6 research outputs found

    A Cloud Based Secure Voting System using Homomorphic Encryption for Android Platform

    Get PDF
    Cloud based service provider are at its top of its services for various applications, as their services are very much reachable from anywhere anytime in current days. It is responsibility of the company that the Cloud storage is owned and maintained by themselves keeping the data available and accessible, and the physical environment protected and running. Could storage provider seem to be uncertain of confidentiality in many cases, as we need to limit ourselves on trust to a third party. Keeping our sensitive data ready to access any time anywhere with preventing any information leakage is a challenging task. Cryptography in this scenario plays an important role, providing security for information to protect valuable information resources on intranets, Internet and the cloud. In addition, Homomorphic cryptosystem is a form of Cryptography where some specific computation can be performed over the cipher text producing a resultant cipher text which, when decrypted, equals the result of operations carry out on the plaintext. With help of this unique property of homomorphism cryptography we proposed a system to keep sensitive information in encrypted form in the cloud storage/service provider and used those data as whenever we require. The scheme proposed here is designed for a secure online voting system on Android platform and voted information is encrypted and stored those in the cloud

    An FPGA Implementation of Chaos based Image Encryption and its Performance Analysis

    Get PDF
    Today, hardware chip design with FPGA implementation for designing secure crypto processor is a growing topic due to rapidly increasing attack on digital images over internet network. In this paper, an FPGA implementation of Chaotic Map based two phase image encryption technique is proposed. First phase consists of pixel position permutation and second phase consists of bit value position permutation among different bit planes. In the first phase, original pixel values remain unchanged and in second phase, though pixel values are not directly changed, but finally due to position permutation over bitplanes, values are also modified. These permutations in first and second phase are done by using chaotic behaviour of Arnold Cat Map and Logistic Map respectively. A complete analysis on robustness of the method is shown. Correlation, Encryption time, Decryption time and key sensitivity show that the proposed crypto processor offers high security and reliable encryption speed for real-time image encryption and transmission

    Delaunay Triangulation Based Key Distribution for Wireless Sensor Network

    No full text

    Partial Image Encryption using Peter De Jong Chaotic Map based Bit-Plane Permutation and it’s Performance Analysis

    No full text
    Abstract — Today among various medium of data transmission or storage our sensitive data are not secured with a third-party, that we used to take help of. Cryptography plays an important role in securing our data from malicious attack. This paper present a partial image encryption based on bit-planes permutation using Peter De Jong chaotic map for secure image transmission and storage. The proposed partial image encryption is a raw data encryption method where bits of some bit-planes are shuffled among other bit-planes based on chaotic maps proposed by Peter De Jong. By using the chaotic behavior of the Peter De Jong map the position of all the bit-planes are permuted. The result of the several experimental, correlation analysis and sensitivity test shows that the proposed image encryption scheme provides an efficient and secure way for real-time image encryption and decryption

    A novel montmorillonite clay based bio-nanocomposite as an emerging biocontrol agent against stored grain pulse beetle

    No full text
    Chemical pesticides have been conventionally used to control the stored grain pest infestation, but these are hazardous to humans and the environment. Therefore, the herbal pesticides are gaining more importance in insect pest management. The montmorillonite (MMT) nanoclay, is found to be an effective and underexplored adsorbent for fumigant formulation against stored grain pests. Additionally, essential oils (EOs) and their derivatives offer promising alternatives to conventional insecticides, but their application is constrained by higher volatilization, rapid decomposition, and less persistency. To address the issue, this study focuses on purifying microporous MMT through the sedimentation method and encapsulating cinnamaldehyde from cinnamon essential oil to produce a bio-nanocomposite (CEB) for management of insect pest infestations. Furthermore, the raw MMT, purified MMT, and CEB were characterized by different physiochemical techniques such as X-ray diffraction (XRD), scanning electron microscopy with energy dispersive X-ray spectroscopy (SEM/EDX), transmission electron microscopy (TEM), and Fourier-transform infrared spectroscopy (FT-IR). The SEM-EDX analyses demonstrated shiny irregular sheets and confirmed the presence of C-atom along with Si, O, Al, and Mg. The average crystallite size for CEB is specified to be 9.69 nm. The persistency of the cinnamaldehyde and its effective release from the CEB was confirmed by FT-IR analysis until 30 days. CEB displayed potent fumigant toxicity (LC50 = 0.37 mg/cm3) and high repellency (93.33 %) against Callosobruchus chinensis. Quantitative analysis recorded elevated protein levels (5.47 mg/ml) in treated insects. Similarly, the qualitative analysis revealed up and down-regulation of six and eight protein bands, respectively. Overall, findings show that the formulated bio-nanocomposite can better manage pulse beetle infestations in stored grains
    corecore