5 research outputs found

    Image Encryption based on AES Stream Cipher in Counter Mode

    No full text
    With the first evolution of digital data exchange, information security is becoming more important in data storage and transmission. Because of widely using images in industrial process, it is important to protect the confidential image data from unauthorized access. In this paper, we intend to develop software based image encryption system by applying AES in Counter Mode (AES-CTR) with an explicit initialization vector (IV). IV generation includes incrementing a counter for each packet and linear feedback shift registers (LFSRs). AES-CTR uses the AES block cipher to create stream cipher. AES-CTR uses the only AES encrypt operation for both encryption and decryption, making AES-CTR implementations smaller than implementations of many other AES modes. It is an attractive encryption algorithm for high-speed networking and improving the security of images from unauthorized access

    Analysis on Malware Detection with Multi Classifiers on M0Droid and DroidScreening Datasets

    No full text
    The number of applications for smart mobiledevices is steadily growing with the continuousincrease in the utilization of these devices. theInstallation of malicious applications on smartdevices often arises the security vulnerabilities suchas seizure of personal information or the use of smartdevices in accordance with different purposes bycyber criminals. Therefore, the number of studies inorder to identify malware for mobile platforms hasincreased in recent years. In this study, permissionbasedmodel is used to detect the maliciousapplications on Android which is one of the mostwidely used mobile operating system. M0Droid andDroidScreening data sets have been analyzed usingthe Android application package files andpermission-based features extracted from these files.In our work, permission-based model which appliedpreviously across different data sets investigated toM0Droid and DroidScreening datasets and theexperimental results has been expanded. Whileobtaining results, feature set analyzed using differentclassification techniques. The results show thatpermission-based model is successful on M0Droidand DroidScreening data sets and Random Forestsoutperforms another method. When compared toM0Droid system model, it is obtained much bet terconclusions depend on success rate. Our approachprovides a method for automated static code analysisand malware detection with high accuracy andreduces smartphone malware analysis time

    Barriers between mothers and their adolescent daughters with regards to sexual and reproductive health communication in Taunggyi Township, Myanmar: What factors play important roles?

    No full text
    BACKGROUND:Parents play critical roles in adolescents' sexual and reproductive health (SRH) and discussions between parents and adolescents on this topic are fundamental in reducing adolescents' risky sexual behaviors. However, SRH communication is a challenging issue in Myanmar due to socio-cultural taboos. This study assessed the communication barriers towards SRH issues among mothers and their adolescent girls. METHODS:A community-based, cross-sectional study was conducted from January to December 2017 in Taunggyi Township, Southern Shan State, Myanmar. In total, 112 pairs of mothers and adolescent daughters were recruited using a face-to-face interview method with semi-structured questionnaires. Logistic regression analysis was applied to examine communication barriers on SRH issues between mothers and their adolescent girls. RESULTS:More than half of both mother and adolescent girls had negative perceptions of communication on SRH issues. Only 2.7% of girls discussed SRH issues with their mothers more than four times in the last six months. The factors found to create SRH communication barriers were higher family incomes (adjusted odd ration [AOR] 2.5, 95% confidence interval [CI] 1.0, 6.2), good knowledge of puberty (AOR 4.5, 95% CI 1.6, 12.5), good knowledge of sexual and reproductive health issues (AOR 4.5, 95% CI 1.8, 11.5), and positive perception of communication (AOR 6.7, 95% CI 2.5, 17.9) among mothers, and good knowledge of contraception (AOR 5.7, 95% CI 1.5, 21.4) and good knowledge of sexually transmitted infections (AOR 2.5, 95% CI 1.0, 6.4) among adolescent girls. CONCLUSION:Mothers and adolescent girls communicated on SRHs was narrow, occurring infrequently and late, with only limited topics discussed. Having higher levels of SRH knowledge were more likely to create communication barriers among mother and adolescent girls. Policy makers need to consider targeted sexual and reproductive health education programs that can be implemented at the school and community levels to increase parent-adolescent communication
    corecore