The concept is to capture and preserve the intruder’s details in unattended mode. A camera is integrated
with a processing unit and counter arrangement to ensure authenticity and non-repudiation of the captured
images of the intruder before court of law. Ownership claim is justified concocting confidential data
sharing of visual cryptography. Signal quality is retained and unauthorized tampering of secret data
resisted. Entire procedure indulges: Message Digest M is generated using SHA-2 from the date and time
stamp of the acquired image, two shares are generated from MAC address (K) of the network card and
encryption is done using AES involving encoding using Hamming 1 – bit technique. The cover image is
prepared in DCT domain to restrict JPEG compression. Sensitive data is embedded in restricted areas of
DCT transformed image. Extraction of secret data verifies an intruder. The experimental results prove its
efficacy over existing conventional system.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
Hiding algorithm based fused images and Caesar cipher with intelligent securi...IJECEIAES
The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
The Internet of Things (IoT) is the interconnection of things around us to make our daily process more efficient by providing more comfort and productivity. However, these connections also reveal a lot of sensitive data. Therefore, thinking about the methods of information security and coding are important as the security approaches that rely heavily on coding are not a strong match for these restricted devices. Consequently, this research aims to contribute to filling this gap, which adopts machine learning techniques to enhance network-level security in the low-power devices that use the lightweight MQTT protocol for their work. This study used a set of tools tools and, through various techniques, trained the proposed system ranging from Ensemble methods to deep learning models. The system has come to know what type of attack has occurred, which helps protect IoT devices. The log loss of the Ensemble methods is 0.44, and the accuracy of multi-class classification is 98.72% after converting the table data into an image set. The work also uses a Convolution Neural Network, which has a log loss of 0.019 and an accuracy of 99.3%. It also aims to implement these functions in IDS.
Blockchain based security framework for sharing digital images using reversib...Christo Ananth
Christo Ananth, Denslin Brabin, Sriramulu Bojjagani, “Blockchain based security framework for sharing digital images using reversible data hiding and encryption”, Multimedia Tools and Applications, Springer US, Volume 81,Issue 6, March 2022,pp. 1-18.
Description:
Christo Ananth et al. emphasized that Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in next-generation networks. Digital images are the prime medium attacked by cyber attackers. In this paper, a blockchain based security framework is proposed for sharing digital images in a multi user environment. The proposed framework uses reversible data hiding and encryption as component techniques. A novel high capacity reversible data hiding scheme is also proposed to protect digital images. Reversible data hiding in combination with encryption protects the confidentiality, integrity and authentication of digital images. In the proposed technique, the digital image is compressed first to create room for data hiding, then the user signature is embedded; afterwards the whole image is encrypted. For compression, JPEG lossy compression is used to create high capacity. For encryption, any symmetric block cipher or stream cipher can be used. Experimental results show that the proposed blockchain based framework provides high security and the proposed reversible data hiding scheme provides high capacity and image quality.
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanetijcisjournal
1) The document discusses an encryption algorithm to evaluate the performance of vehicle-to-vehicle (V2V) communication in vehicular ad hoc networks (VANETs).
2) The algorithm uses private key encryption for V2V communication between two vehicles. The vehicles agree on random numbers and perform calculations to derive a shared secret key.
3) The performance of the encryption algorithm is evaluated using the QualNet network simulator.
Ijri ece-01-01 joint data hiding and compression based on saliency and smvqIjripublishers Ijri
Global interconnect planning becomes a challenge as semiconductor technology continuously scales. Because of the increasing wire resistance and higher capacitive coupling in smaller features, the delay of global interconnects becomes large compared with the delay of a logic gate, introducing a huge performance gap that needs to be resolved A novel equalized global link architecture and driver– receiver co design flow are proposed for high-speed and low-energy on-chip communication by utilizing a continuous-time linear equalizer (CTLE). The proposed global link is analyzed using a linear system method, and the formula of CTLE eye opening is derived to provide high-level design guidelines and insights.
Compared with the separate driver–receiver design flow, over 50% energy reduction is observed.
A dynamic data encryption method based on addressing the data importance on ...IJECEIAES
The rapid growth of internet of things (IoT) in multiple areas brings research challenges closely linked to the nature of IoT technology. Therefore, there has been a need to secure the collected data from IoT sensors in an efficient and dynamic way taking into consideration the nature of collected data due to its importance. So, in this paper, a dynamic algorithm has been developed to distinguish the importance of data collected and apply the suitable security approach for each type of data collected. This was done by using hybrid system that combines block cipher and stream cipher systems. After data classification using machine learning classifiers the less important data are encrypted using stream cipher (SC) that use rivest cipher 4 algorithm, and more important data encrypted using block cipher (BC) that use advanced encryption standard algorithm. By applying a performance evaluation using simulation, the proposed method guarantees that it encrypts the data with less central processing unit (CPU) time with improvement in the security over the data by using the proposed hybrid system.
An Overview of Visual Cryptography based Video Watermarking Schemes: Techniqu...idescitation
Digital communication has seen exponential growth in the past decade.
Consequently, the security of digital data has become a field of extensive research since
piracy and unauthorized use of such data is prevalent because of the ease with which data
can be replicated or tampered. Visual Cryptography (VC) is a special cryptographic
technique where decryption is done by an authorized user by simply overlaying the shares.
Thus, there is no requirement for complex computations unlike normal cryptography.
Though simple for an authorized user, it is equally difficult for an unauthorized user to
attack since the secret message can be deciphered if and only if all the shares are available
to the attacker. The probability of this is negligibly small since one of the shares usually
needs to be registered with a Certified Authority (CA). The procedure is non- intrusive and
does not alter the contents of the host image or video. For this reason, VC has been applied
to image watermarking widely. In case of video watermarking applications, robustness
against different types of attacks like frame attacks, spatial and temporal desynchronization
attacks, statistical analysis and collusion attacks need to be considered. Also creation of
shares for videos requires feature extraction techniques which are different from that of
images. Moreover, as size of video is more, a large secret payload can be used to construct a
share. In this survey paper, the research being carried out globally on VC techniques for
videos, along with their pros and cons have been highlighted. The paper also discusses
challenges in applying VC for video watermarking. Further, a performance comparison
amongst the mentioned schemes is also provided.
Enhancing Security of Multimodal Biometric Authentication System by Implement...IOSR Journals
Abstract : Conventional personal identification techniques for instance passwords, tokens, ID card and PIN
codes are prone to theft or forgery and thus biometrics isa solution thereto. Biometrics is the way of recognizing
and scrutinizing the physical traits of a person. Automated biometrics verification caters as a conducive and
legitimate method, but there must be an assurance to its cogency. Furthermore, in most of the cases unimodal
biometric recognition is not able to meet the performance requirements of the applications. According to recent
trends, recognition based on multimodal biometrics is emerging at a greater pace. Multimodal biometrics
unifies two or more biometric traits and thus the issues that emerge in unimodal recognition can be mitigated in
multimodal biometric systems. But with the rapid ontogenesis of information technology, even the biometric
data is not secure. Digital watermarking is one such technique that is implemented to secure the biometric data
from inadvertent or premeditated attacks.This paper propounds an approach that is projected in both the
directions of improving the performance of biometric identification system by going multimodal and, increasing
the security through watermarking. The biometric traits are initially transformed using Discrete Wavelet and
Discrete Cosine Transformation and then watermarked using Singular Value Decomposition. Scheme depiction
and presented outcomes justifies the effectiveness of the scheme.
Keywords: Discrete Cosine Transform (DCT), Discrete Wavelet Transform (DWT), Multimodal biometrics,
Singular Value Decomposition, Watermarking
Hiding algorithm based fused images and Caesar cipher with intelligent securi...IJECEIAES
The process of sending confidential data through the communication media and in complete secrecy is now necessary, whether the data is related to patients, a particular military operation, or a specified office. On the other hand, with the development of various ciphering algorithms, and information hiding algorithms, there is a need to obtain ciphered and hidden data securely without the need to exchange secret keys between the two ends of the communication. In this paper, a hiding algorithm based on fused images and Caesar cipher with intelligent methods to strengthen the security of confidential information is proposed. Firstly, fused image scattering is obtained using 1’s complement and circularly shifting the bits of fused pixels by specified positions before the hiding process. Secondly, the keys for the Caesar cipher are derived from the length of secret information according to the mathematical equation. Thirdly, strengthen the security of Caesar’s cipher by taking a 1’s complement of each letter in the cipher data. The results guarantee the security of the presented algorithm.
Automated diagnosis of attacks in internet of things using machine learning a...journalBEEI
The Internet of Things (IoT) is the interconnection of things around us to make our daily process more efficient by providing more comfort and productivity. However, these connections also reveal a lot of sensitive data. Therefore, thinking about the methods of information security and coding are important as the security approaches that rely heavily on coding are not a strong match for these restricted devices. Consequently, this research aims to contribute to filling this gap, which adopts machine learning techniques to enhance network-level security in the low-power devices that use the lightweight MQTT protocol for their work. This study used a set of tools tools and, through various techniques, trained the proposed system ranging from Ensemble methods to deep learning models. The system has come to know what type of attack has occurred, which helps protect IoT devices. The log loss of the Ensemble methods is 0.44, and the accuracy of multi-class classification is 98.72% after converting the table data into an image set. The work also uses a Convolution Neural Network, which has a log loss of 0.019 and an accuracy of 99.3%. It also aims to implement these functions in IDS.
Blockchain based security framework for sharing digital images using reversib...Christo Ananth
Christo Ananth, Denslin Brabin, Sriramulu Bojjagani, “Blockchain based security framework for sharing digital images using reversible data hiding and encryption”, Multimedia Tools and Applications, Springer US, Volume 81,Issue 6, March 2022,pp. 1-18.
Description:
Christo Ananth et al. emphasized that Security is an important issue in current and next-generation networks. Blockchain will be an appropriate technology for securely sharing information in next-generation networks. Digital images are the prime medium attacked by cyber attackers. In this paper, a blockchain based security framework is proposed for sharing digital images in a multi user environment. The proposed framework uses reversible data hiding and encryption as component techniques. A novel high capacity reversible data hiding scheme is also proposed to protect digital images. Reversible data hiding in combination with encryption protects the confidentiality, integrity and authentication of digital images. In the proposed technique, the digital image is compressed first to create room for data hiding, then the user signature is embedded; afterwards the whole image is encrypted. For compression, JPEG lossy compression is used to create high capacity. For encryption, any symmetric block cipher or stream cipher can be used. Experimental results show that the proposed blockchain based framework provides high security and the proposed reversible data hiding scheme provides high capacity and image quality.
An Encryption Algorithm To Evaluate Performance Of V2v Communication In Vanetijcisjournal
1) The document discusses an encryption algorithm to evaluate the performance of vehicle-to-vehicle (V2V) communication in vehicular ad hoc networks (VANETs).
2) The algorithm uses private key encryption for V2V communication between two vehicles. The vehicles agree on random numbers and perform calculations to derive a shared secret key.
3) The performance of the encryption algorithm is evaluated using the QualNet network simulator.
Pervasive and ubiquitous computing has enabled people better integrate physical things into the digital world. The internet of things (IoT) has been considerably more widely used in business and everyday life in the last decade. Innovative healthcare information and communication technologies are a vast field of research and applications that need IoT benefits, including speed, security, and low cost. The proposed modified advanced encryption standard (AES)-cipher block chaining (CBC)-based blockchain technology offers a shared key to devices that need to communicate directly with or with entities outside the smart healthcare network to give users greater control over transactions. The experiments are carried out using a Raspberry Pi 3, whereas two different sensors are employed in this case. Blockchain technology encrypts data between doctor and patient with varied user numbers. The results from experiments revealed that the proposed modified AES-CBC based blockchain technology could provide the IoT application with security services (confidentiality, integrity, and access control) with efficient execution time.
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
This document discusses a proposed lossless encryption technique for finger biometric images. It begins with an abstract that outlines the need for biometric template protection and discusses existing approaches that offer tradeoffs between security and performance. The introduction provides background on encryption algorithms and notes that direct extensions of text-based algorithms are not suitable for images due to their large size and computational overhead of encryption/decryption. The literature review covers requirements for image encryption like security, compression, and efficiency. It describes complete and selective encryption approaches. The proposed methodology involves preprocessing the input fingerprint image, generating an encryption key, and encrypting/decrypting the image using a cryptosystem algorithm. Performance will be evaluated based on encryption time and security parameters like NPCR
This document proposes using certificate authorities and elliptic curve cryptography to improve security in Zigbee wireless sensor networks. It summarizes Zigbee vulnerabilities like insecure key distribution and lack of key revocation. It then describes a proposed solution where a key distribution center uses ECC to establish session keys between nodes, improving security over the standard Zigbee approach. Finally, it recommends an innovative hybrid solution combining certificate authorities and ECC to further reduce vulnerabilities when nodes enter or exit large-scale IoT networks.
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
This document discusses lightweight cryptography algorithms for security in Internet of Things (IoT) devices. It provides an overview of IoT architecture and applications. It then discusses the need for lightweight cryptography due to constraints of IoT devices. Various lightweight cryptography algorithms are described, including symmetric key and asymmetric key algorithms. Challenges of lightweight cryptography are also outlined. Related work studying lightweight cryptography algorithms for IoT security is reviewed. The document analyzes and compares various lightweight cryptography algorithms suitable for securing resource-constrained IoT devices.
Design of programmable hardware security modules for enhancing blockchain bas...IJECEIAES
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP) creation, authentication of provenance, and confidential data storage. However, blockchain encounters major security challenges due to its decentralized nature of ledgers that contain sensitive data. The research objective is to design a dedicated programmable hardware security modules scheme to safeguard and maintain sensitive information contained in the blockchain networks in the context of the IC supply chain. Thus, the blockchain framework could rely on the proposed hardware security modules and separate the entire cryptographic operations within the system as stand-alone hardware units. This work put forth a novel approach that could be considered and utilized to enhance blockchain security in real-time. The critical cryptographic components in blockchain secure hash algorithm-256 (SHA-256) and the elliptic curve digital signature algorithm are designed as separate entities to enhance the security of the blockchain framework. Physical unclonable functions are adopted to perform authentication of transactions in the blockchain. Relative comparison of designed modules with existing works clearly depicts the upper hand of the former in terms of performance parameters.
This document discusses security issues in cloud computing and proposes a solution using authentication and encryption. It first describes common cloud deployment models and layers. It then discusses major security concerns like privacy, confidentiality and data integrity. The proposed solution uses EAP-CHAP for authentication and the Rijndael encryption algorithm to encrypt user data at rest and in transit in the cloud, providing security while allowing authorized access. The methodology describes authentication using EAP-CHAP and encryption/decryption of data using Rijndael before it is sent to or retrieved from the cloud.
This document discusses security issues in cloud computing and proposes a solution using authentication and encryption. It first describes common cloud deployment models and layers. It then discusses major security concerns like privacy, confidentiality and data integrity. The proposed solution uses EAP-CHAP for authentication at the user end and Rijndael encryption algorithm to encrypt user data before it is sent to the cloud. The encryption ensures security of data at rest and in transit, while EAP-CHAP handles authentication of users with the cloud service provider. Pseudocode for the Rijndael encryption/decryption process is also provided.
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING IJNSA Journal
The use of mobile devices is common among people and something essential these days. These devices have limited resources which makes it critical to provide security without compromising user ergonomics, given the large number of cyberattacks that occur. This work proposes a context-aware security mechanism for Mobile Cloud Computing providing a security level of device data privacy from the analysis of the attributes of the network that is connected, available level of RAM, CPU, and battery at the time of communication. of data with the cloud. In addition, Transport Layer Security (TLS) technology is used to create a secure channel for sending data between the client and the server and implement the analysis of the mobile device context using Fuzzy logic. The impact of the proposed mechanism on mobile device performance was measured through stress tests. The proposed mechanism had a superior performance of 38% in the number of executions, 10% of memory, and 0.6% of CPU about the use of a single type of predefined symmetric algorithm for private network environment.
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
This document summarizes an article that discusses various approaches to partial image encryption. It begins by defining partial image encryption as encrypting only a portion of an image to reduce computational costs while still providing security. It then outlines several performance parameters for evaluating partial encryption techniques, such as tunability, visual degradation, compression friendliness, and encryption ratio. The document proceeds to review some existing partial encryption methods and analyze their security.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
This document describes a proposed cloud-based health monitoring system using IoT technology. The system uses various sensors to collect patient health data and transmit it securely to the cloud for storage and remote access by doctors. The key components of the system include sensors, a microcontroller, customized software, and cloud server infrastructure. The document discusses the system architecture, data authentication and security mechanisms like encryption that are used to securely transmit sensitive patient health data via the cloud. It proposes using a Real-Or-Random model and Elliptic Curve Cryptography algorithm to authenticate users and encrypt the data transmission between sensors and the cloud server.
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
This document proposes a method for privacy protection of visual data using false color within the JPEG architecture. The method involves converting an input RGB image to grayscale, using the grayscale values to index a RGB color palette to replace the original pixel values, creating a protected false image. The false image and decryption metadata are stored together in a single JPEG file. Only authorized users with the decryption key can decompress, decrypt and decode the file to recover the original image losslessly. The method aims to provide privacy protection with intelligibility and security for surveillance systems and shared visual data.
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
Using passwords only has rapidly become a security risk. Another approach to security is visual
cryptography (VC), which divides paper documents into several encrypted papers managed by multiple
people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our
work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we
propose a method for automatically recognizing encrypted portions using images captured by a digital
device's camera. Our system has several advantages, including no actual text in communication and
enabling users to use different passwords or secret questions at each use. Furthermore, our method is
implementable on wearable glasses-like devices, thus enabling wearers to decrypt text simply by looking at
encrypted portions. We conducted experiments regarding recognition accuracy and performance and
obtained results showing that our proposed method was able to achieve a high recognition rate at a low
cost.
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
The document describes an image recognition-based automatic decryption method for text encrypted using visual cryptography. It proposes a system that can decrypt text encrypted by visual cryptography on digital devices like smartphones or tablets by taking a picture of the encrypted image. It also proposes a novel method for automatically recognizing the encrypted portions in the captured image using rendering filters from computer graphics to achieve a high recognition rate with low cost. Experimental results showed the proposed method achieved a high recognition rate at a low computational cost.
A detailed review on Video SteganographyIRJET Journal
This document provides a summary of previous research on video steganography. It discusses several papers that proposed different techniques for video steganography, including using a binary attention mechanism to hide information in video frames, dual-channel embedding to make the hidden data robust against video transcoding, and using a convolutional neural network model called VStegNET. It also summarizes research on hiding encrypted data within video files and using techniques like genetic algorithms and AES encryption for steganography. Overall, the document reviews a variety of approaches that have been developed for video steganography and hiding secret information in video content.
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
This document proposes a security model for preserving the privacy of medical big data in healthcare clouds using fog computing. It focuses on using a decoy technique and fog computing to securely store and access patients' multimedia healthcare data in the cloud. The model generates two photo galleries - one containing real patient data (OMBD) secretly stored in the cloud, and one containing decoy data (DMBD) stored in fog computing by default. This is to hide the real data and attract unauthorized access attempts to the decoy data first. An authenticated key agreement protocol is also proposed to securely communicate between users and the two galleries based on pairing cryptography. The goal is to make the original medical data more secure while still providing efficient healthcare access and
This document proposes an integrated, secured, and intelligent architecture for connecting the Internet of Things (IoT) and cloud computing. The key components of the proposed architecture are: (1) an intelligent system using intelligent smart cards and readers, (2) an IP/MPLS core, (3) an integrated cloud IoT platform, and (4) a security gateway using elliptic curve cryptography. Experimental results show the system can authenticate users and devices securely while providing reasonable response times under increased loads. The proposed architecture aims to provide a novel way to access applications securely from IoT devices using a single smart card.
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
This document proposes a system for secure image transcoding using chaotic algorithm encryption. The system encrypts images using a chaotic key-based algorithm (CKBA) before transcoding. It involves applying the discrete cosine transform, CKBA encryption, quantization, and entropy encoding like Huffman coding. A transcoder block then converts the data to a lower bit rate format while maintaining security. At the receiver, the inverse processes are applied to reconstruct the image. The system aims to provide efficient content delivery with end-to-end security for multimedia applications like mobile web browsing.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Más contenido relacionado
Similar a INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSURE CONFIDENTIALITY, AUTHENTICITY AND NON-REPUDIATION
Pervasive and ubiquitous computing has enabled people better integrate physical things into the digital world. The internet of things (IoT) has been considerably more widely used in business and everyday life in the last decade. Innovative healthcare information and communication technologies are a vast field of research and applications that need IoT benefits, including speed, security, and low cost. The proposed modified advanced encryption standard (AES)-cipher block chaining (CBC)-based blockchain technology offers a shared key to devices that need to communicate directly with or with entities outside the smart healthcare network to give users greater control over transactions. The experiments are carried out using a Raspberry Pi 3, whereas two different sensors are employed in this case. Blockchain technology encrypts data between doctor and patient with varied user numbers. The results from experiments revealed that the proposed modified AES-CBC based blockchain technology could provide the IoT application with security services (confidentiality, integrity, and access control) with efficient execution time.
IRJET- Lossless Encryption Technique for Finger Biometric ImagesIRJET Journal
This document discusses a proposed lossless encryption technique for finger biometric images. It begins with an abstract that outlines the need for biometric template protection and discusses existing approaches that offer tradeoffs between security and performance. The introduction provides background on encryption algorithms and notes that direct extensions of text-based algorithms are not suitable for images due to their large size and computational overhead of encryption/decryption. The literature review covers requirements for image encryption like security, compression, and efficiency. It describes complete and selective encryption approaches. The proposed methodology involves preprocessing the input fingerprint image, generating an encryption key, and encrypting/decrypting the image using a cryptosystem algorithm. Performance will be evaluated based on encryption time and security parameters like NPCR
This document proposes using certificate authorities and elliptic curve cryptography to improve security in Zigbee wireless sensor networks. It summarizes Zigbee vulnerabilities like insecure key distribution and lack of key revocation. It then describes a proposed solution where a key distribution center uses ECC to establish session keys between nodes, improving security over the standard Zigbee approach. Finally, it recommends an innovative hybrid solution combining certificate authorities and ECC to further reduce vulnerabilities when nodes enter or exit large-scale IoT networks.
Lightweight Cryptography Algorithms for Security of IoT Devices: A SurveyIRJET Journal
This document discusses lightweight cryptography algorithms for security in Internet of Things (IoT) devices. It provides an overview of IoT architecture and applications. It then discusses the need for lightweight cryptography due to constraints of IoT devices. Various lightweight cryptography algorithms are described, including symmetric key and asymmetric key algorithms. Challenges of lightweight cryptography are also outlined. Related work studying lightweight cryptography algorithms for IoT security is reviewed. The document analyzes and compares various lightweight cryptography algorithms suitable for securing resource-constrained IoT devices.
Design of programmable hardware security modules for enhancing blockchain bas...IJECEIAES
Globalization of the chip design and manufacturing industry has imposed significant threats to the hardware security of integrated circuits (ICs). It has made ICs more susceptible to various hardware attacks. Blockchain provides a trustworthy and distributed platform to store immutable records related to the evidence of intellectual property (IP) creation, authentication of provenance, and confidential data storage. However, blockchain encounters major security challenges due to its decentralized nature of ledgers that contain sensitive data. The research objective is to design a dedicated programmable hardware security modules scheme to safeguard and maintain sensitive information contained in the blockchain networks in the context of the IC supply chain. Thus, the blockchain framework could rely on the proposed hardware security modules and separate the entire cryptographic operations within the system as stand-alone hardware units. This work put forth a novel approach that could be considered and utilized to enhance blockchain security in real-time. The critical cryptographic components in blockchain secure hash algorithm-256 (SHA-256) and the elliptic curve digital signature algorithm are designed as separate entities to enhance the security of the blockchain framework. Physical unclonable functions are adopted to perform authentication of transactions in the blockchain. Relative comparison of designed modules with existing works clearly depicts the upper hand of the former in terms of performance parameters.
This document discusses security issues in cloud computing and proposes a solution using authentication and encryption. It first describes common cloud deployment models and layers. It then discusses major security concerns like privacy, confidentiality and data integrity. The proposed solution uses EAP-CHAP for authentication and the Rijndael encryption algorithm to encrypt user data at rest and in transit in the cloud, providing security while allowing authorized access. The methodology describes authentication using EAP-CHAP and encryption/decryption of data using Rijndael before it is sent to or retrieved from the cloud.
This document discusses security issues in cloud computing and proposes a solution using authentication and encryption. It first describes common cloud deployment models and layers. It then discusses major security concerns like privacy, confidentiality and data integrity. The proposed solution uses EAP-CHAP for authentication at the user end and Rijndael encryption algorithm to encrypt user data before it is sent to the cloud. The encryption ensures security of data at rest and in transit, while EAP-CHAP handles authentication of users with the cloud service provider. Pseudocode for the Rijndael encryption/decryption process is also provided.
CONTEXT-AWARE SECURITY MECHANISM FOR MOBILE CLOUD COMPUTING IJNSA Journal
The use of mobile devices is common among people and something essential these days. These devices have limited resources which makes it critical to provide security without compromising user ergonomics, given the large number of cyberattacks that occur. This work proposes a context-aware security mechanism for Mobile Cloud Computing providing a security level of device data privacy from the analysis of the attributes of the network that is connected, available level of RAM, CPU, and battery at the time of communication. of data with the cloud. In addition, Transport Layer Security (TLS) technology is used to create a secure channel for sending data between the client and the server and implement the analysis of the mobile device context using Fuzzy logic. The impact of the proposed mechanism on mobile device performance was measured through stress tests. The proposed mechanism had a superior performance of 38% in the number of executions, 10% of memory, and 0.6% of CPU about the use of a single type of predefined symmetric algorithm for private network environment.
The document discusses wireless body area networks and wireless sensor networks. It describes the goals of the project which are to implement the Tate pairing and Weil pairing protocols, analyze their performance with respect to time and memory consumption, and implement the better performing one for security purposes. The document provides background on sensor network technology, including how sensors have evolved from large specialized systems to smaller low-power devices. It outlines some of the applications of wireless sensor networks.
This document summarizes an article that discusses various approaches to partial image encryption. It begins by defining partial image encryption as encrypting only a portion of an image to reduce computational costs while still providing security. It then outlines several performance parameters for evaluating partial encryption techniques, such as tunability, visual degradation, compression friendliness, and encryption ratio. The document proceeds to review some existing partial encryption methods and analyze their security.
Data security and protection is one of the most common technologies used in the field of computer science. This is because of its great importance in all fields related to daily life, whether political, economic, and other aspects change. In this research paper, a new intelligent system that concentrates on image and text encryption and decryption is proposed. Furthermore, the image recognition rate is increased. In this paper, the Rivest Shamir Adleman 3 key (RSA3k) algorithm is used but in a new technique to encrypt and decrypt text. The proposed technique relies on using square root of public key as private key. XOR operation for colored images encryption and decryption is performed. By calculating signal to noise ratio (PSNR), mean square error (MSE), and bit error rate (BER), the most important things that we address how to provide data security for large data based on encryption techniques and increase the security of multimedia data and texture date and address the problem of time and accuracy in image matching. the results show that the quality of images after decryption is good.
IRJET- Cloud Data Authentication for Health Monitoring System using IoT Techn...IRJET Journal
This document describes a proposed cloud-based health monitoring system using IoT technology. The system uses various sensors to collect patient health data and transmit it securely to the cloud for storage and remote access by doctors. The key components of the system include sensors, a microcontroller, customized software, and cloud server infrastructure. The document discusses the system architecture, data authentication and security mechanisms like encryption that are used to securely transmit sensitive patient health data via the cloud. It proposes using a Real-Or-Random model and Elliptic Curve Cryptography algorithm to authenticate users and encrypt the data transmission between sensors and the cloud server.
IRJET- Image Privacy Protection as a Single ShareIRJET Journal
This document proposes a method for privacy protection of visual data using false color within the JPEG architecture. The method involves converting an input RGB image to grayscale, using the grayscale values to index a RGB color palette to replace the original pixel values, creating a protected false image. The false image and decryption metadata are stored together in a single JPEG file. Only authorized users with the decryption key can decompress, decrypt and decode the file to recover the original image losslessly. The method aims to provide privacy protection with intelligibility and security for surveillance systems and shared visual data.
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
Using passwords only has rapidly become a security risk. Another approach to security is visual
cryptography (VC), which divides paper documents into several encrypted papers managed by multiple
people. Decryption occurs by stacking these papers, i.e., they cannot be decrypted individually. In our
work, we consider a system for decrypting text encrypted by VC on digital devices. Furthermore, we
propose a method for automatically recognizing encrypted portions using images captured by a digital
device's camera. Our system has several advantages, including no actual text in communication and
enabling users to use different passwords or secret questions at each use. Furthermore, our method is
implementable on wearable glasses-like devices, thus enabling wearers to decrypt text simply by looking at
encrypted portions. We conducted experiments regarding recognition accuracy and performance and
obtained results showing that our proposed method was able to achieve a high recognition rate at a low
cost.
IMAGE RECOGNITION-BASED AUTOMATIC DECRYPTION METHOD FOR TEXT ENCRYPTED USING ...IJCSEA Journal
The document describes an image recognition-based automatic decryption method for text encrypted using visual cryptography. It proposes a system that can decrypt text encrypted by visual cryptography on digital devices like smartphones or tablets by taking a picture of the encrypted image. It also proposes a novel method for automatically recognizing the encrypted portions in the captured image using rendering filters from computer graphics to achieve a high recognition rate with low cost. Experimental results showed the proposed method achieved a high recognition rate at a low computational cost.
A detailed review on Video SteganographyIRJET Journal
This document provides a summary of previous research on video steganography. It discusses several papers that proposed different techniques for video steganography, including using a binary attention mechanism to hide information in video frames, dual-channel embedding to make the hidden data robust against video transcoding, and using a convolutional neural network model called VStegNET. It also summarizes research on hiding encrypted data within video files and using techniques like genetic algorithms and AES encryption for steganography. Overall, the document reviews a variety of approaches that have been developed for video steganography and hiding secret information in video content.
IRJET - Security Model for Preserving the Privacy of Medical Big Data in ...IRJET Journal
This document proposes a security model for preserving the privacy of medical big data in healthcare clouds using fog computing. It focuses on using a decoy technique and fog computing to securely store and access patients' multimedia healthcare data in the cloud. The model generates two photo galleries - one containing real patient data (OMBD) secretly stored in the cloud, and one containing decoy data (DMBD) stored in fog computing by default. This is to hide the real data and attract unauthorized access attempts to the decoy data first. An authenticated key agreement protocol is also proposed to securely communicate between users and the two galleries based on pairing cryptography. The goal is to make the original medical data more secure while still providing efficient healthcare access and
This document proposes an integrated, secured, and intelligent architecture for connecting the Internet of Things (IoT) and cloud computing. The key components of the proposed architecture are: (1) an intelligent system using intelligent smart cards and readers, (2) an IP/MPLS core, (3) an integrated cloud IoT platform, and (4) a security gateway using elliptic curve cryptography. Experimental results show the system can authenticate users and devices securely while providing reasonable response times under increased loads. The proposed architecture aims to provide a novel way to access applications securely from IoT devices using a single smart card.
Iaetsd implementation of chaotic algorithm for secure imageIaetsd Iaetsd
This document proposes a system for secure image transcoding using chaotic algorithm encryption. The system encrypts images using a chaotic key-based algorithm (CKBA) before transcoding. It involves applying the discrete cosine transform, CKBA encryption, quantization, and entropy encoding like Huffman coding. A transcoder block then converts the data to a lower bit rate format while maintaining security. At the receiver, the inverse processes are applied to reconstruct the image. The system aims to provide efficient content delivery with end-to-end security for multimedia applications like mobile web browsing.
This document discusses message transfer using steganography. Steganography is used to hide information like text, images or videos within other media files such as images, videos or music. The document discusses how steganography can be used to securely transfer messages between two parties by hiding the messages within digital files like images without the server being able to decrypt the messages. It discusses how the least significant bits of pixels can be modified to embed secret data without significantly affecting the cover image. Different encryption techniques for embedding the data are also discussed. The document concludes that steganography can help protect messages not only from intruders but also from server-side attacks by making it difficult for the server to detect and decrypt embedded messages.
Similar a INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSURE CONFIDENTIALITY, AUTHENTICITY AND NON-REPUDIATION (20)
Call for Papers -International Journal of Computer Networks & Communications ...IJCNCJournal
International Journal of Computer Networks & Communications (IJCNC)
Citations, h-index, i10-index of IJCNC
---- Scopus, ERA Listed, WJCI Indexed ----
Scopus Cite Score 2022--1.8
https://airccse.org/journal/ijcnc.html
IJCNC is listed in ERA 2023 as per the Australian Research Council (ARC) Journal Ranking
Scope & Topics
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Authors are solicited to contribute to this journal by submitting articles that illustrate research results, projects, surveying works and industrial experiences that describe significant advances in the Computer Networks & Communications.
Topics of Interest
· Network Protocols & Wireless Networks
· Network Architectures
· High speed networks
· Routing, switching and addressing techniques
· Next Generation Internet
· Next Generation Web Architectures
· Network Operations & management
· Adhoc and sensor networks
· Internet and Web applications
· Ubiquitous networks
· Mobile networks & Wireless LAN
· Wireless Multimedia systems
· Wireless communications
· Heterogeneous wireless networks
· Measurement & Performance Analysis
· Peer to peer and overlay networks
· QoS and Resource Management
· Network Based applications
· Network Security
· Self-Organizing Networks and Networked Systems
· Optical Networking
· Mobile & Broadband Wireless Internet
· Recent trends & Developments in Computer Networks
Paper Submission
Authors are invited to submit papers for this journal through E-mail: ijcnc@airccse.org or through Submission System. Submissions must be original and should not have been published previously or be under consideration for publication while being evaluated for this Journal.
Important Dates
· Submission Deadline : June 22, 2024
· Notification : July 22, 2024
· Final Manuscript Due : July 29, 2024
· Publication Date : Determined by the Editor-in-Chief
Contact Us
Here's where you can reach us: ijcnc@airccse.org or ijcnc@aircconline.com
For other details please visit - http://airccse.org/journal/ijcnc.html
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Blockchain Enforced Attribute based Access Control with ZKP for Healthcare Se...IJCNCJournal
The relationship between doctors and patients is reinforced through the expanded communication channels provided by remote healthcare services, resulting in heightened patient satisfaction and loyalty. Nonetheless, the growth of these services is hampered by security and privacy challenges they confront. Additionally, patient electronic health records (EHR) information is dispersed across multiple hospitals in different formats, undermining data sovereignty. It allows any service to assert authority over their EHR, effectively controlling its usage. This paper proposes a blockchain enforced attribute-based access control in healthcare service. To enhance the privacy and data-sovereignty, the proposed system employs attribute-based access control, zero-knowledge proof (ZKP) and blockchain. The role of data within our system is pivotal in defining attributes. These attributes, in turn, form the fundamental basis for access control criteria. Blockchain is used to keep hospital information in public chain but EHR related data in private chain. Furthermore, EHR provides access control by using the attributed based cryptosystem before they are stored in the blockchain. Analysis shows that the proposed system provides data sovereignty with privacy provision based on the attributed based access control.
EECRPSID: Energy-Efficient Cluster-Based Routing Protocol with a Secure Intru...IJCNCJournal
A revolutionary idea that has gained significance in technology for Internet of Things (IoT) networks backed by WSNs is the " Energy-Efficient Cluster-Based Routing Protocol with a Secure Intrusion Detection" (EECRPSID). A WSN-powered IoT infrastructure's hardware foundation is hardware with autonomous sensing capabilities. The significant features of the proposed technology are intelligent environment sensing, independent data collection, and information transfer to connected devices. However, hardware flaws and issues with energy consumption may be to blame for device failures in WSN-assisted IoT networks. This can potentially obstruct the transfer of data. A reliable route significantly reduces data retransmissions, which reduces traffic and conserves energy. The sensor hardware is often widely dispersed by IoT networks that enable WSNs. Data duplication could occur if numerous sensor devices are used to monitor a location. Finding a solution to this issue by using clustering. Clustering lessens network traffic while retaining path dependability compared to the multipath technique. To relieve duplicate data in EECRPSID, we applied the clustering technique. The multipath strategy might make the provided protocol more dependable. Using the EECRPSID algorithm, will reduce the overall energy consumption, minimize the End-to-end delay to 0.14s, achieve a 99.8% Packet Delivery Ratio, and the network's lifespan will be increased. The NS2 simulator is used to run the whole set of simulations. The EECRPSID method has been implemented in NS2, and simulated results indicate that comparing the other three technologies improves the performance measures.
Analysis and Evolution of SHA-1 Algorithm - Analytical TechniqueIJCNCJournal
A 160-bit (20-byte) hash value, sometimes called a message digest, is generated using the SHA-1 (Secure Hash Algorithm 1) hash function in cryptography. This value is commonly represented as 40 hexadecimal digits. It is a Federal Information Processing Standard in the United States and was developed by the National Security Agency. Although it has been cryptographically cracked, the technique is still in widespread usage. In this work, we conduct a detailed and practical analysis of the SHA-1 algorithm's theoretical elements and show how they have been implemented through the use of several different hash configurations.
Optimizing CNN-BiGRU Performance: Mish Activation and Comparative AnalysisIJCNCJournal
Deep learning is currently extensively employed across a range of research domains. The continuous advancements in deep learning techniques contribute to solving intricate challenges. Activation functions (AF) are fundamental components within neural networks, enabling them to capture complex patterns and relationships in the data. By introducing non-linearities, AF empowers neural networks to model and adapt to the diverse and nuanced nature of real-world data, enhancing their ability to make accurate predictions across various tasks. In the context of intrusion detection, the Mish, a recent AF, was implemented in the CNN-BiGRU model, using three datasets: ASNM-TUN, ASNM-CDX, and HOGZILLA. The comparison with Rectified Linear Unit (ReLU), a widely used AF, revealed that Mish outperforms ReLU, showcasing superior performance across the evaluated datasets. This study illuminates the effectiveness of AF in elevating the performance of intrusion detection systems.
An Hybrid Framework OTFS-OFDM Based on Mobile Speed EstimationIJCNCJournal
The Future wireless communication systems face the challenging task of simultaneously providing high-quality service (QoS) and broadband data transmission, while also minimizing power consumption, latency, and system complexity. Although Orthogonal Frequency Division Multiplexing (OFDM) has been widely adopted in 4G and 5G systems, it struggles to cope with a significant delay and Doppler spread in high mobility scenarios. To address these challenges, a novel waveform named Orthogonal Time Frequency Space (OTFS). Designers aim to outperform OFDM by closely aligning signals with the channel behaviour. In this paper, we propose a switching strategy that empowers operators to select the most appropriate waveform based on an estimated speed of the mobile user. This strategy enables the base station to dynamically choose the waveform that best suits the mobile user’s speed. Additionally, we suggest retaining an Integrated Sensing and Communication (ISAC) radar approach for accurate Doppler estimation. This provides precise information to facilitate the waveform selection procedure. By leveraging the switching strategy and harnessing the Doppler estimation capabilities of an ISAC radar.Our proposed approach aims to enhance the performance of wireless communication systems in high mobility cases. Considering the complexity of waveform processing, we introduce an optimized hybrid system that combines OTFS and OFDM, resulting in reduced complexity while still retaining performance benefits.This hybrid system presents a promising solution for improving the performance of wireless communication systems in higher mobility.The simulation results validate the effectiveness of our approach, demonstrating its potential advantages for future wireless communication systems. The effectiveness of the proposed approach is validated by simulation results as it will be illustrated.
Enhanced Traffic Congestion Management with Fog Computing - A Simulation-Base...IJCNCJournal
Accurate latency computation is essential for the Internet of Things (IoT) since the connected devices generate a vast amount of data that is processed on cloud infrastructure. However, the cloud is not an optimal solution. To overcome this issue, fog computing is used to enable processing at the edge while still allowing communication with the cloud. Many applications rely on fog computing, including traffic management. In this paper, an Intelligent Traffic Congestion Mitigation System (ITCMS) is proposed to address traffic congestion in heavily populated smart cities. The proposed system is implemented using fog computing and tested in a crowdedCairo city. The results obtained indicate that the execution time of the simulation is 4,538 seconds, and the delay in the application loop is 49.67 seconds. The paper addresses various issues, including CPU usage, heap memory usage, throughput, and the total average delay, which are essential for evaluating the performance of the ITCMS. Our system model is also compared with other models to assess its performance. A comparison is made using two parameters, namely throughput and the total average delay, between the ITCMS, IOV (Internet of Vehicle), and STL (Seasonal-Trend Decomposition Procedure based on LOESS). Consequently, the results confirm that the proposed system outperforms the others in terms of higher accuracy, lower latency, and improved traffic efficiency.
Rendezvous Sequence Generation Algorithm for Cognitive Radio Networks in Post...IJCNCJournal
Recent natural disasters have inflicted tremendous damage on humanity, with their scale progressively increasing and leading to numerous casualties. Events such as earthquakes can trigger secondary disasters, such as tsunamis, further complicating the situation by destroying communication infrastructures. This destruction impedes the dissemination of information about secondary disasters and complicates post-disaster rescue efforts. Consequently, there is an urgent demand for technologies capable of substituting for these destroyed communication infrastructures. This paper proposes a technique for generating rendezvous sequences to swiftly reconnect communication infrastructures in post-disaster scenarios. We compare the time required for rendezvous using the proposed technique against existing methods and analyze the average time taken to establish links with the rendezvous technique, discussing its significance. This research presents a novel approach enabling rapid recovery of destroyed communication infrastructures in disaster environments through Cognitive Radio Network (CRN) technology, showcasing the potential to significantly improve disaster response and recovery efforts. The proposed method reduces the time for the rendezvous compared to existing methods, suggesting that it can enhance the efficiency of rescue operations in post-disaster scenarios and contribute to life-saving efforts.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
May 2024, Volume 16, Number 3 - The International Journal of Computer Network...IJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
Vehicle Ad Hoc Networks (VANETs) have become a viable technology to improve traffic flow and safety on the roads. Due to its effectiveness and scalability, the Wingsuit Search-based Optimised Link State Routing Protocol (WS-OLSR) is frequently used for data distribution in VANETs. However, the selection of MultiPoint Relays (MPRs) plays a pivotal role in WS-OLSR's performance. This paper presents an improved MPR selection algorithm tailored to WS-OLSR, designed to enhance the overall routing efficiency and reduce overhead. The analysis found that the current OLSR protocol has problems such as redundancy of HELLO and TC message packets or failure to update routing information in time, so a WS-OLSR routing protocol based on improved-MPR selection algorithm was proposed. Firstly, factors such as node mobility and link changes are comprehensively considered to reflect network topology changes, and the broadcast cycle of node HELLO messages is controlled through topology changes. Secondly, a new MPR selection algorithm is proposed, considering link stability issues and nodes. Finally, evaluate its effectiveness in terms of packet delivery ratio, end-to-end delay, and control message overhead. Simulation results demonstrate the superior performance of our improved MR selection algorithm when compared to traditional approaches.
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
So far, Wireless Body Area Networks (WBANs) have played a pivotal role in driving the development of intelligent healthcare systems with broad applicability across various domains. Each WBAN consists of one or more types of sensors that can be embedded in clothing, attached directly to the body, or even implanted beneath an individual's skin. These sensors typically serve asingle application. However, the traffic generated by each sensor may have distinct requirements. This diversity necessitates a dual approach: tailored treatment based on the specific needs of each traffic typeand the fulfillment of application requirements, such asreliability and timeliness. Never the less, the presence of energy constraints and the unreliable nature of wireless communications make QoS provisioning under such networks a non-trivial task. In this context, the current paper introduces a novel Medium AccessControl (MAC) strategy for the regular traffic applications of WBANs, designed to significantly enhance efficiency when compared to the established MAC protocols IEEE 802.15.4 and IEEE 802.15.6, with a particular focus on improving reliability, timeliness, and energy efficiency.
May_2024 Top 10 Read Articles in Computer Networks & Communications.pdfIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
The efficient use of energy in wireless sensor networks is critical for extending node lifetime. The network topology is one of the factors that have a significant impact on the energy usage at the nodes and the quality of transmission (QoT) in the network. We propose a topology control algorithm for software-defined wireless sensor networks (SDWSNs) in this paper. Our method is to formulate topology control algorithm as a nonlinear programming (NP) problem with the objective to optimizing two metrics, maximum communication range, and desired degree. This NP problem is solved at the SDWSN controller by employing the genetic algorithm (GA) to determine the best topology. The simulation results show that the proposed algorithm outperforms the MaxPower algorithm in terms of average node degree and energy expansion ratio.
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
The integration of artificial intelligence technology with a scalable Internet of Things (IoT) platform facilitates diverse smart communication services, allowing remote users to access services from anywhere at any time. The multi-server environment within IoT introduces a flexible security service model, enabling users to interact with any server through a single registration. To ensure secure and privacy preservation services for resources, an authentication scheme is essential. Zhao et al. recently introduced a user authentication scheme for the multi-server environment, utilizing passwords and smart cards, claiming resilience against well-known attacks. This paper conducts cryptanalysis on Zhao et al.'s scheme, focusing on denial of service and privacy attacks, revealing a lack of user-friendliness. Subsequently, we propose a new multi-server user authentication scheme for privacy preservation with fuzzy commitment over the IoT environment, addressing the shortcomings of Zhao et al.'s scheme. Formal security verification of the proposed scheme is conducted using the ProVerif simulation tool. Through both formal and informal security analyses, we demonstrate that the proposed scheme is resilient against various known attacks and those identified in Zhao et al.'s scheme.
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
In -Vehicle Ad-Hoc Network (VANET), vehicles continuously transmit and receive spatiotemporal data with neighboring vehicles, thereby establishing a comprehensive 360-degree traffic awareness system. Vehicular Network safety applications facilitate the transmission of messages between vehicles that are near each other, at regular intervals, enhancing drivers' contextual understanding of the driving environment and significantly improving traffic safety. Privacy schemes in VANETs are vital to safeguard vehicles’ identities and their associated owners or drivers. Privacy schemes prevent unauthorized parties from linking the vehicle's communications to a specific real-world identity by employing techniques such as pseudonyms, randomization, or cryptographic protocols. Nevertheless, these communications frequently contain important vehicle information that malevolent groups could use to Monitor the vehicle over a long period. The acquisition of this shared data has the potential to facilitate the reconstruction of vehicle trajectories, thereby posing a potential risk to the privacy of the driver. Addressing the critical challenge of developing effective and scalable privacy-preserving protocols for communication in vehicle networks is of the highest priority. These protocols aim to reduce the transmission of confidential data while ensuring the required level of communication. This paper aims to propose an Advanced Privacy Vehicle Scheme (APV) that periodically changes pseudonyms to protect vehicle identities and improve privacy. The APV scheme utilizes a concept called the silent period, which involves changing the pseudonym of a vehicle periodically based on the tracking of neighboring vehicles. The pseudonym is a temporary identifier that vehicles use to communicate with each other in a VANET. By changing the pseudonym regularly, the APV scheme makes it difficult for unauthorized entities to link a vehicle's communications to its real-world identity. The proposed APV is compared to the SLOW, RSP, CAPS, and CPN techniques. The data indicates that the efficiency of APV is a better improvement in privacy metrics. It is evident that the AVP offers enhanced safety for vehicles during transportation in the smart city.
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
The International Journal of Computer Networks & Communications (IJCNC) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of Computer Networks & Communications. The journal focuses on all technical and practical aspects of Computer Networks & data Communications. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on advanced networking concepts and establishing new collaborations in these areas.
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
Malware is one of the threats to security of computer networks and information systems. Since malware instances are available sufficiently, there is increased interest among researchers on usage of Artificial Intelligence (AI). Of late AI-enabled methods such as machine learning (ML) and deep learning paved way for solving many real-world problems. As it is a learning-based approach, accumulated training samples help in improving thequality of training and thus leveraging malware detection accuracy. Existing deep learning methods are focusing on learning-based malware detection systems. However, there is need for improving the state of the art through ensemble approach. Towards this end, in this paper we proposed a framework known as Deep Ensemble Framework (DEF) for automatic malware detection. The framework obtains features from training samples. From given malware instance a grayscale image is generated. There is another process to extract the opcode sequences. Convolutional Neural Network (CNN) and Long Short Term Memory (LSTM) techniques are used to obtain grayscale image and opcode sequence respectively. Afterwards, a stacking ensemble is employed in order to achieve efficient malware detection and classification. Malware samples collected fromthe Internet sources and Microsoft are used for theempirical study. An algorithm known as Ensemble Learning for Automatic Malware Detection (EL-AML) is proposed to realize our framework. Another algorithm named Pre-Process is proposed to assist the EL-AML algorithm for obtaining intermediate features required by CNN and LSTM.Empirical study reveals that our framework outperforms many existing methods in terms of speed-up and accuracy.
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
With the emergence of smart devices and the Internet of Things (IoT), millions of users connected to the network produce massive network traffic datasets. These vast datasets of network traffic, Big Data are challenging to store, deal with and analyse using a single computer. In this paper we developed parallel implementation using a High Performance Computer (HPC) for the Non-Negative Matrix Factorization technique as an engine for an Intrusion Detection System (HPC-NMF-IDS). The large IoT traffic datasets of order of millions samples are distributed evenly on all the computing cores for both storage and speedup purpose. The distribution of computing tasks involved in the Matrix Factorization takes into account the reduction of the communication cost between the computing cores. The experiments we conducted on the proposed HPC-IDS-NMF give better results than the traditional ML-based intrusion detection systems. We could train the HPC model with datasets of one million samples in only 31 seconds instead of the 40 minutes using one processor), that is a speed up of 87 times. Moreover, we have got an excellent detection accuracy rate of 98% for KDD dataset.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
Optimizing Gradle Builds - Gradle DPE Tour Berlin 2024Sinan KOZAK
Sinan from the Delivery Hero mobile infrastructure engineering team shares a deep dive into performance acceleration with Gradle build cache optimizations. Sinan shares their journey into solving complex build-cache problems that affect Gradle builds. By understanding the challenges and solutions found in our journey, we aim to demonstrate the possibilities for faster builds. The case study reveals how overlapping outputs and cache misconfigurations led to significant increases in build times, especially as the project scaled up with numerous modules using Paparazzi tests. The journey from diagnosing to defeating cache issues offers invaluable lessons on maintaining cache integrity without sacrificing functionality.
Batteries -Introduction – Types of Batteries – discharging and charging of battery - characteristics of battery –battery rating- various tests on battery- – Primary battery: silver button cell- Secondary battery :Ni-Cd battery-modern battery: lithium ion battery-maintenance of batteries-choices of batteries for electric vehicle applications.
Fuel Cells: Introduction- importance and classification of fuel cells - description, principle, components, applications of fuel cells: H2-O2 fuel cell, alkaline fuel cell, molten carbonate fuel cell and direct methanol fuel cells.
Discover the latest insights on Data Driven Maintenance with our comprehensive webinar presentation. Learn about traditional maintenance challenges, the right approach to utilizing data, and the benefits of adopting a Data Driven Maintenance strategy. Explore real-world examples, industry best practices, and innovative solutions like FMECA and the D3M model. This presentation, led by expert Jules Oudmans, is essential for asset owners looking to optimize their maintenance processes and leverage digital technologies for improved efficiency and performance. Download now to stay ahead in the evolving maintenance landscape.
Introduction- e - waste – definition - sources of e-waste– hazardous substances in e-waste - effects of e-waste on environment and human health- need for e-waste management– e-waste handling rules - waste minimization techniques for managing e-waste – recycling of e-waste - disposal treatment methods of e- waste – mechanism of extraction of precious metal from leaching solution-global Scenario of E-waste – E-waste in India- case studies.
The CBC machine is a common diagnostic tool used by doctors to measure a patient's red blood cell count, white blood cell count and platelet count. The machine uses a small sample of the patient's blood, which is then placed into special tubes and analyzed. The results of the analysis are then displayed on a screen for the doctor to review. The CBC machine is an important tool for diagnosing various conditions, such as anemia, infection and leukemia. It can also help to monitor a patient's response to treatment.
Use PyCharm for remote debugging of WSL on a Windo cf5c162d672e4e58b4dde5d797...shadow0702a
This document serves as a comprehensive step-by-step guide on how to effectively use PyCharm for remote debugging of the Windows Subsystem for Linux (WSL) on a local Windows machine. It meticulously outlines several critical steps in the process, starting with the crucial task of enabling permissions, followed by the installation and configuration of WSL.
The guide then proceeds to explain how to set up the SSH service within the WSL environment, an integral part of the process. Alongside this, it also provides detailed instructions on how to modify the inbound rules of the Windows firewall to facilitate the process, ensuring that there are no connectivity issues that could potentially hinder the debugging process.
The document further emphasizes on the importance of checking the connection between the Windows and WSL environments, providing instructions on how to ensure that the connection is optimal and ready for remote debugging.
It also offers an in-depth guide on how to configure the WSL interpreter and files within the PyCharm environment. This is essential for ensuring that the debugging process is set up correctly and that the program can be run effectively within the WSL terminal.
Additionally, the document provides guidance on how to set up breakpoints for debugging, a fundamental aspect of the debugging process which allows the developer to stop the execution of their code at certain points and inspect their program at those stages.
Finally, the document concludes by providing a link to a reference blog. This blog offers additional information and guidance on configuring the remote Python interpreter in PyCharm, providing the reader with a well-rounded understanding of the process.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...
INNOVATIVE LOW-COST PERIMETER SECURITY GADGET WITH IN-BUILT MECHANISM TO ENSURE CONFIDENTIALITY, AUTHENTICITY AND NON-REPUDIATION
1. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
DOI: 10.5121/ijcnc.2022.14407 117
INNOVATIVE LOW-COST PERIMETER
SECURITY GADGET WITH IN-BUILT
MECHANISM TO ENSURE CONFIDENTIALITY,
AUTHENTICITY AND NON-REPUDIATION
Ritesh Mukherjee 1
, Anirban Goswami2
, Soumit Chowdhury3
and Nabin Ghoshal4
1
Centre for Development of Advanced Computing, Kolkata, India
2
Techno Main Salt Lake, Sec – V, Kolkata-700091, India
3
Government College of Engineering & Ceramic Technology, Kolkata-700010, India
4
Department of Engineering & Technological Studies, University of Kalyani,
Kalyani-741235, West Bengal, India,
ABSTRACT
The concept is to capture and preserve the intruder’s details in unattended mode. A camera is integrated
with a processing unit and counter arrangement to ensure authenticity and non-repudiation of the captured
images of the intruder before court of law. Ownership claim is justified concocting confidential data
sharing of visual cryptography. Signal quality is retained and unauthorized tampering of secret data
resisted. Entire procedure indulges: Message Digest M is generated using SHA-2 from the date and time
stamp of the acquired image, two shares are generated from MAC address (K) of the network card and
encryption is done using AES involving encoding using Hamming 1 – bit technique. The cover image is
prepared in DCT domain to restrict JPEG compression. Sensitive data is embedded in restricted areas of
DCT transformed image. Extraction of secret data verifies an intruder. The experimental results prove its
efficacy over existing conventional system.
KEYWORDS
Visual cryptography, share generation, AES, key exchange, image compression.
1. INTRODUCTION
The term perimeter offers a defined boundary to act as the first line of defence against trespassers
and Perimeter security has been an appropriate choice. But, the complexity of perimeter security
depends on the valuation and surface area of a property. In modern times, electronic gadgets are
widely used for perimeter security.
To be effective against well-heeled trespassers, active perimeter security and monitored CCTV
are used to ensure both situation and customer requirements. Across the globe, property owners
rely on surveillance systems in form of CCTV cameras to assist an individual in monitoring and
protecting physical areas. But there is no specific template for a “perfect” perimeter detection
system, due to the varying parameters like location, accessibility, points of entry, lighting and
operational hours. So, recent technological advancement demands tailored surveillance system
with maximum security and negligible human interference.
2. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
118
In the proposed algorithm, we have tried to amalgamate the hardware design of a self-developed
security gadget with an inbuilt camera [1] having inbuilt processing unit to capture the facial
image of a person with a timestamp.
The device has been framed with components having connectivity and functionalities defined as
follows:
1. Portable Instrument cabinet: The main apparatus is an enclosure made of aluminium for
necessary circuitry. This apparatus can be installed/commissioned in a hidden place. This box
has got a built in mechanism for the following activities.
Capture continuous video.
Analyse frames to identify human faces.
Capture facial image and time information.
Transmit the captured facial image with a time stamp to the predefined offsite storage.
2. Gadget holding arrangement: This is a small sliding tray provided with the gadget to directly
mount it.
3. Power supply module: The developed apparatus makes use of +5 volts regulated DC power
supply up to a maximum 1000 mA current capacity. The Power supply module is a 5v micro
USB power supply arrangement for the mentioned gadget.
4. Wi-fi dongle: Small USB wi-fi dongle which will be connected to the gadget and will help to
transmit data from the portable gadget to the offsite storage in wireless mode.
5. Network cable [Optional]: A standard network cable with a RJ45 connecter will be used for
the purpose of data transfer between a portable gadget and the offsite storage in wired mode.
This will be useful as an alternate arrangement in absence of a reliable wireless arrangement.
6. Application Software: Above apparatus operates using application software. This application
is responsible for headless start-up of the gadget, video capture, frame extraction, face
detection, face image capture, time capture and transfer of facial images with a time stamp.
The gadget operates in following steps:
Capture video of the rear view.
Analysis of captured video in real-time.
Detection of human faces from a captured frame.
Crop face images.
Capture time stamp (with index in case of presence of multiple faces on the same frame).
Transfer facial images with a time stamp to offsite storage.
Basic requirements cum pre-requisites for the operation
Power supply.
Place for commissioning the gadget.
Storage / Server with network connectivity (preferably wireless).
After capturing the facial image, we use the technique of visual cryptography and steganography
for effective data hiding process.
2. LITERATURE REVIEW
To assure fidelity of a file [2. 3], data hiding techniques generally explain the fabrication of
authentication signals in a digital file. Creators generally own the copyright to a digital image the
3. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
119
moment they create it like in physical mode. The owner is privileged with several exclusive legal
rights over the use and distribution of it. The fabrication of the owner’s key data as an invisible
digital watermark [4, 5] in a digital file justifies the fact.
The concept of neural network-based visual cryptography helps to preserve the secrecy of data.
To support visual cryptography, Shamir [6] proposed generation of public and private shares
from secret information and subsequently shared the appropriate share. The secret data can only
be revealed after bonding of appropriate shares. This justifies amalgamation of reversible data
concealment [7] and encrypted information sharing to elucidate information security. In addition,
Omnia Abdullah Alharbi et al. [8] supported conservative prevention of data through multilevel
security pattern. In another algorithm, Sanjay Kumar et al. [9] mentioned recovery of cover
media which justifies the authenticity of hiding.
Generally, data authentication protocols are implemented in the frequency domain and the DCT
domain is most popular due to its efficient performance. Cox et al [10] proposed that DCT be
used in the JPEG compression procedure. Moreover, resistance to JPEG compression was
suggested by Koch et al [11] who used the middle band frequency coefficients of a DCT
transformed block. The same concept was stated by Hsu et al. [12]. In another algorithm,
Langelaar et al. [13] confirmed that the choice of middle-frequency bands for embedding restricts
watermark information from getting scattered to low-frequency areas of the image. Lin et al. [14]
explained resistance to JPEG compression by using a mid-frequency band of a DCT block for
embedding.
The proposed approach has some exclusive features like:
1. A security gadget with an embedded camera is modelled to capture the facial image of an
intruder and named with time a stamp.
2. The facial image is cropped from the captured frame, normalized in the desired format, and
preserved with a date-time stamp.
3. Common terminologies about the security of the digital domain like Confidentiality, Integrity,
and Availability in addition to Authenticity and Non- Repudiation to secure secret data with
the combined effort of visual cryptography and steganography [15, 32].
4. The sensitive data is represented in a much more secure manner to ensure Confidentiality.
5. Use of middle-frequency band of a DCT transformed block for protecting the embedded
secret data.
6. White noise is controlled by using a self-defined technique.
7. Both secrecy and security are ensured with negligible computational complexity in the case of
share generation.
8. The 1-bit error detection and correction technique helps to retrieve the correct version.
The phase-wise elaboration of the protocol is done in the next section.
3. THE METHODOLOGY
3.1. Phase I
Every facial image collected through an inbuilt camera is cropped and normalized in the desired
format and preserved with a date stamp. The date-time stamp is in the format of YYYY MM
DDHHMISS [I] i.e. DT, where I is the index of the images.
3.2. Phase II
DT is digital data and using Sha-2[16] a 256-bit message digest is generated from DT i.e. DT#.
4. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
120
The gadget has a unique ID (say K) that is its 48-bit MAC address of either a wired or wireless
card. It is represented as a string of bits say Kb which is of fixed length. With the help of a self-
defined technique two shares KS1 and KS2 are pseudo-dynamically created from Kb. The bit
‘‘1’’ of Kb is represented as 0/1(KS1) & 1/0(KS2) and ‘‘0’’ as 0/1(KS1) & 0/1(KS2) respectively
because Kb = KS1 XOR KS2. The bit sequence of KS1 and KS2 are generated pseudo-
dynamically and so differs in content. KS2 cannot be generated from KS1 and even not vice
versa. Even if a technically abled person with an ill intention tries to generate a duplicate version
of KS1 and KS2, it cannot be done due to its pseudo-dynamic nature.
DT# is concatenated with KS2 to form DT#KS2.
Using Kb, DT#KS2 is encrypted by the technique of block cipher algorithm, i.e. AES (Advanced
Encryption Standard) [16-18] with a key length of 256 bits to form DT#KS2E. Now DT#KS2E
and KS1 are encoded using Hamming 1-bit error detection and correction technique [19] to form
DT#KS2EEC and KS1EC.
3.3. Phase III
In the proposed algorithm, we have tried to prevent data loss even after JPEG compression is
affected. Firstly, the facial part of the image collected from the camera is partitioned as non-
overlapping 8x8 blocks. The 8x8 blocks are levelled off and two-dimensional DCT is applied to
them. Even after decompression, decent image quality is maintained at a quality level of 50 and is
represented as a Q50 quantization matrix. Also, a technique of rounding off the fractional value
further supports the prevention of data loss. The casting position in a middle-frequency band of
every alternate block is always pseudorandom. So, the steps of Levelling, DCT, Quantize and
round off help to avoid any data loss even after any JPEG compression attack on the modified
image. These factors also prevent collusion attacks.
3.4. Phase IV
The embedding of DT#KS2EEC and KS1EC is done in the mid-frequency range of the transformed
block. DT#KS2EEC is embedded in the diagonal part of the first and second 4x4 blocks andKS1EC
is embedded in the diagonal part of the third and fourth 4x4 blocks of each 8x8 block.
3.5. Phase V
For authentication, the extraction algorithm executes on the facial image to be verified and
performs the following steps to justify confidentiality:
1. (DT#KS2)`EEC and KS1`EC are reframed internally in memory. Embedding technique as in
phase III and subsequent extraction justifies confidentiality.
2. Now (DT#KS2)`EEC is decoded to form (DT#KS2)`E and KS1`EC is decoded to form
KS1`using Hamming technique but within a private method.
3. Now (DT#KS2)`E is decrypted using Kb to form (DT#KS2)`. Further (DT#KS2)` is de-
concatenated to form (DT#)` and (KS2)`.
4. Taking (KS2)` as input the algorithm will overlap with reframed KS1`and produce Kbe, which
should match with Kb, to prove the authenticity of the image. Moreover, KS2 never leaves the
gadget, the framed Kbe matching with Kb ensures non-repudiation property.
5. This (DT#)`should match with the Sha-2 of the name of the file, i.e date and time stamp
(YYYYMMDDHHMISS[I])of the image. To ensure, the integrity of the image is checked
with the instant generated message digest from the date stamp of the facial image chosen.
5. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
121
The whole process is for the verification purpose of a captured facial image of an intruder with a
date and time stamp.
4. DETAILED DISCUSSION OF THE OPERATIONAL STEPS
The description of the processes are:
4.1. Configuration of the device and its utility
The composition of the device is:
1) Process steps
Capture video
Extraction of frames
Analysis of frame to detect face
Crop face (if detected) and normalize
Capture time information in ‘ddmmyyyyhhmiss[I]’ format
Transfer cropped face image for offsite preservation.
The flow diagram of the steps is shown in figure 1.
Figure 1. Brief flow diagram of the process
2) Product composition
An aluminum cabinet.
A digital video capturing and processing unit placed inside a metal housing
A power supply module
A holding means that includes a sliding tray arrangement for holding gadgets.
Wi-fi dongle for transfer of cropped face image.
Network cable for transfer of cropped face image (in absence of wireless
connectivity)
3) All process parameters (for tested performance), more particularly those which are critical in
the process
Capture
Video
Frame
Analysis
Face
detection
Preserve Cropped Face
Image with time stamp
Remote
Storage
6. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
122
Camera resolution: 320 X 240.
Brightness: 60.
Normalized face size: 80 X 80.
Required storage: [1.84 -- 3.38] KB per image.
Figure 2 explains one possible implementation scenario where the gadget is installed in a
residence to capture intruders' facial images and preserve them in dedicated storage for future
reference. This type of installation is perfectly comparable with a low-cost domestic alternative
of CCTV kind of arrangement.
Figure 2. Implementation plan for surveillance of Individual’s Residence
Figure 3 explains a scenario that may cover the deployment of the proposed gadget commercially
where more than one gadget is installed at different strategic locations to capture the facial
images of the trespassers and preserved in central storage, which may be in a compartmentalized
manner for future reference. This type of implementation is suitable for the implementation of
perimeter security in residential complexes and hotels etc.
Figure 3. Implementation strategy for surveillance of Residential complex or Hotels
7. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
123
4.2. Cropping and Normalization of the captured Image
The facial image of a person is captured through the in-built camera and cropped to get a distinct
facial image only.
Then, the image is normalized by changing the pixel intensity range. The motivation for the same
is to achieve consistency and avoid mental distraction for the dynamic range of a given set of data
(signals or images). The formula for normalizing a grayscale digital image is:
IN = (IO - IOMI) * [(INMA – INMI) / (IOMA - IOMI)] + INMI (1)
Where
IN = Normalized Image.
IO = Original Image
IOMI = Minimum pixel value of the original image.
INMA = Maximum pixel value of the new image.
INMI = Minimum pixel value of the new image.
IOMA = Maximum pixel value of the original image.
IOMI = Minimum pixel value of the original image.
INMI = Minimum pixel value of the new image.
In the proposed method, the values of INMA and INMI are taken as 255 and 0 respectively.
IN is stored in the system with the date-time stamp in the format YYYYMMDDHHMISS[I]. It is
in digital form and a 256-bit message digest (SHA-2) is generated from it.
4.3. Generation of Shares
The 48-bit MAC address of a wired or wireless card is represented as a bit sequence and
considered for the generation of shares.
The format of two shares (KS1 and KS2) depends on the intensity value defined by PI(x, y). To
generate the shares “0” is represented as “0” and “1” is represented as “255”. The conversion is
due to the framing of black and white pixels which will help to reconstruct the MAC address
even after some image processing operations are applied as proposed by Tai-Wen Yue et al. [15].
The shares are generated as: (PI(i,j)==0) ? KS1(i,2*j-1) = 255, KS1(i,2*j) = 0, KS2 (i, 2*j-1) =
KS1 (i, 2*j), KS2(i, 2*j) = KS1(i, 2*j-1) : (mod (random ([m n]), 2) == 0) ? KS1(i, 2*j-1) = 255,
KS1(i,2*j) = 0, KS2(i, 2*j-1) = KS1(i,2*j-1), KS2(i, 2*j) = KS1(i,2*j): KS1(i,2*j-1) = 0;
KS1(i,2*j) = 255, KS2(i, 2*j-1) = KS1(i,2*j-1),S2(i,2*j)= KS1(i,2*j); (2)
Here, r and c represent the width and height of payload data, i varies from 1 to r and j varies from
1 to c. The values of m and n are taken arbitrarily depending on the corresponding pixel intensity.
The procedure of share generation from 48 bits MAC address is shown in figure 4.
8. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
124
AA.F0.C1.E2.
77.51
10101010.1111000
0.11000001.111000
10.01110111.01010
001
Conversion of 0
to 0 and 1 to 255
Share 1 Sequence of 0 and
255
Share 2
48 bit MAC
address
Binary format of
MAC address
Gray scale Image
(Fabricated)
Generation of
shares
Gray Scale Image
(Detected)
Figure 4. Share Generation
4.4. Formation of Message digest and it’s encryption
Secured Hashing Algorithm (SHA) variant 2 is much more secure because it generates a unique
value for every digest. A 256-bit hash value denoted as DT# is generated from DT. DT# is
concatenated with KS2 to form DT#KS2.
Due to the involvement of a lesser number of bits in the encryption process as in DES technique,
a more robust form of encryption is Advanced Encryption Standard (AES). This is a variant of
the Rijndael block cipher which enhances the encryption technique to give the best protection for
sensitive data from prying eyes.
In the proposed algorithm, we have taken consecutive blocks from DT# each of size 128 bits. i.e.
AES technique which separates the data into a four-by-four column of sixteen bytes. This format
explicitly considers the allowed values for the key length (Kl), block size (Bs) and the number of
rounds (Rn) to be 8,4 and 14 respectively. Moreover, AES is a symmetric encryption algorithm
and the same key Kb represented as 128 bits are used for the encryption and decryption
process.DT#KS2 is encrypted to form (DT#KS2)E.
For execution, the AES-256 algorithm uses a round function and involve four different byte-
oriented transformations:
1) Byte substitution using a substitution table (S-box).
2) Shifting rows of the State array by different offsets.
3) Mixing the data within each column of the State array.
4) Adding a Round Key to the State.
The intended receiver knows the symmetric key.
The motive behind the use of the AES mechanism is that: 1) The image encrypted can only be
deciphered by the receiver as the key is only known to the sender and receiver.2) AES technique
proves better because a block is processed as a whole to frame the ciphertext.3) The key
expansion method makes it more robust.
This technique provides enhanced confidentiality and is quite strong concerning the conventional
approaches.
9. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
125
4.5. Encoding using Hamming 1-bit error detection and correction technique
Hamming code uses the block code technique to encode a message. Some redundant bits are
taken and inserted at specific locations in a message for error detection and correction. The
receiver receives a message and checks the bit position for error.
The redundant bits are determined as: 2r
≥ m + r + 1 where m is the number of data bits and r is
the number of redundant bits. This is explained by Ramadhan J. Mstafa et al. [19].
For example, if the data to be encoded is 1011001, the redundant bits are R8, R4, R2, and R1 and
will be combined with the data bits to form 101R8100R41R2R1.
In the algorithm, Hamming Code is used on a 3-bit code. We can assume a single bit as a set of 8
bits and pad an extra bit at the 9th
position to get a set of 9 bits. Now 3 consecutive bits are put to
manipulation using Hamming Code and the procedure is followed for encoding at the sender’s
end and decoding at the receiver’s end. As per the formula, if there are 3 data bits then including
3 redundant bits the total bit set will of 6 bits (3 + 3).
In our algorithm, we have considered a data set of three bits at a time. For example, if the data set
is D2D1D0 and check bit set is C0C1C2, then the encoded word will beC0C1D2C2D1D0. The
weightage of C0, C1, C2 are calculated as:
C0 = 0, D2D1 = 00 or 10,
= 1, D2D1 = 01 or 11.
C1 = 0, D2D0 = 00 or 10,
= 1, D2D0 = 01 or 11.
C2 = 0, D1D0 = 00 or 10,
= 1, D1D0 = 01 or 11. (3)
After all the bits of (DT#KS2)E and KS1 are encoded we get (DT#KS2)EEC and KS1EC.
4.6. Generation of pseudorandom embedding point
A variable ipos is generated pseudo-randomly for the embedding of secret bits. A particular block
(k) as determined by mod (k, 2) is chosen for embedding. The mathematical derivation for ipos is
done as:
ipos = (In), n varies from 1 to 8.
B1 = I0I1I2I3.
d1 = (I0I1) XOR (I2I3) = d11d12.
k = Kn, n varies from 1 to 8.
B2 = K0K1K2K3.
d2 = (K0K1) XOR (K2K3) = d21d22.
d3 = d1 XOR d2 = d31d32.
ipos = Dec (d3) = any value from 0 to 3.
ipos= (ipos == 0 || ipos ==1) ? 1: (ipos == 2)? 2:3. (4)
Here B1 and B2 are the combination of 4 bits. d1, d2 and d3 are the intermediate values owing to
bit operations.
4.7. Embedding Technique
Input: The facial part of the Image as cover and (DT#KS2)EEC and KS1EC as the payload.
10. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
126
Output: An authenticated Image.
The facial image is considered as a set of non–overlapping 8 x 8-pixel blocks. Firstly the blocks
are prepared to resist loss through JPEG compression and then they are used individually for the
embedding of the full payload.
Step 1: The technique of DCT is effective within the pixel intensity range of -127 to 128 and so
the pixel values are leveled off by subtracting 128 from them individually.
Step 2: The values [–127 128] of a block are converted to frequency components on the
application of the forward DCT formula (Equation 5).
Bpq=𝛼p𝛼q∑ ∑ 𝐴
𝑁−1
𝑛=0
𝑀−1
𝑚=0 mncos
𝜋(2𝑚+1)𝑝
2𝑀
cos
𝜋(2𝑛+1)𝑞
2𝑁
, where 0≤ p≤ M-1 and 0≤q≤N-1. (5)
The terms 𝛼p and𝛼q are represented as,
𝛼p = {
1
√𝑀
, 𝑝 = 0
√2/𝑀, 1 ≤ 𝑝 ≤ 𝑀 − 1
𝛼q = {
1
√𝑁
, 𝑞 = 0
√2/𝑁, 1 ≤ 𝑞 ≤ 𝑁 − 1
Using the above formula, Bpq are obtained from Amn.
Step 3: The frequency coefficients are quantized by using a matrix Q50 and rounded off to the
nearest integer. This is done to distribute the energy of an image in low, medium and high-
frequency zone. Distortion in the low-frequency area produces visual alterations but the high-
frequency zone is untouched by the JPEG quantizer. In the proposed algorithm, parametric
modifications of the coefficients control share casting with an eye on resisting JPEG compression
[31].
Step 4: Coefficients in the middle-frequency zone are chosen pseudo-randomly depending on:
(flag == true) ? (S1(w) == 0) && (ipos == i) ? CI(i, 7-i) < 0 ? diff = 0 - CI(i, 7-i), CI(i, 7-i) =
CI(i, 7-i) + (diff + d) : (CI(i, 7-i) == 0) ? CI(i, 7-i) = CI(i, 7-i) + d : CI(i, 7-i) = CI(i, 7-i) :
(S1(w) == 255) && ( ipos == i) ? CI(i, 7-i) > 0 ? diff = CI(i, 7-i) – 0, CI(i, 7-i) = CI(i, 7-i) - (diff
+ d) : (CI(i, 7-i) == 0) ? CI(i, 7-i) = CI(i, 7-i) - d : CI(i, 7-i) = CI(i, 7-i) : Index values of CI are
swapped for both black and white intensity values of S1(w). (6)
The assumptions are:
1. For similar value of ipos, the index values of CI are alternated by using a flag variable.
2. S1(w) denotes the payload vector at position w. Here the payload vector is DT#EE and KS1E.
3. The value of i is equivalent to ipos.
4. CI(i, 7-i) is the intensity value of the cover image pixel at location (i, 7-i).
5. The value of d helps to maintain an acceptable image distortion even after hiding i.e.
imperceptible to HVS.
DT#EE is embedded in the diagonal part of the first and second 4x4 blocks and KS1E is embedded
in the diagonal part of the third and fourth 4x4 blocks of each 8x8 block.
Step 5: Restoration is done by the product of the current block and Q50.
11. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
127
Step 6: The generated values of a block are rounded off to the nearest integer after applying
Inverse DCT (IDCT) (equation 7).
Amn=∑ ∑ 𝛼p𝛼q
𝑁−1
𝑞=0
𝑀−1
𝑝=0 Bpq cos
𝜋(2𝑚+1)𝑝
2𝑀
cos
𝜋(2𝑛+1)𝑞
2𝑁
, where 0≤m≤M-1 and 0≤n≤N-1. (7)
𝛼p = {
1
√𝑀
, 𝑝 = 0
√2/𝑀, 1 ≤ 𝑝 ≤ 𝑀 − 1
𝛼q = {
1
√𝑁
, 𝑞 = 0
√2/𝑁, 1 ≤ 𝑞 ≤ 𝑁 − 1
Next, 128 is added to each value to complete the decompression procedure. The generated 8x8
block is returned to its original location. After all the blocks are properly rewritten, the image is
reframed to form an authenticated image.
4.8. Payload Detection Process
Input: An authenticated image.
Output: An authentic Image.
The input image is considered as a set of non – overlapping 8 x 8 pixel blocks. The choice of
blocks is similar to that done in the hiding process. The following steps are repeated for the total
detection of the payload.
Step 1: To make DCT coefficients robust, 128 is subtracted from all the values of 8x8 blocks of
the image.
Step 2: 2D DCT is applied to the levelled-off blocks.
Step 3: To resist JPEG compression, a standard matrix Q50 is used to quantize each matrix.
Step 4: Mid frequency region coefficients are pseudo-randomly chosen for extraction of the bits.
Step 5: The detection of the bits is accomplished as:
(flag == true) ? (ipos == i) ? (WI (i, 7-i) > 0)? S1E (w) = 0: S1E (w) = 255.
(flag == false) ? (ipos == i) ? (WI (7-i, i) > 0)? S1E (w) = 0: S1E (w) = 255. (8)
Here WI represents the pixel intensity and S1E represents the payload vector.
Step 6: The determination of bit (0/1) is done by flag variable. Subsequent 8 bits form a byte and
the subsequent bytes are placed consecutively to check for their correctness.
In the proposed algorithm (DT#KS2)`EEC and KS1`EC are reframed internally and through
Hamming process (DT#KS2)`E and KS1` are obtained and restored internally. (DT#KS2)`E is
decrypted to form (DT#KS2)`. After de-concatenation, we get (DT#)` and (KS2)`.
Step 7: (KS2)` is overlapped with KS1` to produce Kbe. If Kbe matches with Kb, the collected
image proves the presence of the intruder. Moreover, as (KS2)` never leaves the gadget, the
match also ensures the non-repudiation property of the gadget.
Step 8: To ensure the integrity of the image, the (DT#)` is matched with Sha-2 that is generated
from date and time stamp of the facial image chosen.
The flow chart in figure 5 is the pictorial representation of sub-sections 4.2 to 4.7 respectively.
12. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
128
Figure 5. Procedure performed for Data Hiding
ipos
Stego Image
Cover Image
8 x 8 Blocks
Levelling
DCT
Transformed
Fabrication
Algorithm
Quantized and
Rounded
KS1EC
(DT#KS2)EEC
(DT#KS2)E
KS1
Hamming 1-bit Error Correction and
Detection Technique
KS2
00: 1A: C2: 7B:00:47
12 digits (48 bits) MAC
address of the gadget (Kb)
AES Technique
Concatenation
(DT#KS2)
0510d2134d607307bbeeb03
57979f01cd185baca
DT#
Self -Devised
Gadget
1 2 3
Facial Images of
Intruder
1 2 3
20210115131022(I)
13. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
129
The flow chart in figure 6 is the pictorial representation of sub-section 4.8 respectively.
=
Figure 6. Procedure performed for Authentication
5. COMPLEXITY ANALYSIS
The proposed algorithm aims at developing a low-cost device to detect and justify the presence of
an intruder. The justification of presence has been achieved through amalgamation of visual
cryptography and steganography in digital medium and so the complexity factor may not be
much of a concern. The self-defined procedures have less amount of mathematical and
computational complexity as compared to conventional procedures.
Yes
Non Repudiation
Property Holds
Integrity of the
Image holds
Internal to the algorithm
(DT#)
`
Match
DT
#
Internal to the algorithm
Kb Yes
Match
Kbe
ipos
8 x 8 Blocks
Levelled, DCT transformed and Quantized
Extraction Algorithm
Stego
Image
(DT#KS2)`EEC KS1`E
C
Hamming 1-bit Error
Correction and Detection
Technique
(DT#KS2)`E KS1`
AES Technique
(DT#KS2)`
De-concatenate
(DT#)
`
(KS2)
`
Kb
Kbe
14. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
130
To justify:
DCT transform is used to convert spatial format to frequency format and hence the image
information exists in a quantitative form beneficial for compression manipulation. This helps in
Human Visual System.
In the context of visual cryptography, a self-defined procedure is defined to create two shares.
Instead of power and modulus, we chose an approach that is less complex and robust. As the
time complexity to generate the shares is each O(n2I).
The reason for using Hamming code is to establish copyright and sensitive data protection
religiously.
The features of data communication can be customized for commercial benefit.
AES mechanism has been chosen for all its improved features, except the complexity factor.
6. PERFORMANCE ANALYSIS
6.1. Result Analysis using Image quality Metrics
Certain standard grayscale facial images are taken for verifying the effectiveness of data insertion
and extraction methods. Matlab (version R2020a) is used for coding. The dimension of the source
images is taken as 512 x 512. Some of the sources and corresponding authenticated versions are
shown in figure 7.
Type Images
Source
A B C D E F G H
Authenticat
ed
I J K L M N O P
Figure 7. Visual Interpretation
The source and authenticated images are visually identical, despite using the mid-frequency band
to hold secret data.
The algorithm has restricted Visual Attacks by manipulating white noise. Further, the efficiency
of the algorithm is tested with the image quality metrics like, Mean Square Error (MSE) [20],
Peak Signal to Noise Ratio (PSNR) [20], Image Fidelity (IF), Structural Similarity Index Metric
(SSIM) [21], Bit Error Rate (BER) [22] and Normalized Correlation Coefficient (NCC) [21]. In
table 1, the values are mentioned according to the metrics.
15. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
131
Table 1. Performance Analysis
The achieved average PSNR value is 43.16 dB is quite acceptable. The computed values of MSE,
IF, SSIM, and CC i.e. 7.801, 0.934, 0.991, and 0.992 respectively justify closeness between the
original and authenticated images w.r.t HVS. The values of table 1 also interpret the high
possibility of sensitive data recovery during authentication.
6.2. Effectiveness against other techniques
The effectiveness of the algorithm has been based on modelling a low-cost device as the
hardware component and establishing accurate proof of evidence of the presence of the intruder.
The second part has been dealt with accurately based on secured generation of shares, encrypting
the sensitive data in the best possible method, the accurate embedding of sensitive data and
possible authentication as and when required.
In addition, the proposed algorithm is compared with similar existing techniques w.r.t PSNR as in
table 2. The average PSNR value shows that the proposed technique is quite acceptable.
Table 2. PSNR comparison
Sl. No. Algorithms Resolution Level PSNR (in dB)
1 [23] 1 29.01
2 [24] 2 34.82
3 [25] 2 31.10
4 [26] 2 24.51
5 [27] 1 35.41
6 [28] 2 22.78
7 [29] 2 36.16
8 [30] 1 37.61
9 Proposed 2 43.16
6.3. Resistance against Attacks
Statistical Attack: The fabrication intensity is properly verified to resist any significant
distortions in the authenticating signals. Considering CS, MS, and t as a carrier signal, modified
signal and intensity strength respectively the mathematical interpretation is MS = t x CS. To
sustain imperceptibility and robustness in fabrication, the intensity of t is attuned to control white
noise. To justify, the density estimation is compared between the original and authenticated
images as in figure 8.
Images MSE PSNR IF SSIM NCC
A 8.2912 42.4101 0.9371 0.9914 0.9941
B 7.3109 43.9102 0.9313 0.991 0.9902
C 8.2912 42.4101 0.9371 0.9914 0.9941
D 7.3109 43.9102 0.9313 0.991 0.9902
E 8.2912 42.4101 0.9371 0.9914 0.9941
F 7.3109 43.9102 0.9313 0.991 0.9902
G 8.2912 42.4101 0.9371 0.9914 0.9941
H 7.3109 43.9102 0.9313 0.991 0.9902
Average 7.80105 43.16015 0.9342 0.9912 0.99215
16. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
132
Image Frequency Plot
Figure 8. Analysis based on Frequency Distribution
Figure 8 shows a negligible difference between the original and the authenticated images.
Copy Attack: A copy of the authenticated image and the original image may be available to an
intruder. If compared, the two files will be different. But as one of the shares is held by an
intended receiver, it is never possible for an attacker to destroy the hidden information. The
procedure during authentication is internal. Even if the authenticated images are hacked by an
intruder bit error is incorporated, Hamming 1 – bit error detection and correction technique can
easily rectify it. Also, a similar symmetric key cannot be generated by an intruder which helps to
resist copy attack. In addition, the cover image also varies and hence restricts protocol attack.
Collusion Attack: The attacker may have an intention to destroy the content of a document by
combining the copies of it. But in the proposed algorithm, the embedding position is pseudo-
random in every context and so whatever may be the number of authenticated images, combining
them all will not help to decipher the sensitive portion. The average technique implemented on
the multiple copies of the same authenticated image is g(x, y) = f(x, y) + n(x, y), where f(x, y) is
the original, g(x, y) is the noisy image and n(x, y) is the amount of noise added. In this algorithm
g(x, y) will never converge to f(x, y) and n(x, y) not having the value “0”. The authenticated
users are only privileged to authenticate the presence of an intruder.
Normalized-Cross correlation (NCC): The intensity variation is checked between the original
and authenticated images. A value close to 1 justifies the closeness of extracted sensitive data to
the actual signal. Table 3 shows the NCC value of the extracted sensitive data after certain
attacks.
0
50
100
150
200
250
0 20 40 60 80 100 120 140 160 180 200 220 240 260 280
original watermarked
0
50
100
150
200
250
0 20 40 60 80 100 120 140 160 180 200 220 240 260 280
original watermarked
17. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
133
Table 3. NCC value comparison after attacks
Applied attacks names with their
respective parameter values
NCC values of four recovered signatures copies
were found from different regions of the cover
image
Vertical Flip – 1800
and then reverse 0.9994
Horizontal Flip – 1800
and then reverse 0.9995
Blurring (Blur Radius – 5, Max Delta – 2) 0.9206
Gaussian Filter (Filter - 3*3 & Sigma – 0.9) 0.8069
Circular Average Attack (radius 0.5) 0.9115
Normalization 0.9645
7. CONCLUSION
The proposed method emphasizes introducing a low-cost device to capture and preserve the
presence of an unwanted person in unattended mode and also to establish the presence of the
intruder. The key factors are:
1. The embedding is done to prevent loss of data due to JPEG compression.
2. The embedding positions are pseudorandom in nature.
3. The encryption of message digest (SHA-2) by the AES mechanism before embedding helps to
protect sensitive data from an intruder.
4. The content of the shares is different from each other and depends on their generation at
different times.
5. If an error occurs in one bit, it can be easily rectified by Hamming code technique.
6. One of the shares is never public and difficult to obtain by an intruder.
7. The average PSNR value of 43.36 dB and NCC value of 0.93 clearly shows an advancement
in frequency domain-based data security.
Hence, the efficacy lies in lost cost devices, improved robustness, secured hiding and low visual
artifacts. But, this algorithm can be further extended to include the following:
Use of multi-bit error correction technique with Cyclic Redundancy Check and Hamming
Distance.
Non-overlapping of multi-copy of secret data in different segments of the cover medium.
CONFLICT OF INTEREST
The authors declare no conflict of interest.
ACKNOWLEDGMENTS
The author(s) expresses their deep sense of gratitude towards all the faculty and staff members of
the Department of Engineering & Technological Studies, University of Kalyani, West Bengal,
India, for their kind cooperation and support in connection with carrying out this research work.
REFERENCES
[1] Debasis Mazumdar & Ritesh Mukherjee (2020) “Apparatus for Automated Monitoring of Facial
Images and a process therefor”, US Patent 10,592,727, filed April 21, 2015 and issued Mar 17, 2020.
[2] Lu C.S. & Liao H.Y.M. (2001) “Multipurpose watermarking for image authentication and
protection”, IEEE Transactions on Image Processing, Vol. 10, No. 10, pp. 1579–1592.
18. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
134
[3] Yu G.J., Lu C.S. & Liao H.Y.M. (2001) “Mean quantization-based fragile watermarking for image
authentication”, Optical Engineering, Vol. 40, No. 7, pp. 1396–1408.
[4] Barni M., Bartolini F. & Furon T. (2003) “A general framework for robust watermarking security”,
Signal Processing, Vol. 83, No. 10, pp. 2069–2084.
[5] Lee I.S. & Tsai W.H. (2009) “A new approach to covert communication via PDF Files”, Signal
Processing, Vol. 90, No. 2, pp. 557–565.
[6] Shamir A (1979) “How to share a secret”, Communication of the ACM, Vol.22, No.11, pp. 612–613.
[7] Brabin, D. R. D., Perinbam, J. R. P. & Meganathan, D. (2016) “A block-based reversible data hiding
scheme for digital images using optimal value computation”, Wireless Personal Communications.
DOI: 10.1007/s11277-016-3817-4.
[8] Omnia Abdullah Alharbi, Asia Othman Aljhadli & Azizah Abdul Manaf (2020)“A Robust Double
Layer Steganography Technique Based on DNA Sequences”, The 4th International Conference on
Future Networks and Distributed Systems (ICFNDS), article No.:38, pp.1–5, https:// doi.org /
10.1145 / 3440749. 3442644.
[9] Sanjay Kumar, Anjana Gupta & Gurjit Singh Walia (2021) “Reversible data hiding: A contemporary
survey of state-of-the-art, opportunities, and challenges”, Applied Intelligence, Vol.52, issue 7, pp
7373–7406, https://doi.org/10.1007/s10489-021-02789-2.
[10] Cox I J, Kilian J, Leighton T & Shamoon T (1997) “Secure Spread Spectrum Watermarking for
Multimedia”, IEEE Transaction on Image Processing, Vol. 6, No. 12, pp. 1673–1687.
[11] Koch E & Zhao J (1995) “Towards robust and hidden image copyright labeling”, Proceedings of
IEEE Workshop on Nonlinear Signal and Image Processing, Neos Marmaras, Greece, pp. 452–455.
[12] Hsu C. T. & Wu J. L. (1999) “Hidden Digital Watermarks in Images”, IEEE Trans. On Image
Processing, Vol. 8, No. 1, pp. 58-68.
[13] Langelaar G., Setyawan I. & Lagendijk R.L. (2000) “Watermarking Digital Image and Video Data”,
IEEE Signal Processing Magazine, Vol. 17, pp. 20-43.
[14] Lin S. D., Shie S. C. & Guo J. Y. (2010) “Improving the robustness of DCT based image
watermarking against JPEG compression”, Computer Standards & Interfaces, Vol. 32, pp. 54–60.
[15] Yue T. W. & Chiag S. (2000) “A Neural Network Approach for Visual Cryptography”, IEEE-INNS-
ENNS International Joint Conference on Neural Networks, Vol.5, pp. 494-499.
[16] Jayeeta Majumder & Chittaranjan Pradhan (2020) “Pixel Value Differencing Based Image
Steganography using AES and SHA-2 Cryptography Method”, International Journal of Recent
Technology and Engineering (IJRTE), Vol. 8, No. 5, pp. 5325-5329.
[17] Roshni Padate & Aamna Patel (2014) “Encryption and Decryption of Text using AES Algorithm”,
International Journal of Emerging Technology and Advanced Engineering, Vol. 4, No. 5, pp. 883-
886.
[18] M.Pitchaiah, Philemon Daniel & Praveen (2012) “Implementation of Advanced Encryption
StandardAlgorithm”, International Journal of Scientific & Engineering Research, Vol. 3, No. 3, pp. 1-
6.
[19] Mstafa R J & Elleithy K M (2014) “A Highly Secure Video Steganography using Hamming Code (7,
4). Systems”, Applications and Technology Conference (LISAT), IEEE.
[20] Varnan C S, Jagan A, Kaur J, Jyoti D & Dr. Rao D S (2011) “Image Quality Assessment Techniques
on Spatial Domain”, International Journal of Computer Science and Technology (IJCST), Vol. 2,
No.3, ISSN: 2229-4333(Print), ISSN: 0976-8491(Online).
[21] Wang Z, Bovik A C, Sheikh H R & Simoncelli E P (2004) “Image Quality Assessment: From Error
Visibility to Structural Similarity”, IEEE Transactions on Image Processing, Vol.13, No.4.
[22] Kaur G & Kochhar A (2011) “A Steganography Implementation based on LSB and DCT”,
International Journal for Science and Emerging Technologies with Latest Trends, Vol.4, No.1, pp.
35–41. ISSN No: Online 2250-3641.
[23] S. D. Lin, S. C. Shie & J. Y. Guo (2010) “Improving the robustness of DCT based image
watermarking against JPEG compression”, Computer Standards &Interfaces, Vol. 32, pp. 54–60.
[24] S. D. Lin & C. F. Chen (2000) “A robust DCT based watermarking for copyright protection”, IEEE
Transactions on Consumer Electronics, Vol. 46, No. 3, pp. 415–421.
[25] S. D. Lin, S. C. Shie & C. F. Chen (2003) “A DCT based image watermarking with threshold
embedding”, International Journal of Computers and Applications, Vol. 25, No. 2, pp. 130–135,
2003.
[26] Vikash Saxena & J. P. Gupta (2009) “A novel watermarking scheme for JPEG images”, WSEAS
Transactions on Signal Processing, 2009, Vol. 5, No. 2, pp. 74–84, 2009.
19. International Journal of Computer Networks & Communications (IJCNC) Vol.14, No.4, July 2022
135
[27] Rekha Chaturvedi, Abhay Sharma, N. Hemrajani & D. Goyal (2012) “Analysis of robust
watermarking technique using mid-band dct domain for different image formats”, International
Journal of Scientific and Research Publications, Vol. 2, No. 3, pp. 1–4.
[28] Q. Kang, K. Li, & J. Yang (2014) “A digital watermarking approach based on DCT domain
combining QR code and chaotic theory”, in Eleventh International Conference on Wireless and
Optical Communications Networks (WOCN), pp. 1–7.
[29] Jobin Abraham & Varghese Paul (2016) “A DCT based imperceptible color image watermarking
scheme”, International Journal of Signal Processing, Image Processing, and Pattern Recognition, Vol.
9, No. 7, pp. 137–146.
[30] Anirban Goswami, Ritesh Mukherjee & Nabin Ghoshal (2017) “Chaotic Visual Cryptography Based
Digitized Document Authentication”, Wireless Personal Communications, Vol.96, No. 3, pp. 3585–
3605.
[31] Gelar Budiman and Ledya Novamizanti (2015) “White Space Steganography On Text By Using
Lzw-Huffman Double Compression”, International Journal of Computer Networks &
Communications (IJCNC), Vol.7, No.2, pp. 123-136, DOI: 10.5121/ijcnc.2015.7210.
[32] Saraireh, Saleh (2013) “A Secure Data Communication System Using Cryptography and
Steganography (2013)”, International Journal of Computer Networks & Communications (IJCNC)
Vol.5, No.3, pp. 125-137.
AUTHORS
Ritesh Mukherjee is associated with C-DAC (Centre for Development of Advanced
Computing), Kolkata, India as an Associate Director. He has 22 years of experience in
software solution development in the area of large databases, data warehousing, Web
technologies, Mobile Computing, etc. He has contributed to more than 15 projects, the
release of 7 solutions and 3 products. He has 14 research papers in various journals, and
conferences, 3 copyrights, 1 Indian, and 1 US patent.
Anirban Goswami is currently working as Asst. Professor and Asst. Registrar in Techno
India (An Engineering College under the Maulana Abul Kalam Azad University of
Technology), Kolkata, West Bengal, India. He has more than 22 years of teaching
experience He had contributed in more to 10 graduate-level projects and has 15
international conferences and 6 international journal publications. He did his Ph. D. from
the Faculty of Engineering, Technology & Management, University of Kalyani.
Soumit Chowdhury is presently working as an Assistant Professor of Computer
Science & Engineering, in the Govt. College of Engineering & Ceramic Technology,
Kolkata, India. He has more than 16 years of teaching experience in different
engineering colleges and has published 18 research papers in different National,
International Journals and Conferences. He has also successfully supervised one UGC-
funded research project as a Principal Investigator and did his Ph. D. in Engineering
from the University of Kalyani.
Nabin Ghoshal is currently attached with the Department of Engineering &
Technological Studies, University of Kalyani, Kalyani, West Bengal. He is sincerely
involved with Teaching and Research work. His research areas are Steganography,
Watermarking, Security, Bio-metric steganography, Visual Cryptography, Visual
Cryptography through Steganography, Copyright protection, and authentication (Audio
& Video). He received his Ph. D. in Computer Science & Engineering from the
University of Kalyani in 2011. Dr. Ghoshal has 55 research papers in various international journals and
national and international conferences. He wrote a book in his research area.
Dr. Ghoshal attended many national and international conferences in India and abroad.