113 research outputs found

    Design of Secure Chatting Application with End to End Encryption for Android Platform

    Get PDF
    In this paper, a secure chatting application with end to end encryption for smart phones that used the android OS has beenproposed. This is achieved by the use of public key cryptography techniques. The proposed application used the Elliptic Curve DiffieHellman Key Exchange (ECDH) algorithm to generate the key pair and exchange to produce the shared key that will be used for theencryption of data by symmetric algorithms. The proposed Application allows the users to communicate via text messages, voicemessages and photos. For the text message security the standard AES algorithm with a 128 bit key are used. The generated key (160 bit)minimized to 128 bit length by selecting the first 128 bit of the generated key in order to be used by the AES algorithm. For the voice andimage security processes the proposed application used the symmetric algorithm RC4 for this purpose

    The predictive value of high jump achievement in terms of some physical abilities and biomechanical variables for young youth

    Get PDF
    The development of the athletic activity including high jump, was not just a coincidence, but it has gone through many stages of development until it reached the current stage. What makes the high jump activity different from other athletic activity is that it is characterized by the heights altitude a jumper can reach. Therefore, prediction plays a key role in knowing the athlete future achievement results by inferring known facts and data that helps trainers guide and plan training programs and codify their content towards identifying and applying variables that have an effective impact on the training process, raising the athlete skills and physical level. To allow the athlete to reach his/her best performance and jump as high as he could. On this basis, the importance of the research lies in predicting the level of achievement for high jump athletes based on the results of some physical abilities and biomechanical variables related to the athlete performance through the use of the predictive equation proposed by the researcher

    Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain

    Get PDF
    With development, technology, computer science, computer networks and transmission of multimedia between two or more parts, a security of multimedia becomes an essential issue since most of the systems became easy to attack. In this newspaper, we suggest amodel to Hybrid Cipher for Secure Multimedia by using AES and RC4 Chain. The analysis and evaluate the performance of this model ismeasured by testing several parameters. Show The resulting multimedia is found to be more distorted in hybrid Cipher

    ELLIPTIC CURVES PUBLIC KEY TRAITOR TRACING SCHEME

    Get PDF
    In this paper we use the elliptic curves system in the Public Key Traitor Tracing Scheme. The Elliptic Curve points form Abelian group that used in the Public Key Traitor Tracing Scheme. The main advantage of elliptic curves systems is thus their high cryptographic strength relative to the size of the key. We design and implement an elliptic curves public key encryption scheme, in which there is one public encryption key, but many private decryption keys which are distribute through a broadcast channel, the security of the elliptic curves public key encryption scheme based on the Elliptic Curves Decisional Diffie Hellman(ECDDH) problem that is analogous to Decisional Diffie Hellman(DDH) problem, but it is more intractable than DDH problem

    Hyperchaotic technology-based efficient image encryption algorithm an overview.

    Get PDF
    Multimedia data encryption is so crucial because the multimedia encryption algorithm needs more time and memory, and it is difficult to implement. Because of this, the hyperchaotic image encryption technique is becoming more and more popular, which uses little memory, time, or energy and offers the highest level of security for low-powered devices. This study offers a comprehensive overview of modern hyperchaotic systems. By focusing on these complex systems' uniqueness and fundamental features, a study of their dynamic behavior is offered. Such systems are now being used more and more in a variety of industries, including finance, secure communication, and encryption, for example. In reality, every field calls for particular performances of unusual complexity. This research then suggests a specific classification based on the crucial hyperchaotic characteristic, Lyapunov exponent, the equilibrium points, dynamical behavior, NPCR, and UACI.

    Visual secret sharing and related Works -A Review

    Get PDF
    The accelerated development of network technology and internet applications has increased the significance of protecting digital data and images from unauthorized access and manipulation. The secret image-sharing network (SIS) is a crucial technique used to protect private digital photos from illegal editing and copying. SIS can be classified into two types: single-secret sharing (SSS) and multi-secret sharing (MSS). In SSS, a single secret image is divided into multiple shares, while in MSS, multiple secret images are divided into multiple shares. Both SSS and MSS ensure that the original secret images cannot be reconstructed without the correct combination of shares. Therefore, several secret image-sharing methods have been developed depending on these two methods for example visual cryptography, steganography, discrete wavelet transform, watermarking, and threshold. All of these techniques are capable of randomly dividing the secret image into a large number of shares, each of which cannot provide any information to the intrusion team.  This study examined various visual secret-sharing schemes as unique examples of participant secret-sharing methods. Several structures that generalize and enhance VSS were also discussed in this study on covert image-sharing protocols and also this research also gives a comparative analysis of several methods based on various attributes in order to better concentrate on the future directions of the secret image. Generally speaking, the image quality generated employing developed methodologies is preferable to the image quality achieved through using the traditional visual secret-sharing methodology

    Globalization: Information Technology and Economic Growth Nexus: Empirical Evidence from ARDL Model Approach to Co-integration and Causality Analysis

    Get PDF
    This study provides a realistic examination of link between economic growth, information technology and its elements with particular attention on the stock market advancement in Pakistan.  Our results recommend a positive connection between well-organized stock market and economic growth equally in long run and short run. In financial theory globalization information technology would affect the increase economic development. This study investigates the influence of globalization and economic advancement on income disparity in Pakistan. In this study, we used the annual time series data and also used autoregressive distributed lag model (ARDL) econometric technique. We collected this data 1973 to 2014 from state bank of Pakistan and international financial statistics. From this study, it is decided that, globalization information technology has substantial effect on income parity; the economic growth rate is also achieving the income equality. In the policy outlook trade openness, foreign payment, foreign direct investment, may contribute in reducing inequality, the key variables used in this study are like savings, inflation, and exchange rate, gross domestic product, investment. This implies that, if this country wants to increase the economic growth, then to formulate and strictly implement some particular policies that facilitate investment in ICT

    Globalization: Information Technology and Economic Growth Nexus: Empirical Evidence from ARDL Model Approach to Co-integration and Causality Analysis

    Get PDF
    This study provides a realistic examination of link between economic growth, information technology and its elements with particular attention on the stock market advancement in Pakistan.  Our results recommend a positive connection between well-organized stock market and economic growth equally in long run and short run. In financial theory globalization information technology would affect the increase economic development. This study investigates the influence of globalization and economic advancement on income disparity in Pakistan. In this study, we used the annual time series data and also used autoregressive distributed lag model (ARDL) econometric technique. We collected this data 1973 to 2014 from state bank of Pakistan and international financial statistics. From this study, it is decided that, globalization information technology has substantial effect on income parity; the economic growth rate is also achieving the income equality. In the policy outlook trade openness, foreign payment, foreign direct investment, may contribute in reducing inequality, the key variables used in this study are like savings, inflation, and exchange rate, gross domestic product, investment. This implies that, if this country wants to increase the economic growth, then to formulate and strictly implement some particular policies that facilitate investment in ICT

    Population Trend of Canola Aphid, Lipaphis Erysimi (Kalt) (Homoptera: Aphididae) And It’s Associated Bio-Control Agent, Coccinella Septempunctata (Linnaeus) (Coleoptera: Coccinellidae) in Different Brassica Lines

    Get PDF
    Studies regarding the determination of population trend of Lipaphis erysimi (Kalt) and its associated bio-control agent, Coccinella septempunctata (Linnaeus) in different brassica lines, were conducted at the New Developmental Farm, The University of Agriculture Peshawar during cropping season (2012-2013). Four different brassica lines IBGE-I, IBGE-II, IBGE-III and IBGE-IV were used, which were replicated four times in Randomized Complete Block Design. The data revealed that aphid’s infestation invariably started in all four varieties during 2nd week of February 2013 (1st observation). The peak population of 2.47 aphid’s leaf -1 was recorded during 3rd week of March and lowest population of 1.67 aphid’s leaf -1 was recorded during 2nd week of April. The specie of ladybird beetle (Coccinella septempunctata) was first time appeared on 14th February with mean number of (0.22 ladybird beetle plant -1). At the time when aphid’s population started to increase, the peak population of C. septempunctata (1.32 ladybird beetle plant-1) was recorded on the 3rd week of March. Among all the Brassica lines, IBGE-I showed comparatively more resistance by recording least number of aphids on it as compared to IBGE-III, IBGE-IV and IBGE-II. IBGE-II showed least resistance against Lipaphis erysimi, which was found to be most susceptible cultivar by recording highest mean number of aphid’s population on it. IBGE-I was also found superior in terms of bio-control agents. Maximum number of bio-control agents was recorded on IBGE-I followed by IBGE-III and IBGE-IV. Lowest number of beetles was recorded on IBGE-II. Keywords: Lipaphis erysimi, Coccinella septempunctata, Brassica lines

    MONITORING SYSTEM FOR DETECTION OF OVER SPEED OBJECT

    Get PDF
    This paper introduces a system, which can be applied for monitoring of the speed of moving objects using a single camera. The Monitoring System is developed to monitor one moving object at a time with its speed being monitoring using a sequence of video frames. Field test has been conducted to capture real-life data and the processed results are presented. Multiple moving objects and noisy data problems are considered.The proposed system depends on evaluating the position and the orientation of moving objects in real world according to suitable reference point, on the screen, which can be selected by the user (static object)
    • …
    corecore