scholarly journals Enhanced Data Security of Communication System Using Combined Encryption and Steganography

Author(s):  
Haider Th.Salim Alrikabi ◽  
Hussein Tuama Hazim

<h2>Data security has become a paramount necessity and more obligation in daily life. Most of our systems can be hacked, and it causes very high risks to our confidential files inside the systems. Therefore, for various security reasons, we use various methods to save as much as possible on this data, regardless of its different forms, texts, pictures, videos, etc. In this paper, we mainly rely on storing the basic image which should be protected in another image after changing its formal to composites using the DWT wavelet transform. The process of zeroing sites and storing their contents technique is used to carry the components of the main image. Then process them mathematically by using the exponential function. The result of this process is to obtain a fully encrypted image. The image required to be protected from detection and discrimination is hidden behind the encrypted image. The proposed system contains two algorithms. the first algorithm is used for encryption and hiding, but the second algorithm is designed for returning and decoding the main image to its original state with very efficiently.</h2>

2018 ◽  
Vol 6 (2) ◽  
pp. 101-120
Author(s):  
MOHD FAHMI BIN ISMAIL ◽  
MOHD FIRDAUS BIN CHE YAACOB

Masyarakat Orang Asli Temiar merupakan komuniti orang yang telah lama wujud di negara kita.Kepelbagaian nilai budaya kehidupan masyarakat menjadi lambang jati diri dan kebanggaan masyarakatini. Oleh sebab itu, masyarakat Orang Asli Temiar ini sememangnya kaya dengan warisan ceritarakyat yang menjadi kebanggaan kepada masyarakat tersebut. Namun demikian, arus kepesatan,pembangunan dan kemajuan kemodenan menyebabkan khazanah cerita rakyat ini semakin dipinggirkanoleh masyarakat ini. Selain itu, mereka beranggapan bahawa medium lisan sebagai cerita mitos yangbercorak dongeng dan sekadar untuk berhibur semata-mata. Menerusi kajian ini, akan membincangkansatu objektif utama iaitu menganalisis nilai budaya dalam cerita rakyat masyarakat Orang Asli Temiar GuaMusang, Kelantan. Hal ini, dengan sendiri mewujudkan ruang ilmiah yang menuntut kepada pengkajianilmiah yang khusus. Sehubungan itu, pengkaji akan menggunakan kaedah kepustakaan dan kaedahkajian lapangan bagi memastikan kelancaran dalam menjalankan kajian tersebut. Selanjutnya, kajian iniakan menerapkan Teori Sastera Warisan yang dikemukakan oleh (A. Wahab Ali, 2005) sebagai gagasanuntuk memperkukuhkan dapatan kajian ini. Hasil dapatan kajian ini berhasil menemukan antara nilaibudaya yang selama ini menjadi landasan kepada ketamadunan masyarakat Orang Asli Temiar GuaMusang, Kelantan. Sementara itu, kemantapan elemen nilai budaya yang dihasilkan ini, dan diamalkandalam kehidupan seharian masyrakat ini, secara tidak lansung akan melahirkan kesan-kesan tersurat dantersirat kepada diri masyarakat komuniti ini. Kesimpulannya, cerita rakyat masyarakat Orang Asli Temiaradalah manifestasi kehidupan, adat kepercayaan dan lambang jati diri masyarakat ini.   Temiar indigenous people are a community are comunity of people living in the jugngle, marginalized andlangging in term of modernity country. There it can not be denied that this society is actually rich in diversecultures, fokstales and very high philosophy of thought. However, rapid development and modernity hasled to an increase in marginalized folklore Therefore open an empty space in scientifi c research whichrequired a specifi c research. This study aims to fi ll the empty space by examine the folktales of TemiarIndigenous community in Gua Musang, Kelantan. This study focused on three main objectives. First wasto show eff ect the folktales of Temiar Indigenous community in Gua Musang, Kelantan. Concomitantly, thisstudy used literature research and fi eld research. Furthermore, this study will apply the Sastera Warisantheory by Theory of Conceptual Keyword introduced by Mohamad Mokhtar Hassan in 2005 as the notionto strengthen this study. The realibility of cultural values hold by the Temiar Indigenous community and thepracticing of it in daily life infl uencing the Temiar Indigenous individually and collectively as community. Asconclusion, the folktales of Temiar Indigenous community can be said as manifestation of life, customsand beliefs, and sign of their identity.


Internet of Things(IoT) is playing a pivotal role in our daily life as well as in various fields like Health, agriculture, industries etc. In the go, the data in the various IoT applications will be easily available to the physical dominion and thus the process of ensuringthe security of the data will be a major concern. For the extensive implementation of the numerous applications of IoT , the data security is a critical component. In our work, we have developed an encryption technique to secure the data of IoT. With the help of Merkle-Hellman encryption the data collected from the various IoT devices are first of all encrypted and then the secret message is generated with the help of Elliptic Curve Cryptography.


2018 ◽  
Author(s):  
Muhammad Haris Mahyuddin

An interesting prospective pseudomorphic overlayer on bcc surface material as implemented in Pd pseudomorphic overlayer on V(110) surface has been introduced in the frame work of first-principles calculation. Adsorption and decomposition of H2S molecule were calculated on this overlayer structure. In comparison, we also calculated them on their bare V(110) and Pd(111) surfaces. It was found that Pseudomorphic overlayer surface structure weakened the adsorption energy of H2S, SH, S and H compared to its bare Pd(111) and V(110) surfaces. Furthermore, Pd/V(110) surface was found to have higher activation energy barrier for H2S and SH dissociation than its bare Pd(111) and V(110) do. Pd/V(110) surface is predicted to be a promising catalyst membrane used in gas-shift reactor technology because besides its advantage to absorb hydrogen with very high permeation coefficient, sulfur atom is predicted to be adsorbed in a limited amount.


2021 ◽  
Vol 6 (2) ◽  
pp. 72-81
Author(s):  
Reham Ahmed El-Shahed ◽  
◽  
Maryam Al-Berry ◽  
Hala Ebied ◽  
Howida A. Shedeed ◽  
...  

Steganography is one of the most important tools in the data security field as there is a huge amount of data transferred each moment over the internet. Hiding secret messages in an image has been widely used because the images are mostly used in social media applications. The proposed algorithm is a simple algorithm for hiding an image in another image. The proposed technique uses QR factorization to conceal the secret image. The technique successfully hid a gray and color image in another one and the performance of the algorithm was measured by PSNR, SSIM and NCC. The PSNR for the cover image was in the range of 41 to 51 dB. DWT was added to increase the security of the method and this enhanced technique increased the cover PSNR to 48 t0 56 dB. The SSIM is 100% and the NCC is 1 for both implementations. Which improves that the imperceptibility of the algorithm is very high. The comparative analysis showed that the performance of the algorithm is better than other state-of-the-art algorithms


2014 ◽  
Vol 1049-1050 ◽  
pp. 2092-2095
Author(s):  
Min Wang ◽  
Hao Zhang ◽  
Ting Ting Lu

60GHz signal has very high time resolution and multipath resolution, thus having the potential of achieving high accuracy ranging and positioning at centimeter level or even millimeter level. This technology has great application value in fields like indoor robot navigation, hazardous area monitoring and accurate positioning. In this paper, after designing the pulse-based 60GHz wireless communication system, we proposed a pulse-based 60GHz ranging system. Theoretical analysis and simulations demonstrate that the proposed system can achieve good ranging performance.


2018 ◽  
Vol 15 (11) ◽  
pp. 3528-3532
Author(s):  
K. Antony Kumar ◽  
S Ravikumar ◽  
S. Alex David

Author(s):  
Suci Ramadani ◽  

The development of technology at this time allows everyone to exchange information without any limitation of time and distance. The possibility that data leakage will occur during the process of exchanging information is carried out, therefore in sending data especially images, security aspects, confidentiality and efficiency of data storage is very necessary. If the important information falls into the wrong hands, it will cause unwanted things, for example manipulation of images with negative shapes and can harm the owner of the image. One method used to maintain data security is cryptography using one of the techniques, Elgamal. The strength of this algorithm lies in the difficulty of calculating discrete algorithms on prime integers in which multiplication operations are performed. In this research, the writer combines Hill Cipher to do image encryption and Elgamal Algorithm to decrypt the key of Hill Cipher. The image is first encrypted using the Hill Cipher, then the Hill Cipher key is encrypted using the Elgamal Algorithm. The implementation of the system uses the programming language Visual Basic Net 2010. The results of the implementation with the initial encrypted image has 4282.85 milliseconds with random images, while the encrypted image will be re-described as having 20442.84 milliseconds with the image returned to the beginning.


2015 ◽  
Vol 36 (6) ◽  
pp. 692-708 ◽  
Author(s):  
Arlesia L. Mathis ◽  
Ronica N. Rooks ◽  
Rima H. Tawk ◽  
Daniel J. Kruger

Objective: Increases in body weight and declining physical activity that may accompany aging are linked to a range of problems affecting daily life (i.e., decreased mobility and overall quality of life). This study investigates the actual and perceived neighborhood environment on overweight and obese urban older adults. Method: We selected 217 individuals aged 65+ who answered questions about their neighborhood on the 2009 Speak to Your Health survey. Using multinomial regression models and geospatial models, we examined relationships between neighborhood environment and BMI. Results: We found that obese older adults were 63% less likely to have a park within their neighborhood ( p = .04). Our results also show that older adults who perceive their neighborhood crime as very high are 12 times more likely to be overweight ( p = .04). Discussion: Findings suggest that parks may affect BMI in older adults; however, neighborhood perceptions play a greater role.


Urban Studies ◽  
2016 ◽  
Vol 55 (3) ◽  
pp. 605-622 ◽  
Author(s):  
Anita Harris

This article considers the function of friendship as a form of urban relation for young people living in working class areas of Australia’s multicultural capital cities. These neighbourhoods are characterised by very high diversity, significant socioeconomic disadvantage and large youth populations, and over the last five years many have received the largest influx of refugees and migrants of any Australian municipality. Against this backdrop, this article investigates the ways that sociality is produced amongst young people of many backgrounds who must constantly negotiate interethnic propinquity in their daily lives. It explores how young people create ways of being together beyond and beneath the imperatives of formal social cohesion initiatives to participate in harmonious community-making. It argues that everyday forms of convivial co-habitation are produced and regulated through friendship relations and networks that embed mix in daily life, and these can serve to recognise and manage, rather than eliminate, intensity, conflict and ambivalence. It suggests that such practices of sociality complicate mainstream policy endeavours, and can offer some important and hopeful ways to expand theorisation of social relations in the multicultural city.


Author(s):  
Chen Lin ◽  
Tianbao Wang ◽  
Chenxi Yang

With the continuous development of information technology, real-time audio and video communication is becoming more and more important in people's daily life. At present, there are a lot of software with audio and video communication function in the market, such as Tencent QQ software, wechat, nailing, etc. these software are developed with C / S architecture, and can not achieve cross platform and cross terminal. Users need to download the software to carry out audio and video communication. In view of this, this paper uses webrtc technology based on ice framework to realize the design of remote audio and video communication system, completes the internal network penetration, establishes the communication process between clients, designs room server and signaling server for conversation, and completes the design of remote network audio and video communication system.


Sign in / Sign up

Export Citation Format

Share Document