2,252 research outputs found

    Security Enhancement on Cloud to multi Cloud using Audio Cryptography

    Get PDF
    Nowadays, cloud computing is most popular and modern technology of storing the large amount of information on the internet and accessing it from anywhere. Costs reduction, universal access, availability of number of applications and flexibility is a number of reasons for popularity of cloud computing. Users store sensitive information on cloud, providing security becomes important aspect as these cloud service providers cannot be trusted one. As the cloud computing assures user to provide the data, the cloud computing environment failure may result in loss or unavailability of data so the concept of Multi-Clouds is introduces. Dealing with single cloud” service providers are anticipated to become infamous with customers due to scare of service availability failure and the possibility of malicious intruders in the individual cloud. Multi-clouds guarantee to provide service at any cost if there is any failure at any cloud due to any reason. The use of multi-clouds as it can tackle the security and mainly availability issues much effectively than single cloud that affects cloud computing user. The proposed work surveys recent research related to single and multi cloud security and addresses possible solutions. This work aims to promote the use of multi clouds to solve problem of data availability due to failure in individual cloud. To provide data confidentiality as well as data integrity, security mechanism which uses an image audio secret sharing scheme(ASS) cryptography instead of visual secret sharing scheme(VSS)

    Cryptographic Approach Using Audio for Data Security

    Get PDF
    Abstract - Secret Sharing is a cryptography algorithm. This technique divides secret data into multiple parts, giving each participant its own unique part. To reconstruct secret some or all parts of secret are needed. In order to reconstruct secret, if condition is that all participant is mandatory it becomes impractical due to any reason. Therefore threshold based scheme is used where any k of the participant is sufficient to reconstruct the original secret. The proposed secret sharing scheme use audio data to create shares of secret data. As audio data is large in size, to provide protection using encryption technique it becomes time consuming. So this audio data is used as cover data and divided into shares then shares are distributed among different participants. This is based on audio shares in which audio file is used cover data. If an eavesdropper gets one share and trying to play individual share in a media player, he or she will only hear as original sound like cover sound. But when k shares out of n shares are mixed together the original secret is reconstructed. DOI: 10.17762/ijritcc2321-8169.15028

    On the security of the Quantum Key Distribution protocols

    Get PDF
    6 pages, 1 table.-- Communication presented at the 5th World Multiconference on Systemics, Cybernetics and Informatics and 7th International Conference on Information System Analysis and Synthesis (SCI/ISAS 2001, Orlando, Florida, Jul 22-25, 2001).The advent of quantum computers may compromise the security of today's conventional cryptosystems. Quantum key distribution protocols are proposed to ward off such threat; but, for the moment, the proposed quantum protocols are an hybrid of classical and quantum mechanisms and, as a consequence, they will result compromised as easily as conventional cryptography by quantum cryptanalysis.This work was supported by CICYT, Spain, under grant TEL98-1020 and by MEC under Programa de estancias de Científicos y Tecnólogos Extranjeros en España.Peer reviewe

    Printed document integrity verification using barcode

    Get PDF
    Printed documents are still relevant in our daily life and information in it must be protected from threats and attacks such as forgery, falsification or unauthorized modification. Such threats make the document lose its integrity and authenticity. There are several techniques that have been proposed and used to ensure authenticity and originality of printed documents. But some of the techniques are not suitable for public use due to its complexity, hard to obtain special materials to secure the document and expensive. This paper discuss several techniques for printed document security such as watermarking and barcode as well as the usability of two dimensional barcode in document authentication and data compression with the barcode. A conceptual solution that are simple and efficient to secure the integrity and document sender's authenticity is proposed that uses two dimensional barcode to carry integrity and authenticity information in the document. The information stored in the barcode contains digital signature that provides sender's authenticity and hash value that can ensure the integrity of the printed document

    Ternary and quadriphase sequence diffusers

    Get PDF
    A room acoustic diffuser breaks up reflected wavefronts, and this can be achieved by presenting a spatially varying surface impedance. In hybrid surfaces, varying impedance is achieved by patches of absorption and reflection, giving reflection coefficients nominally of 0 and 1. These surfaces are hybrids, absorbing some of the incident sound while diffusing any reflected energy. A problem with planar hybrid surfaces is that specular energy is only removed by absorption. By exploiting interference, by reflecting waves out-of-phase with the specular energy, it is possible to diminish the specular energy further. This can be achieved by using a diffuser based on a ternary sequence that nominally has reflection coefficients of 0, -1, and +1. Ternary sequences are therefore a way of forming hybrid absorber-diffusers that achieve better scattering performance without additional absorption. This paper discusses methods for making ternary sequence diffusers, including giving sequence generation methods. It presents prediction results based on Fourier and boundary element method models to examine the performance. While ternary diffusers have better performance than unipolar binary diffusers at most frequencies, there are frequencies at which the performances are the same. This can be overcome by forming diffusers from four-level, quadriphase sequences

    The emergence of new technologies in the ICT field: main actors, geographical distribution and knowledge sources

    Get PDF
    This paper examines the emergence of technologies, applications and platforms in the area of information and communication technologies (ITC), using patent data. It detects new technologies/applications/products using patents' abstracts and describes them looking at their degree of "hybridisation", in terms of technological domains and knowledge base, at the role of firms in driving the innovation activity, and at the geographical distribution of the innovation. The results show that in emerging technologies in ITC are more concentrated across technological classes and across firms than non emerging ones, and that this pattern is invariant across major countries. Furthermore, a preliminary analysis on patent citations show that in emerging technologies knowledge sources are more specific in terms of technological classes and more dispersed in terms of cited institutions. Also there is evidence of a role for universities and public research centres as sources of knowledge
    • 

    corecore