scholarly journals Audio Cryptography via Enhanced Genetic Algorithm

Author(s):  
Salamudeen Alhassan ◽  
Gabriel Kofi Armah ◽  
Issah Zabsonre Alhassan

As communication technologies surged recently, the secrecy of shared information between communication parts has gained tremendous attention. Many Cryptographic techniques have been proposed/implemented to secure multimedia data and to allay public fears during communication. This paper expands the scope of audio data security via an enhanced genetic algorithm. Here, each individual (audio sample) is genetically engineered to produce new individuals. The enciphering process of the proposed technology acquires, conditions, and transforms each audio sample into bit strings. Bits fission, switching, mutation, fusion, and deconditioning operations are then applied to yield cipher audio signals. The original audio sample is recovered at the receiver's end through a deciphering process without the loss of any inherent message. The novelty of the proposed technique resides in the integration of fission and fusion into the traditional genetic algorithm operators and the use of a single (rather than two) individual(s) for reproduction. The effectiveness of the proposed cryptosystem is demonstrated through simulations and performance analyses.

2021 ◽  
Vol 14 (3) ◽  
pp. 371-396 ◽  
Author(s):  
Xinyu (Judy) Hu ◽  
Larissa K. Barber ◽  
YoungAh Park ◽  
Arla Day

AbstractSeveral decades of research have addressed the role of information and communication technologies (ICTs) in industrial-organizational (I-O) psychology. However, segmented research streams with myriad terminologies run the risk of construct proliferation and lack an integrated theoretical justification of the contributions of ICT concepts. Therefore, by identifying important trends and reflecting on key constructs, findings, and theories, our review seeks to determine whether a compelling case can be made for the uniqueness of ICT-related concepts in studying employee and performance in I-O psychology. Two major themes emerge from our review of the ICT literature: (a) a technology behavior perspective and (b) a technology experience perspective. The technology behavior perspective with three subcategories (the “where” of work design, the “when” of work extension, and the “what” of work inattention) explores how individual technology use can be informative for predicting employee well-being and performance. The technology experience perspective theme with two subcategories (the “how” of ICT appraisals and “why” of motives) emphasizes unique psychological (as opposed to behavioral) experiences arising from the technological work context. Based on this review, we outline key challenges of current ICT research perspectives and opportunities for further enhancing our understanding of technological implications for individual workers and organizations.


2018 ◽  
Vol 2018 ◽  
pp. 1-12 ◽  
Author(s):  
Qinlong Huang ◽  
Yue He ◽  
Wei Yue ◽  
Yixian Yang

Data collaboration in cloud computing is more and more popular nowadays, and proxy deployment schemes are employed to realize cross-cloud data collaboration. However, data security and privacy are the most serious issues that would raise great concerns from users when they adopt cloud systems to handle data collaboration. Different cryptographic techniques are deployed in different cloud service providers, which makes cross-cloud data collaboration to be a deeper challenge. In this paper, we propose an adaptive secure cross-cloud data collaboration scheme with identity-based cryptography (IBC) and proxy re-encryption (PRE) techniques. We first present a secure cross-cloud data collaboration framework, which protects data confidentiality with IBC technique and transfers the collaborated data in an encrypted form by deploying a proxy close to the clouds. We then provide an adaptive conditional PRE protocol with the designed full identity-based broadcast conditional PRE algorithm, which can achieve flexible and conditional data re-encryption among ciphertexts encrypted in identity-based encryption manner and ciphertexts encrypted in identity-based broadcast encryption manner. The extensive analysis and experimental evaluations demonstrate the well security and performance of our scheme, which meets the secure data collaboration requirements in cross-cloud scenarios.


Author(s):  
Saheed Ige Adetunbi ◽  
A. T. Kareem ◽  
B. A. Oyebamiji

The study was motivated by the need to harness technological advancement to enhance agricultural production in Osun State. The study assessed the utilization of Information and Communication Technologies (ICTs) tools for sharing of agricultural related information in Osun State, Nigeria. The study illustrated the socio economic characteristics of the Respondent, identified the available ICT tools for sharing of various agricultural related information, identified agricultural related information shared through various available ICT tools, measured the frequency of utilization of the identified ICT tools and assessed the severity of challenges encountered by Respondent in the utilization of ICT tools in the study area. Sixty percent of Extension Agents in each of the three zones in the study area were sampled. The data collected were examined using descriptive statistics tools while regression analysis was used to test the significant relationship between the socio-economic characteristics of Respondents and their frequency of utilization of ICT Tools for sharing of agricultural related information in the study areas. The analysis of the data was carried out with the use of SPSS version 22. The findings revealed that the average age of Respondents was 39 years; more than half of the respondent (67.1%) were male; most (81.4%) of the respondent were married; majority (68.6%) of the respondent were Christian; about (70%) of the respondent had tertiary education. The mean household size was 5 members per household; majority of the respondents belonged to one association or the other and they access the internet with their own data plan. Radio (wms 2.7) was ranked first as most available ICT tools for sharing information in the study area. Furthermore, information on availability and sources of farm inputs (wms2.3) was ranked most shared information while information on storage facilities (wms1.0) was ranked the least shared information by the Respondents. Also, the initial cost of procurement of ICT gadgets, cost of maintenance, risk of theft of gadget, and fluctuating power supply were the major challenges encountered with the use of various ICT tools. Regression analysis identified a significant relationship between selected socio-economic characteristics of the Respondents and frequency of Utilization of ICT Tools for sharing Agriculture related information. The study recommended use of Radio as medium through which agricultural related information should be shared bearing in mind its ease of access, little cost of procurement and maintenance, extent of reach and frequency of usage among the respondents. Provision of access to internet facility was recommended in order to afford respondents a limitless right to use information on the World Wide Web. Finally, alternative source of power to enable respondents recharge their ICT gadgets was recommended to make up for unreliable electricity supply.


2011 ◽  
Vol 127 ◽  
pp. 360-367 ◽  
Author(s):  
Xiao Dong Kang ◽  
Gang Huang ◽  
Xian Li Cao ◽  
Xiang Zhou

This paper takes the five –link concrete pump boom as the research object, and transforms its trajectory planning issue into a multi-object optimization problem. Using intelligent hill climbing algorithm and genetic algorithm, and integrating them closely to ensure real-time online planning for the pump truck effectively, and make the planned motion trajectory for the boom is global optimized under particular constrained conditions. Simulation and performance comparison experiments show that this hybrid algorithm is practical and effective, which offers a new approach for the trajectory planning problem of concrete pump truck.


Author(s):  
Roland Schmitz ◽  
Shujun Li ◽  
Christos Grecos ◽  
Xinpeng Zhang

Histogram-based watermarking schemes are invariant to pixel permutations and can thus be combined with permutation-based ciphers to form a commutative watermarking-encryption scheme. In this chapter, the authors demonstrate the feasibility of this approach for audio data and still image data. Typical histogram-based watermarking schemes based on comparison of histogram bins are prone to desynchronization attacks, where the whole histogram is shifted by a certain amount. These kind of attacks can be avoided by synchronizing the embedding and detection processes, using the mean of the histogram as a calibration point. The resulting watermarking scheme is resistant to three common types of shifts of the histogram, while the advantages of previous histogram-based schemes, especially commutativity of watermarking and permutation-based encryption, are preserved. The authors also report on the results of testing robustness of the still image watermark against JPEG and JPEG2000 compression and on the possibility of using histogram-based watermarks for authenticating the content of an image.


Author(s):  
Daniel A. Craig ◽  
Jungtae Kim

Anxiety has long been considered a hindrance to both language learning and performance. To address this issue in oral language testing, it has been suggested that the use of Information & Communication Technologies (ICT) to distance the test-taker from the interviewer could reduce anxiety levels and, thus, improve performance. Research has been undertaken on the use of synchronous and asynchronous text chat to lower anxiety and increase communication. However, research on the use of videoconferencing is largely unknown in the same areas. Thus, this study undertakes the challenge by comparing forty students’ anxiety levels when they took an oral test face-to-face and via an online videoconferencing medium. The students were from a private, mid-sized, Korean university, and they were interviewed and rated by two interviewers under both face-to-face and video conference conditions, as well as surveyed for state anxiety. The findings in this study will be used to guide the design of future distance assessment instruments as well as inform educational research in this field.


2019 ◽  
Vol 2019 ◽  
pp. 1-14
Author(s):  
Monika Kumari ◽  
G. Sahoo

Cloud is a widely used platform for intensive computing, bulk storage, and networking. In the world of cloud computing, scaling is a preferred tool for resource management and performance determination. Scaling is generally of two types: horizontal and vertical. The horizontal scale connects users’ agreement with the hardware and software entities and is implemented physically as per the requirement and demand of the datacenter for its further expansion. Vertical scaling can essentially resize server without any change in code and can increase the capacity of existing hardware or software by adding resources. The present study aims at describing two approaches for scaling, one is a predator-prey method and second is genetic algorithm (GA) along with differential evolution (DE). The predator-prey method is a mathematical model used to implement vertical scaling of task for optimal resource provisioning and genetic algorithm (GA) along with differential evolution(DE) based metaheuristic approach that is used for resource scaling. In this respect, the predator-prey model introduces two algorithms, namely, sustainable and seasonal scaling algorithm (SSSA) and maximum profit scaling algorithm (MPSA). The SSSA tries to find the approximation of resource scaling and the mechanism for maximizing sustainable as well as seasonal scaling. On the other hand, the MPSA calculates the optimal cost per reservation and maximum sustainable profit. The experimental results reflect that the proposed logistic scaling-based predator-prey method (SSSA-MPSA) provides a comparable result with GA-DE algorithm in terms of execution time, average completion time, and cost of expenses incurred by the datacenter.


Sign in / Sign up

Export Citation Format

Share Document