Explore chapters and articles related to this topic
Cryptography and Steganography Techniques
Published in Rohit Tanwar, Tanupriya Choudhury, Mazdak Zamani, Sunil Gupta, Information Security and Optimization, 2020
Further research highlights the approach in which a multilevel secret data hiding technique is used. This method uses two kinds of encryption techniques that include visual steganography and cryptography. In the first phase, the half-toning method is used which reduces the pixels and simplifies the process. In the next step, visual cryptography is applied to generate shares and offer the first level of security. Then the steganography LSB technique is applied to hide the shares in various modes of media like images, audio and videos (Patil and Goud, 2016). One of the research articles presented a method that claims to be stronger and more difficult to decode the confidential information. It uses both encryption and steganography techniques to make safe and secure communication. For encryption, the AES encoding technique of 128-bit key size is used to encrypt the information in UTF-8 format and further transform it into a base-64 format and make it appropriate for further processing. The further coded message is again twisted to attain the extreme level of security. Then, finally, the twisted coded messages are inserted in an appropriate cover image. This image is then transmitted securely over a network and carries confidential information. Hence, security is exhibited at four levels and, as a result, a confidential message is sent over an insecure channel (Karthikeyan et al., 2016).
Wireless Sensor Networks (WSNs)
Published in Chanchal Dey, Sunit Kumar Sen, Industrial Automation Technologies, 2020
Cryptography ensures a secure communication between a transmitter and a receiver. In this, an ordinary or plain text is converted into cipher text (this process is called encryption) at the transmitter and decryption at the receiver. Data encryption requires an algorithm and a key. While the algorithm may not be secret, total secrecy is maintained about the key used for encryption. The number of bits comprising a key is considerable and it is just impossible to get the composition of the key. Two types of cryptography are employed: symmetric and asymmetric. In a symmetric cryptosystem, the same key is used for encryption and decryption, while separate keys are used in asymmetric cryptosystem. Cryptography ensures data integrity, confidentiality, and device and message authentication. The security strength of any cryptosystem depends on the key used and not on the algorithm.
Analysis of Various Color Models for Endoscopic Images
Published in J. Dinesh Peter, Steven Lawrence Fernandes, Carlos Eduardo Thomaz, Advances in Computerized Analysis in Clinical and Medical Imaging, 2019
Caren Babu, Anand Paul, D. Abraham Chandy
Another prominent application of endoscopic image in literature is abnormality detection. The automatic detection of abnormalities using endoscopic image is a growing field of interest for biomedical researchers. The texture-based image segmentation and pathology detection using the YIQ color model show superior results in ref. [12]. The YIQ is also used for the detection of GI adenomas in video endoscopy by applying a color transformation in the video frame which improves the texture discrimination [13]. In ref. [12], YUV is used along with YIQ for abnormality detection whereas in ref. [14] HSI color space is used by performing segmentation on endoscopic images. There are mainly two advantages for HSI color space. Firstly, HSI is suitable for specifying color in a more suitable way for human perception. Secondly, this model can control the intensity and chromatic components more easily and independently. It should be noted that HSI and HSV color space shows superior results for endoscopic image classification system mainly due to its relevance in perception [15]. Another color model CIE Lab is used for segmentation of clinical endoscopic images into integral parts to record a sequence of only interesting parts [16]. The application of color models for endoscopic images extends to image steganography to maintain secure communication of medical data. In ref. [17], HSV color space is suggested to give better performance than RGB, YCbCr, and HSI models and is successful in the secure transmission of key frames during WCE. Thus, the scope of color conversion is immense in endoscopic images and detail study of which helps in arriving at the appropriate one for a particular application.
A genetic algorithm based image steganography scheme with high embedding capacity and low distortion
Published in The Imaging Science Journal, 2021
In this fast-growing world, we are achieving a milestone every next day in computational capabilities. With the advent of internet technology, secure communication is a primary requirement that is provided by conventional encryption techniques. With a limited set of possibilities in conventional techniques, covert communications were applauded. Further, these tasks were incorporated using two different approaches: Spatial domain techniques and Frequency domain techniques. In spatial domain-based steganography techniques, the objective is to hide maximum payload with lesser distortion. It started with a simple LSB substitution method [4]. In this paper, the secret information is embedded in lesser significant bit planes by just replacing the bits. Further, in the same paper, an optimal pixel adjustment process was introduced, which could reduce the distortion remarkably. The embedding was done in simple raster scan order only (Figure 1). Later, Lin and Tsai [15] proposed a similar method for data embedding in which each pixel was embedded in a block of size . They used a parity bit to detect the correctness during transmission. The distortion associated is still comparable to simple LSB substitution methods. Later the Yang et al. [16] proposed an improvement that is capable of reducing the distortion. Another remarkable effort has been made by Chang et al. in 2008 [17]. They proposed a method with authentication capabilities. Authentication has become one of the primary requirements because embedding patterns are still the same. Later in 2011, Wu et al. [18] proposed an Adaptive Authentication based scheme which outperformed the previous methods.
Policy-based security for distributed manufacturing execution systems
Published in International Journal of Computer Integrated Manufacturing, 2018
Octavian Morariu, Cristina Morariu, Theodor Borangiu
The SSL protocol, first introduced by Netscape, was used initially to ensure secure communication between web servers and browsers communicating over HTTP(s). However, the protocol itself is at socket layer, so the applications are not limited to HTTP. The mechanism proposed in the paper uses a PKI, consisting in a CA that generates public–private key pairs to identify the server, the client or both. The SSL handshake, in case of mutual authentication, consists in the following main steps:
Cloud manufacturing architecture for part quality assessment
Published in Cogent Engineering, 2020
Alessandra Caggiano, Tiziana Segreto, Roberto Teti
Afterwards, the obtained pre-processed point cloud is transmitted by Hypertext Transfer Protocol Secure (HTTPS) data communication protocol to the cloud layer for advanced processing aimed at the construction of the STL file. HTTPS encrypted using Transport Layer Security (TLS) allows for secure communication through authentication, protection of the privacy and integrity of the exchanged data in transit.