scholarly journals A Novel Fuzzy Encryption Technique Based on Multiple Right Translated AES Gray S-Boxes and Phase Embedding

2017 ◽  
Vol 2017 ◽  
pp. 1-9 ◽  
Author(s):  
Naveed Ahmed Azam

This paper presents a novel image encryption technique based on multiple right translated AES Gray S-boxes (RTSs) and phase embedding technique. First of all, a secret image is diffused with a fuzzily selected RTS. The fuzzy selection of RTS is variable and depends upon pixels of the secret image. Then two random masks are used to enhance confusion in the spatial and frequency domains of the diffused secret image. These random masks are generated by applying two different RTSs on a host image. The decryption process of the proposed cryptosystem needs the host image for generation of masks. It is therefore, necessary, to secure the host image from unauthorized users. This task is achieved by diffusing the host image with another RTS and embedding the diffused secret image into the phase terms of the diffused host image. The cryptographic strength of the proposed security system is measured by implementing it on several images and applying rigorous analyses. Performance comparison of the proposed security technique with some of the state-of-the-art security systems, including S-box cryptosystem and steganocryptosystems, is also performed. Results and comparison show that the newly developed cryptosystem is more secure.

Author(s):  
إبراهيم محمد زين

الملخّص يهدف هذا البحث لبيان أن السبيل الناجح لمواجهة الإرهاب الدولي المعاصر الملتبس بدعاوي الجهاد الإسلامي وإحياء دولة الخلافة الإسلامية هو التركز على معاني الأمن الفكري والروحي في الإسلام وهذا الاتجاه في المباحثة يُعيد النظر في طرائق قضايا الجهاد ويميز بين ما هو عقائدي ومرتبط بنظام الإسلام الكلي وبين ما هو من مجال حروب الفتنة والصعلكة.  الكلمات المفتاحيّة: الجهاد، حروب الصعلكة، حروب الفتنة، الأمن الروحي والفكري.              Abstract This study focuses on the most effective way of combating global terrorism that utilizes the banner of Jihad and restoration of the Khilafa system of governance. It should be emphasized that there is a dire need for a new line of investigation concerning the issue of Jihad that pays more attention to both spiritual and intellectual security systems in Islam. This requires a distinction to be made between what is universalistic in the Islamic system and what is particular. In this regard one has to differentiate between acts of just war and those of economic or sedition wars. Keywords: Jihad, economic war, sedition war, spiritual-intellectual security system.


2021 ◽  
pp. 026553222110361
Author(s):  
Chao Han

Over the past decade, testing and assessing spoken-language interpreting has garnered an increasing amount of attention from stakeholders in interpreter education, professional certification, and interpreting research. This is because in these fields assessment results provide a critical evidential basis for high-stakes decisions, such as the selection of prospective students, the certification of interpreters, and the confirmation/refutation of research hypotheses. However, few reviews exist providing a comprehensive mapping of relevant practice and research. The present article therefore aims to offer a state-of-the-art review, summarizing the existing literature and discovering potential lacunae. In particular, the article first provides an overview of interpreting ability/competence and relevant research, followed by main testing and assessment practice (e.g., assessment tasks, assessment criteria, scoring methods, specificities of scoring operationalization), with a focus on operational diversity and psychometric properties. Second, the review describes a limited yet steadily growing body of empirical research that examines rater-mediated interpreting assessment, and casts light on automatic assessment as an emerging research topic. Third, the review discusses epistemological, psychometric, and practical challenges facing interpreting testers. Finally, it identifies future directions that could address the challenges arising from fast-changing pedagogical, educational, and professional landscapes.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Saba Moeinizade ◽  
Ye Han ◽  
Hieu Pham ◽  
Guiping Hu ◽  
Lizhi Wang

AbstractMultiple trait introgression is the process by which multiple desirable traits are converted from a donor to a recipient cultivar through backcrossing and selfing. The goal of this procedure is to recover all the attributes of the recipient cultivar, with the addition of the specified desirable traits. A crucial step in this process is the selection of parents to form new crosses. In this study, we propose a new selection approach that estimates the genetic distribution of the progeny of backcrosses after multiple generations using information of recombination events. Our objective is to select the most promising individuals for further backcrossing or selfing. To demonstrate the effectiveness of the proposed method, a case study has been conducted using maize data where our method is compared with state-of-the-art approaches. Simulation results suggest that the proposed method, look-ahead Monte Carlo, achieves higher probability of success than existing approaches. Our proposed selection method can assist breeders to efficiently design trait introgression projects.


2021 ◽  
Vol 2 (2) ◽  
pp. 105-115
Author(s):  
Mahmod Al-Bkree

This work is to optimize perimeter surveillance and explore the distribution of ground bases for unmanned aerial vehicles along the Jordanian border and optimize the set of technologies for each aerial vehicle. This model is part of ongoing research on perimeter security systems based on unmanned aerial vehicles. The suggested models give an initial insight about selecting technologies carried by unmanned aerial vehicles based on their priority; it runs for a small scale system that can be expanded, the initial results show the need for at least four ground bases along the length of the border, and a selected set of various technologies for each vehicle.


Author(s):  
Willi Sauerbrei ◽  
◽  
Aris Perperoglou ◽  
Matthias Schmid ◽  
Michal Abrahamowicz ◽  
...  

2012 ◽  
Vol 2012 ◽  
pp. 1-9 ◽  
Author(s):  
Ching-Yu Yang

This paper proposes a novel form of reversible data hiding using two marked images by employing the adaptive coefficient-shifting (ACS) algorithm. The proposed ACS algorithm consists of three parts: the minimum-preserved scheme, the minimum-preserved with squeezing scheme, and the base-value embedding scheme. More specifically, each input block of a host image can be encoded to two stego-blocks according to three predetermined rules by the above three schemes. Simulations validate that the proposed method not only completely recovers the host medium but also losslessly extracts the hidden message. The proposed method can handle various kinds of images without any occurrence of overflow/underflow. Moreover, the payload and peak signal-to-noise ratio (PSNR) performance of the proposed method is superior to that of the conventional invertible data hiding schemes. Furthermore, the number of shadows required by the proposed method is less than that required by the approaches which are based upon secret image sharing with reversible steganography.


2019 ◽  
Vol 4 (2) ◽  
pp. 112-120
Author(s):  
Hadjira BELAIDI ◽  
Nour-El-Houda MEDDAH

This work deals with lock and home security systems. First, Motion sensors detect movement indoors and outdoors to guard against intruders, protect valuables and more. Thus, if any movement, RFID reader will be activated and database will be scanned to identify the persons who have the access to the home. This enhances the effectiveness of the security system and provides the user with the complete, whole-house protection he needs. An RFID badge can be used to unlock the door and access to the home. Alerts also are received on the smart phone if motion is sensed in a protected area inside or outside; giving the user the information it needs to act quickly. The door can also be remotely locked/unlocked. A microcontroller (ATmega2560) is used to control the entire system, and GSM is used to send alerts to the Smartphone. An Ethernet shield that connects the microcontroller to the database (DB) is also added.


Mathematics ◽  
2021 ◽  
Vol 9 (22) ◽  
pp. 2837
Author(s):  
Saykat Dutta ◽  
Sri Srinivasa Raju M ◽  
Rammohan Mallipeddi ◽  
Kedar Nath Das ◽  
Dong-Gyu Lee

In multi/many-objective evolutionary algorithms (MOEAs), to alleviate the degraded convergence pressure of Pareto dominance with the increase in the number of objectives, numerous modified dominance relationships were proposed. Recently, the strengthened dominance relation (SDR) has been proposed, where the dominance area of a solution is determined by convergence degree and niche size (θ¯). Later, in controlled SDR (CSDR), θ¯ and an additional parameter (k) associated with the convergence degree are dynamically adjusted depending on the iteration count. Depending on the problem characteristics and the distribution of the current population, different situations require different values of k, rendering the linear reduction of k based on the generation count ineffective. This is because a particular value of k is expected to bias the dominance relationship towards a particular region on the Pareto front (PF). In addition, due to the same reason, using SDR or CSDR in the environmental selection cannot preserve the diversity of solutions required to cover the entire PF. Therefore, we propose an MOEA, referred to as NSGA-III*, where (1) a modified SDR (MSDR)-based mating selection with an adaptive ensemble of parameter k would prioritize parents from specific sections of the PF depending on k, and (2) the traditional weight vector and non-dominated sorting-based environmental selection of NSGA-III would protect the solutions corresponding to the entire PF. The performance of NSGA-III* is favourably compared with state-of-the-art MOEAs on DTLZ and WFG test suites with up to 10 objectives.


Author(s):  
ASHWATHIMESANGLA AO

Visual cryptography is a secret sharing scheme for encrypting a secret image, it is a perfectly secure way that allows secret sharing without any cryptographic computation, which is termed as Visual Cryptography Scheme (VCS). In this paper secret image is divided into shares (printed on transparencies), and each share holds some information. At the receiver this shares are merged to obtain the secret information which is revealed without any complex computation. The proposed algorithm is for color host image, divided into three color planes Red, Green, Blue and merged with secret image which is binarized and divided into shares. The decoding requires aligning the result obtained by merging color host image and shares, so as to obtain the secret image.


Sign in / Sign up

Export Citation Format

Share Document