21 research outputs found

    Generalized Self-Healing Key Distribution using Vector Space Access Structure

    Get PDF
    Abstract. We propose and analyze a generalized self-healing key distribution using vector space access structure in order to reach more flexible performance of the scheme. Our self-healing technique enables better performance gain over previous approaches in terms of storage, communication and computation complexity. We provide rigorous treatment of security of our scheme in an appropriate security framework and show it is computationally secure and achieves forward and backward secrecy

    Synthesis of Carbon Nanoparticles and Study of Bioaccumulation in Seeds and its Application in Plant Fortification

    Get PDF
    The aim of the study is to carry out green synthesis of carbon nanoparticles and to study its applications in plant fortification and to analyze the bioaccumulation of minerals in the seeds. The synthesis of carbon nanoparticles was by pyrolysis of coconut milk. The average particle size and surface morphology was determined by scanning electron microscope, UV spectroscopy was used to find the optical spectra, Raman spectroscopy was conducted for comparing Raman shift and the crystallite size was calculated by (XRD) analysis. The soil used for cultivation was also analyzed before and after addition of carbon nanoparticles and the changes in pH and amount of minerals and organic matter was studied and showed improved soil characteristics after addition of carbon nanoparticles in a 1:10 ratio. The growth of a monocot and dicot plant species were analyzed as control and test for up to 22 days to study the effect of carbon nanoparticles on physical and chemical parameters of the plant. The results did show a significant rate of increase in root and shoot length of the test plants. Chemical parameters such as concentration of IAA, amount of protein and estimation of chlorophyll was determined by Salkowski test, Lowry’s test and Chlorophyll estimation test respectively which also showed positive results to the addition of carbon nanoparticles. There was also a significant increase in magnesium content in the seeds which proved mineral bioaccumulation in the soil as a result of carbon nanoparticle addition

    Audio watermarking in partially compressed-encrypted domain

    No full text
    In Digital Asset Management systems, media is often handled in compressed and encrypted form. In this paper, we propose a novel partially compressed-encrypted robust MP3 audio watermarking technique. However, arbitrary embedding of a watermark in a partially compressed encrypted MP3 audio can cause drastic degradation of the quality as the underlying change may result in random decrypted values. In addition, encryption may result in very low compression efficiency. Thus the challenge is to design a watermarking technique that provides good watermarked audio quality and at the same time gives good compression efficiency. While the proposed technique embeds watermark in the partially compressed-encrypted domain, the extraction of watermark can be done in the encrypted or decrypted domains. The experiments show that the watermarked audio quality is good and the reduction in compression efficiency is low. The experimental results also show that the proposed watermarking technique is robust to common signal processing attacks

    Video forgery detection using HOG features and compression properties

    No full text
    In this paper, we propose a novel video forgery detection technique to detect the spatial and temporal copy paste tampering. It is a challenge to detect the spatial and temporal copy-paste tampering in videos as the forged patch may drastically vary in terms of size, compression rate and compression type (I, B or P) or other changes such as scaling and filtering. In our proposed algorithm, the copy-paste forgery detection is based on Histogram of Oriented Gradients (HOG) feature matching and video compression properties. The benefit of using HOG features is that they are robust against various signal processing manipulations. The experimental results show that the forgery detection performance is very effective. We also compare our results against a popular copy-paste forgery detection algorithm. In addition, we analyze the experimental results for different forged patch sizes under varying degree of modifications such as compression, scaling and filtering

    Model Redundancy vs. Intrusion Detection

    No full text
    A major problem faced by intrusion detection is the intensive computation in the detection phase, and a possible solution is to reduce model redundancy, and thus economize the detection computation

    Machine learning approaches in cyber security analytics

    No full text

    Privacy enabled digital rights management without trusted third party assumption

    No full text
    Digital rights management systems are required to provide security and accountability without violating the privacy of the entities involved. However, achieving privacy along with accountability in the same framework is hard as these attributes are mutually contradictory. Thus, most of the current digital rights management systems rely on trusted third parties to provide privacy to the entities involved. However, a trusted third party can become malicious and break the privacy protection of the entities in the system. Hence, in this paper, we propose a novel privacy preserving content distribution mechanism for digital rights management without relying on the trusted third party assumption. We use simple primitives such as blind decryption and one way hash chain to avoid the trusted third party assumption. We prove that our scheme is not prone to the “oracle problem” of the blind decryption mechanism. The proposed mechanism supports access control without degrading user's privacy as well as allows revocation of even malicious users without violating their privacy
    corecore