625 research outputs found

    An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication

    Get PDF
    Authentication means acknowledging a user’s identity. It is the way of associating a request with a set of identity. The identification provided is an authorized user’s information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system

    An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication

    Get PDF
    Authentication means acknowledging a user’s identity. It is the way of associating a request with a set of identity. The identification provided is an authorized user’s information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system

    Dynamic virtual cluster cloud security using hybrid steganographic image authentication algorithm

    Get PDF
    Storing data in a third party cloud system causes serious problems on data confidentiality. Generally, encryption techniques provide data confidentiality but with limited functionality, which occurs due to unsupported actions of encryption operation in cloud storage space. Hence, developing a decentralized secure storage system with multiple support functions like encryption, encoding, and forwarding tends to get complicated, when the storage system spreads. This paper aims mainly on hiding image information using specialized steganographic image authentication (SSIA) algorithm in clustered cloud systems. The SSIA algorithm is applied to virtual elastic clusters in a public cloud platform. Here, the SSIA algorithm embeds the image information using blowfish algorithm and genetic operators. Initially, the blowfish symmetric block encryption is applied over the image and then the genetic operator is applied to re-encrypt the image information. The proposed algorithm provides an improved security than conventional blowfish algorithm in a clustered cloud system

    SecMon: End-to-End Quality and Security Monitoring System

    Get PDF
    The Voice over Internet Protocol (VoIP) is becoming a more available and popular way of communicating for Internet users. This also applies to Peer-to-Peer (P2P) systems and merging these two have already proven to be successful (e.g. Skype). Even the existing standards of VoIP provide an assurance of security and Quality of Service (QoS), however, these features are usually optional and supported by limited number of implementations. As a result, the lack of mandatory and widely applicable QoS and security guaranties makes the contemporary VoIP systems vulnerable to attacks and network disturbances. In this paper we are facing these issues and propose the SecMon system, which simultaneously provides a lightweight security mechanism and improves quality parameters of the call. SecMon is intended specially for VoIP service over P2P networks and its main advantage is that it provides authentication, data integrity services, adaptive QoS and (D)DoS attack detection. Moreover, the SecMon approach represents a low-bandwidth consumption solution that is transparent to the users and possesses a self-organizing capability. The above-mentioned features are accomplished mainly by utilizing two information hiding techniques: digital audio watermarking and network steganography. These techniques are used to create covert channels that serve as transport channels for lightweight QoS measurement's results. Furthermore, these metrics are aggregated in a reputation system that enables best route path selection in the P2P network. The reputation system helps also to mitigate (D)DoS attacks, maximize performance and increase transmission efficiency in the network.Comment: Paper was presented at 7th international conference IBIZA 2008: On Computer Science - Research And Applications, Poland, Kazimierz Dolny 31.01-2.02 2008; 14 pages, 5 figure

    Applications of Difital Image Stegnographic Techniques in Medical Image Analysis

    Get PDF
    In this digitized world maintaining the security of the secret information is a challenging task. While, sending secret information through the internet draws the attention of hackers.  The highly authenticated information can be hidden by using Steganography. Image processing plays a very important role in such stenographic techniques. The advantage of stenography can be enhanced to medical images and creation of database for a particular patient under one authentication with security. Steganography techniques used in bio-medical field to hide the person medical data like prescription, X-ray, Iris, MRI, CT scan images behind a single cover media. In this paper the embedding Schemes to store complete medical data under one authentication is done by using Spatial and transform domains. The performance of the techniques is compared and the best method to hide medical information by using steganographic techniques with high PSNR, less MSE and high SSIM is identified for different modalities. Implementation of steganography in bio-medical field yields high imperceptibility and embedding capacit

    Efficiency of LSB steganography on medical information

    Get PDF
    The development of the medical field had led to the transformation of communication from paper information into the digital form. Medical information security had become a great concern as the medical field is moving towards the digital world and hence patient information, disease diagnosis and so on are all being stored in the digital image. Therefore, to improve the medical information security, securing of patient information and the increasing requirements for communication to be transferred between patients, client, medical practitioners, and sponsors is essential to be secured. The core aim of this research is to make available a complete knowledge about the research trends on LSB Steganography Technique, which are applied to securing medical information such as text, image, audio, video and graphics and also discuss the efficiency of the LSB technique. The survey findings show that LSB steganography technique is efficient in securing medical information from intruder
    • 

    corecore