FA Multilayered Secure, Robust and High Capacity Image Steganographic Algorithm
S.K.Muttoo, Sushil Kumar
Abstract: It is observed that all of the current steganographic algorithms rely heavily on the conventional encryption systems which do not serve well in the context of image steganography. Advanced encryption standard (AES) is one of the most powerful techniques of cryptography which can be used as an integral part of steganographic system for better confidentiality and security. In this paper we propose a reversible image steganographic embedding algorithm consisting of three parts. First, we use the self- synchronization variable codes, viz., T-codes for encoding/compressing the original text message. Next, the encoded binary string is encrypted using an improved AES method. The encrypted message is then embedded in the high frequency bands obtained from the cover image by applying the 1- level decomposition of Double Density Dual Tree Discrete Wavelet Transform (DD DT DWT). This algorithm provides three layer of security- one layer at each level of compression, encryption and embedding, respectively. Thus, there is no chance that the intruder may detect the original message after couple of attacks. The algorithm is compared with the corresponding algorithm based on Discrete Wavelet Transform (DWT) and found to be better in terms of imperceptibility, robustness and embedding capacity.
Keywords : T-codes; AES; DD DT DWT; DWT; PSNR; SSIM.
A Study on the Readiness of Cloud Computing for Captious Computations
GhantaSrinivasaRao, ShaikNazeer, U.UshaRani, Gogineni Vijay Krishna
Abstract: The emergence cloud computing in the computing arena has had major effect in way we utilize computing resources. It is being heralded by many as the new computing paradigm, coming with disruptive technologies which are expected to foster all sorts of innovations. However, further investigations suggest that cloud computing it is nothing new, rather an evolution of different existing technologies creatively integrated together. Therefore, it has inherited strengths and weaknesses of existing technologies, but has lowered the entry bar to computing making it an interesting proposition. In this paper we propose a security wrapper, which affords enough protection to the classified data as it flows in the cloud. The wrapper offers security to data in motion and at rest, and incorporates adaptive SLA negotiation.
Keywords : Cloud Computing; Security Wrapper; Cloud Providers; Service Level Agreement.
Do Indonesian Province Website Rich and Popular?
Widya Silfianti, Ruddy J. Suhatril
Abstract: Most local governments in Indonesia are relatively left behind in terms of e-government implementation. According to Indonesian e- government road map, Indonesia has only reached the third phase of the action. This article will discuss the diversity of features, popularity, and information richness on the website of the provinces in Indonesia. The population of study is the website of 33 provinces in Indonesia. The research result show that the traffic does not depend on information richness and number of web features. There were differences in information richness and real traffic rank among the provinces outside Java with Java.
Keywords : e-Government; popularity; information richness; webmetric.
A Fast Approach for Breaking RSA Cryptosystem
Alaa H Al-Hamami, Bilal S O Al-Kubaysee
Abstract: Prime numbers play a very important role in the complexity and security of the public key cryptosystem. RSA is one type of public key algorithm and its security depends on the complexity of factoring (n) value. Any encryption algorithm depends on the length of the key and the computational effort required breaking the key. This paper introduces an efficient algorithm to attack the RSA Scheme. Obtaining the private key of the RSA scheme is the target of the suggested algorithm by factoring the modulus based on the public key (e, n) of the RSA scheme. The suggested algorithm is very fast due to its treatments for the factorizing problem. It will limited the search for the p & q values especially when the value of n is small, since most of public key encryption schemes select a small encryption n in order to improve the efficiency and eligability of encryption. The suggested algorithm is more efficient than most existed algorithms of attack since it is break the search process and takes less running time.
Keywords : RSA Scheme; Factoring; GCD; Attack; Prime Numbers.
Interoperability of Digital Signatures in Public Administration
Nicușor Vatră
Abstract: Interoperability is becoming one of the technical terms used in the IT industry and this is due to the development of the Internet and the growing need to make different applications communicate to each other. Interoperability seen as critical in public key infrastructure (PKI) implementations, because are used to assess the ability of two PKI applications to interact, providing great flexibility in carrying out secure transactions between two or more organizations using different PKI technologies. In this paper, we present some public key infrastructure interoperability problems, and we identify an infrastructure for interoperability of digital signatures in public administration.
Keywords : digital signature; encryption; public key infrastructure; interoperability.
Congestive Loss in Wireless Ad hoc Network, Network Performance Analysis
Haniza N., Zulkiflee M., Abdul S.Shibghatullah, Shahrin S.
Abstract: Communication in wireless network is quite susceptible to mobility, nodes capacity and power consumption level. These might contributes to the major problem of TCP performance degradation where there are highly potential of packet loss and packet reordering. In this research, we manage to observe the impact of packet behavior once the node’s capacity is limited when passing on-going data. This condition occurs when the node’s buffer starts to be overloaded. A simulation study by using OPNET Modeler 14.5 is conducted to achieve the purpose. A static ad hoc topology with the size of users (2n where n=0, 1, 2, 3 and 4) is used to observe several parameters such as throughput, number of packet dropped, retransmission count and end-to-end TCP delay. The results show that the size of buffer for ad hoc node influence the network performance whenever number of users is changed. In future, we plan to extend this study in a way of deeply understanding the effect of mobility in wireless network.
Keywords : Wireless; Ad hoc; CBR; BER; OPNET; network congestion; buffer size; PLI.
Web-based Timetable Information System for Public Transport
Andrey Makarovskiy
Abstract: Web-based timetable information system for public transport has been created in Tver region, Russia, aimed to serve as a communication system for passengers and offering the opportunity for Internet search for path between any stops of any modes of transport in the region. Moreover the system is adjusted for traffic schedules and transport schedule information receiving at any stop of the travel line and timetable for any route. Information updating is provided by the carriers. The system is implemented on Microsoft technologies base.
Keywords : timetable information system; PTV Vision VISUM; public transport; shortest path.
Image Deblurring Using Back Propagation Neural Network
P.Subashini, M.Krishnaveni, Vijay Singh
Abstract: Image deblurring is the process of obtaining the original image by using the knowledge of the degrading factors. Degradation comes in many forms such as blur, noise, and camera misfocus. A major drawback of existing restoration methods for images is that they suffer from poor convergence properties; the algorithms converge to local minima, that they are impractical for real imaging applications. Added to its disadvantage, some methods make restrictive assumptions on the PSF or the true image that limits the algorithm’s portability to different applications. In conventional approach, deblurring filters are applied on the degraded images without the knowledge of blur and its effectiveness. In this paper, concepts of artificial intelligence are applied for restoration problem in which images are degraded by a blur function and corrupted by random noise. The proposed methodology adopted back propagation network with gradient decent rule which consists of three layers. This methodology uses highly nonlinear back propagation neuron for image restoration to get a high quality restored image and attains fast neural computation, less computational complexity due to the less number of neurons used and quick convergence without lengthy training algorithm. Specific experiments are carried out and the results explore that this work can have extensive application expansion.
Keywords: Image restoration; deblurring ; BPN ; blur parameter ; point spread function.