The comparing recent proposal for multimedia applications network security remains an important topic for researchers. The security deals with both wired and wireless communication. Network is defined as it is a large system consisting of many similar parts that are connected together to allow the movement or communication between or along the parts or between the parts and a control center. There are the main components of the network information system such as end systems (terminals, servers) and intermediate systems (hubs, switches, gateways). Every node has its own set of vulnerabilities that can be related to hardware, software, protocol stack etc. Nodes are interconnected by physical supports in a network for example connected with cables in wired Local Area Network (LAN) or radio waves (Wi-Fi) in Wireless Local Area Network (WLAN). Some nodes are able to provide services (FTP, HTTP browsing, database access). If two nodes want to communicate together, they must be interconnected physically and logically. Network security deals with also information hiding technique. Now day’s security deals with heterogeneous networks. The use of different wireless and wired network which are working on different platform is heterogeneous. So design of network security for such type of heterogeneous network is difficult task.
Whenyour computer isconnected to the Internet, you expose your computer to a variety of potentialthreats. The Internet isdesigned in such a waythat if you have access to the Internet, all other computers on the Internet canconnect to yourcomputer.Thisleavesyouvulnerable to variouscommonattacks. This isespeciallytroubling as severalpopular programs open services on your computer thatallowothers to view files on your computer! Whilethisfunctionalityisexpected, the difficultyisthatsecurityerrors are detectedthatalwaysallow hackers to attackyour computer with the ability to view or destroy sensitive information stored on your computer. To protectyour computer fromsuchattacksyouneed to "teach" your computer to ignore or resistexternaltestingattempts. The commonname for such a program is Firewall. A firewall is software thatcreates a secureenvironmentwhosefunctionis to block or restrictincoming and outgoing information over a network. These firewalls actually do not work and are not suitable for business premises to maintain information securitywhilesupporting free exchange of ideas. Firewall are becoming more and more sophisticated in the day, and new features are beingadded all the time, sothat, despitecriticism and intimidatingdevelopmentmethods, they are still a powerfuldefense. In thispaper, weread a network firewall thathelps the corporateenvironment and other networks thatwant to exchange information over the network. The firewall protects the flow of trafficthrough the internet and limits the amount of external and internal information and provides the internal user with the illusion of anonymous FTP and www online communications.
This document summarizes and reviews several techniques for secure clustering in vehicular ad hoc networks (VANETs). It first provides background on VANETs and discusses why secure clustering is important. It then reviews five specific secure clustering techniques that have been proposed: 1) using public key infrastructure for key management between cluster heads, 2) Shamir's secret sharing scheme for data authentication, 3) using threshold cryptography for decentralized certificate authorities, 4) establishing trust through physical/logical domain grouping, and 5) methods for secure message aggregation and using onion signatures. The document aims to provide a comprehensive understanding and comparison of these different secure clustering techniques to help guide further research.
This document provides background information on the history and importance of network security. It discusses how the advent of the internet led to security becoming a major concern, as the internet's architecture allowed for many security threats. The document outlines the internet and network security timeline, from the creation of the ARPANET in 1969 to the crimes of Kevin Mitnick in the 1990s that heightened awareness of information security. It also examines the differences between data security and network security, and how a layered security model corresponds to the OSI model layers.
Network infrastructures have played important part in most daily communications for business industries,
social networking, government sectors and etc. Despites the advantages that came from such
functionalities, security threats have become a daily struggle. One major security threat is hacking.
Consequently, security experts and researchers have suggested possible security solutions such as
Firewalls, Intrusion Detection Systems (IDS), Intrusion Detection and Prevention Systems (IDP) and
Honeynet. Yet, none of these solutions have proven their ability to completely address hacking. The reason
behind that, there is a few researches that examine the behavior of hackers. This paper formally and
practically examines in details the behavior of hackers and their targeted environments. Moreover, this
paper formally examines the properties of one essential pre-hacking step called scanning and highlights its
importance in developing hacking strategies. Also, it illustrates the properties of hacking that is common in
most hacking strategies to assist security experts and researchers towards minimizing the risk of hack.
This document proposes a trust count based validation method to lessen internal attacks in mobile ad hoc networks. The key aspects of the proposed method are:
1. The network is divided into hierarchical clusters, each with a fully trusted cluster head.
2. Each node holds a certificate from an offline certificate authority that includes the node's access policy and expiration time.
3. A trust count is periodically calculated for each node based on its access policy evaluations.
4. Cluster heads renew or reject member nodes' certificates based on their trust count values, aiming to mitigate internal attacks like node capture attacks.
Co-operative Wireless Intrusion Detection System Using MIBs From SNMPIJNSA Journal
In emerging technology of Internet, security issues are becoming more challenging. In case of wired LAN it is somewhat in control, but in case of wireless networks due to exponential growth in attacks, it has made difficult to detect such security loopholes. Wireless network security is being addressed using firewalls, encryption techniques and wired IDS (Intrusion Detection System) methods. But the approaches which were used in wired network were not successful in producing effective results for wireless networks. It is so because of features of wireless network such as open medium, dynamic changing topology, cooperative algorithms, lack of centralized monitoring and management point, and lack of a clear line of defense etc. So, there is need for new approach which will efficiently detect intrusion in wireless network. Efficiency can be achieved by implementing distributive, co-operative based, multi-agent IDS. The proposed system supports all these three features. It includes mobile agents for intrusion detection which uses SNMP (Simple network Management Protocol) and MIB (Management Information Base) variables for mobile wireless networks.
Due to inherent limitations in wireless sensor networks, security is a crucial issue. While research in WSN security is progressing at tremendous pace, no comprehensive document lists the security issues and the threat models which pose unique threats to the wireless sensor networks. In this paper we have made an effort to document all the known security issues in wireless sensor networks and have provided the research direction towards countermeasures against the threats posed by these issues
International Refereed Journal of Engineering and Science (IRJES)irjes
International Refereed Journal of Engineering and Science (IRJES) is a leading international journal for publication of new ideas, the state of the art research results and fundamental advances in all aspects of Engineering and Science. IRJES is a open access, peer reviewed international journal with a primary objective to provide the academic community and industry for the submission of half of original research and applications
Wireless Networks Security in Jordan: A Field StudyIJNSA Journal
- The document summarizes a study that evaluated the security of wireless networks in Jordan through a process called "wardriving" where the researchers drove around with wireless network detection tools.
- The results found that the majority (79.52%) of wireless networks tested were unsecured and vulnerable. Most networks used either low levels of encryption (68.67%) or no encryption at all (11.45%).
- Nearly all networks broadcast the default SSID (92.17%), leaving them exposed to potential hackers since changing the SSID is a basic security precaution.
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
The document proposes a signature-based intrusion detection system using multithreading. It captures network packets and analyzes them for intrusions by comparing signatures to databases of known attacks. A multithreaded design is suggested to improve performance by processing packets in parallel threads. Agents would be deployed on the network with detection modules that use caching of frequent signatures to speed up analysis. An update module would transfer new frequent signatures to the caches.
This document discusses the Address Resolution Protocol (ARP) and its use in intrusion detection systems. It proposes a standardized 64-byte ARP protocol structure to more easily capture ARP packets from a network. The structure includes fields for frame information, destination and source addresses, ARP type details, and sender/target MAC and IP addresses. This standardized structure could be integrated into network monitoring to help detect intrusions without affecting normal data transfer processes. Overall, the document aims to optimize the ARP sequence for use in intrusion detection systems.
A technical review and comparative analysis of machine learning techniques fo...IJECEIAES
Machine learning techniques are being widely used to develop an intrusion detection system (IDS) for detecting and classifying cyber attacks at the network-level and the host-level in a timely and automatic manner. However, Traditional Intrusion Detection Systems (IDS), based on traditional machine learning methods, lacks reliability and accuracy. Instead of the traditional machine learning used in previous researches, we think deep learning has the potential to perform better in extracting features of massive data considering the massive cyber traffic in real life. Generally Mobile Ad Hoc Networks have given the low physical security for mobile devices, because of the properties such as node mobility, lack of centralized management and limited bandwidth. To tackle these security issues, traditional cryptography schemes can-not completely safeguard MANETs in terms of novel threats and vulnerabilities, thus by applying Deep learning methods techniques in IDS are capable of adapting the dynamic environments of MANETs and enables the system to make decisions on intrusion while continuing to learn about their mobile environment. An IDS in MANET is a sensoring mechanism that monitors nodes and network activities in order to detect malicious actions and malicious attempt performed by Intruders. Recently, multiple deep learning approaches have been proposed to enhance the performance of intrusion detection system. In this paper, we made a systematic comparison of three models, Inceprtion architecture convolutional neural network (Inception-CNN), Bidirectional long short-term memory (BLSTM) and deep belief network (DBN) on the deep learning-based intrusion detection systems, using the NSL-KDD dataset containing information about intrusion and regular network connections, the goal is to provide basic guidance on the choice of deep learning models in MANET.
This document discusses network intrusion detection systems (NIDS) and their ability to handle high-speed traffic. It introduces NIDS and their role in monitoring network traffic. The document presents an experiment that tests the open-source NIDS Snort under high-volume traffic. The experiment shows that Snort drops more packets as traffic speed and volume increases, demonstrating a weakness of NIDS in high-speed environments. It suggests using a parallel NIDS technique to help NIDS better handle high-speed network traffic and reduce packet dropping.
This document summarizes and evaluates techniques for identifying adversary attacks in wireless sensor networks. It begins by describing common types of attacks and issues with cryptographic identification methods. It then evaluates existing localization techniques like Received Signal Strength (RSS) and spatial correlation analysis. Specifically, it proposes the Generalized Model for Attack Detection (GMFAD) which uses Partitioning Around Medoids (PaM) clustering on RSS readings to detect multiple attackers. It also presents the Coherent Detection and Localization Model (CDAL-M) which integrates PaM with localization algorithms like RADAR and Bayesian networks to determine attacker locations. The document analyzes these techniques' effectiveness at detecting and localizing multiple adversary attackers in wireless sensor networks.
This document discusses the risks, countermeasures, costs and benefits of cloud computing. It identifies key risks like cyberattacks, lack of data location control, complex trust boundaries that make investigations difficult, and privacy issues. It recommends solutions like well-defined policies, service level agreements, continuous risk assessments, encryption, and guidance from NIST. While cloud computing offers cost savings and flexibility, users are ultimately responsible for security and must approach cloud adoption with care given its immature nature and risks.
Wireless Sensor Networks: An Overview on Security Issues and ChallengesIJAEMSJORNAL
Wireless Sensor Networks (WSNs) are formed by deploying as large number of sensor nodes in an area for the surveillance of generally remote locations. A typical sensor node is made up of different components to perform the task of sensing, processing and transmitting data. WSNs are used for many applications in diverse forms from indoor deployment to outdoor deployment. The basic requirement of every application is to use the secured network. Providing security to the sensor network is a very challenging issue along with saving its energy. Many security threats may affect the functioning of these networks. WSNs must be secured to keep an attacker from hindering the delivery of sensor information and from forging sensor information as these networks are build for remote surveillance and unauthorized changes in the sensed data may lead to wrong information to the decision makers. This paper gives brief description about various security issues and security threats in WSNs.
This document discusses wireless communication security. It begins by defining wireless communication and noting some advantages and disadvantages, including security issues. It then discusses the general characteristics of the Wireless Application Protocol (WAP) and provides an overview of wireless communication systems. The document outlines some common security threats in wireless networks like unauthorized disclosure, data modification, network disruption, and repudiation. It also describes different types of wireless attacks and security goals in wireless networks to provide authentication, confidentiality, integrity, non-repudiation, and availability. Symmetric and asymmetric encryption techniques are introduced as methods for encrypting data in wireless networks.
Fog computing is a decentralized architecture that processes data and applications closer to end users and IoT devices than cloud computing does. It helps address issues with cloud computing like high latency and low capacity for IoT applications. Fog nodes can be devices like routers, switches and hubs that have some computing and storage capabilities. The paper discusses security and privacy issues with fog computing and possible solutions. It outlines threats like denial of service attacks, eavesdropping, spoofing and man-in-the-middle attacks. Authentication, authorization, and virtualization are identified as areas with security issues, and solutions like public key infrastructure, intrusion detection and certification authorities are proposed.
Cloud technology to ensure the protection of fundamental methods and use of i...SubmissionResearchpa
A comparative analysis of attacks carried out in cloud technologies, the main methods and methods of information protection, the possibilities of using hardware and software, and methods to combat threats when eliminating them, ensuring data protection were carried out by Mamarajabov Odil Elmurzayevich 2020. Cloud technology to ensure the protection of fundamental methods and use of information. International Journal on Integrated Education. 3, 10 (Oct. 2020), 313-315. DOI:https://doi.org/10.31149/ijie.v3i10.780 https://journals.researchparks.org/index.php/IJIE/article/view/780/750 https://journals.researchparks.org/index.php/IJIE/article/view/780
Ensuring Privacy in opportunistic NetworkIOSR Journals
This document discusses ensuring privacy in opportunistic networks. It begins by defining opportunistic networks and how they differ from mobile ad hoc networks (MANETs) in their lack of constant connectivity between source and destination. The document then outlines some common attacks on opportunistic networks like viruses and worms. It proposes using public-private cryptography techniques like encryption and decryption to ensure privacy of user data as it is forwarded through intermediate nodes in opportunistic networks. The algorithm is implemented in the NS2 network simulator to test maintaining privacy while still allowing opportunistic forwarding of messages.
This document proposes a system called FireCol, which stands for a collaborative protection network for detecting flooding DDoS attacks. FireCol uses a distributed network of intrusion prevention systems located at internet service providers that form virtual protection rings around hosts. These systems collaborate by exchanging selected traffic information to detect DDoS attacks close to the source. The document outlines the architecture of FireCol and experimental results showing its effectiveness at detecting attacks with low overhead. Future work is mentioned to extend FireCol's capabilities.
MANETs have unique characteristics like dynamic topology, wireless radio medium, limited resources and lack of centralized administration; as a result, they are vulnerable to different types of attacks in different layers of protocol stack. wormhole attack detection in wireless sensor networks
International Journal of Computational Engineering Research(IJCER)ijceronline
International Journal of Computational Engineering Research(IJCER) is an intentional online Journal in English monthly publishing journal. This Journal publish original research work that contributes significantly to further the scientific knowledge in engineering and Technology.
In our research work we are improving the performance of mobile ad hoc networks under jamming attack by using an integrated approach. The proposed work includes a network with high mobility, using IEEE Along g standard jamming attacks and countermeasures in wireless sensor networks
This document summarizes research on enhancing the DSR routing protocol to prevent distributed denial of service (DDoS) attacks in mobile ad hoc networks (MANETs). It discusses how DDoS attacks work, the challenges they present for MANETs due to their dynamic nature, and existing research on DDoS attack detection and prevention. The document reviews literature on analyzing DDoS attack behaviors and properties, characterizing attack traffic patterns, and using statistical analysis and neural networks to identify attacks. The goal of the research is to develop an enhanced DSR protocol that can detect and mitigate DDoS attacks in MANETs more effectively than previous approaches.
Design & Implementation of Secure AODV In Multicast Routing To Detect DDOS At...IJNSA Journal
The wireless ad hoc network is particularly vulnerable to DOS attacks due to its features of open medium, dynamic changing topology, cooperative algorithms, decentralization of the protocols, and lack of a clear line of defense is a growing problem in networks today. In Mobile Ad hoc Networks (MANET), various types of Denial of Service Attacks (DOS) are possible because of the inherent limitations of its routing protocols. In this paper we will secure the MANET from the DDOS attack. DDOS attacks are similar to DOS attacks but there is a difference between them and that is DDOS attacks involve breaking in to hundreds or thousands of machines, so for this reason, this attack called Distributed. Very often, systems that use for attack is a part of the networks and users of these systems don’t know about that, their systems used for attack to another systems. This kind of attack, consume more bandwidth and uses more sources in network. . In this work, we study the effect of one of the important attacks that called DDOS in MANET on most vulnerability protocol that named AODV. The product of this study is detection of DDOS attack by
using AODV (adhoc on demand distance vector) protocol. Proposed scheme is distributed in nature it has the capability to prevent Distributed DOS (DDOS) as well..
1) Network security has become more important with the rise of the internet and interconnected networks. As personal and business information is transmitted over networks, security threats have also increased.
2) The document discusses the history and importance of network security. It covers how the architecture of the internet led to vulnerabilities, and how understanding attack methods has helped develop appropriate security technologies.
3) The future of network security is still evolving as new trends emerge. A layered security approach corresponding to the OSI model layers is being explored as an effective way to design secure networks.
This document summarizes the key aspects of computer network security. It discusses the importance of network security due to increased interconnectivity and risk of intellectual property theft. It describes common internet attack methods like viruses, Trojans, eavesdropping and denial of service attacks. It also discusses network security technologies used to defend against attacks, such as firewalls, encryption, intrusion detection systems. The document outlines security considerations for network design like access control, authentication, integrity and non-repudiation. It examines vulnerabilities in the internet architecture and security issues in different versions of the internet protocol. Finally, it discusses future directions for network security.
This document proposes a middleware called MSOAH-IoT to address heterogeneity issues in IoT applications. The middleware is based on a service-oriented architecture and uses REST APIs to collect data from heterogeneous sensors. It introduces heterogeneous networking interfaces and has been tested on gateways running different operating systems. The middleware aims to support various smart objects using different networking interfaces and OS systems while unifying various data formats. It is implemented on a Raspberry Pi gateway to manage communications at the network edge and handle heterogeneity issues.
A Secure Intrusion Detection System against DDOS Attack in Wireless Ad-Hoc Ne...IJERA Editor
MANET (Wireless Mobile Ad-hoc Network) is a technology which are used in society in daily life an
activities such as in traffic surveillance, in building construction or it’s application is used in battlefield also. In
MANET there is no control of any node here is no centralized controller that’s why each node has its own
routing capability. And each node act as device and its change its connection to other devices.
The main problem of today’s MANET is a security, because there is no any centralized controller. Our main aim
is that we protect them from DDOS attack in terms of flooding through messages, packet drop, end to end delay
and energy dropping etc. For that we are applying many techniques for saving energy of nodes and identifying
malicious node and types of DDOS attack and in this paper we are discussing this technique.
International Journal of Network Security & Its Applications (IJNSA)IJNSA Journal
The International Journal of Network Security & Its Applications (IJNSA) is a bi monthly open access peer-reviewed journal that publishes articles which contribute new results in all areas of the computer Network Security & its applications. The journal focuses on all technical and practical aspects of security and its
applications for wired and wireless networks. The goal of this journal is to bring together researchers and practitioners from academia and industry to focus on understanding Modern security threats and countermeasures, and establishing new collaborations in these areas.
Protecting location privacy in sensor networks against a global eavesdropperShakas Technologies
The document discusses techniques for providing location privacy in sensor networks against a global eavesdropper. It proposes four techniques - periodic collection, source simulation, sink simulation, and backbone flooding - to provide location privacy for monitored objects (source location privacy) and data sinks (sink location privacy). These techniques provide trade-offs between privacy, communication cost, and latency. Analysis and simulation demonstrate that the proposed techniques are efficient and effective for providing source and sink location privacy in sensor networks.
SURVEY OF TRUST BASED BLUETOOTH AUTHENTICATION FOR MOBILE DEVICEEditor IJMTER
Practical requirements for securely demonstrating identities between two handheld
devices are an important concern. The adversary can inject a Man-In- The-Middle (MITM) attack to
intrude the protocol. Protocols that employ secret keys require the devices to share private
information in advance, in which it is not feasible in the above scenario. Apart from insecurely
typing passwords into handheld devices or comparing long hexadecimal keys displayed on the
devices’ screen, many other human-verifiable protocols have been proposed in the literature to solve
the problem. Unfortunately, most of these schemes are unsalable to more users. Even when there are
only three entities attempt to agree a session key, these protocols need to be rerun for three times.
So, in the existing method a bipartite and a tripartite authentication protocol is presented using a
temporary confidential channel. Besides, further extend the system into a transitive authentication
protocol that allows multiple handheld devices to establish a conference key securely and efficiently.
But this method detects only the outsider attacks. Method does not consider the insider attacks. So,
in the proposed method trust score based method is introduced which computes the trust values for
the nodes and provide the security. The trust score is computed has a positive influence on the
confidence with which an entity conducts transactions with that node. Network the behavior of the
node will be monitored periodically and its trust value is also updated .So depending on the behavior
of the node in the network trust relation will be established between two nodes.
Help the Genetic Algorithm to Minimize the Urban Traffic on IntersectionsIJORCS
This document summarizes a research paper that uses genetic algorithms to optimize traffic light timing at intersections to minimize traffic. It first describes modeling traffic light intersections using Petri nets. It then explains how genetic algorithms can be used for optimization by coding the problem variables in chromosomes, defining a fitness function to evaluate populations over generations, and using operators like mutation and crossover. The fitness function aims to minimize average traffic light cycle times based on 14 parameters related to light timing and vehicle wait times at two intersections. The genetic algorithm optimization of traffic light timing parameters is found to improve traffic flow at intersections.
Welcoming the research scholars, scientists around the globe in the Open Access Dimension, IJORCS is now accepting manuscripts for its next issue (Volume 4, Issue 4). Authors are encouraged to contribute to the research community by submitting to IJORCS, articles that clarify new research results, projects, surveying works and industrial experiences that describe significant advances in field of computer science.
All paper submissions (http://www.ijorcs.org/submit-paper) are received and managed electronically by IJORCS Team. Detailed instructions about the submission procedure are available on IJORCS website (http://www.ijorcs.org/author-guidelines)
License plate recognition system is one of the core technologies in intelligent traffic control. In this paper, a new and tunable algorithm which can detect multiple license plates in high resolution applications is proposed. The algorithm aims at investigation into and identification of the novel Iranian and some European countries plate, characterized by both inclusion of blue area on it and its geometric shape. Obviously, the suggested algorithm contains suitable velocity due to not making use of heavy pre-processing operation such as image-improving filters, edge-detection operation and omission of noise at the beginning stages. So, the recommended method of ours is compatible with model-adaptation, i.e., the very blue section of the plate so that the present method indicated the fact that if several plates are included in the image, the method can successfully manage to detect it. We evaluated our method on the two Persian single vehicle license plate data set that we obtained 99.33, 99% correct recognition rate respectively. Further we tested our algorithm on the Persian multiple vehicle license plate data set and we achieved 98% accuracy rate. Also we obtained approximately 99% accuracy in character recognition stage.
FPGA Implementation of FIR Filter using Various Algorithms: A RetrospectiveIJORCS
This Paper is a review study of FPGA implementation of Finite Impulse response (FIR) with low cost and high performance. The key observation of this paper is an elaborate analysis about hardware implementations of FIR filters using different algorithm i.e., Distributed Arithmetic (DA), DA-Offset Binary Coding (DA-OBC), Common Sub-expression Elimination (CSE) and sum-of-power-of-two (SOPOT) with less resources and without affecting the performance of the original FIR Filter.
Using Virtualization Technique to Increase Security and Reduce Energy Consump...IJORCS
An approach has been presented in this paper in order to generate a secure environment on internet Based Virtual Computing platform and also to reduce energy consumption in green cloud computing. The proposed approach constantly checks the accuracy of stored data by means of a central control service inside the network environment and also checks system security through isolating single virtual machines using a common virtual environment. This approach has been simulated on two types of Virtual Machine Manager (VMM) Quick EMUlator (Qemu), HVM (Hardware Virtual Machine) Xen and outputs of the simulation in VMInsight show that when service is getting singly used, the overhead of its performance will be increased. As a secure system, the proposed approach is able to recognize malicious behaviors and assure service security by means of operational integrity measurement. Moreover, the rate of system efficiency has been evaluated according to the amount of energy consumption on five applications (Defragmentation, Compression, Linux Boot Decompression and Kernel Boot). Therefore, this has been resulted that to secure multi-tenant environment, managers and supervisors should independently install a security monitoring system for each Virtual Machines (VMs) which will come up to have the management heavy workload of. While the proposed approach, can respond to all VM’s with just one virtual machine as a supervisor.
Algebraic Fault Attack on the SHA-256 Compression FunctionIJORCS
The cryptographic hash function SHA-256 is one member of the SHA-2 hash family, which was proposed in 2000 and was standardized by NIST in 2002 as a successor of SHA-1. Although the differential fault attack on SHA-1compression function has been proposed, it seems hard to be directly adapted to SHA-256. In this paper, an efficient algebraic fault attack on SHA-256 compression function is proposed under the word-oriented random fault model. During the attack, an automatic tool STP is exploited, which constructs binary expressions for the word-based operations in SHA-256 compression function and then invokes a SAT solver to solve the equations. The simulation of the new attack needs about 65 fault injections to recover the chaining value and the input message block with about 200 seconds on average. Moreover, based on the attack on SHA-256 compression function, an almost universal forgery attack on HMAC-SHA-256 is presented. Our algebraic fault analysis is generic, automatic and can be applied to other ARX-based primitives.
Enhancement of DES Algorithm with Multi State LogicIJORCS
The principal goal to design any encryption algorithm must be the security against unauthorized access or attacks. Data Encryption Standard algorithm is a symmetric key algorithm and it is used to secure the data. Enhanced DES algorithm works on increasing the key length or complex S-BOX design or increased the number of states in which the information is to be represented or combination of above criteria. By increasing the key length, the number of combinations for key will increase which is hard for the intruder to do the brute force attack. As the S-BOX design will become the complex there will be a good avalanche effect. As the number of states increases in which the information is represented, it is hard for the intruder to crack the actual information. Proposed algorithm replace the predefined XOR operation applied during the 16 round of the standard algorithm by a new operation called “Hash function” depends on using two keys. One key used in “F” function and another key consists of a combination of 16 states (0,1,2…13,14,15) instead of the ordinary 2 state key (0, 1). This replacement adds a new level of protection strength and more robustness against breaking methods.
Hybrid Simulated Annealing and Nelder-Mead Algorithm for Solving Large-Scale ...IJORCS
This paper presents a new algorithm for solving large scale global optimization problems based on hybridization of simulated annealing and Nelder-Mead algorithm. The new algorithm is called simulated Nelder-Mead algorithm with random variables updating (SNMRVU). SNMRVU starts with an initial solution, which is generated randomly and then the solution is divided into partitions. The neighborhood zone is generated, random number of partitions are selected and variables updating process is starting in order to generate a trail neighbor solutions. This process helps the SNMRVU algorithm to explore the region around a current iterate solution. The Nelder- Mead algorithm is used in the final stage in order to improve the best solution found so far and accelerates the convergence in the final stage. The performance of the SNMRVU algorithm is evaluated using 27 scalable benchmark functions and compared with four algorithms. The results show that the SNMRVU algorithm is promising and produces high quality solutions with low computational costs.
Welcoming the research scholars, scientists around the globe in the Open Access Dimension, IJORCS is now accepting manuscripts for its next issue (Volume 4, Issue 2). Authors are encouraged to contribute to the research community by submitting to IJORCS, articles that clarify new research results, projects, surveying works and industrial experiences that describe significant advances in field of computer science.
To view complete list of topics coverage of IJORCS, Aim & Scope, please visit, www.ijorcs.org/scope
Welcoming the research scholars, scientists around the globe in the Open Access Dimension, IJORCS is now accepting manuscripts for its next issue (Volume 4, Issue 1). Authors are encouraged to contribute to the research community by submitting to IJORCS, articles that clarify new research results, projects, surveying works and industrial experiences that describe significant advances in field of computer science.
Voice Recognition System using Template MatchingIJORCS
It is easy for human to recognize familiar voice but using computer programs to identify a voice when compared with others is a herculean task. This is due to the problem that is encountered when developing the algorithm to recognize human voice. It is impossible to say a word the same way in two different occasions. Human speech analysis by computer gives different interpretation based on varying speed of speech delivery. This research paper gives detail description of the process behind implementation of an effective voice recognition algorithm. The algorithm utilize discrete Fourier transform to compare the frequency spectra of two voice samples because it remained unchanged as speech is slightly varied. Chebyshev inequality is then used to determine whether the two voices came from the same person. The algorithm is implemented and tested using MATLAB.
Channel Aware Mac Protocol for Maximizing Throughput and FairnessIJORCS
The proper channel utilization and the queue length aware routing protocol is a challenging task in MANET. To overcome this drawback we are extending the previous work by improving the MAC protocol to maximize the Throughput and Fairness. In this work we are estimating the channel condition and Contention for a channel aware packet scheduling and the queue length is also calculated for the routing protocol which is aware of the queue length. The channel is scheduled based on the channel condition and the routing is carried out by considering the queue length. This queue length will provide a measurement of traffic load at the mobile node itself. Depending upon this load the node with the lesser load will be selected for the routing; this will effectively balance the load and improve the throughput of the ad hoc network.
A Review and Analysis on Mobile Application Development Processes using Agile...IJORCS
This document provides a review and analysis of mobile application development processes using agile methodologies. It begins with an introduction to agile software development and discusses how agile principles are a natural fit for mobile application development given the dynamic environment. The document then reviews several proposed mobile application development processes that combine agile and non-agile techniques, including Mobile-D, RaPiD7, a hybrid methodology, MASAM, and a Scrum and Lean Six Sigma integration approach. It concludes by noting that while agile methodologies show promise for mobile development, further empirical validation is still needed.
Congestion Prediction and Adaptive Rate Adjustment Technique for Wireless Sen...IJORCS
In general, nodes in Wireless Sensor Networks (WSNs) are equipped with limited battery and computation capabilities but the occurrence of congestion consumes more energy and computation power by retransmitting the data packets. Thus, congestion should be regulated to improve network performance. In this paper, we propose a congestion prediction and adaptive rate adjustment technique for Wireless Sensor Networks. This technique predicts congestion level using fuzzy logic system. Node degree, data arrival rate and queue length are taken as inputs to the fuzzy system and congestion level is obtained as an outcome. When the congestion level is amidst moderate and maximum ranges, adaptive rate adjustment technique is triggered. Our technique prevents congestion by controlling data sending rate and also avoids unsolicited packet losses. By simulation, we prove the proficiency our technique. It increases system throughput and network performance significantly.
A Study of Routing Techniques in Intermittently Connected MANETsIJORCS
A Mobile Ad hoc Network (MANET) is a self-configuring infrastructure less network of mobile devices connected by wireless. These are a kind of wireless Ad hoc Networks that usually has a routable networking environment on top of a Link Layer Ad hoc Network. The routing approach in MANET includes mainly three categories viz., Reactive Protocols, Proactive Protocols and Hybrid Protocols. These traditional routing schemes are not pertinent to the so called Intermittently Connected Mobile Ad hoc Network (ICMANET). ICMANET is a form of Delay Tolerant Network, where there never exists a complete end – to – end path between two nodes wishing to communicate. The intermittent connectivity araise when network is sparse or highly mobile. Routing in such a spasmodic environment is arduous. In this paper, we put forward the indication of prevailing routing approaches for ICMANET with their benefits and detriments
Improving the Efficiency of Spectral Subtraction Method by Combining it with ...IJORCS
In the field of speech signal processing, Spectral subtraction method (SSM) has been successfully implemented to suppress the noise that is added acoustically. SSM does reduce the noise at satisfactory level but musical noise is a major drawback of this method. To implement spectral subtraction method, transformation of speech signal from time domain to frequency domain is required. On the other hand, Wavelet transform displays another aspect of speech signal. In this paper we have applied a new approach in which SSM is cascaded with wavelet thresholding technique (WTT) for improving the quality of speech signal by removing the problem of musical noise to a great extent. Results of this proposed system have been simulated on MATLAB.
An Adaptive Load Sharing Algorithm for Heterogeneous Distributed SystemIJORCS
This summarizes a research paper that proposes an adaptive load sharing algorithm for heterogeneous distributed systems. The algorithm aims to balance load across nodes by migrating tasks from overloaded nodes to underloaded nodes, taking into account factors like node processing capacities, link capacities, and communication delays. It formulates mathematical models to represent changes in waiting times as tasks are added, completed or migrated between nodes. The goal is to minimize overall response times through decentralized load balancing decisions made locally at each node.
The Design of Cognitive Social Simulation Framework using Statistical Methodo...IJORCS
Modeling the behavior of the cognitive architecture in the context of social simulation using statistical methodologies is currently a growing research area. Normally, a cognitive architecture for an intelligent agent involves artificial computational process which exemplifies theories of cognition in computer algorithms under the consideration of state space. More specifically, for such cognitive system with large state space the problem like large tables and data sparsity are faced. Hence in this paper, we have proposed a method using a value iterative approach based on Q-learning algorithm, with function approximation technique to handle the cognitive systems with large state space. From the experimental results in the application domain of academic science it has been verified that the proposed approach has better performance compared to its existing approaches.
An Enhanced Framework for Improving Spatio-Temporal Queries for Global Positi...IJORCS
This document proposes a framework to improve the processing of spatio-temporal queries for global positioning systems. The framework employs a new indexing algorithm built on SQL Server 2008 that avoids the overhead of R-Tree indexing. It utilizes dynamic materialized views and an adaptive safe region to reduce communication costs and update loads. Caching is used to enhance performance. The notification engine processes concurrent queries using publish/subscribe to group similar queries. Experiments showed the framework outperformed R-Tree indexing.
A PSO-Based Subtractive Data Clustering AlgorithmIJORCS
There is a tremendous proliferation in the amount of information available on the largest shared information source, the World Wide Web. Fast and high-quality clustering algorithms play an important role in helping users to effectively navigate, summarize, and organize the information. Recent studies have shown that partitional clustering algorithms such as the k-means algorithm are the most popular algorithms for clustering large datasets. The major problem with partitional clustering algorithms is that they are sensitive to the selection of the initial partitions and are prone to premature converge to local optima. Subtractive clustering is a fast, one-pass algorithm for estimating the number of clusters and cluster centers for any given set of data. The cluster estimates can be used to initialize iterative optimization-based clustering methods and model identification methods. In this paper, we present a hybrid Particle Swarm Optimization, Subtractive + (PSO) clustering algorithm that performs fast clustering. For comparison purpose, we applied the Subtractive + (PSO) clustering algorithm, PSO, and the Subtractive clustering algorithms on three different datasets. The results illustrate that the Subtractive + (PSO) clustering algorithm can generate the most compact clustering results as compared to other algorithms.
Coordinate Systems in FME 101 - Webinar SlidesSafe Software
If you’ve ever had to analyze a map or GPS data, chances are you’ve encountered and even worked with coordinate systems. As historical data continually updates through GPS, understanding coordinate systems is increasingly crucial. However, not everyone knows why they exist or how to effectively use them for data-driven insights.
During this webinar, you’ll learn exactly what coordinate systems are and how you can use FME to maintain and transform your data’s coordinate systems in an easy-to-digest way, accurately representing the geographical space that it exists within. During this webinar, you will have the chance to:
- Enhance Your Understanding: Gain a clear overview of what coordinate systems are and their value
- Learn Practical Applications: Why we need datams and projections, plus units between coordinate systems
- Maximize with FME: Understand how FME handles coordinate systems, including a brief summary of the 3 main reprojectors
- Custom Coordinate Systems: Learn how to work with FME and coordinate systems beyond what is natively supported
- Look Ahead: Gain insights into where FME is headed with coordinate systems in the future
Don’t miss the opportunity to improve the value you receive from your coordinate system data, ultimately allowing you to streamline your data analysis and maximize your time. See you there!
Transcript: Details of description part II: Describing images in practice - T...BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and slides: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
How RPA Help in the Transportation and Logistics Industry.pptxSynapseIndia
Revolutionize your transportation processes with our cutting-edge RPA software. Automate repetitive tasks, reduce costs, and enhance efficiency in the logistics sector with our advanced solutions.
Understanding Insider Security Threats: Types, Examples, Effects, and Mitigat...Bert Blevins
Today’s digitally connected world presents a wide range of security challenges for enterprises. Insider security threats are particularly noteworthy because they have the potential to cause significant harm. Unlike external threats, insider risks originate from within the company, making them more subtle and challenging to identify. This blog aims to provide a comprehensive understanding of insider security threats, including their types, examples, effects, and mitigation techniques.
Details of description part II: Describing images in practice - Tech Forum 2024BookNet Canada
This presentation explores the practical application of image description techniques. Familiar guidelines will be demonstrated in practice, and descriptions will be developed “live”! If you have learned a lot about the theory of image description techniques but want to feel more confident putting them into practice, this is the presentation for you. There will be useful, actionable information for everyone, whether you are working with authors, colleagues, alone, or leveraging AI as a collaborator.
Link to presentation recording and transcript: https://bnctechforum.ca/sessions/details-of-description-part-ii-describing-images-in-practice/
Presented by BookNet Canada on June 25, 2024, with support from the Department of Canadian Heritage.
7 Most Powerful Solar Storms in the History of Earth.pdfEnterprise Wired
Solar Storms (Geo Magnetic Storms) are the motion of accelerated charged particles in the solar environment with high velocities due to the coronal mass ejection (CME).
Kief Morris rethinks the infrastructure code delivery lifecycle, advocating for a shift towards composable infrastructure systems. We should shift to designing around deployable components rather than code modules, use more useful levels of abstraction, and drive design and deployment from applications rather than bottom-up, monolithic architecture and delivery.
論文紹介:A Systematic Survey of Prompt Engineering on Vision-Language Foundation ...Toru Tamaki
Jindong Gu, Zhen Han, Shuo Chen, Ahmad Beirami, Bailan He, Gengyuan Zhang, Ruotong Liao, Yao Qin, Volker Tresp, Philip Torr "A Systematic Survey of Prompt Engineering on Vision-Language Foundation Models" arXiv2023
https://arxiv.org/abs/2307.12980
RPA In Healthcare Benefits, Use Case, Trend And Challenges 2024.pptxSynapseIndia
Your comprehensive guide to RPA in healthcare for 2024. Explore the benefits, use cases, and emerging trends of robotic process automation. Understand the challenges and prepare for the future of healthcare automation
Quantum Communications Q&A with Gemini LLM. These are based on Shannon's Noisy channel Theorem and offers how the classical theory applies to the quantum world.
The Rise of Supernetwork Data Intensive ComputingLarry Smarr
Invited Remote Lecture to SC21
The International Conference for High Performance Computing, Networking, Storage, and Analysis
St. Louis, Missouri
November 18, 2021
Comparison Table of DiskWarrior Alternatives.pdfAndrey Yasko
To help you choose the best DiskWarrior alternative, we've compiled a comparison table summarizing the features, pros, cons, and pricing of six alternatives.
UiPath Community Day Kraków: Devs4Devs ConferenceUiPathCommunity
We are honored to launch and host this event for our UiPath Polish Community, with the help of our partners - Proservartner!
We certainly hope we have managed to spike your interest in the subjects to be presented and the incredible networking opportunities at hand, too!
Check out our proposed agenda below 👇👇
08:30 ☕ Welcome coffee (30')
09:00 Opening note/ Intro to UiPath Community (10')
Cristina Vidu, Global Manager, Marketing Community @UiPath
Dawid Kot, Digital Transformation Lead @Proservartner
09:10 Cloud migration - Proservartner & DOVISTA case study (30')
Marcin Drozdowski, Automation CoE Manager @DOVISTA
Pawel Kamiński, RPA developer @DOVISTA
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
09:40 From bottlenecks to breakthroughs: Citizen Development in action (25')
Pawel Poplawski, Director, Improvement and Automation @McCormick & Company
Michał Cieślak, Senior Manager, Automation Programs @McCormick & Company
10:05 Next-level bots: API integration in UiPath Studio (30')
Mikolaj Zielinski, UiPath MVP, Senior Solutions Engineer @Proservartner
10:35 ☕ Coffee Break (15')
10:50 Document Understanding with my RPA Companion (45')
Ewa Gruszka, Enterprise Sales Specialist, AI & ML @UiPath
11:35 Power up your Robots: GenAI and GPT in REFramework (45')
Krzysztof Karaszewski, Global RPA Product Manager
12:20 🍕 Lunch Break (1hr)
13:20 From Concept to Quality: UiPath Test Suite for AI-powered Knowledge Bots (30')
Kamil Miśko, UiPath MVP, Senior RPA Developer @Zurich Insurance
13:50 Communications Mining - focus on AI capabilities (30')
Thomasz Wierzbicki, Business Analyst @Office Samurai
14:20 Polish MVP panel: Insights on MVP award achievements and career profiling
INDIAN AIR FORCE FIGHTER PLANES LIST.pdfjackson110191
These fighter aircraft have uses outside of traditional combat situations. They are essential in defending India's territorial integrity, averting dangers, and delivering aid to those in need during natural calamities. Additionally, the IAF improves its interoperability and fortifies international military alliances by working together and conducting joint exercises with other air forces.
Measuring the Impact of Network Latency at TwitterScyllaDB
Widya Salim and Victor Ma will outline the causal impact analysis, framework, and key learnings used to quantify the impact of reducing Twitter's network latency.
2. 24 Sanjay Jadhav, Viddhulata Mohite
protocol is the primary used protocol on the World the needs to prevent from the man-in-middle attacking.
Wide Web. So, access to web based applications has With the rapid growth of Internet, the WWW provides
become more widespread. However, most web an important channel for user to obtain useful
applications contain security vulnerabilities and so, information. Whereas there are more than eight billion
exposing web servers directly on Internet causes a web pages, so supplying information to user’s content,
rapid increase in web applications attacks. Placing a is a challenging work. Fortunately, there are various
firewall in front of web servers can protect against web search engines, about 3500 search engines, such
network level vulnerabilities by filtering application as Google, Yahoo, AltaVista,etc by which we can find
traffic. Nevertheless, firewalls do not prohibit attacks valuable information efficiently. But possible attack is
employing application level vulnerabilities. Therefore, SPAM can be considered and design system immune
integration of reverse proxy is required to protect to SPAM.
against application level attacks. The reverse proxy is a
mandatory proxy placed in front of internal web Stepping stone attacks are often used by network
servers. This mandatory proxy protects the access to intruders to hide their identities. The Round Trip
web server resources. It deals HTTP request and Times (RTT) between the sent packets and
response via filtering process. corresponding echo packets for the connection chains
of stepping stones are critical for detecting such
Distributed Denials of service (DDOS) attacks are attacks. Technology never ends. Future systems are
persistent current and very real threats to network. expected to defense different types of attacks as well
Expanding upon a flexible distributed framework for as a mixture of service with very different and often
network remediation utilizing multiple strategies is conflicting service requirements. In these scenarios,
considered. A novel adaptive clustering method accurate modeling is especially imperative for
combined with features ranking for DDOS attack preventing attacks. Security issues associated with the
detection. Wavelet analysis method is considered also development of the network is becoming the hot spot,
as one of the most efficient methods for detecting high rise buildings or intelligence communities, local
DDOS attacks. The use of client puzzles has been area networks everywhere, through the Ethernet as the
recognized as a preventive defense against the resource communication channel. The multimedia applications
exhaustion attacks. Its original schemes however such as communication of voice, sending videos,
cannot be used against bandwidth attacks. To resolve accessing e-mails; file transfer requires integration of
this, some defense mechanisms have recently been sources like cellular/WLAN/LAN.
proposed in which the puzzles are created and the
answers are evaluated by the routers distributed over The integration of resources working together on
the network. Although interesting, these mechanisms single platform is called as heterogeneous network. It
are of high complexity and their success relies on high needs frame work for a network security in
co-operation for core routers, a thing that is not heterogeneous networks environment. Also needs
possible in the near future. A Denial of service (DOS) separate algorithms for all types of possible attacks in
attack is a malicious activity which culminates in the network should work in heterogeneous network. For
denial of legitimate requests for the victim’s resources. analysis purpose use of network simulator (ns-2) is
A flooding attack is a DOS attack in which the attacker taken for consideration as it works for real-time and
sends on overwhelming number of requests for a key non-real-time analysis. The comparison between
resource to the victim. This leads to the depletion of designed and existing algorithm can be also carried out
those resources so that the legitimate requests for the with network simulator. Design of network security
same area denied. The target of a flooding attack is model is also one of the important tasks. Due to a rapid
resource in the victim’s system for example a buffer, progress in IT fields and increasing demand for web
CPU time to process requests or the bandwidth of the applications, lots of researches have focused on how to
communication channel to the victim. achieve network security the next generation network.
Algorithms will be developed for network security for
Today’s security systems have been drawing great following attacks and security authentication, malware
attentions as cryptographic algorithm have gained attacks, cookies security, Denial of service (DoS),
popularity due to the nature that make them suitable cache timing attacks, Man –in-middle attack, spam,
for use in constrained environment such as mobile stepping stone attacks for heterogeneous networks.
sensor information applications, where computing Out of these all information hiding techniques are
resources and power availability are limited. Elliptic more suitable and easily implementation task [1]. At
curve cryptography (ECC) is one of them, which present, the academic world pay mostly attention on
requires less computational power, communication the field that using image, video, audio as carriers and
bandwidth, and memory in comparison with other do little research on using text as carrier. It mainly
crypto-system. In order to save pre-computing there is because the redundant of text file is very small, it is
a trend for sensor networks to design a sensor node difficult to embed, and the robustness is not well.
communicates to the end database, which indicating
www.ijorcs.org
3. A Data Hiding Techniques based on Length of English Text using DES and Attacks 25
At the same time, it offers a wide space to the 1. Typesetting carrier text in mrified form.
applications of data hiding system based on text 2. In setting a few random interference using suitable
document [2]. algorithm, but we must ensure that these
interferences will not affect the extraction of secret
message. The purpose of pre-processing is to
Embedded increase the accuracy of extracting and improve
Pre- Carrier Algorithm
Sender Processing Text
the ability against attacking.
E(m)
Secret C. Design of Embedded Algorithm
Message
DES Preliminary definition:
Encryption
1. Define stochastic nature numbers Lk, then
according to Lk, divide the binary bit stream of
Key Common secret message M into groups randomly and
Channel P transform them into decimal number. The decimal
DES number of M is M~{ml.m2 ... mi liE N .mi<2k-l}
Decryption after being transformed.
2. Define the set of text V~ {v l.v2 ... vj I j EN}
according the sequence of text
Extraction 3. Define Length (x) As the function[5]. which is
Re- Algorithm
Receiver Processing used to calculate length of words.
Carrier Text C(E(m))
Reverse
4. Define the set of decimal is D~{dl, d2, ... , di}.
which is the result that transform secret message
using KE.
Figure 1: Structure of the hiding system
Design of embedded algorithm:
The structure of the system is shown in figure 1, it
mainly includes preprocessing, embedding, extracting The embedded algorithm decides the invisibility,
and post-processing five modules. The processing hidden capacity, robustness of the system. Complexity
module is divided into encryption, grouping and of the algorithm impacts operation efficiency directly.
formatting text three modules. The remaining paper The embedded algorithm is designed as follows:
focuses on the proposed system algorithm in section II. Step 1. Select a colour which is similar to the colour of
Section III follows flow chart whereas section VI gives carrier as embedded characteristic, which has
result. solved the second problem, which make the
colour change of the text as a manner of
II. PROPOSED SYSTEM ALGORITHM
embedding secret message.
A. Using DES to encrypt the main two steps are select Step 2. Define the embedded position in the words.
one appropriate encryption key KE and encrypt
secret message m with KE to get the cipher text m '. Algorithms E(M) is described as follows:
E (M)
B. Creating the embedded key KE: {
Step 1. Transform the encrypted file whose type is byte int x.y;
into binary sequence. Define x= 1, y= 1; // start embed with the
Step 2. Take the elements of Lk as the length of block. beginning or decide by himself
And cut the text into even blocks, Lk is Line1:
random integers between 0 and 5, then extract If x<j and y <j then // judge the embedding
the embedded key KE ={k I k E lk } .which is complete or not.
need to be attention is that KE is generated by If Length (vy>dx) then // select the position of
random function. character need to be embedded.
Embed message into the position Length (vy)-
Step 3. Translate every block into decimal digit, and
mx of word vy;
generate a decimal sequence, which will decide
the embedded position with the length of the x=x+ l; y=y+ 1;
words, Pre-process carrier text. Pre-processing is Else jy+1
adjust the colour, font size and character spacing
of the carrier without change its original vector goto linel;
content and format, then add some colour and Else fail to embed;
characters as disturbs. It mainly includes the Complete embedding.
following two steps.
www.ijorcs.org
4. 26 Sanjay Jadhav, Viddhulata Mohite
III. PROPOSED SYSTEM FLOW CHART dcipher.init(Cipher.DECRYPT_MODE, key);
}
Accept path of Doc file, Encryption key and catch (javax.crypto.NoSuchPaddingException e)
{
Secret Message
}
catch (java.security.NoSuchAlgorithmException e)
Encrypt the secret message and convert into {
binary } catch (java.security.InvalidKeyException e)
}
}
Randomly cut the binary into groups and
note the random number into Emk= public String encrypt(String str) {
{..}{Embedded key} try {
// Encode the string into bytes using utf-8
byte[] utf8 = str.getBytes(“UTF8”);
Convert the binary groups into decimal and // Encrypt
note the decimals into D= {…} byte[] enc = ecipher.doFinal(utf8);
// Encode bytes to base64 to get a string
return new
Read sequentially the accepted doc file and
find the length of the word as ni sun.misc.BASE64Encoder().encode(enc);
} catch (javax.crypto.BadPaddingException e)
{
Ni>Di } catch (IllegalBlockSizeException e) {
} catch (UnsupportedEncodingException e) {
}
Change the attribute of the (ni-di)th return null;
character }
public String decrypt(String str) {
Next word try {
// Decode base64 to get bytes byte[] dec = new
Result Doc sun.misc.BASE64Decoder().decodeBuffer(str);
// Decrypt
byte[] utf8 = dcipher.doFinal(dec);
IV. PROGRAM FOR PROPOSED SYSTEM // Decode using utf-8
return new String(utf8, “UTF8”);
package com.sss.stegnography.text.cryptography;
}
import java.io.UnsupportedEncodingException;
catch (javax.crypto.BadPaddingException e) {
import javax.crypto.Cipher;
}
import javax.crypto.IllegalBlockSizeException;
catch (IllegalBlockSizeException e) {
import javax.crypto.SecretKey;
}
public class DesEncrypter catch (UnsupportedEncodingException e) {
{ }
Cipher ecipher; catch (java.io.IOException e) {
Cipher dcipher; }
public DesEncrypter(SecretKey key) { return null;
try { }
ecipher = Cipher.getInstance(“DES”); }
dcipher = Cipher.getInstance(“DES”);
ecipher.init(Cipher.ENCRYPT_MODE, key);
www.ijorcs.org
5. A Data Hiding Techniques based on Length of English Text using DES and Attacks 27
V. RESULT
Figure 2: Original Document
Figure 3: Encrypted Document
www.ijorcs.org
6. 28 Sanjay Jadhav, Viddhulata Mohite
Figure 4: Screenshots – Hide Data
Figure 5: Screenshots – Extract Data
Encryption Key: keykeykey
VII. REFERENCES
Embedded Key: [1] Stefan Katzenbeisser,Fabien A P Petitcolas.
02010321200210113030212320112232231333311110 “Information hiding techniques for stegnography and
01101002300333212001010031301120031030120131 digital watermarking” Artech House Publishers, 2000.
23220233313032030331323001220122011002220200 [2] Peticolas F.A.P, Anderson R.J.Kuhn M.G.information
23212 Hiding –Asurvey,Proceedings of the IEEE, 1999, 87(7),
PP:1062-107.
Result message: - This is secret message [3] Cachin,C, “An information Theoretic model for
stegnography”, in proceeding of the second international
VI. CONCLUSION workshop on information hiding,vol.1525 of lecture
notes in computer science, Springer, 1998, pp.306-308.
In general, the security and the capacity of the
[4] Jeremiah J. Haarmsen, William A.Pearlman
information hidden system conflict with each other, in “Steganalysis of additive noise modelable information
order to solve the problem, we design and hiding” Electrical Computer and systems Engineering
implemented a hidden system based on the length of Department,Rensselar Polytechnic Institute, Troy,NY.
English text document and secret message encryption. [5] Neil F.Jhonson and Sushil Jajodia “Steganalysis: The
Combine randomness of the English words, DES, with investigation of hidden information” The 1998 IEEE
the ideological of blocks, which insure the security, Information Technology Conference. September 1st-
and the capacity are greatly improved at the same time. 3rd,1998.
The proposed system used for information hiding gives [6] Jonathan Watkins “Steganography-Message Hidden in
several advantages form a technical viewpoint: Bits” Multimedia Systems Coursework, Department of
flexibility and portability is very well, but robustness Electronics and computer Science, University of
and operational efficiency of the system are Southampton. 15th December 2001.
deficiency, which need to improve and perfect.
www.ijorcs.org
7. A Data Hiding Techniques based on Length of English Text using DES and Attacks 29
[7] Leonid Reyzin and Scott Russell “More efficient
provably Secure Stegnography” Department of computer
science Boston University, May 15,2003.
[8] P.Davern, M.Scott “Steganography: its history and its
application to computer based data files” Dublin City
University.
[9] Liu Cuilin,Shen Yongiun,Zhang Guidong,Di Changyan
“A Data Hiding System Based on Length of English
Text” 2010 first ACIS International Symposium on
Cryptography, and Network Security,Data Mining and
Knowledge Discovery, E-Commerce and Its
Applications, and Embedded Systems.
www.ijorcs.org