A Novel and Secure Hybrid iWD-MASK Algorithm for Enhanced Image Security

Author(s):  
Righa Tandon ◽  
P. K. Gupta

With the rapid growth of technology dependency over use of digital data is increasing day by day. In dDesigning digital communication systems to keepmaintain the security of data intact at all levels is important, and is considered as a vital issue in the field of digital computing. Use of digital images for the vast variety of applications in military, medical, and other sectors areis gaining a lot ofgreat popularity. Owing to this, Therefore, there is a rising demand ofto enhance the security of digital imaginge security. In this paper, we have focused on the protection of privacy, protection and proposed one of the swarm intelligence based algorithm known as “intelligent water drop-matrix array symmetric key” (iWD-MASK) for encryption and decryption of digital images. Here, the MASK approach has been implemented to generate the key of sizewhich is 128 bits in size. Also, use of an intelligent water drop algorithm implements the concept of soil particles and velocity to increase the confusion for any attacker(s) if they try to execute any attack on the image. We have also provided the detailed comparison of the proposed iWD-MASK with other hybrid approaches like MAES + Chaos and MASK + Chaos. The proposed algorithm uses three metrics, viz., precision, recall, and F-measure to evaluate the overall performance and the obtained results shows a significant improvement infor encryption and decryption of digital images over other approaches.

Author(s):  
Ashish Joshi ◽  
Amar Kumar Mohapatra

Background & Objective: Cryptographic protocols had been evident method for ensuring con dentiality, Integrity and authentication in various digital communication systems. However the validation and analysis of such cryptographic protocols was limited to usage of formal mathematical models until few years back. Methods: In this paper, various popular cryptographic protocols have been studied. Some of these protocols (PAP, CHAP, and EAP) achieve security goals in peer to peer communication while others (RADIUS, DIAMETER and Kerberos) can work in multiparty environment. These protocols were validated and analysed over two popular security validation and analysis tools AVISPA and Scyther. The protocols were written according to their documentation using the HLPSL and SPDL for analysis over AVISPA and Scyther respectively. The results of these tools were analysed to nd the possible attack an each protocol. Afterwards The execution time analysis of the protocols were done by repeating the experiment for multiple iterations over the command line versions of these tools.As the literature review suggested, this research also validates that using password based protocols (PAP) is faster in terms of execution time as compared to other methods, Usage of nonces tackles the replay attack and DIAMETER is secure than RADIUS. Results and Conclusion: The results also showed us that DIAMETER is faster than RADIUS. Though Kerberos protocol was found to safe, the results tell us that it is compromisable under particular circumstances.


2011 ◽  
Vol 2011 ◽  
pp. 1-6
Author(s):  
Valentine A. Aalo ◽  
George P. Efthymoglou

The received signal in many wireless communication systems comprises of the sum of waves with random amplitudes and random phases. In general, the composite signal consists of correlated nonidentical Gaussian quadrature components due to the central limit theorem (CLT). However, in the presence of a small number of random waves, the CLT may not always hold and the quadrature components may not be Gaussian distributed. In this paper, we assume that the fading environment is such that the quadrature components follow a correlated bivariate Student-t joint distribution. Then, we derive the envelope distribution of the received signal and obtain new expressions for the exact and high signal-to-noise (SNR) approximate average BER for binary modulations. It also turns out that the derived envelope pdf approaches the Rayleigh and Hoyt distributions as limiting cases. Using the derived envelope pdf, we investigate the effect of correlated nonidentical quadratures on the error rate performance of digital communication systems.


2021 ◽  
Vol 12 (4) ◽  
pp. 35-42
Author(s):  
Thomas Alan Woolman ◽  
Philip Lee

There are significant challenges and opportunities facing the economies of the United States in the coming decades of the 21st century that are being driven by elements of technological unemployment. Deep learning systems, an advanced form of machine learning that is often referred to as artificial intelligence, is presently reshaping many aspects of traditional digital communication technology employment, primarily network system administration and network security system design and maintenance. This paper provides an overview of the current state-of-the-art developments associated with deep learning and artificial intelligence and the ongoing revolutions that this technology is having not only on the field of digital communication systems but also related technology fields. This paper will also explore issues and concerns related to past technological unemployment challenges, as well as opportunities that may be present as a result of these ongoing technological upheavals.


2019 ◽  
Vol 23 (1) ◽  
pp. 192-195 ◽  
Author(s):  
Jules M. Moualeu ◽  
Daniel B. da Costa ◽  
Walaa Hamouda ◽  
Ugo S. Dias ◽  
Rausley A. A. de Souza

Sign in / Sign up

Export Citation Format

Share Document