7 research outputs found

    A New Steganography Approach depending on Isolation Curve in Digital Images.

    Get PDF
    result, protecting the whole document from being regenerated by any counterfeiting person. The main goal of this paper is combining the curve security concepts with information hiding techniques in order to increase the capabilities of steganography techniques. This paper produced a new data hiding approach for embedded data (text or image …etc) in a digital image by using the gaps locations that generated between curves points, which has isolated parametric curve. Parameterization techniques are greatly affects on curve shape and adds a security features that difficult predict by any counterfeiter. The proposed algorithm will be increased Variable Incremental Growth that rises in parametric Lagrange curve in order to reach robust method for hiding data in digital images. The proposed method was implemented on different sizes of digital images and the results of the propose

    Design and implement a new secure prototype structure of e-commerce system

    Get PDF
    The huge development of internet technologies and the widespread of modern and advanced devices lead to an increase in the size and diversity of e-commerce system development. These developments lead to an increase in the number of people that navigate these sites asking for their services and products. Which leads to increased competition in this field. Moreover, the expansion in the size of currency traded makes transaction protection an essential issue in this field. Providing security for each online client especially for a huge number of clients at the same time, causing an overload on the system server. This problem may lead to server deadlock, especially at rush time, which reduce system performance. To solve security and performance problems, this research suggests a prototype design for agent software. This agent will play the role of broker between the clients and the electronic marketplace. This is done by providing security inside the client device and converting the client’s order into a special form which is called a record form to be sent to the commercial website. Experimental results showed that this method increase system performance in terms of page loading time, transaction processing and improves the utilization of system resources

    Hybrid Information Hiding Technique Using Parametric Spline and DFT

    Get PDF
    Information hiding is a means to conical and transmitting information usingapparently innocent carrier without depiction any suspicions. This paper presents anew means for information hiding based images by using Hybrid of ParametricSpline and DFT. A set of control points, which represents secret key, are selectsrandomly from the carrier , and a curve pass by the selected control points isimplement using B-Spline. A hiding process for the secret message bits tacksplace on the spectral real part of the intensity pixels where the B-Spline curvepasses by using LSB technique, followed by the IDFT. The paper also presents theinformation hiding features, and techniques for images, and Interpolationtechniques. The Objective fidelity criteria are depicts the improvements inalgorithm with an application example

    A novel of substitution-box design using PLL algorithms in magic cube

    Get PDF
    In most modern symmetric ciphers, substitution boxes are non-linear core components that provide robust security and confusion. The construction of active S-boxes has been hot object among safely experts. The goal is at build a cryptographically active S-box, number of researchers have built an S-Box using RNA, DNA, chaotic systems, etc. In this article, we used new approach to generate multiple S-Boxes based on the Permutation of Last Layer algorithms (PLL) to replacement the place (permutation) of the pieces generated from the Magic Cube and instead of using static S-Boxes, we can generate dynamic S-Boxes to use various S-Boxes in every round to add to confusion. When comparing the proposed algorithm with other searches and tests on it. We found it has achieved a high percentage of success comparable to the S-Box from chaotic and etc. The proposed design passes S-Box test criteria effectively, these tests: invertibility, completeness, avalanche, strict avalanche, and balanced are among S-Box test criteria. The results of the analysis show that the novel S-Box overrun each of these statistical tests, has a good avalanche impact, and thus can protect against a wide range of attacks. Because S-Box and its reverse take but smaller milliseconds to construct it ability be applied in a variety of lightweight application

    A Novel SNOW3G-M Algorithm and Medical

    No full text
    In the past two years, the demand for the use of mobile networks has increased, due to what the world has been exposed to in the face of the COVID-19 pan-demic and the lack of communication between people. People resorted to using of mobile networks in light of the pandemic, and their importance has appeared in several aspects, such as automotives, media and entertainment, and healthcare. This growing demand for the mobile network led to the actual development of the 4G network in terms of providing the speed of transmission and encryption data to maintain security. In this paper, a new member of the SNOW 3G family was proposed, which is one of the fourth generation algorithms called SNOW 3G-M, which has a higher encryption speed in line with the capacity of modern CPUs and is expected to be a move to the fifth generation communication system in the future. The SNOW 3G-M keystream passes all of the tests for long key stream data, short key stream data, and initialization vector data sets

    4G Network Security Algorithms: Overview

    No full text
    Long Term Evolution (LTE) of (Universal Mobile Telecommunication System) is one of the modern steps in series of mobile telecommunications systems. That appears to be a strong technology that meets the requirements of fourth-generation (4G) mobile networks and supports authentication and encryption mechanisms between User Equipment (UE) and Message Management Entity (MME). This paper provides an overview of the three most important algorithms that are considered the heart of LTE cryptographic algorithms (SNOW3G, AES, and ZUC) and a comparison between cipher key length and initial vector length to generate keystream depending on the structure used for each algorithm as each algorithm has a time of complexity and space of complexity that differs from the other security algorithm.
    corecore