Статьи журнала - International Journal of Computer Network and Information Security

Все статьи: 1157

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Copyright Protection for Digital Images using Singular Value Decomposition and Integer Wavelet Transform

Siddharth Singh, Tanveer J. Siddiqui

Статья научная

This paper presents a new technique for copyright protection of images using integer wavelet transform (IWT), singular value decomposition (SVD) and Arnold transform. We divide the cover image into four sub-images by picking alternate pixels from consecutive rows and columns and embed the copyright mark into the sub-image having the largest sum of singular values. The embedding is done by modifying singular values of the IWT coefficients of the selected sub-image. The use of Arnold transform and SVD increases security and robustness against geometric and several signals processing attacks, while IWT provides computational efficiency. We compare the performance of our technique with state-of-the-art-methods. The experimental results show that the proposed technique is more imperceptible and achieves higher security and robustness against various signal processing (filtering, compression, noise addition, histogram equalization and motion blur) and geometrical (cropping, resizing, rotation) attacks.

Бесплатно

Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA

Correlation Power Analysis using Measured and Simulated Power Traces based on Hamming Distance Power Model – Attacking 16-bit Integer Multiplier in FPGA

Marek Repka, Michal Varchola

Статья научная

In many cases side channel attacks complexity are estimated by considering attack simulations only. Regarding this estimations, parameters of cryptographic devices are set so the attack is infeasible. This work shows that this approach to secure cryptographic equipment can be dangerous because real attacks can be much better than expected according to simulations. This observation is presented on very generic Correlation Power Attack using Hamming Distance Power Model. This attack is aimed against integer multiplier implemented in FPGA. In cryptography, an integer multiplier power consumption can sometimes be exploited to reveal a secret. Very often it is in asymmetric cryptography that is used in PKI as a fundamental building block. As an example, there are DSA and its various derivations.

Бесплатно

Cost Optimization based Resource Allocation Scheme for Vehicular Cloud Networks

Cost Optimization based Resource Allocation Scheme for Vehicular Cloud Networks

Mahantesh G. Kambalimath, Mahabaleshwar S. Kakkasageri

Статья научная

Efficient Resource management in an Vehicular Cloud Networks (VCN) results in an increase resource utilization and reduction of the cost. Proper resource allocation schemes in VCN provides the better performance in terms the reduction of cost, reduction in the waiting time of vehicle (client) and also the waiting queue length. Resources are required to provide more efficiently by the cloud providers for the requested services by the vehicle. For this reason it is necessary to design proper resource allocation schemes in VCN. The aim of resource allocation scheme in VCN is to allocate the appropriate computing resources for the client vehicle application. Efficient resource allocation scheme in VCN plays a major role in the overall performance of the system. Members of VCN change dynamically due to the mobility in their movement. Vehicles may face high costs or issue related to the performance parameter when proper resource allocation schemes are not applied. In this work, we proposed the cost effective based resource allocation in VCN. The proposed cost model provides the resource to vehicle by considering the lesser expensive approach hence by achieving in the reduction of cost. We compare the results of the cost optimization with the generic algorithm that uses a combination of best fit and first fit techniques for resource allocation in VCN.

Бесплатно

Cost-Aware Task Scheduling in Cloud Computing Environment

Cost-Aware Task Scheduling in Cloud Computing Environment

Mokhtar A. Alworafi, Atyaf Dhari, Asma A. Al-Hashmi, Suresha, A. Basit Darem

Статья научная

Cloud computing is a new generation of computing environment which delivers the applications as a service to users over the internet. The users can select any service from a list provided by service providers depending on their demands or needs. The nature of this new computing environment leads to tasks scheduling and load balancing problems which become a booming research area. In this paper, we have proposed Scheduling Cost Approach (SCA) that calculates the cost of CPU, RAM, bandwidth, storage available. In this approach, the tasks will be distributed among the VMs based on the priority given by user. The priority depends on the user budget satisfaction. The proposed SCA will try to improve the load balance by selecting suitable VM for each task. The results of SCA are compared with the results of FCFS and SJF algorithms which proves that, the proposed SCA approach significantly reduces the cost of CPU, RAM, bandwidth, storage compared to FCFS and SJF algorithms.

Бесплатно

Журнал