scholarly journals Proposed Hybrid Algorithm for Image Steganography in Text Security Using Fish Algorithm

Author(s):  
Ghada Mohammad Tahir Kasim Aldabagh

The rapid growth of various technologies makes secure data transmission a very important issue. The cryptography technique is the most popular method in several security cases. The major issue is putting the security in place without disturbing the personal data. In such a case, steganography can be used as the most suitable alternative technique. Essentially, steganography is the art of hiding important data that we want to send over a channel or transmission medium. The hiding of information is made with the carrier, making the hacking of data difficult. Hiding the important data provides security and privacy at a high level. In general, there are five types of steganograph: text, audio, video, image and protocol. The carrier plays an important role in steganography. The selection of the carrier depends on the level of security. We proposed an algorithm which is useful for multi-level steganography, and is more advantageous than the standard, less significant, bit algorithm. In this paper, we used multi-level steganography. We focused on image steganography along with a fish algorithm in order to secure the text. We aimed to compare the performance of a basic algorithm to the proposed algorithm. The parameters which have been taken into consideration to compare these two algorithms are execution time and peak signal to noise ratio. We achieved the expected result which shows the applied security for the important data. We used MATLAB 10 software to get these results.

2014 ◽  
pp. 451-484
Author(s):  
Rula Sayaf ◽  
Dave Clarke

Access control is one of the crucial aspects in information systems security. Authorizing access to resources is a fundamental process to limit potential privacy violations and protect users. The nature of personal data in online social networks (OSNs) requires a high-level of security and privacy protection. Recently, OSN-specific access control models (ACMs) have been proposed to address the particular structure, functionality and the underlying privacy issues of OSNs. In this survey chapter, the essential aspects of access control and review the fundamental classical ACMs are introduced. The specific OSNs features and review the main categories of OSN-specific ACMs are highlighted. Within each category, the most prominent ACMs and their underlying mechanisms that contribute enhancing privacy of OSNs are surveyed. Toward the end, more advanced issues of access control in OSNs are discussed. Throughout the discussion, different models and highlight open problems are contrasted. Based on these problems, the chapter is concluded by proposing requirements for future ACMs.


Author(s):  
Rula Sayaf ◽  
Dave Clarke

Access control is one of the crucial aspects in information systems security. Authorizing access to resources is a fundamental process to limit potential privacy violations and protect users. The nature of personal data in online social networks (OSNs) requires a high-level of security and privacy protection. Recently, OSN-specific access control models (ACMs) have been proposed to address the particular structure, functionality and the underlying privacy issues of OSNs. In this survey chapter, the essential aspects of access control and review the fundamental classical ACMs are introduced. The specific OSNs features and review the main categories of OSN-specific ACMs are highlighted. Within each category, the most prominent ACMs and their underlying mechanisms that contribute enhancing privacy of OSNs are surveyed. Toward the end, more advanced issues of access control in OSNs are discussed. Throughout the discussion, different models and highlight open problems are contrasted. Based on these problems, the chapter is concluded by proposing requirements for future ACMs.


Author(s):  
Ghada Mohammad Tahir Kasim Aldabagh

The newly emerging technologies enable us to deliver and share the information in the form of multimedia. However, the major issue is security without disturbing the personal data. In such case, steganography can be used as a most suitable technique. Basically steganography is the art and technique of hiding important data which we want to send over a channel or transmission medium. The hiding of information is made with the carrier so the the hacking of data will be difficult. Generally, we have two choices to hide the data, i.e. image or video. For effectual and fortunate embedded process, it is very important to select correct pixel in a video image. These pixels are playing important role in storage of secret information. Here, we are focused on the text based steganography.Generally, there are various types of the steganography viztext, audio, video, image type, protocol type etc. Carrier plays an important role in the steganography. This carrier is also known as the cover. In this present study, we aim to evaluate the carrier on text steganography. We proposed an algorithm which is useful for the multi-level text steganography, which is more advantageous than the standard least significant bit algorithm. Two different tests were used to prove proposed algorithm and checked the time of implementation needed for both algorithm and Peak Signal to Noise Ratio to new image. MATLAB was used to implement algorithm, which was most useful computational language.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Iwona Karasek-Wojciechowicz

AbstractThis article is an attempt to reconcile the requirements of the EU General Data Protection Regulation (GDPR) and anti-money laundering and combat terrorist financing (AML/CFT) instruments used in permissionless ecosystems based on distributed ledger technology (DLT). Usually, analysis is focused only on one of these regulations. Covering by this research the interplay between both regulations reveals their incoherencies in relation to permissionless DLT. The GDPR requirements force permissionless blockchain communities to use anonymization or, at the very least, strong pseudonymization technologies to ensure compliance of data processing with the GDPR. At the same time, instruments of global AML/CFT policy that are presently being implemented in many countries following the recommendations of the Financial Action Task Force, counteract the anonymity-enhanced technologies built into blockchain protocols. Solutions suggested in this article aim to induce the shaping of permissionless DLT-based networks in ways that at the same time would secure the protection of personal data according to the GDPR rules, while also addressing the money laundering and terrorist financing risks created by transactions in anonymous blockchain spaces or those with strong pseudonyms. Searching for new policy instruments is necessary to ensure that governments do not combat the development of all privacy-blockchains so as to enable a high level of privacy protection and GDPR-compliant data processing. This article indicates two AML/CFT tools which may be helpful for shaping privacy-blockchains that can enable the feasibility of such tools. The first tool is exceptional government access to transactional data written on non-transparent ledgers, obfuscated by advanced anonymization cryptography. The tool should be optional for networks as long as another effective AML/CFT measures are accessible for the intermediaries or for the government in relation to a given network. If these other measures are not available and the network does not grant exceptional access, the regulations should allow governments to combat the development of those networks. Effective tools in that scope should target the value of privacy-cryptocurrency, not its users. Such tools could include, as a tool of last resort, state attacks which would undermine the trust of the community in a specific network.


2021 ◽  
Vol 11 (3) ◽  
pp. 968
Author(s):  
Yingchun Sun ◽  
Wang Gao ◽  
Shuguo Pan ◽  
Tao Zhao ◽  
Yahui Peng

Recently, multi-level feature networks have been extensively used in instance segmentation. However, because not all features are beneficial to instance segmentation tasks, the performance of networks cannot be adequately improved by synthesizing multi-level convolutional features indiscriminately. In order to solve the problem, an attention-based feature pyramid module (AFPM) is proposed, which integrates the attention mechanism on the basis of a multi-level feature pyramid network to efficiently and pertinently extract the high-level semantic features and low-level spatial structure features; for instance, segmentation. Firstly, we adopt a convolutional block attention module (CBAM) into feature extraction, and sequentially generate attention maps which focus on instance-related features along the channel and spatial dimensions. Secondly, we build inter-dimensional dependencies through a convolutional triplet attention module (CTAM) in lateral attention connections, which is used to propagate a helpful semantic feature map and filter redundant informative features irrelevant to instance objects. Finally, we construct branches for feature enhancement to strengthen detailed information to boost the entire feature hierarchy of the network. The experimental results on the Cityscapes dataset manifest that the proposed module outperforms other excellent methods under different evaluation metrics and effectively upgrades the performance of the instance segmentation method.


2021 ◽  
Author(s):  
Shatadru Shikta ◽  
Somania Nur Mahal ◽  
Kazi Bushra Al Jannat ◽  
MAHADY HASAN ◽  
M. ROKONUZZAMAN

2012 ◽  
Vol 153 (45) ◽  
pp. 1767-1778 ◽  
Author(s):  
Vilmos Bíró

The author summarizes the most important data about the development of reconstructive techniques of nerve injuries in the hand based on literature references and the author’s own experience in the past decades. A new bulk of knowledge turned into a common property related to the micro- and macroanatomic structure of peripheral nerves, the process of nerve regeneration, and the technical conditions of nerve reconstructive operations. This knowledge is a prerequisite for hand surgeons to perform their nerve reconstructive operations on a contemporary high level with an optimal result. After a critical review of literature data, the author reports his own experience and sketches the coming possible roads. A detailed list of references is also provided for those who are interested in the field. Orv. Hetil., 2012, 153, 1767–1778.


Sensors ◽  
2020 ◽  
Vol 20 (4) ◽  
pp. 1196 ◽  
Author(s):  
Seulah Lee ◽  
Babar Jamil ◽  
Sunhong Kim ◽  
Youngjin Choi

Myoelectric prostheses assist users to live their daily lives. However, the majority of users are primarily confined to forearm amputees because the surface electromyography (sEMG) that understands the motion intents should be acquired from a residual limb for control of the myoelectric prosthesis. This study proposes a novel fabric vest socket that includes embroidered electrodes suitable for a high-level upper amputee, especially for shoulder disarticulation. The fabric vest socket consists of rigid support and a fabric vest with embroidered electrodes. Several experiments were conducted to verify the practicality of the developed vest socket with embroidered electrodes. The sEMG signals were measured using commercial Ag/AgCl electrodes for a comparison to verify the performance of the embroidered electrodes in terms of signal amplitudes, the skin-electrode impedance, and signal-to-noise ratio (SNR). These results showed that the embroidered electrodes were as effective as the commercial electrodes. Then, posture classification was carried out by able-bodied subjects for the usability of the developed vest socket. The average classification accuracy for each subject reached 97.92%, and for all the subjects it was 93.2%. In other words, the fabric vest socket with the embroidered electrodes could measure sEMG signals with high accuracy. Therefore, it is expected that it can be readily worn by high-level amputees to control their myoelectric prostheses, as well as it is cost effective for fabrication as compared with the traditional socket.


2020 ◽  
Vol 2 (2) ◽  
pp. 11
Author(s):  
Mona H. Mostafa ◽  
Sayeda M. Mohamed

Context: Acculturative stress is an essential challenge of international students in a new culture. This challenge may impact their academic success, psychological wellbeing, and the educational institution's effectiveness in retaining these students. Aim: To examine the relationship between acculturative stress, self-efficacy, and assertiveness among international undergraduate nursing students. Methods: The study was conducted at the Faculty of Nursing, Cairo University. The correlational research design was used on a simple random sample consists of 135 undergraduate international nursing students. Four tools were used for data collection. They were personal data sheet, acculturative stress assessment scale, Rathus assertiveness schedule, and general self-efficacy assessment scale. Results: 47.00% of undergraduate international nursing students had a mild level of acculturative stress, 34.8% of undergraduate international nursing students were somewhat non-assertive, about half of undergraduate international nursing students had a moderate level of self-efficacy. There was a statistically significant positive correlation between self-efficacy and assertiveness. Also, there was a statistically significant negative correlation between acculturative stress and assertiveness. There was no statistically significant correlation between self-efficacy and acculturative stress. Conclusions: Undergraduate international nursing students were inclined towards experiencing acculturative stress, and near half of them exhibit a mild level. More than one-third of them were somewhat assertive, with near half of them had a high level of self-efficacy. The development of educational programs is needed to maximize assertiveness skills, self-efficacy, and reducing acculturative stress among undergraduate international nursing students.


Sign in / Sign up

Export Citation Format

Share Document