625 research outputs found
An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication
Authentication means acknowledging a userâs identity. It is the way of associating a request with a set of identity. The identification provided is an authorized userâs information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system
An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication
Authentication means acknowledging a userâs identity. It is the way of associating a request with a set of identity. The identification provided is an authorized userâs information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system
Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm
Storing data in a third party cloud system causes serious problems on data confidentiality. Generally, encryption techniques provide data confidentiality but with limited functionality, which occurs due to unsupported actions of encryption operation in cloud storage space. Hence, developing a decentralized secure storage system with multiple support functions like encryption, encoding, and forwarding tends to get complicated, when the storage system spreads. This paper aims mainly on hiding image information using specialized steganographic image authentication (SSIA) algorithm in clustered cloud systems. The SSIA algorithm is applied to virtual elastic clusters in a public cloud platform. Here, the SSIA algorithm embeds the image information using blowfish algorithm and genetic operators. Initially, the blowfish symmetric block encryption is applied over the image and then the genetic operator is applied to re-encrypt the image information. The proposed algorithm provides an improved security than conventional blowfish algorithm in a clustered cloud system
SecMon: End-to-End Quality and Security Monitoring System
The Voice over Internet Protocol (VoIP) is becoming a more available and
popular way of communicating for Internet users. This also applies to
Peer-to-Peer (P2P) systems and merging these two have already proven to be
successful (e.g. Skype). Even the existing standards of VoIP provide an
assurance of security and Quality of Service (QoS), however, these features are
usually optional and supported by limited number of implementations. As a
result, the lack of mandatory and widely applicable QoS and security guaranties
makes the contemporary VoIP systems vulnerable to attacks and network
disturbances. In this paper we are facing these issues and propose the SecMon
system, which simultaneously provides a lightweight security mechanism and
improves quality parameters of the call. SecMon is intended specially for VoIP
service over P2P networks and its main advantage is that it provides
authentication, data integrity services, adaptive QoS and (D)DoS attack
detection. Moreover, the SecMon approach represents a low-bandwidth consumption
solution that is transparent to the users and possesses a self-organizing
capability. The above-mentioned features are accomplished mainly by utilizing
two information hiding techniques: digital audio watermarking and network
steganography. These techniques are used to create covert channels that serve
as transport channels for lightweight QoS measurement's results. Furthermore,
these metrics are aggregated in a reputation system that enables best route
path selection in the P2P network. The reputation system helps also to mitigate
(D)DoS attacks, maximize performance and increase transmission efficiency in
the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On
Computer Science - Research And Applications, Poland, Kazimierz Dolny
31.01-2.02 2008; 14 pages, 5 figure
Applications of Difital Image Stegnographic Techniques in Medical Image Analysis
In this digitized world maintaining the security of the secret information is a challenging task. While, sending secret information through the internet draws the attention of hackers. The highly authenticated information can be hidden by using Steganography. Image processing plays a very important role in such stenographic techniques. The advantage of stenography can be enhanced to medical images and creation of database for a particular patient under one authentication with security. Steganography techniques used in bio-medical field to hide the person medical data like prescription, X-ray, Iris, MRI, CT scan images behind a single cover media. In this paper the embedding Schemes to store complete medical data under one authentication is done by using Spatial and transform domains. The performance of the techniques is compared and the best method to hide medical information by using steganographic techniques with high PSNR, less MSE and high SSIM is identified for different modalities. Implementation of steganography in bio-medical field yields high imperceptibility and embedding capacit
Efficiency of LSB steganography on medical information
The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder
- âŠ