41 research outputs found

    A cryptographic image encryption technique for facial-blurring of images

    Full text link
    Protection of faces in pictures and videos of people in connection with sensitive information, activism, abused cases and others on public broadcasting media and social net- works is very important. On social networks like YouTube,facebook, Twitter and others, videos are being posted with blurring techniques of which some of them cannot be recoverable. Most blurring techniques used can easily be recoverable using off-the-shelf software. The ones that are difficult to be recovered also can easily be used by abusers and ther wrong doers. This paper proposes an image encryption technique that will make it possible for selected facial area to be encrypted based on RGB pixel shuffling of an m*n size image. This will make it difficult for off-the-shelf software to restore the ncrypted image and also make it easy for the law enforcement agencies to reconstruct the face back in case the picture or video is related to an abuse case. The implementation of the encryption method will be done using MATLAB. At the and, there will be no change in the total size of the image during encryption and decryption process.Comment: 7 pages. International Journal of Advanced Technology & Engineering Research (IJATER), 201

    A Hybrid Cryptosystem Based On Vigenere Cipher and Columnar Transposition Cipher

    Full text link
    Privacy is one of the key issues addressed by information Security. Through cryptographic encryption methods, one can prevent a third party from understanding transmitted raw data over unsecured channel during signal transmission. The cryptographic methods for enhancing the security of digital contents have gained high significance in the current era. Breach of security and misuse of confidential information that has been intercepted by unauthorized parties are key problems that information security tries to solve. This paper sets out to contribute to the general body of knowledge in the area of classical cryptography by develop- ing a new hybrid way of encryption of plaintext. The cryptosystem performs its encryption by encrypting the plaintext using columnar transposition cipher and further using the ciphertext to encrypt the plaintext again using Vigen\`ere ci- pher. At the end, cryptanalysis was performed on the ciphertext. The implementation will be done using java program- ming.Comment: 7 pages. International Journal of Advanced Technology & Engineering Research Volume 3 Issue 1 (IJATER), 201

    Using SOA with Web Services for effective Integration of Hospital Information Systems via an Enterprise Service Bus

    Full text link
    Hospitals are distributed across geographical areas and it is important for all hospitals to share information as well as integrate their systems for effective researching and health delivery. Health personals and institutions in need of information from hospitals with respect to geographical areas can easily do researches on patients, treatments, disease outbreaks, and effects of drugs. This research work is aimed at integrating of database systems of hospital across geographical areas via a service bus. A centralized service bus was used to facilitate interoperability of applications across platforms and enhance communication within the hospital infrastructure as well as creating enabling environment for new layer of abstractions to be added without modification of the entire system. Concept of Service Oriented Architecture with web services was used for rapid integration solution in solving the challenges faced during integration of multiple incompatible applications.Comment: 6 pages. International Journal of Research in Engineering & Advanced Technology (IJREAT), 2013. arXiv admin note: text overlap with arXiv:1204.0179 by other authors without attributio

    Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data

    Full text link
    Fighting criminal activities in our modern societies required the engagement of intelligent information systems that can analyze crime data geographically and enable new concepts to be deduced from it. These information systems should be able to create visualization of such data as well as have the capability of giving new incite of information, if data is updated whilst maintaining the previously predicted patterns. This paper proposed the use of Formal Concept Analysis, or Galois Lattices, a data analysis technique grounded on Lattice Theory and Propositional Calculus, for the visualization and analysis of crime data. This method considered the set of common and distinct attributes of crimes in such a way that categorization are done based on related crime types, geographical locations and the persons involved.Comment: Submitted to International Journal of Research in Engineering & Advanced Technology (IJREAT).pp: 1-5.1.5.(2013). arXiv admin note: substantial text overlap with arXiv:1307.8112, arXiv:1307.778

    Visualization and Analysis of Geographical Crime Patterns Using Formal Concept Analysis

    Full text link
    There are challenges faced in today's world in terms of crime analysis when it comes to graphical visualization of crime patterns. Geographical representation of crime scenes and crime types become very important in gathering intelligence about crimes. This provides a very dynamic and easy way of monitoring criminal activities and analyzing them as well as producing effective countermeasures and preventive measures in solving them. But we need effective computer tools and intelligent systems that are automated to analyze and interpret criminal data in real time effectively and efficiently. These current computer systems should have the capability of providing intelligence from raw data and creating a visual graph which will make it easy for new concepts to be built and generated from crime data in order to solve, understand and analyze crime patterns easily. This paper proposes a new method of visualizing and analyzing crime patterns based on geographical crime data by using Formal Concept Analysis, or Galois Lattices, a data analysis technique grounded on Lattice Theory and Propositional Calculus. This method considered the set of common and distinct attributes of crimes in such a way that categorization are done based on related crime types. This will help in building a more defined and conceptual systems for analysis of geographical crime data that can easily be visualized and intelligently analyzed by computer systems.Comment: 6 pages. International Journal of Remote Sensing & Geoscience (IJRSG), 2013. arXiv admin note: substantial text overlap with arXiv:1307.778

    A Visual Cryptographic Encryption Technique for Securing Medical Images

    Full text link
    The increased growth in the use of transmission of multimedia medical contents over unsecured and open networks provides insecurity for confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized personnel with patient. This paper presented a visual cryptographic technique for encrypting of medical images before transmission or storage of them. This will make such images inaccessible by unauthorized personnel and also ensures confidentiality. The process made use of an encryption technique that is based on pixel shuffling and a secret key generated from the image.Comment: 5 pages. International Journal of Emerging Technology and Advanced Engineering (IJREAT), 201

    Computer Aided Investigation: Visualization and Analysis of data from Mobile communication devices using Formal Concept Analysis

    Full text link
    In this world of terrorism, it is very important to know the network of individual suspects. It is also important to analyze the attributes of members of a network and the relationships that exist between them either directly or indirectly. This will make it easy for concepts to be built in aiding criminal investigations. However traditional approaches cannot be used to visualize and analyze data collected on individuals. With this current day where information systems play critical role in everyday life of every individual, it is easier to depend on digital information in fighting crime.Effective computer tools and intelligent systems that are automated to analyze and interpret criminal data in real time effectively and efficiently are needed in fighting crime. These current computer systems should have the capability of providing intelligence from raw data and creating a visual graph which will make it easy for new concepts to be built and generated from crime data in order to solve understand and analyze crime patterns easily. This paper proposes a new method of computer aided investigation by visualizing and analyzing data of mobile communication devices using Formal Concept Analysis, or Galois Lattices, a data analysis technique grounded on Lattice Theory and Propositional Calculus. This method considered the set of common and distinct attributes of data in such a way that categorizations are done based on related data with respect to time and events. This will help in building a more defined and conceptual systems for analysis of crime data that can easily be visualized and intelligently analyzed by computer systems.Comment: 12 pages. 2nd CMI and GTUC International Conference on Applications of Mobile Communications in Africa: Prospects and Challenges, 2013, 201

    Using SOA with Web Services for effective data integration of Enterprise Pharmaceutical Information Systems

    Full text link
    Medicines exist for combating illnesses and drug stores provide an outlet for consumers to gain access to these drugs. However, due to various factors such as cost of production, accessibility and legal issues as well as distribution factors, availability of these drugs at any location cannot be guaranteed at all times. There is need for individuals and organizations such as hospitals to be able to locate required drugs within given geographical vicinity. This is of immense importance especially during emergencies, travel, and in cases where the drugs are uncommon. This research work is aimed at solving this problem by designing a system that integrates all drugstores. The integration of the drug stores will be based on SOA concepts with web services via a central service bus. The database systems of the drug stores will be integrated via a service bus such that drugs can easily be searched for and the results will be displayed based on its availability. Drugs can easily be searched for within geographically distributed pharmaceutical databases as well as consumption of drugs with relation to geographical locations can easily be monitored and tracked. This will make it easy for health institutions to research on drug consumption patterns across geographical areas and also control their usage.Comment: 11 pages paper. Submitted paper. arXiv admin note: text overlap with arXiv:1204.0179, arXiv:1307.7790 by other author

    An Integrated Geographic Information System and Marketing Information System Model

    Full text link
    Maintaining competitive advantage is significant in this present day of globalization, knowledge management and enormous economic activities. An organization's future developments are influenced by its managements' decisions. Businesses today are facing a lot of challenges in terms of competition and they have to be in the lead by strengthening their research and development strategies with the aid of cutting edge technologies. Hence marketing intelligence is now a key to the success of any business in today's rapidly changing business environment. With all the technologies available in marketing research, businesses still struggle with how to gather information and make decisions in a short time and real-time about their customers' needs and purchasing patterns in various geographical areas. This paper is set out to contribute to the body of knowledge in the area of the application of Geographic Information Systems technology solutions to businesses by developing a model for integrating Geographic Information Systems into existing Marketing Information Systems for effective marketing research. This model will interconnect organizations at the highest levels, providing reassurance to enable broad scope of checks and balances as well as benefiting many business activities including operational, tactical and strategic decision making due to its analytical and solution driven functions.Comment: 6 pages. International Journal of Advanced Technology & Engineering Research (IJATER) Volume 2 issue 6, 201

    A Visual Cryptographic Encryption Technique for Securing Medical Images

    No full text
    Abstract — The increased growth in the use of transmission of multimedia medical contents over unsecured and open networks provides insecurity for confidential patient information over these networks. Digital encryption of medical images before transmission and storage is proposed as a way to effectively provide protection of patient information. Encryption before watermarking of these images is necessary in order to ensure inaccessibility of information to unauthorized personnel with patient. This paper presented a visual cryptographic technique for encrypting of medical images before transmission or storage of them. This will make such images inaccessible by unauthorized personnel and also ensures confidentiality. The process made use of an encryption technique that is based on pixel shuffling and a secret key generated from the image. Keywords—visual cryptography, medical images, secret key, encryption I
    corecore