach to embed ...
Image
#AIRCC #IJCIS International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission URL: http://coneco2009.com/submissions/imagination/home.html Contact Us: ijcisjournal@wireilla.com
Image
#IJCIS #cryptosystems #SecurityEngineering #Software Security Paper Title Performance Analysis of Sha-2 and Sha-3 Finalists Author Ram Krishna Dahal, Jagdish Bhatta, Tanka Nath Dhamala Abstract National Institute of Science and Technology (NIST) published the first Secure Hash Standard SHA-0 in 1993 as Federal Information Processing Standard publication (FIPS PUBS) which two years later was replaced by SHA-1 to improve the original design and added SHA-2 family by subsequent revisions of the FIPS. Most of the widely used cryptographic hash functions are under attack today. With the need to maintain a certain level of security, NIST had selected new cryptographic hash function through public competition. The winning algorithm, Keccak will not only have to establish a strong security, but also has to exhibit good performance and capability to run. In this context, we have analysed SHA-3 finalists along with the used standard SHA-2. The performances of respective algorithms are evaluated ...
Image
8th International Conference on Software Security (ICSS 2022) December 23 ~ 24, 2022, Sydney, Australia Webpage URL: https://cndc2022.org/icss/index Submission Deadline: September 24, 2022 Contact us: Here's where you can reach us: icss@cndc2022.org or icssconfe@yahoo.com Submission URL: https://cndc2022.org/submission/index.php
Image
#researchers #phd #articles #papersubmission #student #researchscholors #AIRCC #IJCIS #FuzzySystems #SecurityEngineering #WirelessNetworkSecurity Call For Papers...!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission System: ijcisjournal@wireilla.com    Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com Submission Deadline : September 24, 2022
Image
Call for Papers!! 2nd International Conference on Cryptography and Blockchain (CRBL 2022) October 22 ~ 23, 2022, Sydney, Australia Webpage URL: https://comit2022.org/crbl/index Submission URL: https://comit2022.org/submission/index.php Authors are invited to submit papers through the conference Submission System by September 17, 2022. Contact Us: crbl@comit2022.org or crblconf@yahoo.com
Image
#IJCIS #cryptosystems #SecurityEngineering #Software Security Elliptic Curve Cryptography in Securing Networks by Mobile Authentication Author Manoj Prabhakar  Abstract This paper proposes an enhanced authentication model, which is suitable for low-power mobile devices. It uses an Extended Password Key Exchange Protocols [2] and elliptic-curve-cryptosystem based trust delegation mechanism to generate a delegation pass code for mobile station authentication, and it can effectively defend all known attacks to mobile networks including the denial-of-service attack. Moreover, the mobile station only needs to receive one message and send one message to authenticate itself to a visitor’s location register, and the model only requires a single elliptic-curve scalar point multiplication on a mobile device. Therefore, this model enjoys both computation efficiency and communication efficiency as compared to known mobile authentication models. Keywords Mobile authentication, denial-of-service...
Image
#researchers #phd #articles #papersubmission #student #researchscholors #AIRCC #IJCIS #FuzzySystems #SecurityEngineering #WirelessNetworkSecurity ***Paper Submission*** International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Indexing URL: https://wireilla.com/ijcis/indexing.html Submission System: ijcisjournal@wireilla.com    Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com Submission Deadline : September 17, 2022
Image
 #5G #networks #technology #adhoc #manet  Submit your Research Papers!!! 11th International Conference of Networks and Communications (NECO 2022) November 26 ~ 27, 2022, London, United Kingdom Webpage URL: https://iccsea2022.org/neco/index Submission URL: https://iccsea2022.org/submission/index.php Here's where you can reach us : neco@iccsea2022.org or necoconf2022@gmail.com
Image
International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Paper Title: Blind and Robust Images Watermarking Based on Wavelet and Edge Insertion Website URL: https://wireilla.com/ijcis/index.html Volume URL: https://wireilla.com/ijcis/vol3.html Paper URL: https://wireilla.com/papers/ijcis/V3N3/3313ijcis03.pdf Submission through Email: ijcisjournal@wireilla.com   Submission Link: http://coneco2009.com/submissions/imagination/home.html Here's where you can reach us: ijcisjournal@yahoo.com ABSTRACT  This paper gives a new scheme of watermarking technique related to insert the mark by adding edge in HH sub-band of the host image after wavelet decomposition. Contrary to most of the watermarking algorithms in wavelet domain, our method is blind and results show that it is robust against the JPEG and GIF compression, histogram and spectrum spreading, noise adding and small rotation. Its robustness against compression is better than others watermarking alg...
Image
#researchers #phd #articles #papersubmission #student #researchscholors #AIRCC #IJCIS #Cryptographic #Quantum cryptography Call For Papers...!!! International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Web page URL: https://wireilla.com/ijcis/index.html Submission System: ijcisjournal@wireilla.com    Submission System: http://allcfps.com/wireilla/submission/index.php Contact Us: ijcisjournal@yahoo.com or ijcisjournal@wireilla.com Submission Deadline : September 10, 2022
Image
International Journal on Cryptography and Information Security (IJCIS) ISSN : 1839-8626 Paper Title: A Secure Color Image Steganography in Transform Domain    Website URL: https://wireilla.com/ijcis/index.html Volume URL: https://airccse.org/journal/ijcis/current2013.html Paper URL: https://wireilla.com/papers/ijcis/V3N1/3113ijcis03.pdf Submission through Email: ijcisjournal@wireilla.com   Submission Link: http://coneco2009.com/submissions/imagination/home.html Here's where you can reach us: ijcisjournal@yahoo.com ABSTRACT  Steganography is the art and science of covert communication. The secret information can be concealed in content such as image, audio, or video. This paper provides a novel image steganography technique to hide both image and key in color cover image using Discrete Wavelet Transform (DWT) and Integer Wavelet Transform (IWT). There is no visual difference between the stego image and the cover image. The extracted image is also similar to the secret...