confidential data
Recently Published Documents


TOTAL DOCUMENTS

404
(FIVE YEARS 194)

H-INDEX

16
(FIVE YEARS 3)

Author(s):  
A. H. M. Almawgani ◽  
Adam R. H. Alhawari ◽  
Ayman Taher Hindi ◽  
Waled Hussein Al-Arashi ◽  
A. Y. Al-Ashwal

2022 ◽  
Vol 4 (1) ◽  
Author(s):  
Rafika Husnia Munfa'ati ◽  
Sugi Guritman ◽  
Bib Paruhum Silalahi

Information data protection is necessary to ward off and overcome various fraud attacks that may be encountered. A secret sharing scheme that implements cryptographic methods intends to maintain the security of confidential data by a group of trusted parties is the answer. In this paper, we choose the application of recursive algorithm on Shamir-based linear scheme as the primary method. In the secret reconstruction stage and since the beginning of the share distribution stage, these algorithms have been integrated by relying on a detection parameter to ensure that the secret value sought is valid. Although the obtained scheme will be much simpler because it utilizes the Vandermonde matrix structure, the security aspect of this scheme is not reduced. Indeed, it is supported by two detection parameters formulated from a recursive algorithm to detect cheating and identify the cheater(s). Therefore, this scheme is guaranteed to be unconditionally secure and has a high time efficiency (polynomial running time).


2022 ◽  
Vol 15 (1) ◽  
pp. 1-23
Author(s):  
Rizwan Ur Rahman ◽  
Lokesh Yadav ◽  
Deepak Singh Tomar

Phishing attack is a deceitful attempt to steal the confidential data such as credit card information, and account passwords. In this paper, Phish-Shelter, a novel anti-phishing browser is developed, which analyzes the URL and the content of phishing page. Phish-Shelter is based on combined supervised machine learning model.Phish-Shelter browser uses two novel feature set, which are used to determine the web page identity. The proposed feature sets include eight features to evaluate the obfuscation-based rule, and eight features to identify search engine. Further, we have taken eleven features which are used to discover contents, and blacklist based rule. Phish-Shelter exploited matching identity features, which determines the degree of similarity of a URL with the blacklisted URLs. Proposed features are independent from third-party services such as web browser history or search engines result. The experimental results indicate that, there is a significant improvement in detection accuracy using proposed features over traditional features.


Author(s):  
Aliaa Sadoon Abd ◽  
Ehab Abdul Razzaq Hussein

Cryptography and steganography are among the most important sciences that have been properly used to keep confidential data from potential spies and hackers. They can be used separately or together. Encryption involves the basic principle of instantaneous conversion of valuable information into a specific form that unauthorized persons will not understand to decrypt it. While steganography is the science of embedding confidential data inside a cover, in a way that cannot be recognized or seen by the human eye. This paper presents a high-resolution chaotic approach applied to images that hide information. A more secure and reliable system is designed to properly include confidential data transmitted through transmission channels. This is done by working the use of encryption and steganography together. This work proposed a new method that achieves a very high level of hidden information based on non-uniform systems by generating a random index vector (RIV) for hidden data within least significant bit (LSB) image pixels. This method prevents the reduction of image quality. The simulation results also show that the peak signal to noise ratio (PSNR) is up to 74.87 dB and the mean square error (MSE) values is up to 0.0828, which sufficiently indicates the effectiveness of the proposed algorithm.


Author(s):  
Janardan Kulkarni ◽  
Jay Prajapati ◽  
Sakshi Patel

A Cloud is a type of analogous and scattered system consisting of a collection of inter-connected and virtualized computers that are dynamically provisioned and presented as one or more unified computing resources “ . cloud computing is the dynamic provisioning of IT capabilities (hardware, software, or services) from third parties over a network. However this technology is still in its initial stages of development, as it suffers from threats and vulnerabilities that prevent the users from trusting it. Various malicious activities from illegal users have threatened this technology such as data misuse, inflexible access control and limited monitoring. The occurrence of these threats may result into damaging or illegal access of critical and confidential data of users. This article is in order to describe the impact of those vulnerabilities and threats to create awareness among organisations and users so that they can Adopt this technology with trust And form a trusted provider Who has trusted security policies. Here we have defined cloud-specific vulnerabilities, cloud feature vulnerabilities and propose a reference vulnerabilities architecture of cloud computing and threats related cloud computing. Cloud security and privacy plays an important role to avoid cloud threats .Cloud Privacy Concerns the expression of or devotion to various legal and non- legal norms regarding the right to private life. Cloud Security Concerns the confidentiality, ease of use and reliability of data or information. As the development of cloud computing, issue of security has become a top priority. In this article we are going to discuss about the Characteristics of vulnerabilities , cloud vulnerabilities and cloud threats , Also how we can overcome or avoid them and keep our data safe.


Author(s):  
Paavni Gaur

Abstract: An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14 , for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will further be implemented by me. The paper shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image.


2021 ◽  
Vol 10 (2) ◽  
pp. 81-88
Author(s):  
K.G.L. CHAMUDDIKA ◽  
K.G.N.U. RANAWEERA

Cybercrimes are virtual crimes that evolved according to nature and the intention of the culprit. Numerous cyber-attacks have been led by several anonymous groups to establish the censorship of information. As the technology used for any activity in the banking industry is continuously upgrading with monetary values as well as with information of clients, it is necessary to have a piece of updated knowledge on both cyber-attacks and technology for both clients and employees of the banking industry. Furthermore, it is crucial to study the nature, techniques and impact of cybercrimes as its techniques are continually evolving with technology. Moreover, it would be possible for individuals to assume that their confidential data and transactions are secured with the bank. This study investigated trends of cybercrimes against Sri Lankan financial institutions using seven Licensed Commercial Banks and uncovered its nature, techniques, impact and strategies that were applied by institutions for the protection of its clients.


2021 ◽  
Vol 4 (4) ◽  
pp. 377-385
Author(s):  
Volodymyr M. Lucenko ◽  
Dmytro O. Progonov

Reliable protection of confidential data processed in critical information infrastructure elements of public institutions and private organizations is topical task today. Of particular interest are methods to prevent the leakage of confidential data by localizing informative (dangerous) signals that both carry an informative component, and have a signal level higher than predefined threshold. The increase in signal energy from personal computers is caused by increasing of its transistors switching speed. Modern passive shielding methods for secured computers, similar to the well-known program TEMPEST, require either costly and large shielding units or technological simplification by using of low-cost fragmentary shielding of computer’s individual elements. Therefore, localization of side electromagnetic radiation produced by personal computer is needed. The paper presents a cost-effective approach to reducing the level of computer’s electromagnetic radiation by passive method. The radiation are localized and measured by its estimation on personal computer’s elements, namely unshielded communication lines between video processor and a monitor, fragments of electric tracks on motherboards, etc. During experiments authors used ad-hoc miniature electric (ball antenna) and magnetic (Hall sensor) antennas connected to selective voltmeters. This approach significantly reduces the cost of equipment and measurements as well as requirements to analytics’ qualification for improving computer’s protection. Also, the alternative approach for computer protection is proposed. The approach is based on image content protection by distorting the image on the monitor instead of reducing electromagnetic radiation caused by signals from the monitor. The protection includes image scrambling using Arnold transform that randomly “shuffle” the lines in each frame.


2021 ◽  
Author(s):  
paavni gaur

Abstract An Image Encryption and Decryption Using AES (Advance Encryption Standard) Algorithm is proposed in the project. Due to increasing use of image in various field, it is very important to protect the confidential image data from unauthorized access. The design uses the iterative approach with block size of 128 bit and key size of 128, 192 or 256 bit. The numbers of round for key size of 256 bits is 14, for 128 bits is 10 and for 192 bits is 12. As secret key increases the security as well as complexity of the cryptography algorithms. In this paper , an algorithm in which the image is an input to AES Encryption to get the encrypted image and then input it to AES Decryption to get the original image is proposed and explained which will further be implemented by me.The paper shows the study in which a system could be used for effective image data encryption and key generation in diversified application areas, where sensitive and confidential data needs to be transmitted along with the image.


2021 ◽  
Vol 2137 (1) ◽  
pp. 012055
Author(s):  
Wei Yang ◽  
Caijun Zhang ◽  
Jinqiu Zhang ◽  
Kaiqiang Xian ◽  
Qianjun Wu ◽  
...  

Abstract There is confidential data in integrated online services applications. The data needs to be hidden before transmission on the Internet, and the data authenticity should be assured. Information hiding technology is an effective way of protecting the confidential data and may be used for assuring data authenticity. A Two-domain data hiding scheme (TDHS) is introduced in the paper to protect contract document authenticity in grid system. TDHS aims to embed confidential data into signature image in both spatial and frequency domain. LSB-like algorithm is used to generate a signature image Hs by embedding feature data of contract document into the original signature image H in the spatial domain. Then DCT algorithm is adopted to embed the watermark in signature image Hs in the frequency domain, and generate signature image Hs ready . The signature image Hs ready is inserted into the contract document. When received the document with signature, the recipient can verify its authenticity. The feasibility of TDHS is verified through experiments.


Sign in / Sign up

Export Citation Format

Share Document