-
61
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Thesis -
62
Enhancement of cryptography and transform domain in steganography for higher embedding capacity
Published 2012“…In the field of Data Communication, security issues are the top priority.Cryptography and steganography address the necessary elements for secure communication namely privacy, confidentiality,key exchange,authentication,and non-repudiation but reveals the fact that communication is happening.This study proposes a combination of Steganography and Cryptography to enhance security of the transmitted information.Hence this work is composed of two parts:cryptographic and steganographic.In the cryptographic part,an improvement has been proposed to the Hill cipher algorithm to be more secured by using a large and random key with large data block,and also extending it by including the special characters and digits.For the steganographic part,a new method has been proposed by combining Discrete Cosine Transform (DCT) and Discrete Wavelet Transform (DWT),to take the advantageous of both algorithms.The original image is decomposed into four bands using the Haar wavelet LL,HL,LH and HH.Three of these sub-bands have been selected to hiding data (LH,HL and HH)which are less effect to the image than LL sub-band.Then,DCT transform is applied to the selected DWT sub-band,the process of hiding will be in the least significant bit of the DCT coefficients to each sub-band. …”
Get full text
Undergraduates Project Papers -
63
Correlation immunity and resiliency of boolean functions from haar domain perspective
Published 2015“…The strength of any conventional cipher system relies on the underlying cryptographic Boolean functions employed in the system. …”
Get full text
Article -
64
Performance and security improvements of Dӧmӧsi’s cryptosystem
Published 2016“…Dӧmӧsi’s cryptosystem (Dӧmӧsi’s, 2008; Dӧmӧsi, November 11–14, 2009) is a new stream cipher based on finite automata without outputs. The cryptosystem uses specific deterministic finite accepters as secret keys for the encryption and decryption. …”
Get full text
Get full text
Get full text
Article -
65
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Academic Exercise -
66
Generation of IPv6 addresses based on one-to-many reversible mapping using AES
Published 2012“…Each time a user tries to access the network, different IPv6 address will be given which is generated using CFB (Cipher Feedback) mode of AES (Advanced Encryption Standard) algorithm, whereby there is a one-to-many reversible mapping between user and IPv6 addresses. …”
Get full text
Get full text
Book Chapter -
67
Enhancing selective encryption for H.264/AVC using advanced encryption standard
Published 2010“…The system includes two main functions; first is the encoding/encryption of video stream, through the execution of two processes (the input sequences of video is first compressed by the H.264/AVC encoder, and the encoded bit stream (I-frame) is partially encrypted using AES block cipher). And the second function is the decryption/decoding of the encrypted video through two process (specify the encrypted I-frame stream, decryption of the I-frame, and decoding with H.264/AVC decoder). …”
Get full text
Article -
68
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The Advanced Encryption Standard (AES) algorithm is one on the most common and widely symmetric block cipher algorithm that used for encryption and decryption data nowadays. …”
Get full text
Get full text
Get full text
Thesis -
69
Adaptive chosen all inputs model for analyzing key derivation functions against bit-flip and timing side-channel attacks
Published 2019“…The result showed that only the stream cipher based KDF is vulnerable to the bit-flipping attack. …”
Get full text
Get full text
Get full text
Thesis -
70
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The fitness function used is the correlation function in the SKF algorithm to optimize the cipher image produced using the Lorenz system. Next, the thesis will be discussed about the findings of this study. …”
Get full text
Thesis -
71
Security in robot operating system (ROS) by using Advanced Encryption Standard (AES)
Published 2018“…The study investigates a robot’s performance when ciphering the messages interchanged between ROS nodes under the publish/subscribe paradigm. …”
Get full text
Undergraduates Project Papers -
72
A novel efficient substitution-box design based on firefly algorithm and discrete chaotic map
Published 2018“…Substitution boxes are essential nonlinear components responsible to impart strong confusion and security in most of modern symmetric ciphers. Constructing efficient S-boxes has been a prominent topic of interest for security experts. …”
Get full text
Article -
73
An effective simulation analysis of transient electromagnetic multiple faults
Published 2020“…The proposed ciphertext-only impossible differential analysis provides an effective method for random multiple faults analysis, which would be helpful for improving the security of block ciphers.…”
Get full text
Article