Search results

1 – 10 of 406
Open Access
Article
Publication date: 14 August 2020

F.J. Farsana, V.R. Devi and K. Gopakumar

This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream…

1787

Abstract

This paper introduces an audio encryption algorithm based on permutation of audio samples using discrete modified Henon map followed by substitution operation with keystream generated from the modified Lorenz-Hyperchaotic system. In this work, the audio file is initially compressed by Fast Walsh Hadamard Transform (FWHT) for removing the residual intelligibility in the transform domain. The resulting file is then encrypted in two phases. In the first phase permutation operation is carried out using modified discrete Henon map to weaken the correlation between adjacent samples. In the second phase it utilizes modified-Lorenz hyperchaotic system for substitution operation to fill the silent periods within the speech conversation. Dynamic keystream generation mechanism is also introduced to enhance the correlation between plaintext and encrypted text. Various quality metrics analysis such as correlation, signal to noise ratio (SNR), differential attacks, spectral entropy, histogram analysis, keyspace and key sensitivity are carried out to evaluate the quality of the proposed algorithm. The simulation results and numerical analyses demonstrate that the proposed algorithm has excellent security performance and robust against various cryptographic attacks.

Details

Applied Computing and Informatics, vol. 19 no. 3/4
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 20 April 2023

Vamsi Desam and Pradeep Reddy CH

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and…

Abstract

Purpose

Several chaotic system-based encryption techniques have been presented in recent years to protect digital images using cryptography. The challenges of key distribution and administration make symmetric encryption difficult. The purpose of this paper is to address these concerns, the novel hybrid partial differential elliptical Rubik’s cube algorithm is developed in this study as an asymmetric image encryption approach. This novel algorithm generates a random weighted matrix, and uses the masking method on image pixels with Rubik’s cube principle. Security analysis has been conducted, it enhances and increases the reliability of the proposed algorithm against a variety of attacks including statistical and differential attacks.

Design/methodology/approach

In this light, a differential elliptical model is designed with two phases for image encryption and decryption. A modified image is achieved by rotating and mixing intensities of rows and columns with a masking matrix derived from the key generation technique using a unique approach based on the elliptic curve and Rubik’s cube principle.

Findings

To evaluate the security level, the proposed algorithm is tested with statistical and differential attacks on a different set of test images with peak signal-to-noise ratio, unified average changed intensity and number of pixel change rate performance metrics. These results proved that the proposed image encryption method is completely reliable and enhances image security during transmission.

Originality/value

The elliptic curve–based encryption is hard to break by hackers and adding a Rubik’s cube principle makes it even more complex and nearly impossible to decode. The proposed method provides reduced key size.

Details

Journal of Engineering, Design and Technology , vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1726-0531

Keywords

Article
Publication date: 14 August 2017

Krista White and Caryn Radick

This paper aims to explore two separate legacy oral history digitization projects at one institution and how the project teams approached the different issues and challenges these…

1357

Abstract

Purpose

This paper aims to explore two separate legacy oral history digitization projects at one institution and how the project teams approached the different issues and challenges these projects presented.

Design/methodology/approach

The approach compares two case studies of how digitization of legacy oral history collections was carried out. The paper discusses these projects utilizing a lifecycle model approach and reveals how archival and digital humanities perspectives drove some of the projects’ differences.

Findings

The authors find that when working with digitizing legacy oral history collections, each collection will require different approaches and methods of problem solving. In large institutions with multiple repositories, it can be useful for project teams to consult each other to develop best practices.

Practical implications

The two case studies presented in this paper can serve as models for other institutions digitizing many oral history collections and serve as a model for communication and collaboration in larger institutions with multiple repositories.

Originality/value

This paper compares and contrasts two case studies of digitization projects involving legacy oral history collections in different units of one large institution. Project teams were influenced by different approaches. One project was conducted by archivists and the other led by a digital humanities librarian. Differing professional foci provided different perspectives about collection characteristics and, subsequently, led to different approaches that impacted implementation of the projects.

Details

Digital Library Perspectives, vol. 33 no. 3
Type: Research Article
ISSN: 2059-5816

Keywords

Article
Publication date: 15 February 2022

Neeraj Bisht, Bishwajeet Pandey and Sandeep Kumar Budhani

Privacy and security of personal data is the prime concern in any communication. Security algorithms play a crucial role in privacy preserving and are used extensively. Therefore…

Abstract

Purpose

Privacy and security of personal data is the prime concern in any communication. Security algorithms play a crucial role in privacy preserving and are used extensively. Therefore, these algorithms need to be effective as well as energy-efficient. Advanced Encryption Standards (AES) is one of the efficient security algorithms. The principal purpose of this research is to design Energy efficient implementation of AES, as it is one of the important aspects for a step toward green computing.

Design/methodology/approach

This paper presents a low voltage complementary metal oxide semiconductor (LVCMOS) based energy efficient architecture for AES encryption algorithm on Field Programmable Gate Array (FPGA) platform. The experiments are performed for five different FPGAs at different input/output standards of LVCMOS. Experiments are performed separately at two frequencies (default and 1.6 GHz).

Findings

The comparative study of total on-chip power consumption for different frequency suggested that LVCMOS12 performed best for all the FPGAs. Also, Kintex-7 Low Voltage was found to be the best performing FPGA. At 1.6 GHz frequency, the authors observed 55% less on-chip power consumption when switched from Artix-7 with LVCMOS33 (maximum power consuming combination) to Kintex-7 Low Voltage with LVCMOS12. Mathematical models are developed for the proposed design.

Originality/value

The green implementation of AES algorithm based on LVCMOS standards has not been explored yet by researchers. The energy efficient implementation of AES will certainly be beneficial for society as it will consume less power and dissipate lesser heat to environment.

Details

World Journal of Engineering, vol. 20 no. 4
Type: Research Article
ISSN: 1708-5284

Keywords

Content available

Abstract

Details

Microelectronics International, vol. 27 no. 2
Type: Research Article
ISSN: 1356-5362

Article
Publication date: 8 April 2022

Jai Gopal Pandey, Sanskriti Gupta and Abhijit Karmakar

The paper aims to develop a systematic approach to design, integrate, and implement a set of crypto cores in a system-on-chip SoC) environment for data security applications. The…

Abstract

Purpose

The paper aims to develop a systematic approach to design, integrate, and implement a set of crypto cores in a system-on-chip SoC) environment for data security applications. The advanced encryption standard (AES) and PRESENT block ciphers are deployed together, leading to a common crypto chip for performing encryption and decryption operations.

Design/methodology/approach

An integrated very large-scale integration (VLSI) architecture and its implementation for the AES and PRESENT ciphers is proposed. As per the choice, the architecture performs encryption or decryption operations for the selected cipher. Experimental results of the field-programmable gate array (FPGA) and application-specific integrated circuit (ASIC) implementations and related design analysis are provided.

Findings

FPGA implementation of the architecture on Xilinx xc5vfx70t-1-ff1136 device consumes 19% slices, whereas the ASIC design is implemented in 180 nm complementary metal-oxide semiconductor ASIC technology that takes 1.0746 mm2 of standard cell area and consumes 14.26 mW of power at 50 MHz clock frequency. A secure audio application using the designed architecture on an open source SoC environment is also provided. A test methodology for validation of the designed chip using an FPGA-based platform and tools is discussed.

Originality/value

The proposed architecture is compared with a set of existing hardware architectures for analyzing various design metrics such as latency, area, maximum operating frequency, power, and throughput.

Details

Microelectronics International, vol. 39 no. 2
Type: Research Article
ISSN: 1356-5362

Keywords

Article
Publication date: 16 March 2015

Danijela Tesendic and Danijela Boberic Krsticev

The purpose of this paper is to describe a case study of developing a web service that will act as an intermediary between the Audio Library system for the visually impaired and…

6225

Abstract

Purpose

The purpose of this paper is to describe a case study of developing a web service that will act as an intermediary between the Audio Library system for the visually impaired and the library management systems. The Audio Library is based on speech recognition and text-to-speech engines and it produces synthesized speech from various electronic materials. It has its own database with a limited number of books and textual materials. Web services described in this paper should enable access to a larger number of electronic resources provided by libraries.

Design/methodology/approach

In this paper, the author specified software architecture of a web service analyzing different approaches for search and retrieval.

Findings

Web service described in this paper is the first software solution addressing the problem of lending e-books in Serbia. It aggregates collections of different libraries in a single access point for the Audio Library system. In this way, users of the Audio Library system are provided with larger number of electronic resources.

Originality/value

Communication between the Audio Library and this web service is achieved by using standardized protocols for exchanging library data. However, those protocols did not fulfill all necessary requirements, so the authors propose some extensions to overcome those issues.

Details

Aslib Journal of Information Management, vol. 67 no. 2
Type: Research Article
ISSN: 2050-3806

Keywords

Article
Publication date: 14 December 2021

Rhea Gupta, Sara Dharadhar and Prathamesh Churi

Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and…

Abstract

Purpose

Cloud computing is becoming increasingly popular as it facilitates convenient, ubiquitous, on-demand network access to a shared pool of configurable computing resources and applications that can be quickly retrieved and released. Despite its numerous merits, it faces setbacks in data security and privacy. Data encryption is one of the most popular solutions for data security in the cloud. Various encryption algorithms have been implemented to address security concerns. These algorithms have been reviewed along with the Jumbling Salting algorithm and its applications. The framework for using Jumbling Salting to encrypt text files in the cloud environment (CloudJS) has been thoroughly studied and improvised. The purpose of this paper is to implement the CloudJS algorithm, to discuss its performance and compare the obtained results with existing cloud encryption schemes.

Design/methodology/approach

The paper uses six research questions to analyze the performance of CloudJS algorithm in the cloud environment. The research questions are about measuring encryption time and throughput, decryption time and throughput, the ratio of cipher to the plain text of CloudJS algorithm with respect to other Cloud algorithms like AES and DES. For this purpose, the algorithm has been implemented using dockers-containers in the Linux environment.

Findings

It was found that CloudJS performs well in terms of encryption time, decryption time and throughput. It is marginally better than AES and undoubtedly better than DES in these parameters. The performance of the algorithm is not affected by a number of CPU cores, RAM size and Line size of text files. It performs decently well in all scenarios and all resultant values fall in the desired range.

Research limitations/implications

CloudJS can be tested with cloud simulation platforms (CloudSim) and cloud service providers (AWS, Google Cloud). It can also be tested with other file types. In the future, CloudJS algorithm can also be implemented in images and other files.

Originality/value

To the best of the knowledge, this is the first attempt to implement and analysis of a custom encryption algorithm (CloudJS) in the cloud environment using dockers-containers.

Details

World Journal of Engineering, vol. 20 no. 3
Type: Research Article
ISSN: 1708-5284

Keywords

Article
Publication date: 1 September 1996

Siriginidi Subba Rao

Highlights the need for standards for the CD‐ROM industry to ensure compatibility and to increase the economies of scale to attract wider market accessibility. CD‐ROM, as a unique…

358

Abstract

Highlights the need for standards for the CD‐ROM industry to ensure compatibility and to increase the economies of scale to attract wider market accessibility. CD‐ROM, as a unique publishing medium, has standards mainly at three levels: the physical level, concerning the physical and recording characteristics of the medium; the logical level, concerning the nature of files, directories, volume descriptors, etc.; and the application level, concerning retrieval software, graphics, compression, encryption, etc. Concludes that CD‐ROM technology brings database services within the reach of information centres, especially in developing countries. Positive trends towards standardization in this technology possibly help to reduce the technical hurdles.

Details

Library Review, vol. 45 no. 6
Type: Research Article
ISSN: 0024-2535

Keywords

Book part
Publication date: 25 November 2013

This chapter explores the different ways we share our research. The ways in which we are productive, again, help shape the tools in which productivity occurs. Archiving, storing…

Abstract

This chapter explores the different ways we share our research. The ways in which we are productive, again, help shape the tools in which productivity occurs. Archiving, storing, and sharing are crucial within the field of digital humanities and offer interesting perspectives on how we as humans share information with one another. The focus in this chapter is also on specific tools like timelines, e-portfolios, and the new generation of presentation applications.

Details

Digital Humanities: Current Perspective, Practices, and Research
Type: Book
ISBN: 978-1-78190-689-7

1 – 10 of 406