keyboard_arrow_up
Trends in Cryptographic protocols in 2020

A Novel Image Encryption Scheme with Huffman Encoding and Steganography Technique

    Manju Kumari1, Vipin Pawar2 and Pawan Kumar3 , 1 YMCA University of Science and Technology,India , 2Deenbandhu Chotu Ram University of Science and Technology,India , 3 Maitreyi College, University of Delhi, India

    ABSTRACT

    In today’s day and age when everything is done with the aid of computing technology, the need for confidential communication has drastically increased. Not only the sensitive data such as top intelligent secrets of our nation but personal information of common people needs to be secure. Several combinations of cryptography and steganography techniques in different ways are used by researchers over the past to protect the data being transmitted. Cryptography uses mathematical algorithms to convert the data into an incomprehensible form and Steganography, on the other hand hides the data in a carrier such as image, data, audio or video. Cryptography provides necessary mechanisms for providing accountability, accuracy and confidentiality in public communication mediums such as the Internet and steganography is used in other fields such as copyright, preventing e-document forging etc. We are of the opinion that this security mechanism can further be increased by incorporating the use of Huffman coding in order to reduce the data length. This paper is an effort in the direction to hide, secure and compress the data. It explains the executed procedure by applying various encryption techniques one by one and our aim is to get the best security out of the existing ones. The proposed technique is implemented in MATLAB2016a and the results shown in this paper that our technique is better approach then the conventional techniques.

    KEYWORDS

    Cryptography; Steganography; Huffman Coding; Data Compression


    For More Details :
    http://aircconline.com/ijnsa/V11N4/11419ijnsa04.pdf



Performance Evaluation of Parallel International Data Encryption Algorithm on IMAN1 Super Computer

    Ahmad Bany Doumi and Mohammad Qatawneh , University of Jordan, Jordan

    ABSTRACT

    Distributed security is an evolving sub-domain of information and network security. Security applications play a serious role when data exchanging, different volumes of data should be transferred from one site to another safely and at high speed. In this paper, the parallel International Data Encryption Algorithm (IDEA) which is one of the security applications is implemented and evaluated in terms of running time, speedup, and efficiency. The parallel IDEA has been implemented using message passing interface (MPI) library, and the results have been conducted using IMAN1 Supercomputer, where a set of simulation runs carried out on different data sizes to define the best number of processor which can be used to manipulate these data sizes and to build a visualization about the processor number that can be used while the size of data increased. The experimental results show a good performance by reducing the running time, and increasing speed up of encryption and decryption processes for parallel IDEA when the number of processors ranges from 2 to 8 with achieved efficiency 97% to 83% respectively.

    KEYWORDS

    International Data Encryption Algorithm (IDEA); Plain text; Encrypted data; MPI.


    For More Details :
    http://aircconline.com/ijnsa/V11N1/11119ijnsa04.pdf



EUNICERT: Ethereum Based Digital Certificate Verification System

    Trong Thua Huynh1, Dang-Khoa Pham2 , 1Hochiminh city, Vietnam , 2FPT Telecom, Vietnam

    ABSTRACT

    The fake certificate is a special global problem in today's digital age. Thousands of universities and educational institutions around the world do not exist but can release hundreds of millions of fake degrees. Verifying the integrity of qualifications is a real challenge for today's employers. Applying the anti-data modifying properties of blockchain technology, this study proposes a solution issuing and verifying digital certificates called EUniCert to solve this problem. By changing the design and integrating new consensus algorithm used in Ethereum platform into the Unicoin network that was used to verify and store the information related to the issued digital certificate, the EUniCert improves the latency to validate transactions as well as the number of verified blocks in the blockchain network compared to the previous solution that we have proposed. We implement a simple blockchain system to illustrate the management operation of the digital certificates on the ethereum platform. Besides, we conduct a simulation to evaluate the performance of our proposal compared with the previous system. The result is that the average latency decreases by 3.27 times as well as the number of verified blocks increases by 11% compared with the previous system

    KEYWORDS

    A Digital certificate, blockchain, ethereum, verification, counterfeit.


    For More Details :
    http://aircconline.com/ijnsa/V11N5/11519ijnsa02.pdf



A Chaotic Confusion-Diffusion Image Encryption Based on Henon Map

    Ashraf Afifi, Taif University, Saudi Arabia

    ABSTRACT

    This paper suggests chaotic confusion-diffusion image encryption based on the Henon map. The proposed chaotic confusion-diffusion image encryption utilizes image confusion and pixel diffusion in two levels. In the first level, the plainimage is scrambled by a modified Henon map for n rounds. In the second level, the scrambled image is diffused using Henon chaotic map. Comparison between the logistic map and modified Henon map is established to investigate the effectiveness of the suggested chaotic confusion-diffusion image encryption scheme. Experimental results showed that the suggested chaotic confusion-diffusion image encryption scheme can successfully encrypt/decrypt images using the same secret keys. Simulation results confirmed that the ciphered images have good entropy information and low correlation between coefficients. Besides the distribution of the gray values in the ciphered image has random-like behavior.

    KEYWORDS

    Chaos, Encryptions, Henon map, Shuffle, Confusion, Diffusion.


    For More Details :
    http://aircconline.com/ijnsa/V11N4/11419ijnsa02.pdf



KVEFS: Encrypted File System based on Distributed Key-Value Stores and FUSE

    Giau Ho Kim, Son Hai Le, Trung Manh Nguyen, Vu Thi Ly, Thanh Nguyen Kim, Nguyen Van Cuong, Thanh Nguyen Trung, and Ta Minh Thanh Le Quy Don Technical University,Hanoi, Vietnam

    ABSTRACT

    File System is an important component of a secure operating system. The need to build data protection systems is extremely important in open source operating systems, high mobility hardware systems, and miniaturization of storage devices that make systems available. It is clear that the value of the data is much larger than the value of the storage device. Computers access protection mechanism does not work if the thief retrieves the hard drive from the computer and reads data from it on another computer. Encrypted File System (EFS) is a secure level of operating system kernel. EFS uses cryptography to encrypt or decrypt files and folders when they are being saved or retrieved from a hard disk. EFS is often integrated transparently in operating system There are many encrypted filesystems commonly used in Linux operating systems. However, they have some limitations, which are the inability to hide the structure of the file system. This is a shortcoming targeted by the attacker, who will try to decrypt a file to find the key and then decrypt the entire file system. In this paper, we propose a new architecture of EFS called KVEFS which is based on cryptographic algorithms, FUSE library and key-value store. Our method makes EFS portable and flexible; Kernel size will not increase in Operating System.

    KEYWORDS

    File System in User Space (FUSE), Key-Value store, Encrypt File System, KVEFS, Data Protection.


    For More Details :
    http://aircconline.com/ijnsa/V11N2/11219ijnsa04.pdf



A Multi-Layer Arabic Text Steganographic Method Based on Letter Shaping

    A.F. Al Azzawi, Philadelphia University, Jordan

    ABSTRACT

    Text documents are widely used, however, the text steganography is more difficult than other media because of a little redundant information. This paper presents a text steganography methodology appropriate for Arabic Unicode texts that do not use a normal sequential inserting process to overcome the security issues of the current approaches that are sensitive to steg-analysis. The Arabic Unicode text is kept within main unshaped letters, and the proposed method is used text file as cover text to hide a bit in each letter by reshaping the letters according to its position (beginning, middle, end of the word, or standalone), this hiding process is accomplished through multi-embedding layer where each layer contains all words with the same Tag detected using the POS tagger, and the embedding layers are selected randomly using the stego key to improve the security issues. The experimental result shows that the purposed method satisfied the hiding capacity requirements, improve security, and imperceptibility is better than currently developed approaches.

    KEYWORDS

    Arabic text, multi-layers, Unicode, hiding information, text steganography


    For More Details :
    : http://aircconline.com/ijnsa/V11N1/11119ijnsa03.pdf







menu
Reach Us

emailsecretary@cseij.org


emailcseijsecretary@yahoo.com

close