3 research outputs found

    Image security system using hybrid cryptosystem

    Get PDF
    This work presents and describes a novel method to hide messages in images in a hybrid manner, as steganography is combined with quantum cryptography. Through stimulating and implementing this hybrid approach, the least significant bit (LSB) substitution is employed for hiding secret messages within cover images that consist of three bands (Red, Green and Blue), after which the output is encrypted using quantum one-time pad encryption. The models are illustrated explicitly and tested. In addition, the test analysis uses a steganalysis tool called StegExpose to detect LSB steganography in images. The experimental results proved that the image hiding is reliably secure and undetectable, and hence the proposed new hybrid model provides a sufficient security level as well as we have tested the proposed system using robust state-of- the-art steganalysis techniques and found the low payload threshold maintained in the proposed system produces a high margin of communication security safety. No payload files were detected (0% detections), despite each file containing the entire content of the information as embedded text

    Efficient cryptography techniques for image encryption in cloud storage

    Get PDF
    In recent years and with the great progress of the use of cloud computing and their uses that covered most aspects of modern life as well as provide a variety of services, such as the formation of computing resources, cost control, sustainability, mobility and service flexibility. However, there are challenges to cloud computing, the most important of which is data security and transmission. Cryptographic is the science of protecting data by converting data (plain text) into an incomprehensible format (cipher text) for unauthorized individuals through the use of mathematical techniques. This paper provides work for the most common encryption algorithms that are utilized to encryption of data in cloud computing and presented some of papers that based on the most common cryptographic techniques such as DES, 3DES, Blowfish, AES, RSA, D-H, ECC And others. This way paves the way for finding the suitable encryption algorithm to protect the data in the cloud environment. The AES outperforms the other algorithms in term of encryption time

    Evaluating the effect of Arabic engineering students’ learning styles in blended programming courses

    No full text
    This study investigated the complex relationship among learning styles, gender, perceived satisfaction, and academic performance across four programming courses supported by an e-learning platform. A total of 219 undergraduate students from a public Iraqi university who recently experienced e-learning voluntarily took place in the study. The integrated courses adopted a blended learning mode and all learners were provided the same learning content and pathway irrespective of their individual styles. Data were gathered using the Index of Learning Styles (ILS), three closed-ended questions, and the academic record. Traditional statistics and partial least squares structural equation modelling (PLS-SEM) were performed to examine the proposed hypotheses. The findings of this research suggested that, overall, learning style dimensions are uncorrelated with either academic performance or perceived satisfaction, except for the processing dimension (active/reflective) that has a significant effect on the latter. Furthermore, gender is unassociated with any of the proposed model’s constructs. Finally, there is no significant correlation between academic performance and perceived satisfaction. These results led to the conclusion that even though Arabic engineering students prefer active, sensing, visual, and sequential learning as do other engineering students from different backgrounds, they can adapt to a learning context even if their preferences are not met. The research contributes empirically to the existing debate regarding the potential implications of learning styles and for the Arabic context in particular, since respective research remains rare
    corecore