25 research outputs found

    Security in Wireless Sensor Networks: Issues and Challenges

    Get PDF
    Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks.Comment: 6 page

    A New Digital Watermarking Algorithm Using Combination of Least Significant Bit (LSB) and Inverse Bit

    Full text link
    In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). LSB is used because of its little effect on the image. This new algorithm is using LSB by inversing the binary values of the watermark text and shifting the watermark according to the odd or even number of pixel coordinates of image before embedding the watermark. The proposed algorithm is flexible depending on the length of the watermark text. If the length of the watermark text is more than ((MxN)/8)-2 the proposed algorithm will also embed the extra of the watermark text in the second LSB. We compare our proposed algorithm with the 1-LSB algorithm and Lee's algorithm using Peak signal-to-noise ratio (PSNR). This new algorithm improved its quality of the watermarked image. We also attack the watermarked image by using cropping and adding noise and we got good results as well.Comment: 8 pages, 6 figures and 4 tables; Journal of Computing, Volume 3, Issue 4, April 2011, ISSN 2151-961

    Security in Wireless Sensor Networks

    Get PDF
    Wireless Sensor Network (WSN) is an emerging technology that shows great promise for various futuristic applications both for mass public and military. The sensing technology combined with processing power and wireless communication makes it lucrative for being exploited in abundance in future. The inclusion of wireless communication technology also incurs various types of security threats. The intent of this paper is to investigate the security related issues and challenges in wireless sensor networks. We identify the security threats, review proposed security mechanisms for wireless sensor networks. We also discuss the holistic view of security for ensuring layered and robust security in wireless sensor networks

    Digital Image Steganography

    Get PDF
    Steganography is defined as the science of hiding or embedding data in a transmission medium. Its ultimate objectives, which are undetectability, robustness (i.e., against image processing and other attacks) and capacity of the hidden data (i.e., how much data we can hide in the carrier file), are the main factors that distinguish it from other sisters-in science. techniques, namely watermarking and Cryptography. This paper provides an overview of well known Steganography methods. It identifies current research problems in this area and discusses how our current research approach could solve some of these problems. We propose using human skin tone detection in colour images to form an adaptive context for an edge operator which will provide an excellent secure location for data hiding

    Effect of lead oxide on concrete density for radiation shielding purposes

    Get PDF
    Selection of suitable shielding materials depends on the type, intensity and energy of radiation source, as well as the shielding properties such as mechanical strength, economic preparation and resistance to radiation damage. When compared to ordinary concrete, the addition of some materials with various fractions in the composition of concrete has provided concrete forms more efficient for gamma ray shielding. Concrete has proven to be an tremendous and adaptable shielding material with a well-established linear attenuation coefficient for gamma rays and neutrons. The objectives of this study is to determine the exact composition of concrete constituents and its density. Concrete samples were prepared by mixing cement, water, aggregate and additive with different composition and densities. Density was increases by decreasing the aggregates percent and increasing the additives such as lead oxide. Sample will be compacting to forming a solid material through pelleting and sintering process. Finally, it will undergo for radiation attenuation test. It was found that, substitution of lead oxide by aggregate causes increasing in the specific density and compressive strength of the concrete

    Hiding Information- A Survey

    Get PDF
    Steganography is the science that involves communicating secret data in an appropriate multimedia carrier, e.g., image audio, and video files. It comes under the assumption that if the feature is visible, the point of attack is evident, thus the goal here is always to conceal the very existence of the embedded data. In comparison with Analog media, Digital media offers several distinctadvantages such as high quality, easy editing, high fidelity copying, compression etcIn order to address this Information Security,Steganography plays an important role. Steganography is the art and science of writing hidden messagesin such a way that no one apart from the sender and intended recipient even realizes there is a hiddenmessage. This paper is a tutorial review of the steganography techniques appeared in the literature

    Advanced Intelligent Data Hiding Using Video Stego and Convolutional Neural Networks

    Get PDF
            إخفاء المعلومات هو تقنية لإخفاء البيانات السرية ضمن ملفات أخرى من نفس النوع أو في أنواع أخرى. وتعد تقنية إخفاء البيانات من التقنيات الضروريه في أمن المعلومات الرقمية. يهدف هذا العمل إلى تصميم طريقة إخفاء المعلومات في الاتصال الإلكتروني (ستيجانوجرافيا) يمكنها إخفاء رسالة داخل صور ملف الفيديو بشكل فعال. في هذا العمل ، نحاول اقتراح نموذج إخفاء المعلومات بالفيديو من خلال تدريب نموذج لإخفاء الفيديو (أو الصور) داخل فيديو آخر باستخدام الشبكات العصبية الألتفافية (CNN). في النموذج المقترح يتم تدريب CNN بشكل متزامن لتوليد عمليات الكشف والاختباء ، وهي مصممة للعمل بشكل مزدوج (أي يتم تدريب الشبكتين بنفس الوقت). يحتوي هذا النموذج على إستراتيجية جيدة لأنماط الصور ، والتي تساعد على اتخاذ قرارات لتحديد أي أجزاء من صورة الغلاف يجب أن تكون زائدة عن الحاجة ، والتي تسمح بأخفاء المزيد من وحدات البكسل هناك. يمكن تنفيذ CNN باستخدام مكتبة (keras)، جنبًا إلى جنب مع مكتبة (tensorflow). بالإضافة إلى ذلك ، تم استخدام صور ملونه (RGB)عشوائية من مجموعة بيانات " ImageNet" لتدريب النموذج المقترح (حوالي 45000 صورة بالحجم (256 × 256)). تم تدريب النموذج المقترح باستخدام صور عشوائية مأخوذة من قاعدة بيانات ImageNet ويمكنه العمل على الصور المأخوذة من مجموعة واسعة من المصادر. ومن خلال توفير مساحة على الصورة عن طريق إزالة المساحة الزائدة ، يمكن زيادة كمية البيانات المخفية (تحسين السعة). ونظرًا لأن الأوزان معمارية النموذج يتم توزيعهما بشكل عشوائي ، فلا يمكن معرفة الطريقة الفعلية التي ستخفي الشبكة بها البيانات لأي شخص ليس لديه الأوزان. علاوة على ذلك ، تم التشفير بطريقة  خلط الكتلة (block-shuffling) كطريقة تشفير لتحسين الأمان ؛ وأيضا تم استخدام طرق تحسين الصورة لتحسين جودة الصور الناتجة. واظهرت النتائج ، أن الطريقة المقترحة حققت مستوى أمان عالي، وقدرة تضمين عالية. بالإضافة إلى ذلك ، اظهرت النتائج أن النظام حقق نتائج جيدة في إمكانية الرؤية والهجمات، حيث نجحت الطريقة المقترحة في خداع المراقب وبرنامج تحليل ستيجانوجرافيا.Steganography is a technique of concealing secret data within other quotidian files of the same or different types. Hiding data has been essential to digital information security. This work aims to design a stego method that can effectively hide a message inside the images of the video file.  In this work, a video steganography model has been proposed through training a model to hiding video (or images) within another video using convolutional neural networks (CNN). By using a CNN in this approach, two main goals can be achieved for any steganographic methods which are, increasing security (hardness to observed and broken by used steganalysis program), this was achieved in this work as the weights and architecture are randomized. Thus, the exact way by which the network will hide the information is unable to be known to anyone who does not have the weights.  The second goal is to increase hiding capacity, which has been achieved by using CNN as a strategy to make decisions to determine the best areas that are redundant and, as a result, gain more size to be hidden. Furthermore, In the proposed model, CNN is concurrently trained to generate the revealing and hiding processes, and it is designed to work as a pair mainly. This model has a good strategy for the patterns of images, which assists to make decisions to determine which is the parts of the cover image should be redundant, as well as more pixels are hidden there. The CNN implementation can be done by using Keras, along with tensor flow backend. In addition, random RGB images from the "ImageNet dataset" have been used for training the proposed model (About 45000 images of size (256x256)). The proposed model has been trained by CNN using random images taken from the database of ImageNet and can work on images taken from a wide range of sources. By saving space on an image by removing redundant areas, the quantity of hidden data can be raised (improve capacity). Since the weights and model architecture are randomized, the actual method in which the network will hide the data can't be known to anyone who does not have the weights. Furthermore, additional block-shuffling is incorporated as an encryption method to improved security; also, the image enhancement methods are used to improving the output quality. From results, the proposed method has achieved high-security level, high embedding capacity. In addition, the result approves that the system achieves good results in visibility and attacks, in which the proposed method successfully tricks observer and the steganalysis program
    corecore