Search results
1 – 10 of 406F.J. Farsana, V.R. Devi and K. Gopakumar
This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream…
Abstract
This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream generated from the modified Lorenz-Hyperchaotic system. In this work, the audio file is initially compressed by Fast Walsh Hadamard Transform (FWHT) for removing the residual intelligibility in the transform domain. The resulting file is then encrypted in two phases. In the first phase permutation operation is carried out using modified discrete Henon map to weaken the correlation between adjacent samples. In the second phase it utilizes modified-Lorenz hyperchaotic system for substitution operation to fill the silent periods within the speech conversation. Dynamic keystream generation mechanism is also introduced to enhance the correlation between plaintext and encrypted text. Various quality metrics analysis such as correlation, signal to noise ratio (SNR), differential attacks, spectral entropy, histogram analysis, keyspace and key sensitivity are carried out to evaluate the quality of the proposed algorithm. The simulation results and numerical analyses demonstrate that the proposed algorithm has excellent security performance and robust against various cryptographic attacks.
Details
Keywords
Vamsi Desam and Pradeep Reddy CH
Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and…
Abstract
Purpose
Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and administration make symmetric encryption difficult. The purpose of this paper is to address these concerns, the novel hybrid partial differential elliptical Rubik’s cube algorithm is developed in this study as an asymmetric image encryption approach. This novel algorithm generates a random weighted matrix, and uses the masking method on image pixels with Rubik’s cube principle. Security analysis has been conducted, it enhances and increases the reliability of the proposed algorithm against a variety of attacks including statistical and differential attacks.
Design/methodology/approach
In this light, a differential elliptical model is designed with two phases for image encryption and decryption. A modified image is achieved by rotating and mixing intensities of rows and columns with a masking matrix derived from the key generation technique using a unique approach based on the elliptic curve and Rubik’s cube principle.
Findings
To evaluate the security level, the proposed algorithm is tested with statistical and differential attacks on a different set of test images with peak signal-to-noise ratio, unified average changed intensity and number of pixel change rate performance metrics. These results proved that the proposed image encryption method is completely reliable and enhances image security during transmission.
Originality/value
The elliptic curve–based encryption is hard to break by hackers and adding a Rubik’s cube principle makes it even more complex and nearly impossible to decode. The proposed method provides reduced key size.
Details
Keywords
This paper aims to explore two separate legacy oral history digitization projects at one institution and how the project teams approached the different issues and challenges these…
Abstract
Purpose
This paper aims to explore two separate legacy oral history digitization projects at one institution and how the project teams approached the different issues and challenges these projects presented.
Design/methodology/approach
The approach compares two case studies of how digitization of legacy oral history collections was carried out. The paper discusses these projects utilizing a lifecycle model approach and reveals how archival and digital humanities perspectives drove some of the projects’ differences.
Findings
The authors find that when working with digitizing legacy oral history collections, each collection will require different approaches and methods of problem solving. In large institutions with multiple repositories, it can be useful for project teams to consult each other to develop best practices.
Practical implications
The two case studies presented in this paper can serve as models for other institutions digitizing many oral history collections and serve as a model for communication and collaboration in larger institutions with multiple repositories.
Originality/value
This paper compares and contrasts two case studies of digitization projects involving legacy oral history collections in different units of one large institution. Project teams were influenced by different approaches. One project was conducted by archivists and the other led by a digital humanities librarian. Differing professional foci provided different perspectives about collection characteristics and, subsequently, led to different approaches that impacted implementation of the projects.
Details
Keywords
Neeraj Bisht, Bishwajeet Pandey and Sandeep Kumar Budhani
Privacy and security of personal data is the prime concern in any communication. Security algorithms play a crucial role in privacy preserving and are used extensively. Therefore…
Abstract
Purpose
Privacy and security of personal data is the prime concern in any communication. Security algorithms play a crucial role in privacy preserving and are used extensively. Therefore, these algorithms need to be effective as well as energy-efficient. Advanced Encryption Standards (AES) is one of the efficient security algorithms. The principal purpose of this research is to design Energy efficient implementation of AES, as it is one of the important aspects for a step toward green computing.
Design/methodology/approach
This paper presents a low voltage complementary metal oxide semiconductor (LVCMOS) based energy efficient architecture for AES encryption algorithm on Field Programmable Gate Array (FPGA) platform. The experiments are performed for five different FPGAs at different input/output standards of LVCMOS. Experiments are performed separately at two frequencies (default and 1.6 GHz).
Findings
The comparative study of total on-chip power consumption for different frequency suggested that LVCMOS12 performed best for all the FPGAs. Also, Kintex-7 Low Voltage was found to be the best performing FPGA. At 1.6 GHz frequency, the authors observed 55% less on-chip power consumption when switched from Artix-7 with LVCMOS33 (maximum power consuming combination) to Kintex-7 Low Voltage with LVCMOS12. Mathematical models are developed for the proposed design.
Originality/value
The green implementation of AES algorithm based on LVCMOS standards has not been explored yet by researchers. The energy efficient implementation of AES will certainly be beneficial for society as it will consume less power and dissipate lesser heat to environment.
Details
Keywords
Jai Gopal Pandey, Sanskriti Gupta and Abhijit Karmakar
The paper aims to develop a systematic approach to design, integrate, and implement a set of crypto cores in a system-on-chip SoC) environment for data security applications. The…
Abstract
Purpose
The paper aims to develop a systematic approach to design, integrate, and implement a set of crypto cores in a system-on-chip SoC) environment for data security applications. The advanced encryption standard (AES) and PRESENT block ciphers are deployed together, leading to a common crypto chip for performing encryption and decryption operations.
Design/methodology/approach
An integrated very large-scale integration (VLSI) architecture and its implementation for the AES and PRESENT ciphers is proposed. As per the choice, the architecture performs encryption or decryption operations for the selected cipher. Experimental results of the field-programmable gate array (FPGA) and application-specific integrated circuit (ASIC) implementations and related design analysis are provided.
Findings
FPGA implementation of the architecture on Xilinx xc5vfx70t-1-ff1136 device consumes 19% slices, whereas the ASIC design is implemented in 180 nm complementary metal-oxide semiconductor ASIC technology that takes 1.0746 mm2 of standard cell area and consumes 14.26 mW of power at 50 MHz clock frequency. A secure audio application using the designed architecture on an open source SoC environment is also provided. A test methodology for validation of the designed chip using an FPGA-based platform and tools is discussed.
Originality/value
The proposed architecture is compared with a set of existing hardware architectures for analyzing various design metrics such as latency, area, maximum operating frequency, power, and throughput.
Details
Keywords
Danijela Tesendic and Danijela Boberic Krsticev
The purpose of this paper is to describe a case study of developing a web service that will act as an intermediary between the Audio Library system for the visually impaired and…
Abstract
Purpose
The purpose of this paper is to describe a case study of developing a web service that will act as an intermediary between the Audio Library system for the visually impaired and the library management systems. The Audio Library is based on speech recognition and text-to-speech engines and it produces synthesized speech from various electronic materials. It has its own database with a limited number of books and textual materials. Web services described in this paper should enable access to a larger number of electronic resources provided by libraries.
Design/methodology/approach
In this paper, the author specified software architecture of a web service analyzing different approaches for search and retrieval.
Findings
Web service described in this paper is the first software solution addressing the problem of lending e-books in Serbia. It aggregates collections of different libraries in a single access point for the Audio Library system. In this way, users of the Audio Library system are provided with larger number of electronic resources.
Originality/value
Communication between the Audio Library and this web service is achieved by using standardized protocols for exchanging library data. However, those protocols did not fulfill all necessary requirements, so the authors propose some extensions to overcome those issues.
Details
Keywords
Rhea Gupta, Sara Dharadhar and Prathamesh Churi
Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and…
Abstract
Purpose
Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and applications that can be quickly retrieved and released. Despite its numerous merits, it faces setbacks in data security and privacy. Data encryption is one of the most popular solutions for data security in the cloud. Various encryption algorithms have been implemented to address security concerns. These algorithms have been reviewed along with the Jumbling Salting algorithm and its applications. The framework for using Jumbling Salting to encrypt text files in the cloud environment (CloudJS) has been thoroughly studied and improvised. The purpose of this paper is to implement the CloudJS algorithm, to discuss its performance and compare the obtained results with existing cloud encryption schemes.
Design/methodology/approach
The paper uses six research questions to analyze the performance of CloudJS algorithm in the cloud environment. The research questions are about measuring encryption time and throughput, decryption time and throughput, the ratio of cipher to the plain text of CloudJS algorithm with respect to other Cloud algorithms like AES and DES. For this purpose, the algorithm has been implemented using dockers-containers in the Linux environment.
Findings
It was found that CloudJS performs well in terms of encryption time, decryption time and throughput. It is marginally better than AES and undoubtedly better than DES in these parameters. The performance of the algorithm is not affected by a number of CPU cores, RAM size and Line size of text files. It performs decently well in all scenarios and all resultant values fall in the desired range.
Research limitations/implications
CloudJS can be tested with cloud simulation platforms (CloudSim) and cloud service providers (AWS, Google Cloud). It can also be tested with other file types. In the future, CloudJS algorithm can also be implemented in images and other files.
Originality/value
To the best of the knowledge, this is the first attempt to implement and analysis of a custom encryption algorithm (CloudJS) in the cloud environment using dockers-containers.
Details
Keywords
Highlights the need for standards for the CD‐ROM industry to ensure compatibility and to increase the economies of scale to attract wider market accessibility. CD‐ROM, as a unique…
Abstract
Highlights the need for standards for the CD‐ROM industry to ensure compatibility and to increase the economies of scale to attract wider market accessibility. CD‐ROM, as a unique publishing medium, has standards mainly at three levels: the physical level, concerning the physical and recording characteristics of the medium; the logical level, concerning the nature of files, directories, volume descriptors, etc.; and the application level, concerning retrieval software, graphics, compression, encryption, etc. Concludes that CD‐ROM technology brings database services within the reach of information centres, especially in developing countries. Positive trends towards standardization in this technology possibly help to reduce the technical hurdles.
Details
Keywords
This chapter explores the different ways we share our research. The ways in which we are productive, again, help shape the tools in which productivity occurs. Archiving, storing…
Abstract
This chapter explores the different ways we share our research. The ways in which we are productive, again, help shape the tools in which productivity occurs. Archiving, storing, and sharing are crucial within the field of digital humanities and offer interesting perspectives on how we as humans share information with one another. The focus in this chapter is also on specific tools like timelines, e-portfolios, and the new generation of presentation applications.