Computer
Yasmin A. Hassan; Abdul Monem S. Rahma
Abstract
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and ...
Read More ...
Since the Internet has been more widely used and more people have access to multimedia content, copyright hacking, and piracy have risen. By the use of watermarking techniques, security, asset protection, and authentication have all been made possible. In this paper, a comparison between fragile and robust watermarking techniques has been presented to benefit them in recent studies to increase the level of security of critical media. A new technique has been suggested when adding an embedded value (129) to each pixel of the cover image and representing it as a key to thwart the attacker, increase security, rise imperceptibility, and make the system faster in detecting the tamper from unauthorized users. Using the two watermarking types in the same system reaches better results and increases the power of the system and makes it robust against any attack and revel the modification if any at the same time. PSNR has been used as a performance metric to evaluate the study. The result of the new proposed watermark is 54. It is preferable to utilize both a fragile and a robust watermark simultaneously.
Computer
Asmaa Ibrahim Hussieen; Abeer Tariq MaoLood; Ekhlas Khalaf Gbash
Abstract
Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and ...
Read More ...
Conventional voting activities are often replaced by electronic voting (EV) in light of the quick expansion of the Internet. For a variety of reasons, various nations have lately switched to EV rather than conventional voting. Different EV systems were presented up to this point. In both practical and theoretical fields, on the other hand, there is no perfect solution. To meet such objectives, the researchers strive for preserving cryptographic primitives when developing high-efficiency e-voting schemes. The concept of fog computing was developed to improve network infrastructure to satisfy the demands of large amounts of data the same time as also increasing the efficiency of the processing power. Also, it has been created as well to address concerns with Cloud computing, like the distribution environment complexity, real-time response, mobility, and IoT application location awareness. The concentration of this study was on a complete review regarding the systems of EVs through various scholars as a platform to detect flaws or problems in the deployment of extremely secure EV systems. In addition, nations having a history of EV system adoption were examined. A concept for future work on establishing a safe EV system depends on problems discovered in numerous works.
Computer
Raad Abdul Ameer Qasim; Bashar Saadoon Mahdi
Abstract
Image Protection is one of the most important issues that have created problems in technology challenges in the past and present years, whether they are stored or when sent to other parties. And how to develop the techniques adopted in encrypting it, devise new methods, or integrate the available technologies ...
Read More ...
Image Protection is one of the most important issues that have created problems in technology challenges in the past and present years, whether they are stored or when sent to other parties. And how to develop the techniques adopted in encrypting it, devise new methods, or integrate the available technologies to provide high security in encrypting images or any important data and preserving them from loss or hacking. This paper presents a new method to generate a random keychain using genetic algorithm techniques to develop new generations and XOR technology to encrypt digital images. Where the results showed the high efficiency of the encryption method with its ease of use and the preservation of the original image data after decoding with high accuracy and speed in implementing the strategy used. The efficiency of these switches for use has been tested using the National Institute of Standards and Technology (NIST) and the statistical randomness test, and the tests were successfully passed.
Ashwaq Talib Hashim; Zaid Mundher Radeef
Volume 17, Issue 1 , December 2017, , Page 33-41
Abstract
Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic ...
Read More ...
Digital cryptography relies greatly on randomness in providing the security requirements imposed by various information systems. Just as different requirements call for specific cryptographic techniques, randomness takes upon a variety of roles in order to ensure the proper strength of these cryptographic primitives. This paper presents a 64-bit random number generator with a high generation speed and a good random sequences by employing the RC5 encryption algorithm round functions with some changes in the usage
of the key, where two keys have been used with an initial vector to start the sequence generator. This generator can be used as a keys generator for any security system or to generate an intermediate password for signing process, and it can be adapted in many other applications, such as random pattern generation, games, etc. Examining the sequences shows great results in terms of randomness and security by achieving a difference near 0.5, this value is the best result, and a high undependability on the previous generated sequences by also achieving a difference more than 0.5, frequency, serial and run test came out with a near optimality results.