A Hybrid Concept of Cryptography and Dual Watermarking (LSB_DCT) for Data Security

Author(s):  
Ranjeet Kumar Singh ◽  
Dilip Kumar Shaw

Now a days, in communication technology safety of digital data in the form of text, image, and video, audio is a biggest problem. With the rapid development of the network multimedia systems, security is the biggest issue. Digital watermarking is one of the solutions to these problems. It hides some secret data into the original image and this information is use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique and dual watermarking for the purpose of Providing highly security and authentication of digital data. This paper use cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are given in the form of table and graph. This algorithm provides more security and data authentication compare to other image data security approach.

2018 ◽  
Vol 12 (1) ◽  
pp. 1-12 ◽  
Author(s):  
Ranjeet Kumar Singh ◽  
Dilip Kumar Shaw

Now a days, in communication technology safety of digital data in the form of text, image, and video, audio is a biggest problem. With the rapid development of the network multimedia systems, security is the biggest issue. Digital watermarking is one of the solutions to these problems. It hides some secret data into the original image and this information is use for image authentication and security. This paper Focus an application using Hybrid approach of Cryptography technique and dual watermarking for the purpose of Providing highly security and authentication of digital data. This paper use cryptography and QR Code in combined approach of LSB and DCT Digital image water marking technique. The Experimental results are given in the form of table and graph. This algorithm provides more security and data authentication compare to other image data security approach.


Symmetry ◽  
2021 ◽  
Vol 13 (6) ◽  
pp. 921
Author(s):  
Rui Wang ◽  
Guohua Wu ◽  
Qiuhua Wang ◽  
Lifeng Yuan ◽  
Zhen Zhang ◽  
...  

With the rapid development of cloud storage, an increasing number of users store their images in the cloud. These images contain many business secrets or personal information, such as engineering design drawings and commercial contracts. Thus, users encrypt images before they are uploaded. However, cloud servers have to hide secret data in encrypted images to enable the retrieval and verification of massive encrypted images. To ensure that both the secret data and the original images can be extracted and recovered losslessly, researchers have proposed a method that is known as reversible data hiding in encrypted images (RDHEI). In this paper, a new RDHEI method using median edge detector (MED) and two’s complement is proposed. The MED prediction method is used to generate the predicted values of the original pixels and calculate the prediction errors. The adaptive-length two’s complement is used to encode the most prediction errors. To reserve room, the two’s complement is labeled in the pixels. To record the unlabeled pixels, a label map is generated and embedded into the image. After the image has been encrypted, it can be embedded with the data. The experimental results indicate that the proposed method can reach an average embedding rate of 2.58 bpp, 3.04 bpp, and 2.94 bpp on the three datasets, i.e., UCID, BOSSbase, BOWS-2, which outperforms the previous work.


Author(s):  
Ahmed Toman Thahab

In modern public communication networks, digital data is massively transmitted through the internet with a high risk of data piracy. Steganography is a technique used to transmit data without arousing suspicion of secret data existence.  In this paper, a color image steganography technique is proposed in spatial domain. The cover image is segmented into non-overlapping blocks which are scattered among image size window using Burrows Wheeler transform before embedding. Secret data is embedded in each block according to its sequence in the Burrows Wheeler transform output. The hiding method is an operation of an exclusive-or between a virtual bit which is generated from the most significant bit and the least significant bits of the cover pixel. Results of the algorithm are analyzed according to its degradation of the output image and embedding capacity. The results are also compared with other existing methods.


2020 ◽  
Vol 11 (2) ◽  
pp. 161-170
Author(s):  
Rochman Hadi Mustofa

AbstractBig Data has become a significant concern of the world, along with the era of digital transformation. However, there are still many young people, especially in developing countries, who are not yet aware of the security of their big data, especially personal data. Misuse of information from big data often results in violations of privacy, security, and cybercrime. This study aims to determine how aware of the younger generation of security and privacy of their big data. Data were collected qualitatively by interviews and focus group discussions (FGD) from. Respondents were undergraduate students who used social media and financial technology applications such as online shopping, digital payments, digital wallet and hotel/transportation booking applications. The results showed that students were not aware enough and understood the security or privacy of their digital data, and some respondents even gave personal data to potentially scam sites. Most students are not careful in providing big data information because they are not aware of the risks behind it, socialization is needed in the future as a step to prevent potential data theft.


10.2196/21685 ◽  
2020 ◽  
Vol 22 (9) ◽  
pp. e21685
Author(s):  
Zonglin He ◽  
Casper J P Zhang ◽  
Jian Huang ◽  
Jingyan Zhai ◽  
Shuang Zhou ◽  
...  

A novel pneumonia-like coronavirus disease (COVID-19) caused by a novel coronavirus named SARS-CoV-2 has swept across China and the world. Public health measures that were effective in previous infection outbreaks (eg, wearing a face mask, quarantining) were implemented in this outbreak. Available multidimensional social network data that take advantage of the recent rapid development of information and communication technologies allow for an exploration of disease spread and control via a modernized epidemiological approach. By using spatiotemporal data and real-time information, we can provide more accurate estimates of disease spread patterns related to human activities and enable more efficient responses to the outbreak. Two real cases during the COVID-19 outbreak demonstrated the application of emerging technologies and digital data in monitoring human movements related to disease spread. Although the ethical issues related to using digital epidemiology are still under debate, the cases reported in this article may enable the identification of more effective public health measures, as well as future applications of such digitally directed epidemiological approaches in controlling infectious disease outbreaks, which offer an alternative and modern outlook on addressing the long-standing challenges in population health.


2021 ◽  
Author(s):  
Aurore Lafond ◽  
Maurice Ringer ◽  
Florian Le Blay ◽  
Jiaxu Liu ◽  
Ekaterina Millan ◽  
...  

Abstract Abnormal surface pressure is typically the first indicator of a number of problematic events, including kicks, losses, washouts and stuck pipe. These events account for 60–70% of all drilling-related nonproductive time, so their early and accurate detection has the potential to save the industry billions of dollars. Detecting these events today requires an expert user watching multiple curves, which can be costly, and subject to human errors. The solution presented in this paper is aiming at augmenting traditional models with new machine learning techniques, which enable to detect these events automatically and help the monitoring of the drilling well. Today’s real-time monitoring systems employ complex physical models to estimate surface standpipe pressure while drilling. These require many inputs and are difficult to calibrate. Machine learning is an alternative method to predict pump pressure, but this alone needs significant labelled training data, which is often lacking in the drilling world. The new system combines these approaches: a machine learning framework is used to enable automated learning while the physical models work to compensate any gaps in the training data. The system uses only standard surface measurements, is fully automated, and is continuously retrained while drilling to ensure the most accurate pressure prediction. In addition, a stochastic (Bayesian) machine learning technique is used, which enables not only a prediction of the pressure, but also the uncertainty and confidence of this prediction. Last, the new system includes a data quality control workflow. It discards periods of low data quality for the pressure anomaly detection and enables to have a smarter real-time events analysis. The new system has been tested on historical wells using a new test and validation framework. The framework runs the system automatically on large volumes of both historical and simulated data, to enable cross-referencing the results with observations. In this paper, we show the results of the automated test framework as well as the capabilities of the new system in two specific case studies, one on land and another offshore. Moreover, large scale statistics enlighten the reliability and the efficiency of this new detection workflow. The new system builds on the trend in our industry to better capture and utilize digital data for optimizing drilling.


Author(s):  
Asra Kamili ◽  
Nasir N. Hurrah ◽  
Shabir Ahamd Parah ◽  
G.M Bhat ◽  
Khan Muhammad

2013 ◽  
Vol 2 (2) ◽  
pp. 134 ◽  
Author(s):  
Agilandeeswari Loganathan ◽  
Brindha Krishnamoorthy ◽  
Stiffy Sunny ◽  
Muralibabu Kumaravel

Communication in digital form has become the part of day todays lifestyle, in certain moment communication is made secret to avoid others from knowing the information. By providing security to the sensitive data it is ensured that the users data is protected from viewing and accessing by others. In the current discussion about data security, Steganographic algorithm using two mediums has been discussed that involves image based encryption and converting to word file. The stage involving image based encryption uses HMAC-MD5 algorithm along with LSB steganography. LSB technique scatters the secret data which have to be protected over the entire image. Convert the embedded image in word file, so that the secret message is made unavailable to others who try to obtain the file. This method provides greater payload capacity along with higher image fidelity and thus make the proposed system is more robust against attacks.


Author(s):  
Е.А. Исаев ◽  
E.A. Isaev

The rapid development of information technology in today's society dictates new requirements for information security technologies of data, methods of remote access and data processing, integrated reduction of financial expenses on working with information. In recent years, the ideal solution to all these problems that is widely suggested is the concept of cloud computing. This technique really makes a number of clear advantages when working with information and is already widely used in a number of areas of scientific and business activities, but many aspects of information security, characteristic of cloud computing is still far from a satisfactory solution. The article discusses the main challenges of information security of cloud computing. A review of methods to ensure data security, the choice of the most secure cloud computing is discussed, and models to provide the method of increasing the security of cloud computing are looked at.


Sign in / Sign up

Export Citation Format

Share Document