scholarly journals PRUDA: A Novel Measurement Attribute Set towards Robust Steganography in Social Networks

2021 ◽  
Vol 2021 ◽  
pp. 1-15
Author(s):  
Liyan Zhu ◽  
Jinwei Wang ◽  
Xiangyang Luo ◽  
Yi Zhang ◽  
Chunfang Yang ◽  
...  

Cloud services have become an increasingly popular solution to provide different services to clients. More and more data are outsourced to the cloud for storage and computing. With this comes concern about the security of outsourced data. In recent years, homomorphic encryption, blockchain, steganography, and other technologies have been applied to the security and forensics of outsourced data. While encryption technologies such as homomorphic encryption and blockchain scramble data so that they cannot be understood, steganography hides the data so that they cannot be observed. Traditional steganography assumes that the environment is lossless. Robust steganography is grounded in traditional steganography and is proposed based on a real lossy social network environment. Thus, researchers, who study robust steganography, believe that the measurement should follow traditional steganography. However, the application scenario of robust steganography breaks through the traditional default lossless environment premise. It brings about changes in the focus of steganography algorithms. Simultaneously, the existing steganography methods miss the evaluation of applicability and ease of use. In this paper, “default parameters” are observed by comparing the process of robust image steganography with traditional image steganography. The idea of “perfecting default parameters” is proposed. Based on this, the attribute set of measuring robust image steganography is presented. We call it PRUDA (Payload, Robustness, ease of Use, antiDetection, and Applicability). PRUDA perfects default parameters observed in the process of traditional steganography algorithms. Statistics on image processing attacks in mobile social apps and analyses on existing algorithms have verified that PRUDA is reasonable and can better measure a robust steganography method in practical application scenarios.

2017 ◽  
Vol 2017 ◽  
pp. 1-11 ◽  
Author(s):  
Pan Yang ◽  
Xiaolin Gui ◽  
Jian An ◽  
Feng Tian

Homomorphic encryption can protect user’s privacy when operating on user’s data in cloud computing. But it is not practical for wide using as the data and services types in cloud computing are diverse. Among these data types, digital image is an important personal data for users. There are also many image processing services in cloud computing. To protect user’s privacy in these services, this paper proposed a scheme using homomorphic encryption in image processing. Firstly, a secret key homomorphic encryption (IGHE) was constructed for encrypting image. IGHE can operate on encrypted floating numbers efficiently to adapt to the image processing service. Then, by translating the traditional image processing methods into the operations on encrypted pixels, the encrypted image can be processed homomorphically. That is, service can process the encrypted image directly, and the result after decryption is the same as processing the plain image. To illustrate our scheme, three common image processing instances were given in this paper. The experiments show that our scheme is secure, correct, and efficient enough to be used in practical image processing applications.


2021 ◽  
pp. 2-10
Author(s):  
Liudmila Babenko ◽  
◽  
Ilya Rusalovsky ◽  

Since time immemorial, cryptography has provided secure transmission of information in an insecure environment, keeping the data secret. Not so long ago the homomorphic cryptography began to actively develop. Its distinctive feature is that this type of cryptography allows you to process encrypted data without their preliminary decryption in such a way that the result of operations on encrypted data is equivalent, after decryption, to the result of operations on open data. Because of these features, homomorphic encryption can be effectively used in various cloud services to perform secure computing and secure image processing. At the same time, it is guaranteed that no one will have open data, even the service that performs the calculations. Purpose of the work: development of methods and tools for homomorphic encryption that allow performing homomorphic implementation of image processing algorithms. Research methods: analysis of possible implementations of digital image processing using homomorphic encryption, analysis of existing problems of performing a homomorphic implementation for image processing algorithms. Results: a method for homomorphic comparison of bits and numbers presented as an array of bits is proposed; a homomorphic implementation of the EPX image resizing algorithm is proposed; the complexity of the operation is analyzed when one pixel of the original image is enlarged using the proposed method; the analysis results are presented.


2020 ◽  
Vol 9 (1) ◽  
pp. 13-17
Author(s):  
B. Rasina Begum ◽  
P. Chithra

Cloud computing provides a scalable platform for growing amount of data and processes that work on various applications and services by means of on-demand service providing. The storage services offered by clouds have become a new profit growth by providing a comparably cheapest, scalable, location-independent platform for managing users’ data. Client uses the cloud storage and enjoys the high-quality applications and services from a shared pool of configurable computing resources using cloud services. It reduces the trouble of local data storage and maintenance. But it gives severe security threats toward users’ outsourced data. Maintaining the log record securely over extended period is very crucial to the proper functioning of any organization. Log holds the record of system events specially user activities. It is the main target for malicious attackers. An attacker, breaking into a system would not try to leave traces of his or her activities behind. This proposed work mainly concentrates on the problem of log security in cloud computing system and using fully homomorphism encryption algorithm in the cloud computing log data.


Author(s):  
Ray Keller

The amphibian embryo offers advantages of size, availability, and ease of use with both microsurgical and molecular methods in the analysis of fundamental developmental and cell biological problems. However, conventional wisdom holds that the opacity of this embryo limits the use of methods in optical microscopy to resolve the cell motility underlying the major shape-generating processes in early development.These difficulties have been circumvented by refining and adapting several methods. First, methods of explanting and culturing tissues were developed that expose the deep, nonepithelial cells, as well as the superficial epithelial cells, to the view of the microscope. Second, low angle epi-illumination with video image processing and recording was used to follow patterns of cell movement in large populations of cells. Lastly, cells were labeled with vital, fluorescent dyes, and their behavior recorded, using low-light, fluorescence microscopy and image processing. Using these methods, the details of the cellular protrusive activity that drives the powerful convergence (narrowing)


Author(s):  
Rubina Sarki ◽  
Khandakar Ahmed ◽  
Hua Wang ◽  
Yanchun Zhang ◽  
Jiangang Ma ◽  
...  

AbstractDiabetic eye disease (DED) is a cluster of eye problem that affects diabetic patients. Identifying DED is a crucial activity in retinal fundus images because early diagnosis and treatment can eventually minimize the risk of visual impairment. The retinal fundus image plays a significant role in early DED classification and identification. An accurate diagnostic model’s development using a retinal fundus image depends highly on image quality and quantity. This paper presents a methodical study on the significance of image processing for DED classification. The proposed automated classification framework for DED was achieved in several steps: image quality enhancement, image segmentation (region of interest), image augmentation (geometric transformation), and classification. The optimal results were obtained using traditional image processing methods with a new build convolution neural network (CNN) architecture. The new built CNN combined with the traditional image processing approach presented the best performance with accuracy for DED classification problems. The results of the experiments conducted showed adequate accuracy, specificity, and sensitivity.


2018 ◽  
Vol 7 (2.21) ◽  
pp. 355
Author(s):  
P Sheela Gowr ◽  
N Kumar

Cloud computing was a hasting expertise which has innovated to a collection of new explores. A sub-ordinate device for Information services, it has an ability towards encourage development by feeding convenient environments for a choice of forms of development is different sequence. Clouds usually consider being eco-friendly, however keep it has open to the diversity of some security issues to can change together the feeder as well as users of these cloud services. In this issue are principally associated to the protection of the information flow throughout also being store in the cloud, with simple problems along with data ease of use, data right to use and data confidentiality. Data encryption and service authentication scheme has been initiated by the industries to deal with them. In this paper analyse and examine different issues on security beside with the different procedure worn by the industries to solve these effects. 


2017 ◽  
Vol 49 (4) ◽  
pp. 1304-1312
Author(s):  
Tiexiong Gong ◽  
Yuanjun Zhu

Abstract To have accurate runoff velocity, there is need to improve dye tracer method for estimating surface runoff velocity. This can enhance the calculations of relevant hydrologic parameters that will lead to a better understanding of hydrological processes and soil erosion. In this study, an integrated dye tracer and image processing method (IPV) and dye tracer method (AOV), respectively, were used to estimate runoff velocity under three slope gradients (5°, 10°, and 15°) and three slope positions (up-slope, mid-slope, and down-slope). The results showed more variation in runoff velocity under IPV than AOV. Both IPV and AOV were positively correlated with slope gradient. IPV values were close to AOV ones for slope gradients ≤5°, but were significantly different for slope gradients ≥10°. The mean AOV value was 10.6% higher than that of IPV. Regression analysis showed that compared with AOV, IPV overestimated and underestimated runoff under low and high runoff velocity conditions, respectively. The use of image processing in IPV was advantageous because of its ease of use with fewer artificial errors and its suitability for lateral diffusion of runoff. Irrespectively, additional studies are needed to verify and/or improve further the use of this method in runoff velocity analysis.


2021 ◽  
Author(s):  
Olena Ponomaryova ◽  
◽  
Sergy Ponomaryiov ◽  

The current problem of transition to the use of "Cloud Computing" in the process of assessing possible use has been reflected in this study. Assessments of the capabilities of cloud services have been conducted, which are part of a group study of cloud computing as a platform for creating a communication environment in the scientific activities of the Free Economic Zone. The essence of the concept of cloud computing is to provide end users with remote dynamic access to services, computing resources and applications via the Internet. The main possibilities and functions of the information space of scientific communications have been considered. In the process of evaluating the possible use of cloud solutions, the main properties, capabilities and characteristics have also been considered. Web-services based on cloud computing technology in terms of meeting the goals of the scientific community have been analyzed. The most widely used and widely used cloud storage services today that can be used to build a research communication platform are cloud infrastructure providers Google, Amazon and Microsoft. When using the capabilities of these services, favorable conditions are created for the translation of all necessary functions into cyberspace. Today, no more than 37% of domestic organizations actually use cloud technologies to optimize their IT infrastructures, although the COVID-19 pandemic has significantly accelerated this process. Experts claim that Cloud Computing opens access to powerful resources, as well as provides a real opportunity to overcome the technological gap that separates Ukraine from more developed countries. With the successful implementation of such a transition, it is possible to organize a platform of communication environment with new features that meet modern requirements for safety and ease of use in scientific activities. Thus, "cloud computing" is a new approach that reduces the complexity of IT systems, through the use of a wide range of efficient technologies, self-managed and available on demand within the virtual infrastructure, as well as consumed as services.


Sign in / Sign up

Export Citation Format

Share Document