13 research outputs found

    Urdu text steganography: Utilizing isolated letters

    Get PDF
    This paper presents an imperceptible and high capacity feature based approach which hides a secret message into Urdu text cover media by utilising all isolated letters. Existing techniques are less imperceptible and also not robust against steganalysis attacks and some of these schemes are failed to provide the better capacity rates. Previous lexical based and syntax based schemes are ineffective to provide the better capacity rate and image based approaches are not robust against format attacks. Moreover, Feature based approaches are more perceptible and thus, cannot resist against visual attacks. This paper proposes an improved algorithm that encompasses all isolated letters of Urdu text for hiding data to provide better capacity rates. Furthermore, this technique is more secured by using strong public key encryption algorithm. In addition, scheme is also imperceptible, since it does not affect the external appearance of the text. Implementation shows that the proposed text steganography technique provides high concealing capacity

    A Fragile Zero Watermarking Scheme to Detect and Characterize Malicious Modifications in Database Relations

    Get PDF
    We put forward a fragile zero watermarking scheme to detect and characterize malicious modifications made to a database relation. Most of the existing watermarking schemes for relational databases introduce intentional errors or permanent distortions as marks into the database original content. These distortions inevitably degrade the data quality and data usability as the integrity of a relational database is violated. Moreover, these fragile schemes can detect malicious data modifications but do not characterize the tempering attack, that is, the nature of tempering. The proposed fragile scheme is based on zero watermarking approach to detect malicious modifications made to a database relation. In zero watermarking, the watermark is generated (constructed) from the contents of the original data rather than introduction of permanent distortions as marks into the data. As a result, the proposed scheme is distortion-free; thus, it also resolves the inherent conflict between security and imperceptibility. The proposed scheme also characterizes the malicious data modifications to quantify the nature of tempering attacks. Experimental results show that even minor malicious modifications made to a database relation can be detected and characterized successfully

    A Novel Feature Selection Method for Classification of Medical Data Using Filters, Wrappers, and Embedded Approaches

    Get PDF
    Feature selection is the process of identifying the most relevant features from the given data having a large feature space. Microarray datasets are comprised of high-quality features and very few samples of data. Feature selection is performed on such datasets to identify the optimal feature subset. The major goal of feature selection is to improve the accuracy by identifying a minimal feature subset. For this purpose, the proposed research focused on analyzing and identifying effective feature selection algorithms. A novel framework is proposed which utilizes different feature selection methods from filters, wrappers, and embedded algorithms. Furthermore, classification is then performed on selected features to classify the data using a support vector machine (SVM) classifier. Two publicly available benchmark datasets are used, i.e., the Microarray dataset and the Cleveland Heart Disease dataset, for experimentation and analysis, and they are archived from the UCI data repository. The performance of SVM is analyzed using accuracy, sensitivity, specificity, and f-measure. The accuracy of 94.45% and 91% is achieved on each dataset, respectively

    Efficiency Analysis in Outsourced Database using One Time Signature Scheme

    Get PDF
    In the outsourced database model (ODB) entities need third party service providers. As the third party service provider is being untrusted, so there should be a mechanism to determine the integrity and authenticity in the query result which is given to the actual client, by the service provider. In the digital signature schemes, verification is efficient. In this many separate signatures can be combined into a single signature, but the problem with digital signatures (for RSA 1024 bits) is that they have storage overhead. To overcome this weakness, we use one way hash chain that requires little storage as compare to digital signatures. One of the types of hash chain is comb skipchain which can be used to reduce the storage overhead. Winternitz one time signature scheme which is the type of one time signatures scheme is use to generate the public key. In this paper, the comb skipchain construction is use to construct the hash chain by using the public key of the one-time signature schemes and the signature produced is use to authenticate the last value of another comb skipchain. By using this technique the problem of storage overhead in outsourced database model is overcome

    Natural Sciences Publishing Cor. Efficiency Analysis in Outsourced Database using One Time Signature Scheme

    No full text
    Abstract: In the outsourced database model (ODB) entities need third party service providers. As the third party service provider is being untrusted, so there should be a mechanism to determine the integrity and authenticity in the query result which is given to the actual client, by the service provider. In the digital signature schemes, verification is efficient. In this many separate signatures can be combined into a single signature, but the problem with digital signatures (for RSA 1024 bits) is that they have storage overhead. To overcome this weakness, we use one way hash chain that requires little storage as compare to digital signatures. One of the types of hash chain is comb skipchain which can be used to reduce the storage overhead. Winternitz one time signature scheme which is the type of one time signatures scheme is use to generate the public key. In this paper, the comb skipchain construction is use to construct the hash chain by using the public key of the one-time signature schemes and the signature produced is use to authenticate the last value of another comb skipchain. By using this technique the problem of storage overhead in outsourced database model is overcome
    corecore