Filters








1,350 Hits in 2.7 sec

Boosting Authenticated Encryption Robustness with Minimal Modifications [chapter]

Tomer Ashur, Orr Dunkelman, Atul Luykx
2017 Lecture Notes in Computer Science  
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidentiality and authenticity in the symmetric-key setting have existed for well over a decade.  ...  We continue this line of work by looking more closely at GCM and ChaCha20+Poly1305 to see what robustness they already provide over algorithms such as OCB, and whether minor variants of the algorithms  ...  and confidentiality resilience, thereby formally showing that ChaCha20+Poly1305's choice to depart from both the Encrypt-then-MAC and GCM designs boosts robustness to nonce misuse.  ... 
doi:10.1007/978-3-319-63697-9_1 fatcat:qaix7jnghzhjdd3ljnwjkst7ze

Special issue on low complexity methods for multimedia security

Guorui Feng, Sheng Li, Haoliang Li, Shujun Li
2021 Multimedia Systems  
This scheme encrypts the original image using pixel encrypting, block and pixel scrambling.  ...  After rigorous review process, we accept ten submissions with an acceptance rate of 38.5%.  ...  The paper entitled "Audio steganography with less modification to the optimal matching CNV-QIM path with the minimal Hamming distance expected value to a Secret", co-authored by Xinhao Sun, Kaixi Wang  ... 
doi:10.1007/s00530-021-00809-2 fatcat:cei757cpubbvfnnzq7zebd4a2q

The State of the Authenticated Encryption

Damian Vizár
2016 Tatra Mountains Mathematical Publications  
The recent Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) has boosted the research activity in this area even more.  ...  We explore the current landscape of results on authenticated encryption.  ...  THE STATE OF THE AUTHENTICATED ENCRYPTION CAESAR competition The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) was officially announced in January 2013.  ... 
doi:10.1515/tmmp-2016-0038 fatcat:vnvjfj73yvff7ovjqagtwdpena

A Review of Image Watermarking Applications in Healthcare

G. Coatrieux, L. Lecornu, B. Sankur, Ch. Roux
2006 2006 International Conference of the IEEE Engineering in Medicine and Biology Society  
In this article, we focus on the complementary role of watermarking with respect to medical information security (integrity, authenticity ...) and management.  ...  This is a situation similar to encryption. Nevertheless, the advantage of reversible watermark over encryption is that at least the image becomes authenticated.  ...  INTRODUCTION DVENTS of multimedia combined with information and communication technology boost the potential of medical information handling and sharing with applications ranging from telediagnosis to  ... 
doi:10.1109/iembs.2006.259305 pmid:17947111 fatcat:zjots4ci6jfzpcbdak46wnqmwi

A Review of Image Watermarking Applications in Healthcare

G. Coatrieux, L. Lecornu, B. Sankur, Ch. Roux
2006 IEEE Engineering in Medicine and Biology Society. Conference Proceedings  
In this article, we focus on the complementary role of watermarking with respect to medical information security (integrity, authenticity ...) and management.  ...  This is a situation similar to encryption. Nevertheless, the advantage of reversible watermark over encryption is that at least the image becomes authenticated.  ...  INTRODUCTION DVENTS of multimedia combined with information and communication technology boost the potential of medical information handling and sharing with applications ranging from telediagnosis to  ... 
doi:10.1109/iembs.2006.4398500 fatcat:f7xhpvapgvgxnn4jmz5endeujq

Robust and Secured Digital Audio Watermarking using Improved DWT-SVD-DFT Approach

Krunalkumar N. Patel, Saurabh A. Shah, Dipti B. Shah
2018 International Journal of Engineering & Technology  
For Security, in our proposed work we are using synchronized secret key concept with DSSS encryption algorithm and two important powerful transformation methods used that are DWT (Discreet Wavelet Transformation  ...  Though there are many challenges to achieve this results, in this paper, our proposed audio watermarking technique is used to improve the robustness, imperceptibility of the embedded information with security  ...  By this data hiding becomes more robust and original audio as well as watermark image can be easily recovered with minimal effort and it is also imperceptible against various attacks and distortion.  ... 
doi:10.14419/ijet.v7i3.12.17771 fatcat:q46lye3vc5bmnn3d3fm7f6lkli

Security Implications of Cooperative Communications in Wireless Networks

Salik Makda, Ankur Choudhary, Naveen Raman, Thanasis Korakis, Zhifeng Tao, Shivendra Panwar
2008 2008 IEEE Sarnoff Symposium  
A typical example is a protocol called CoopMAC [1] , which illustrates how the legacy IEEE 802.11 [2] can be enhanced with minimal modifications to maximize the benefits of cooperative diversity.  ...  The 802.11i architecture contains the following components: 802.1X for authentication, Robust Secure Network(RSN) for keeping track of associations, and AES-based Counter Mode with Cipher Block Chaining  ... 
doi:10.1109/sarnof.2008.4520069 fatcat:ypwex4v2ejdpdfcf53upmnoyyu

Improved Online Security Framework for e-Banking Services in Nigeria: A Real World Perspective

O. Sarjiyus, N. D. Oye, B. Y. Baha
2019 Journal of Scientific Research and Reports  
This research, Improved Online Security Framework for e-banking services is geared towards developing an improved security framework that solves the issues of authentication, confidentiality, integrity  ...  Internet technology has given Banks the opportunity to provide customers robust, convenient and flexible banking services including, but not limited to fund transfers, account checking and payment of bills  ...  and boost their confidence.  ... 
doi:10.9734/jsrr/2019/v23i130113 fatcat:dyspys36hzecdpoxy7533owlti

Improving Robustness of Biometric Identity Determination with Digital Watermarking

Juha Partala, Angelos Fylakis, Anu Pramila, Anja Keskinarkaus, Tapio Seppänen
2016 Journal of Electrical and Computer Engineering  
In many applications, such as identity-based encryption, the identity needs to be known with virtually 100% certainty.  ...  Based on our experiments, our method is robust against JPEG compression, image filtering, and occlusion and enables a reliable determination of an identity without side information.  ...  We boost the performance of image independent biometrics, the determination of identity in any condition, with image dependent biometrics, features computed from a single image, combined with digital watermarking  ... 
doi:10.1155/2016/6390741 fatcat:oo7chma4dfgudaqjdwypw6b33u

Comparative Analysis of Impact of Cryptography Algorithms on Wireless Sensor Networks [article]

Bilwasiva Basu Mallick, Ashutosh Bhatia
2021 arXiv   pre-print
With so much threat of potential adversaries, it is essential to scale up the security level of WSN without affecting its primary goal of seamless data collection and communication with relay devices.  ...  Cryptography techniques are essential for a robust and stable security design of a system to mitigate the risk of external attacks and thus improve its efficiency.  ...  Tahir et. al. also proposed a lightweight authenticated encryption mechanism combined with hashing methods and based on Rabbit stream cipher for WSN application.  ... 
arXiv:2107.01810v1 fatcat:ziqggxqzlbdzbmhcumgtlnkxpe

A Review of Compressive Sensing in Information Security Field

Yushu Zhang, Leo Yu Zhang, Jiantao Zhou, Licheng Liu, Fei Chen, Xing He
2016 IEEE Access  
With respect to this application, the basic framework designs and the corresponding analyses are investigated.  ...  widespread applications, as its characteristics of dimensional reduction and random projection can be utilized and integrated into image cryptosystems, which can achieve simultaneous compression and encryption  ...  Liu et al. exploited lowrank and sparse representation for robust image hashing with tampering recovery capability and strong robustness against content preserving modifications [58] . 5) IMAGE AUTHENTICATION  ... 
doi:10.1109/access.2016.2569421 fatcat:pwi75keuyveajkt2hy2ghsbt2i

Privacy-Preserving Location Authentication in Wi-Fi Networks Using Fine-Grained Physical Layer Signatures

Wei Wang, Yingjie Chen, Qian Zhang
2016 IEEE Transactions on Wireless Communications  
The experimental results show that PriLA achieves the authentication accuracy of 93.2% on average, while leaking merely 45.7% information in comparison with the state-of-the-art approach.  ...  The crux of PriLA is to turn detrimental features in wireless systems, namely carrier frequency offset (CFO) and multipath, into useful signatures for privacy protection and authentication.  ...  Enhancing CFO Encryption Using Existing Schemes Algorithm 2 provides physical layer protection based on the Wi-Fi inherent baseband signal processing blocks with minimal overhead and computational cost  ... 
doi:10.1109/twc.2015.2487453 fatcat:g2szrbmxlzdv5kzifu4bv3rqxy

Steganography-based Password Management: A conceptual Model

2019 Zanco Journal of Pure and Applied Sciences  
To the best of our knowledge this would be the first attempt of using stego-image as a token for two-factor authentication in the literature, which needs no extra cost of hardware, easy to use and implement  ...  Then it goes to encryption process that encrypts the payload with user's master key.  ...  It starts embedding the secret message into the coverobject after encrypting or scrambling the secret message with the given key.  ... 
doi:10.21271/zjpas.31.s3.9 fatcat:2molyi4rzjenxkxmh4g6vd5zde

D3.2 - Annual Releases of the TheFSM Data Platform

Danai Vergeti, Dimitris Ntalaperas, Iosif Angelidis
2021 Zenodo  
combined with the authentication service provided by PROSPEH.  ...  . • U encrypts the dataset DU with KU. The result is EDU. • U encrypts KU with PKP. The result is EKP. • U sends EDU and EKP to P. • P receives both. • P uses the private key SKP to decrypt EKP.  ... 
doi:10.5281/zenodo.4593668 fatcat:vesfhc4h4ne7lnagtheotaswka

Design and Security Simulation of Wi-Fi Networks

Shaldon Leparan Suntu, Obadia Kyetuza Bishoge
2017 International Journal of Computer Networks And Applications  
In this study simulation results of 802.1X with flexible authentication via secure tunnelling was performed.  ...  Opportunistic key caching which is preferred by many vendors was used transit the session information from the posterior access point to the prior access point to minimize the hand-off latency to allow  ...  Virtual private networks (VPN) and IEEE 802.1X/EAP are widely deployed in enterprise's WLAN to boost authentication and access control salient [8] - [10] when configured with authentication, authorization  ... 
doi:10.22247/ijcna/2017/49249 fatcat:dye2ccih3ne3xe7wa5loba5nvm
« Previous Showing results 1 — 15 out of 1,350 results