Journal of Computer & Information Technology

Papers

Voulume: 3
Issue: 2
Journal Paper Splitter
Article No. 1
A novel digital image watermarking scheme based on visual cryptography with colored watermark and colored host image
HARINANDAN TUNGA1 and SOUMEN MUKHERJEE2

1Department of Computer Sc. & Engineering RCC Institute of Information Technology Kolkata, West Bengal-700.015 (INDIA)
2Department of Computer Application RCC Institute of Information technology Kolkata, West Bengal-700.015 (INDIA)

Abstract :

This paper proposes a copyright protection scheme for color images and colored watermarks using visual secret sharing based on the concept of visual cryptography. Most watermarking algorithms call for a piece of information to be hidden directly in media content, in such a way that it is imperceptible to a human observer, but detectable by a computer. This paper presents an improved cryptographic watermark method based on Hwang and Naor-Shamir approaches. The technique does not require that the watermark pattern to be embedded in to the original digital image. Verification information is generated and used to validate the ownership of the image. The method is expected to be proved robust for various image processing operations such as filtering, compression, additive noise, and various geometrical attacks such as rotation, scaling, cropping, flipping, and shearing.

Keyword : Digital Watermark, Visual Cryptography Copyright Protection, Secret Sharing, Pixel Expansion, Peak Signal-to-Noise Ratio (PSNR), Mean Square of Error (MSE).
DOI :
Download Count : 426
View Count : 360
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 2
Vehicular Ad Hoc Networks for Security Aspects
RAMESH KAIT1 , KULDEEP KHERWAL2 and C. NELSON KENNEDY BABU3

1Department of Computer Science & Applications Kurukshetra University Kurukshetra (INDIA)
2Research Scholar,Singhania University Rajsthan (INDIA)
3PG Computer Science & Engineering,Shri Sowdambiga College of Engineering, Aruppukottai,Tamilnadu (INDIA)
Email rameshkait@kuk.ac.in, ks.kherwal@gmail.com   cnkbabu63@yahoo.in

Abstract :

Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. In this paper we review the standardization work and researches related to vehicular networks and discuss the challenges Security Aspect for vehicular networks.

Keyword : Vehicular ad hoc networks, Wireless, Security.
DOI :
Download Count : 437
View Count : 387
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 3
Anomaly Detection Using Artificial Neural Network
MANORANJAN PRADHAN1, SATEESH KUMAR PRADHAN2 and SUDHIR KUMAR SAHU3

1Department of Computer Science & Engg., GITA, Bhubaneswar, Odisha (INDIA)
2Department of Computer Science, Utkal University, Odisha (INDIA)
3P.G. Department of Statistics, Sambalpur University, Odisha (INDIA)

Abstract :

In this research, anomaly detection using neural network is introduced. This research aims to experiment with user behaviour as parameters in anomaly intrusion detection using a backpropagation neural network. Here we wanted to see if a neural network is able to classify normal traffic correctly, and detect known and unknown attacks without using a huge amount of training data. For the training and testing of the neural network, we used the DARPA Intrusion Detection Evaluation data sets. In our final experiment, we have got a classification rate of 88% on known and unknown attacks. Compared with other researches our result is very promising.

Keyword : neural network
DOI :
Download Count : 388
View Count : 332
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Article No. 4
A survey on digital signatures and its applications
ABHISHEK ROY1 and SUNIL KARFORMA2

1Research Scholar, Dept. Of Computer Science, The University of Burdwan, W.B. (INDIA) Assistant Professor, Dept. Of Computer Application, Durgapur Society of Management Science, W.B. (INDIA)
2Associate Professor, Dept. Of Computer Science, The University of Burdwan, W.B, INDIA
Email: dr.sunilkarforma@yahoo.com  ,Email: abhishek.roy@aol.in

Abstract :

The success rate of various electronic mechanisms such as E-Governance, E-Learning, E-Shopping, E-Voting, etc. is absolutely dependent on the security, authenticity and the integrity of the information that is being transmitted between the users of sending end and the users of receiving end. To attain all these parameters, these sensitive information must be digitally signed by its original sender which should be verified categorically by its intended receiver. Since digital signature schemes are basically various complex cryptographic algorithms which are embedded with the plain text message, the performance level of these E-services vary based on certain attributes like key size, block size, computational complexities, security parameters, application specific customizations, etc. In this paper the authors have made a thorough study of the industry standard digital signature schemes to obtain optimum security level for the electronic mechanisms and explored its probable applications in various domains.

Keyword : Digital Signature, Authentication, Integrity, E-Governance Security.
DOI :
Download Count : 391
View Count : 417
Share
Facebook Twitter Google Plus LinkedIn Reddit
Journal Paper Splitter
Ansari Education And Research Society
Facebook Google Plus Twitter
Website developed by
main-banner