109 research outputs found
Online Voting System based on Image Steganography and Visual Cryptography
This paper discusses the implementation of an onlinevoting system based on image steganography and visualcryptography. The system was implemented inJava EE on a web-based interface, with MySQL databaseserver and Glassfish application server as thebackend. After considering the requirements of an onlinevoting system, current technologies on electronicvoting schemes in published literature were examined.Next, the cryptographic and steganography techniquesbest suited for the requirements of the voting systemwere chosen, and the software was implemented. Wehave incorporated in our system techniques like thepassword hashed based scheme, visual cryptography,F5 image steganography and threshold decryptioncryptosystem. The analysis, design and implementationphase of the software development of the votingsystem is discussed in detail. We have also used aquestionnaire survey and did the user acceptance testingof the system
Vulnerability Studies of E2E Voting Systems:Lecture Notes in Electrical Engineering
In the recent years, the existence of end-to-end voter-verifiable (E2E) voting system had increased significantly. Some of the prospective ones have been used in a medium to large scale elections. We have also developed one (eVote). In this paper we review their capabilities to provide an individual and universally verifiable voting system, incoercibility and receipt-freeness to ensure election integrity. We compare some properties along with its resistance against malicious attacks
Implementation and Evaluation of Steganography based Online Voting
Though there are online voting systems available, the authors propose a new and secure steganography based E2E (end-to-end) verifiable online voting system, to tackle the problems in voting process. This research implements a novel approach to online voting by combining visual cryptography with image steganography to enhance system security without degrading system usability and performance. The voting system will also include password hashed-based scheme and threshold decryption scheme. The software is developed on web-based Java EE with the integration of MySQL database server and Glassfish as its application server. The authors assume that the election server used and the election authorities are trustworthy. A questionnaire survey of 30 representative participants was done to collect data to measure the user acceptance of the software developed through usability testing and user acceptance testing
Functionalized Nanoceria Composition for Ophthalmic Treatment DIV 2
The invention provides a composition comprising a plurality of nanoceria particles, a sufficient amount of at least one inhibitor of human carbonic anhydrase II associated with said plurality of nanoceria particles, and a pharmaceutically acceptable carrier containing said plurality of nanoceria particles with associated inhibitor. One preferred inhibitor of human carbonic anhydrase II comprises 4-carboxybenzene sulfonamide. The disclosed composition is useful in treatment of glaucoma
Functionalized Nanoceria Composition for Ophthalmic Treatment DIV
The invention provides a composition comprising a plurality of nanoceria particles, a sufficient amount of at least one inhibitor of human carbonic anhydrase II associated with said plurality of nanoceria particles, and a pharmaceutically acceptable carrier containing said plurality of nanoceria particles with associated inhibitor. One preferred inhibitor of human carbonic anhydrase II comprises 4-carboxybenzene sulfonamide. The disclosed composition is useful in treatment of glaucoma
Functionalized Nanoceria Composition for Ophthalmic Treatment [CIP]
The invention provides a composition comprising a plurality of nanoceria particles, a sufficient amount of at least one inhibitor of human carbonic anhydrase II associated with said plurality of nanoceria particles, and a pharmaceutically acceptable carrier containing said plurality of nanoceria particles with associated inhibitor. One preferred inhibitor of human carbonic anhydrase II comprises 4-carboxybenzene sulfonamide. The disclosed composition is useful in treatment of glaucoma
Network coding schemes with efficient LDPC coded MIMO–NOMA in two-way relay networks
The combination of non-orthogonal multiple access (NOMA) and multi-input multi-output (MIMO) approaches has been considered as assuring multiple access for the fifth generation technology. In this study, the performance of a 2 × 2 MIMO- NOMA system with low-density parity check (LDPC) codes is investigated. Redundancy with randomly interleaved differential encoding (R-RIDE) is proposed and applied to LDPC encoded messages by two users. LDPC decoding is done using the sum-product algorithm (SPA), which has two types of decoding methods, hard-decision and soft-decision. For hard-decision, bit-flipping decoder is used and for soft-decision, probability domain, log-domain, and simplified log-domain decoders are used. Bit error rate (BER) versus signal-to-noise ratio (SNR) in (dB) and average mutual information (AMI) in (bps/Hz) versus SNR (dB) are evaluated to compare the performance of the proposed and conventional LDPC schemes in NOMA and MIMO-NOMA systems. Simulation results show that both AMI and BER of the proposed LDPC-R-RIDE in MIMO-NOMA system greatly outperforms conventional LDPC coded schemes in NOMA and MIMO-NOMA systems. Moreover, the proposed R-RIDE-LDPC in MIMO-NOMA system outperforms the proposed scheme in the NOMA system. From the simulation results, LDPC-R-RIDE with simplified log-domain decoder has the best AMI result and BER performance compared with other decoding methods
Cancelable iris Biometrics based on data hiding schemes
The Cancelable Biometrics is a template protection scheme that can replace a stolen or lost biometric template. Instead of the original biometric template, Cancelable biometrics stores a modified version of the biometric template. In this paper, we have proposed a Cancelable biometrics scheme for Iris based on the Steganographic technique. This paper presents a non-invertible transformation function by combining Huffman Encoding and Discrete Cosine Transformation (DCT). The combination of Huffman Encoding and DCT is basically used in steganography to conceal a secret image in a cover image. This combination is considered as one of the powerful non-invertible transformation where it is not possible to extract the exact secret image from the Stego-image. Therefore, retrieving the exact original image from the Stego-image is nearly impossible. The proposed non-invertible transformation function embeds the Huffman encoded bit-stream of a secret image in the DCT coefficients of the iris texture to generate the transformed template. This novel method provides very high security as it is not possible to regenerate the original iris template from the transformed (stego) iris template. In this paper, we have also improved the segmentation and normalization process
Studies on synthesis and characterization of magnesia based refractory aggregates developed from Indian magnesite
The present work intends to study the properties of magnesia based refractory aggregates developed from Indian magnesite by changing lime/silica ratio. The material has been sintered in the temperature range of 1550C - 1700C. The sintered samples are characterized in terms of bulk density, apparent porosity, true density, percentage densification, mechanical, thermo-mechanical properties like cold modulus of rupture, hot modulus of rupture and thermal shock resistance and structural properties by XRD. The developed microstructures at different temperatures are studied through FESEM study and compositional analysis of the developed phases is done by EDX study
- …