41 research outputs found
A cryptographic image encryption technique for facial-blurring of images
Protection of faces in pictures and videos of people in connection with
sensitive information, activism, abused cases and others on public broadcasting
media and social net- works is very important. On social networks like
YouTube,facebook, Twitter and others, videos are being posted with blurring
techniques of which some of them cannot be recoverable. Most blurring
techniques used can easily be recoverable using off-the-shelf software. The
ones that are difficult to be recovered also can easily be used by abusers and
ther wrong doers.
This paper proposes an image encryption technique that will make it possible
for selected facial area to be encrypted based on RGB pixel shuffling of an m*n
size image. This will make it difficult for off-the-shelf software to restore
the ncrypted image and also make it easy for the law enforcement agencies to
reconstruct the face back in case the picture or video is related to an abuse
case. The implementation of the encryption method will be done using MATLAB. At
the and, there will be no change in the total size of the image during
encryption and decryption process.Comment: 7 pages. International Journal of Advanced Technology & Engineering
Research (IJATER), 201
A Hybrid Cryptosystem Based On Vigenere Cipher and Columnar Transposition Cipher
Privacy is one of the key issues addressed by information Security. Through
cryptographic encryption methods, one can prevent a third party from
understanding transmitted raw data over unsecured channel during signal
transmission. The cryptographic methods for enhancing the security of digital
contents have gained high significance in the current era. Breach of security
and misuse of confidential information that has been intercepted by
unauthorized parties are key problems that information security tries to solve.
This paper sets out to contribute to the general body of knowledge in the area
of classical cryptography by develop- ing a new hybrid way of encryption of
plaintext. The cryptosystem performs its encryption by encrypting the plaintext
using columnar transposition cipher and further using the ciphertext to encrypt
the plaintext again using Vigen\`ere ci- pher. At the end, cryptanalysis was
performed on the ciphertext. The implementation will be done using java
program- ming.Comment: 7 pages. International Journal of Advanced Technology & Engineering
Research Volume 3 Issue 1 (IJATER), 201
Using SOA with Web Services for effective Integration of Hospital Information Systems via an Enterprise Service Bus
Hospitals are distributed across geographical areas and it is important for
all hospitals to share information as well as integrate their systems for
effective researching and health delivery. Health personals and institutions in
need of information from hospitals with respect to geographical areas can
easily do researches on patients, treatments, disease outbreaks, and effects of
drugs. This research work is aimed at integrating of database systems of
hospital across geographical areas via a service bus. A centralized service bus
was used to facilitate interoperability of applications across platforms and
enhance communication within the hospital infrastructure as well as creating
enabling environment for new layer of abstractions to be added without
modification of the entire system. Concept of Service Oriented Architecture
with web services was used for rapid integration solution in solving the
challenges faced during integration of multiple incompatible applications.Comment: 6 pages. International Journal of Research in Engineering & Advanced
Technology (IJREAT), 2013. arXiv admin note: text overlap with
arXiv:1204.0179 by other authors without attributio
Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data
Fighting criminal activities in our modern societies required the engagement
of intelligent information systems that can analyze crime data geographically
and enable new concepts to be deduced from it. These information systems should
be able to create visualization of such data as well as have the capability of
giving new incite of information, if data is updated whilst maintaining the
previously predicted patterns. This paper proposed the use of Formal Concept
Analysis, or Galois Lattices, a data analysis technique grounded on Lattice
Theory and Propositional Calculus, for the visualization and analysis of crime
data. This method considered the set of common and distinct attributes of
crimes in such a way that categorization are done based on related crime types,
geographical locations and the persons involved.Comment: Submitted to International Journal of Research in Engineering &
Advanced Technology (IJREAT).pp: 1-5.1.5.(2013). arXiv admin note:
substantial text overlap with arXiv:1307.8112, arXiv:1307.778
Visualization and Analysis of Geographical Crime Patterns Using Formal Concept Analysis
There are challenges faced in today's world in terms of crime analysis when
it comes to graphical visualization of crime patterns. Geographical
representation of crime scenes and crime types become very important in
gathering intelligence about crimes. This provides a very dynamic and easy way
of monitoring criminal activities and analyzing them as well as producing
effective countermeasures and preventive measures in solving them. But we need
effective computer tools and intelligent systems that are automated to analyze
and interpret criminal data in real time effectively and efficiently. These
current computer systems should have the capability of providing intelligence
from raw data and creating a visual graph which will make it easy for new
concepts to be built and generated from crime data in order to solve,
understand and analyze crime patterns easily. This paper proposes a new method
of visualizing and analyzing crime patterns based on geographical crime data by
using Formal Concept Analysis, or Galois Lattices, a data analysis technique
grounded on Lattice Theory and Propositional Calculus. This method considered
the set of common and distinct attributes of crimes in such a way that
categorization are done based on related crime types. This will help in
building a more defined and conceptual systems for analysis of geographical
crime data that can easily be visualized and intelligently analyzed by computer
systems.Comment: 6 pages. International Journal of Remote Sensing & Geoscience
(IJRSG), 2013. arXiv admin note: substantial text overlap with
arXiv:1307.778
A Visual Cryptographic Encryption Technique for Securing Medical Images
The increased growth in the use of transmission of multimedia medical
contents over unsecured and open networks provides insecurity for confidential
patient information over these networks. Digital encryption of medical images
before transmission and storage is proposed as a way to effectively provide
protection of patient information. Encryption before watermarking of these
images is necessary in order to ensure inaccessibility of information to
unauthorized personnel with patient. This paper presented a visual
cryptographic technique for encrypting of medical images before transmission or
storage of them. This will make such images inaccessible by unauthorized
personnel and also ensures confidentiality. The process made use of an
encryption technique that is based on pixel shuffling and a secret key
generated from the image.Comment: 5 pages. International Journal of Emerging Technology and Advanced
Engineering (IJREAT), 201
Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis
In this world of terrorism, it is very important to know the network of
individual suspects. It is also important to analyze the attributes of members
of a network and the relationships that exist between them either directly or
indirectly. This will make it easy for concepts to be built in aiding criminal
investigations. However traditional approaches cannot be used to visualize and
analyze data collected on individuals. With this current day where information
systems play critical role in everyday life of every individual, it is easier
to depend on digital information in fighting crime.Effective computer tools and
intelligent systems that are automated to analyze and interpret criminal data
in real time effectively and efficiently are needed in fighting crime. These
current computer systems should have the capability of providing intelligence
from raw data and creating a visual graph which will make it easy for new
concepts to be built and generated from crime data in order to solve understand
and analyze crime patterns easily. This paper proposes a new method of computer
aided investigation by visualizing and analyzing data of mobile communication
devices using Formal Concept Analysis, or Galois Lattices, a data analysis
technique grounded on Lattice Theory and Propositional Calculus. This method
considered the set of common and distinct attributes of data in such a way that
categorizations are done based on related data with respect to time and events.
This will help in building a more defined and conceptual systems for analysis
of crime data that can easily be visualized and intelligently analyzed by
computer systems.Comment: 12 pages. 2nd CMI and GTUC International Conference on Applications
of Mobile Communications in Africa: Prospects and Challenges, 2013, 201
Using SOA with Web Services for effective data integration of Enterprise Pharmaceutical Information Systems
Medicines exist for combating illnesses and drug stores provide an outlet for
consumers to gain access to these drugs. However, due to various factors such
as cost of production, accessibility and legal issues as well as distribution
factors, availability of these drugs at any location cannot be guaranteed at
all times. There is need for individuals and organizations such as hospitals to
be able to locate required drugs within given geographical vicinity. This is of
immense importance especially during emergencies, travel, and in cases where
the drugs are uncommon. This research work is aimed at solving this problem by
designing a system that integrates all drugstores. The integration of the drug
stores will be based on SOA concepts with web services via a central service
bus. The database systems of the drug stores will be integrated via a service
bus such that drugs can easily be searched for and the results will be
displayed based on its availability. Drugs can easily be searched for within
geographically distributed pharmaceutical databases as well as consumption of
drugs with relation to geographical locations can easily be monitored and
tracked. This will make it easy for health institutions to research on drug
consumption patterns across geographical areas and also control their usage.Comment: 11 pages paper. Submitted paper. arXiv admin note: text overlap with
arXiv:1204.0179, arXiv:1307.7790 by other author
An Integrated Geographic Information System and Marketing Information System Model
Maintaining competitive advantage is significant in this present day of
globalization, knowledge management and enormous economic activities. An
organization's future developments are influenced by its managements'
decisions. Businesses today are facing a lot of challenges in terms of
competition and they have to be in the lead by strengthening their research and
development strategies with the aid of cutting edge technologies. Hence
marketing intelligence is now a key to the success of any business in today's
rapidly changing business environment. With all the technologies available in
marketing research, businesses still struggle with how to gather information
and make decisions in a short time and real-time about their customers' needs
and purchasing patterns in various geographical areas.
This paper is set out to contribute to the body of knowledge in the area of
the application of Geographic Information Systems technology solutions to
businesses by developing a model for integrating Geographic Information Systems
into existing Marketing Information Systems for effective marketing research.
This model will interconnect organizations at the highest levels, providing
reassurance to enable broad scope of checks and balances as well as benefiting
many business activities including operational, tactical and strategic decision
making due to its analytical and solution driven functions.Comment: 6 pages. International Journal of Advanced Technology & Engineering
Research (IJATER) Volume 2 issue 6, 201
A Visual Cryptographic Encryption Technique for Securing Medical Images
Abstract — The increased growth in the use of transmission of multimedia medical contents over unsecured and open networks provides insecurity for confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized personnel with patient. This paper presented a visual cryptographic technique for encrypting of medical images before transmission or storage of them. This will make such images inaccessible by unauthorized personnel and also ensures confidentiality. The process made use of an encryption technique that is based on pixel shuffling and a secret key generated from the image. Keywords—visual cryptography, medical images, secret key, encryption I