An Application of Visual Cryptography To Financial Documents
|
|
|
- Cynthia Simon
- 10 years ago
- Views:
Transcription
1 An Application of Visual Cryptography To Financial Documents L. W. Hawkes, A. Yasinsac, C. Cline Security and Assurance in Information Technology Laboratory Computer Science Department Florida State University Tallahassee, FL Keywords: visual cryptography, financial security, greying effect, network security Abstract: VCRYPT, an application of visual cryptography, is described as a means of transmitting financial documents where moderate security is required. Visual cryptography in general uses a simple algorithm unlike the complex, computationally intensive algorithms used in other techniques. The interface to the system is window based. The VCRYPT implementation solves the outstanding problem of the greying effect in which the decoding results in a distinctly grey or fuzzy version of the source document. Thus, when visual cryptography is applied to financial documents, it is often difficult to distinguish digits accurately, making it an unattractive protection technique. VCRYPT overcomes this problem using a threshold technique to produce a clear, crisp document, identical to the original. Although visual cryptography requires increased storage and multiple transmissions, the simple share creation algorithm, decreasing storage costs, and fast transmission times, make this a viable alternative for sharing financial documents over the Internet. 1. Introduction With the near universal use of the Internet in business, the need to share financial documents via this medium becomes increasingly more necessary. We introduce VCRYPT [5], a simple, fast, visual cryptography technique, to provide privacy protection when transmitting sensitive data between offices. This technique also makes it difficult for the recipient to modify the source, maintaining the authenticity of the document. Moreover, the final image can be obtained simply with the human visual system. The associated storage cost is increased with this method, but with overall memory and disk storage costs continually decreasing, this issue becomes less significant. This approach is particularly applicable in situations where a moderate degree of security is required when sharing sensitive financial documents over the Internet. Like other threshold schemes, visual cryptography can be used to protect secrecy or it may be used to ensure that a given subset of compromised principals can neither retrieve the secret, nor can they prevent honest principals from receiving the secret. VCRYPT takes a financial document (spreadsheet, for example) represented as a bit map file, and expands it into two or more encoded file shares. These shares can be transferred to the recipients via electronic mail or electronic file transfer process, such as ftp. In order to recover the original document, the recipient only need have the desired subset of the shares and the decoding program. Other visual cryptography techniques have cumbersome user interfaces. Using the VCRYPT simple, window-based interface, the encoding style can be selected with one mouse click. Previous visual cryptography systems also suffer from a greying effect or the decoded image being blurry and much darker than the original image. This is one reason for the approach not becoming a competitive technique for moderate security applications. Our system removes this problem and precisely reproduces the original document. Although the storage requirements for the document are increased, the computational impact is reduced.
2 In this section we have introduced visual cryptography, its advantages and its problems. In section 2 we give details of the visual cryptography approach. In the next section we give details of VCRYPT, present a simple example, and discuss how this can be used for financial documents. We conclude with section 4, in which we highlight our contributions and overview future extensions planned. 2. Visual Cryptography In 1994, Naor and Shamir [3] presented a new cryptographic paradigm based at the pixel level. They termed this visual cryptography and introduced it as a method for encrypting such things as handwritten notes, pictures, graphical images, as well as typed text stored as a graphic image. We posit that this technique has characteristics that make it desirable for use in financial transactions conducted over the Internet. 2.1 The Basic Model The basic 2 out of 2 visual cryptography model consists of a secret message encoded into two transparencies, one transparency representing the ciphertext and the other acting as a secret key. Both transparencies appear to be random dots when inspected individually and provide no information about the original cleartext. However, by carefully aligning the transparencies, the original secret message is reproduced. The actual decoding is accomplished by the human visual system. Naor and Shamir further describe the visual cryptography scheme as a visual secret sharing problem in which the secret message can be viewed as nothing more than a collection of black and white pixels. Each pixel in the original image is represented by at least one subpixel in each of the n transparencies or shares generated. Each share is comprised of collections of m black and white subpixels where each collection represents a particular original pixel. An example of the encoding of white and black pixels in a 2 out of 2 scheme can be seen in Figure 1. Here two shares out of the two generated would be needed to recover the original image. Since only two shares are generated, n = 2. Figure 1(a) represents a single white or black pixel in the original image. Figure 1(b) represents the subpixel assignments that would be given to shares #1 and #2 respectively. The number of subpixels per share used to represent the original pixel is four (m = 4). Finally, Figure 1(c) represents the overall visual effect when shares #1 and #2 are correctly aligned on top of one another. Notice that when the shares in this example are combined the original black pixel is viewed as black, however, the original white pixel takes on a grey scale. Original Pixel White (or 0) Share #1 Share #2 Shares #1 & #2 Black (or 1) 1a 1b Figure 1 1c The structure obtained from either white or black pixel representation in Figure 1 can be described by an n x m Boolean matrix S p where p ε {white, black}. Any given element of the matrix S say s ij, is considered to be 1 iff the jth subpixel in the ith transparency is black. When the n transparencies are properly aligned, 2
3 the resulting black subpixels are the Boolean OR of the columns for each row i 1, i 2,, i n of S. Shares #1 and #2 of Figure 1 would represent i 1 and i 2 respectively. Therefore, the following 2 x 4 Boolean matrices would be derived: S white = { {1, 0, 0, 1}, {1, 0, 0, 1}} and S black = { {1, 0, 0, 1}, {0, 1, 1, 0} }. The matrix elements represent share assignments for share #1 and share #2 respectively. Since m subpixels constitute one original pixel and the overall visual effect of a black subpixel in any one of the shares causes that particular subpixel when combined to become black, inspection of the grey level is the method of determining the original color of a pixel. The grey level of the combined share s subpixels is proportional to the Hamming weight H(V) of the ORed m-vector V. The combined subpixels are interpreted by the human visual system as a black pixel if H(V) > d and as a white pixel if H(V) < d - αm for some fixed threshold 1< d < m and relative difference α=>=0. The use of threshold d and relative difference α is necessary in order to distinguish between the colors. 2.2 Solving the k out of n Visual Secret Sharing Problem. Naor and Shamir continued by expanding the basic visual cryptography scheme to solve the k out of n visual secret sharing problem. A case where visual cryptography is applied to the k out of n problem could begin with a person generating n shares from an original secret image. These n shares could be distributed via some method, say , to n different participants with no prior knowledge of their particular share. In order to retrieve the original image, k out of the n participants would have to collaborate and overlay their shares. Any k out of n participants collaborating could reveal the original secret message, but fewer than k participants could reveal no information at all. This threshold model is similar to that above but also includes two collections of n x m Boolean matrices S 0 and S 1. S 0 acts as a pool of matrices from which to randomly choose matrix S to represent a white pixel while S 1 acts as a pool of matrices from which to randomly choose matrix S to represent a black pixel. The matrix chosen thereby establishes the color of the m subpixels in each one of the n transparencies. In order to be sure that an infinitely powerful cryptanalyst cannot gain any information on the original image by examining fewer than k transparencies, the following conditions must be in place [4]: 1. For any S in S 0, the OR V of any k of the n rows satisfies H(V) < d - αm. 2. For any S in S 1, the OR V of any k of the n rows satisfies H(V) > d. 3. For any subset { i 1, i 2,, i q } of {1, 2,, n } with q < k, the two collections of q x m matrices D t where t ε {0, 1} obtained by restricting each n x m matrix in S t to rows i 1, i 2,, i q are indistinguishable in the sense that there is no way to determine which D t is used to generate white pixels and which is used to generate black pixels. The first two conditions are referred to as contrast while the third condition is referred to as security. As indicated above, one of the advantages of visual cryptography is that there is no computation used. Furthermore, decryption is accomplished by aligning the shares and viewing the original image. Moreover, since there is no complex cryptographic algorithm, the time needed to encrypt is minimal. 2.3 Other Extensions 3
4 Instead of using the standard k out of n sharing scheme above, Ateniese et al [1] precisely qualified subsets of the n shares that will be able to visually recover the secret image. Any non-qualified shares will have no information concerning the secret image. The mathematical formulation used in [1] for encryption is similar to that of Naor and Shamir, but with more precise definition and nomenclature. They also use two n x m matrix pools from which to distribute shares corresponding to white or black pixels. S 0 and S 1 are called basis matrices for a (k, n) threshold visual cryptography scheme with pixel expansion m and contrast c provided that the following properties are satisfied for every subset X of {i 1, i 2,, i p }: 1) if X = {i 1, i 2,, i p }with p > k, then the OR of rows i 1, i 2,, i p of S 1 has weight at least t x 2) if X = {i 1, i 2,, i p }with p > k, then the OR of rows i 1, i 2,, i p of S 0 has weight at least t x - c 3) if X = {i 1, i 2,, i p }with p < k-1, then the two p x m matrices obtained by restricting S 0 and S 1 to rows i 1, i 2,, i p are identical up to a column permutation. The grey level of a black and white pixel respectively is t x /m and (t x c)/m. The relative contrast, c/m, also plays a very important role in determining the visibility of the image. The larger the relative contrast, the easier it is for the human visual system to clearly pick out distinct outlines in the superimposed image. 3. VCRYPT The VCRYPT program is designed to allow users to easily transmit drawings and documents over the Internet. The encoding process consists of taking the original image and producing n shares which are saved as individual files. The security gained through visual cryptography requires proper distribution of the shares. For example, instead of attaching all of the shares to one message, it is better to disburse the shares by sending multiple s to the different recipients. This forces the recipients to work together to recover the drawing. Since a k out of n scheme is used by the VCRYPT program, the interception of any one share would be of no use. In general, a strategy must be developed when using visual cryptography that takes advantage of the distribution of shares and different transmission techniques. When the image is a spreadsheet, since it is being transmitted as a bitmap, the recipient cannot easily change a digit in the copy. 3.1 The Greying Effect One of the most obvious limitations of using visual cryptography in the past was the problem of the decoded image containing an overall grey effect due to the leftover black subpixels from encoding. This occurred because the decoded image is not an exact preproduction, but an expansion of the original, with extra black pixels. Black pixels in the original document remain black pixels in the decoded version, but white pixels become grey. This resulted in a loss of contrast to the entire image. The extra black subpixels in the image cause the image to become distorted. This is unacceptable since the digits used in the financial documents must be clearly discernable. In order to overcome this problem, the VCRYPT program employs a post-receipt threshold filtering technique combined, with resizing, to return the decoded image precisely to its original form. As designed by Naor and Shamir, document shares are combined by the recipient using transparencies, so no postreceipt process is required. In order to filter the greying effect, VCRYPT offers post-receipt processing that can filter the grey pixels and reduce the document precisely to its original form. VCRYPT evaluates every set of m subpixels against the threshold; the pixel is black if the number of black subpixels is above the threshold and white if below the threshold. 4
5 3.2 The VCRYPT Program The main goal of VCRYPT is to take a graphically represented image and encode it into multiple shares. The opposite direction (at the recipient) takes the multiple shares created and reconstructs the original graphical image. Therefore the data flow consists of a graphical file being encoded into multiple files (shares) using some file format. Since the concept of visual cryptography deals with the encoding of pixels into subpixels and collections of Boolean matrices, the natural graphical file format to begin working with is the device independent bitmap or BMP file. The VCRYPT program allows for manipulating the BMP file in various ways and uses a modified version of the BMP file format to store the encoded shares created. Great attention was given to the look and feel of the VCRYPT program. Ease of use coupled with a high quality graphical user interface are necessities in today s software market. In order to keep a sense of familiarity, the VCRYPT program makes use of several standard windows, pull-down menus and buttons. It has standard File, Edit, View, Window, and Help pull-down menus with common menu items on each. Beneath the menu bar is a typical toolbar which gives the user quick access to menu features with just one click of a button. The toolbar buttons include, from left to right, New, Open, Save, Print, Cut, Copy, Paste, Overlay, Encode, Decode, About, and Help. The user interface allows for multiple windows for ease of viewing and provides complete access to the Windows clipboard for Cut, Copy, and Paste operations between different windows applications. Since the graphical user interface is designed to be familiar and user friendly, the entire visual cryptography process requires little additional knowledge on the user s behalf to operate. Unlike past applications of visual cryptography, which used cumbersome interfaces, this style of user interface immediately promotes visual cryptography s use in a wide range of windows applications. 3.3 Encoding and Decoding The encoding option can either be found on the toolbar as described above or on the Edit menu. Once selected, a dialog box opens. The user is then presented with three different encoding styles to choose from. The Basic encoding style uses a 2 out of 2 encoding scheme. The second option is Moderate which uses a 3 out of 4 encoding scheme. Finally, the Advanced option makes use of a 4 out of 6 encoding scheme. The generated shares are automatically given the same file name as the original image, but the extensions are of the form VCp where p is the number of the share created. These files are saved in the same directory as the original image file. The VCRYPT program uses two Boolean matrix pools as described above to encode the original image into n shares. Each Boolean matrix pool contains encoding matrices for black and white pixels respectively. The following Boolean matrix pools are those used by the VCRYPT program to encode black and white pixels when the Basic encoding style (2 out of 2) is chosen: B={{ }, { }, { }, { }, { }, { }} W={{ },{ }, { }, { },{ }, { }}. When a particular matrix from either B or W is randomly selected during encoding, the first four bits of the selected matrix are assigned to share #1 and the second four bits are assigned to share #2. Since the encoding forces four bits to represent one original image bit in each share, the resulting share file size will be larger than the original image file. The decoding option can be also either found on the toolbar or the Edit menu. The entire decoding process involves two separate steps: overlay the shares, and filter the resulting image using an established threshold. The overlay process simply performs a bitwise AND on the shares found in the current directory. 5
6 After the decoding process overlays the shares, it begins the filtering by looking at the subpixels that represent the original pixel. After inspection of the subpixels, a threshold is then used to determine whether the pixel in the decoded image will be black or white. This ensures that each pixel in the decoded image will match the original encoded pixel. Until the VCRYPT program, this greying effect would not allow any image to be decoded into its original form. This is one reason why visual cryptography has not gained more attention as an alternate form of cryptography. 3.4 The Hello World Message We illustrate the use of VCRYPT with the standard Hello World message. The original message, a monochrome bitmap file with dimensions 640 x 480 pixels is shown in Figure 2 Although this is a relatively simple message, it contains a characteristic that can cause problems when visually encoded and decoded: the lack of straight lines. This is why it is often used as an example. The image is encoded using a Basic encoding style of 2 out of 2. This causes two shares to be created and stored in the current directory. These are shown in Figures 3 and 4, which are not to scale. Figure 2 Figure 3, Share #1 Figure 4, Share#2 Figures 3 and 4 provide no information regarding the original Hello World message at all. Each of the shares are monochrome bitmap files with dimensions 1280 x 960 pixels. The increase in dimensions is to allow for the expansion of the image due to encoding. At this point, we could simply choose to decode the images and get the original Hello World image back, but instead we will choose the Overlay option instead. This will cause the VCRYPT program to overlay the two shares, producing Figure 5. This figure demonstrates how the human visual system can decode the shares once they have been overlaid. No decryption algorithm has been used and yet the original message is now visible. However, the greying effect is noticeable and would be quite unacceptable with a spreadsheet. Figure 5 Figure 6 6
7 If the Decoding option is selected, the result is given by Figure 6. The final decoded image has all the attributes that the original had, giving a crisp, clear result which would be acceptable when sharing financial documents. 4.0 Contributions. The VCRYPT visual cryptographic system for transmitting financial documents, with a moderate degree of security, over the Internet has several advantages: 1. complex cryptographic algorithms are not needed; 2. a simple window-based interface is used; 3. the threshold technique, plus resizing, returns the decoded image to its original form i.e. removes the greying effect. The technique also has some disadvantages but these are minor in comparison to the above advantages. The encryption does require increased disk space, but with the falling cost of this resource and the option of compressing files, this aspect of the approach is not significant. Another consideration is that the n, rather than 1, files (shares) are transmitted. This takes more time but in contrast to the other cryptographic algorithms that are computationally intense, this time is minimal. Currently, we are enhancing the program in several ways to include: 1. The support of additional file formats, 2. An increase in the number of options for choice of k and n, 3. An interface with a user s client of choice, 4. The addition of a watermark on the original document for further security, 5. Varying the encoding matrix choice during encryption to add more security 6. Disguising a share such that it is an innocent looking picture while carrying a hidden message. References: 1. Ateniese, G., C. Blundo, A. De Santis, and D. R. Stinson, Constructions and bounds for visual cryptography, in 23 rd International Colloquium on Automata, Languages, and Programming, (ICALP 96), Friedhelm Meyer auf der Heide, Ed., Lecture Notes in Computer Science, Springer-Verlag, Berlin, Mueller, S., Upgrading and Repairing PCS, 3 rd Edition, Que Corporation, Indianapolis, Indiana, Naor, M. and A. Shamir, Visual Cryptography, in Advances in Cryptology Eurocrypt 94, A. De Santis, Ed., Vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp 1-12, Simmons, G. J., Contemporary Cryptology: The Science of Information Integrity, IEEE Press, Piscataway, New Jersey, Cline, Charles A., "A Practical Approach to Using Visual Cryptography in Technical Drawing Environments", Masters Thesis, Florida State University, December
IMAGE HALFTONE TECHNIQUE IN VISUAL SECRET SHARING
IMAGE HALFTONE TECHNIQUE IN VISUAL SECRET SHARING Thesis submitted in the partial fulfillment of the requirements for the degree of Master of Technology in Computer Technology in The Faculty of Engineering
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
Hill s Cipher: Linear Algebra in Cryptography
Ryan Doyle Hill s Cipher: Linear Algebra in Cryptography Introduction: Since the beginning of written language, humans have wanted to share information secretly. The information could be orders from a
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
IDRBT Working Paper No. 11 Authentication factors for Internet banking
IDRBT Working Paper No. 11 Authentication factors for Internet banking M V N K Prasad and S Ganesh Kumar ABSTRACT The all pervasive and continued growth being provided by technology coupled with the increased
Paillier Threshold Encryption Toolbox
Paillier Threshold Encryption Toolbox October 23, 2010 1 Introduction Following a desire for secure (encrypted) multiparty computation, the University of Texas at Dallas Data Security and Privacy Lab created
Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme
www.ijcsi.org 182 Design and Implementation of a Novel Authentication Algorithm for Fool-Proof Lock-Key System Based On Visual Secret Sharing Scheme Harinandan Tunga 1 and Soumen Mukherjee 2 1 Department
Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control Codes
International Journal of Network Security, Vol.10, No.1, PP.1 10, Jan. 2010 1 Security Protection of Software Programs by Information Sharing and Authentication Techniques Using Invisible ASCII Control
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment
Secure Group Oriented Data Access Model with Keyword Search Property in Cloud Computing Environment Chih Hung Wang Computer Science and Information Engineering National Chiayi University Chiayi City 60004,
SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES
www.arpapress.com/volumes/vol8issue1/ijrras_8_1_10.pdf SECURITY IMPROVMENTS TO THE DIFFIE-HELLMAN SCHEMES Malek Jakob Kakish Amman Arab University, Department of Computer Information Systems, P.O.Box 2234,
Quick Guide to IrfanView
Quick Guide to IrfanView The goal of any good web designer is to keep the size of any given web page under 50K in order to assure quick loading of the page. One or more improperly saved photos or graphics
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Document Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
An Introduction to Cryptography and Digital Signatures
An Introduction to Cryptography and Digital Signatures Author: Ian Curry March 2001 Version 2.0 Copyright 2001-2003 Entrust. All rights reserved. Cryptography The concept of securing messages through
Overview/Questions. What is Cryptography? The Caesar Shift Cipher. CS101 Lecture 21: Overview of Cryptography
CS101 Lecture 21: Overview of Cryptography Codes and Ciphers Overview/Questions What is cryptography? What are the challenges of data encryption? What factors make an encryption strategy successful? What
Simple Encryption/Decryption Application
Simple Encryption/Decryption Application Majdi Al-qdah Faculty of Information Technology Multimedia University Cyberjaya, 63100, Malaysia [email protected] Lin Yi Hui Faculty of Information Technology
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION
FAREY FRACTION BASED VECTOR PROCESSING FOR SECURE DATA TRANSMISSION INTRODUCTION GANESH ESWAR KUMAR. P Dr. M.G.R University, Maduravoyal, Chennai. Email: [email protected] Every day, millions of people
Secure Large-Scale Bingo
Secure Large-Scale Bingo Antoni Martínez-Ballesté, Francesc Sebé and Josep Domingo-Ferrer Universitat Rovira i Virgili, Dept. of Computer Engineering and Maths, Av. Països Catalans 26, E-43007 Tarragona,
Figure 1. An embedded chart on a worksheet.
8. Excel Charts and Analysis ToolPak Charts, also known as graphs, have been an integral part of spreadsheets since the early days of Lotus 1-2-3. Charting features have improved significantly over the
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No. # 11 Block Cipher Standards (DES) (Refer Slide
Graphic Design. Background: The part of an artwork that appears to be farthest from the viewer, or in the distance of the scene.
Graphic Design Active Layer- When you create multi layers for your images the active layer, or the only one that will be affected by your actions, is the one with a blue background in your layers palette.
Creating Interactive PDF Forms
Creating Interactive PDF Forms Using Adobe Acrobat X Pro Information Technology Services Outreach and Distance Learning Technologies Copyright 2012 KSU Department of Information Technology Services This
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. #01 Lecture No. #10 Symmetric Key Ciphers (Refer
TIBCO Spotfire Network Analytics 1.1. User s Manual
TIBCO Spotfire Network Analytics 1.1 User s Manual Revision date: 26 January 2009 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
Properties of Secure Network Communication
Properties of Secure Network Communication Secrecy: Only the sender and intended receiver should be able to understand the contents of the transmitted message. Because eavesdroppers may intercept the message,
Excel Companion. (Profit Embedded PHD) User's Guide
Excel Companion (Profit Embedded PHD) User's Guide Excel Companion (Profit Embedded PHD) User's Guide Copyright, Notices, and Trademarks Copyright, Notices, and Trademarks Honeywell Inc. 1998 2001. All
Split Based Encryption in Secure File Transfer
Split Based Encryption in Secure File Transfer Parul Rathor, Rohit Sehgal Assistant Professor, Dept. of CSE, IET, Nagpur University, India Assistant Professor, Dept. of CSE, IET, Alwar, Rajasthan Technical
Software Tool for Implementing RSA Algorithm
Software Tool for Implementing RSA Algorithm Adriana Borodzhieva, Plamen Manoilov Rousse University Angel Kanchev, Rousse, Bulgaria Abstract: RSA is one of the most-common used algorithms for public-key
Instructions for Creating a Poster for Arts and Humanities Research Day Using PowerPoint
Instructions for Creating a Poster for Arts and Humanities Research Day Using PowerPoint While it is, of course, possible to create a Research Day poster using a graphics editing programme such as Adobe
International ejournals
ISSN 0976 1411 Available online at www.internationalejournals.com International ejournals International ejournal of Mathematics and Engineering 227 (2013) 2216-2222 EFFICIENT METHOD OF AUDIO STEGANOGRAPHY
Reviewer s Guide. Morpheus Photo Animation Suite. Screenshots. Tutorial. Included in the Reviewer s Guide:
Morpheus Photo Animation Suite Reviewer s Guide The all-in-one animation suite includes Morpheus Photo Morpher, Morpheus Photo Warper, Morpheus Photo Mixer, as well as all 15 sample morphs, warps, and
Database Migration over Network
Database Migration over Network Kanimozhi N 1, Thresphine J. R 2 1 M.TECH (Computer Science & Eng), PRIST University, Pondicherry India 2 Assistant Professor (Computer Science & Eng), PRIST University,
Processing Data with rsmap3d Software Services Group Advanced Photon Source Argonne National Laboratory
Processing Data with rsmap3d Software Services Group Advanced Photon Source Argonne National Laboratory Introduction rsmap3d is an application for producing 3D reciprocal space maps from x-ray diffraction
Introduction to Microsoft Access 2003
Introduction to Microsoft Access 2003 Zhi Liu School of Information Fall/2006 Introduction and Objectives Microsoft Access 2003 is a powerful, yet easy to learn, relational database application for Microsoft
Aras Corporation. 2005 Aras Corporation. All rights reserved. Notice of Rights. Notice of Liability
Aras Corporation 2005 Aras Corporation. All rights reserved Notice of Rights All rights reserved. Aras Corporation (Aras) owns this document. No part of this document may be reproduced or transmitted in
International Journal of Information Technology, Modeling and Computing (IJITMC) Vol.1, No.3,August 2013
FACTORING CRYPTOSYSTEM MODULI WHEN THE CO-FACTORS DIFFERENCE IS BOUNDED Omar Akchiche 1 and Omar Khadir 2 1,2 Laboratory of Mathematics, Cryptography and Mechanics, Fstm, University of Hassan II Mohammedia-Casablanca,
SPSS: Getting Started. For Windows
For Windows Updated: August 2012 Table of Contents Section 1: Overview... 3 1.1 Introduction to SPSS Tutorials... 3 1.2 Introduction to SPSS... 3 1.3 Overview of SPSS for Windows... 3 Section 2: Entering
MassArt Studio Foundation: Visual Language Digital Media Cookbook, Fall 2013
INPUT OUTPUT 08 / IMAGE QUALITY & VIEWING In this section we will cover common image file formats you are likely to come across and examine image quality in terms of resolution and bit depth. We will cover
QuickTimePro creating movies from frames
Biochem 660 2008 179 QuickTimePro creating movies from frames Appleʼs QuickTime Pro is available on Macintosh and Windows platforms. The free version is downloadable from http://www.apple.com/quicktime/
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Lesson 07: MS ACCESS - Handout. Introduction to database (30 mins)
Lesson 07: MS ACCESS - Handout Handout Introduction to database (30 mins) Microsoft Access is a database application. A database is a collection of related information put together in database objects.
COBOL FormPrint Windows Form Printing for COBOL Version 4.1 User Guide
COBOL FormPrint Windows Form Printing for COBOL Version 4.1 User Guide Flexus Voice: 610-588-9400 P.O. Box 640 Fax: 610-588-9475 Bangor PA 18013-0640 E-Mail: [email protected] U.S.A. WWW: http://www.flexus.com
Microsoft Access Glossary of Terms
Microsoft Access Glossary of Terms A Free Document From www.chimpytech.com COPYRIGHT NOTICE This document is copyright chimpytech.com. Please feel free to distribute and give away this document to your
3/25/2014. 3/25/2014 Sensor Network Security (Simon S. Lam) 1
Sensor Network Security 3/25/2014 Sensor Network Security (Simon S. Lam) 1 1 References R. Blom, An optimal class of symmetric key generation systems, Advances in Cryptology: Proceedings of EUROCRYPT 84,
High Security Online Backup. A Cyphertite White Paper February, 2013. Cloud-Based Backup Storage Threat Models
A Cyphertite White Paper February, 2013 Cloud-Based Backup Storage Threat Models PG. 1 Definition of Terms Secrets Passphrase: The secrets passphrase is the passphrase used to decrypt the 2 encrypted 256-bit
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Cryptography and Network Security. Prof. D. Mukhopadhyay. Department of Computer Science and Engineering. Indian Institute of Technology, Kharagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Module No. # 01 Lecture No. # 12 Block Cipher Standards
Catalog Creator by On-site Custom Software
Catalog Creator by On-site Custom Software Thank you for purchasing or evaluating this software. If you are only evaluating Catalog Creator, the Free Trial you downloaded is fully-functional and all the
SubmitedBy: Name Reg No Email Address. Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se
SubmitedBy: Name Reg No Email Address Mirza Kashif Abrar 790604-T079 kasmir07 (at) student.hh.se Abid Hussain 780927-T039 abihus07 (at) student.hh.se Imran Ahmad Khan 770630-T053 imrakh07 (at) student.hh.se
Instructions for Use. CyAn ADP. High-speed Analyzer. Summit 4.3. 0000050G June 2008. Beckman Coulter, Inc. 4300 N. Harbor Blvd. Fullerton, CA 92835
Instructions for Use CyAn ADP High-speed Analyzer Summit 4.3 0000050G June 2008 Beckman Coulter, Inc. 4300 N. Harbor Blvd. Fullerton, CA 92835 Overview Summit software is a Windows based application that
Part I. Universität Klagenfurt - IWAS Multimedia Kommunikation (VK) M. Euchner; Mai 2001. Siemens AG 2001, ICN M NT
Part I Contents Part I Introduction to Information Security Definition of Crypto Cryptographic Objectives Security Threats and Attacks The process Security Security Services Cryptography Cryptography (code
Password Memory 6 User s Guide
C O D E : A E R O T E C H N O L O G I E S Password Memory 6 User s Guide 2007-2015 by code:aero technologies Phone: +1 (321) 285.7447 E-mail: [email protected] Table of Contents Password Memory 6... 1
Linear Codes. Chapter 3. 3.1 Basics
Chapter 3 Linear Codes In order to define codes that we can encode and decode efficiently, we add more structure to the codespace. We shall be mainly interested in linear codes. A linear code of length
Office of Creative Services. Tuck Visual Identity. A reference guide to Tuck s logos and visual identification standards
Office of Creative Services Tuck Visual Identity A reference guide to Tuck s logos and visual identification standards Tuck Visual Identity Guide Table of Contents Introduction.....................................................1
Image Compression through DCT and Huffman Coding Technique
International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347 5161 2015 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Research Article Rahul
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Word 2010: Mail Merge to Email with Attachments
Word 2010: Mail Merge to Email with Attachments Table of Contents TO SEE THE SECTION FOR MACROS, YOU MUST TURN ON THE DEVELOPER TAB:... 2 SET REFERENCE IN VISUAL BASIC:... 2 CREATE THE MACRO TO USE WITHIN
CXQuotes Doors and Windows Quotation software. Cogitrix
CXQuotes Doors and Windows Quotation software Cogitrix Table of content TABLE OF CONTENT... 2 TABLES OF PICTURES... 6 SOFTWARE FEATURES... 7 QUICK...7 REDUCING ERRORS...7 PRINT QUALITY...7 PRICES COMPARISON...7
Legal Notes. Regarding Trademarks. 2012 KYOCERA Document Solutions Inc.
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
+ Create, and maintain your site
T4 Basics Version 1.0 + Create, and maintain your site With T4, you are in control of the content of your website. Feel free to be creative, and keep your site up to date. Few of T4 Features Media Library
GUIDELINES FOR PREPARING POSTERS USING POWERPOINT PRESENTATION SOFTWARE
Society for the Teaching of Psychology (APA Division 2) OFFICE OF TEACHING RESOURCES IN PSYCHOLOGY (OTRP) Department of Psychology, Georgia Southern University, P. O. Box 8041, Statesboro, GA 30460-8041
Interacting with Users
7 Interacting with Users 7 Apple Remote Desktop is a powerful tool for interacting with computer users across a network. You can interact by controlling or observing remote screens, text messaging with
Steganography and Visual Cryptography in Computer Forensics
2010 Fifth International Workshop on Systematic Approaches to Digital Forensic Engineering Steganography and Visual Cryptography in Computer Forensics George Abboud Department of Computer Engineering and
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2
Effective Secure Encryption Scheme [One Time Pad] Using Complement Approach Sharad Patil 1 Ajay Kumar 2 Research Student, Bharti Vidyapeeth, Pune, India [email protected] Modern College of Engineering,
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key
Enhancing Advanced Encryption Standard S-Box Generation Based on Round Key Julia Juremi Ramlan Mahmod Salasiah Sulaiman Jazrin Ramli Faculty of Computer Science and Information Technology, Universiti Putra
An Implementation of a High Capacity 2D Barcode
An Implementation of a High Capacity 2D Barcode Puchong Subpratatsavee 1 and Pramote Kuacharoen 2 Department of Computer Science, Graduate School of Applied Statistics National Institute of Development
AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES
HYBRID RSA-AES ENCRYPTION FOR WEB SERVICES AN IMPLEMENTATION OF HYBRID ENCRYPTION-DECRYPTION (RSA WITH AES AND SHA256) FOR USE IN DATA EXCHANGE BETWEEN CLIENT APPLICATIONS AND WEB SERVICES Kalyani Ganesh
How To Use Trackeye
Product information Image Systems AB Main office: Ågatan 40, SE-582 22 Linköping Phone +46 13 200 100, fax +46 13 200 150 [email protected], Introduction TrackEye is the world leading system for motion
Connected from everywhere. Cryptelo completely protects your data. Data transmitted to the server. Data sharing (both files and directory structure)
Cryptelo Drive Cryptelo Drive is a virtual drive, where your most sensitive data can be stored. Protect documents, contracts, business know-how, or photographs - in short, anything that must be kept safe.
GFI FAXmaker 14 for Exchange/Lotus/SMTP. Fax-Client Manual. By GFI Software Ltd
GFI FAXmaker 14 for Exchange/Lotus/SMTP Fax-Client Manual By GFI Software Ltd http://www.gfi.com Email: [email protected] Information in this document is subject to change without notice. Companies, names,
Secure Data Transfer
Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol
Microsoft Access 2007
How to Use: Microsoft Access 2007 Microsoft Office Access is a powerful tool used to create and format databases. Databases allow information to be organized in rows and tables, where queries can be formed
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur
Cryptography and Network Security Department of Computer Science and Engineering Indian Institute of Technology Kharagpur Module No. # 01 Lecture No. # 05 Classic Cryptosystems (Refer Slide Time: 00:42)
Functional-Repair-by-Transfer Regenerating Codes
Functional-Repair-by-Transfer Regenerating Codes Kenneth W Shum and Yuchong Hu Abstract In a distributed storage system a data file is distributed to several storage nodes such that the original file can
Web Ambassador Training on the CMS
Web Ambassador Training on the CMS Learning Objectives Upon completion of this training, participants will be able to: Describe what is a CMS and how to login Upload files and images Organize content Create
Masao KASAHARA. Public Key Cryptosystem, Error-Correcting Code, Reed-Solomon code, CBPKC, McEliece PKC.
A New Class of Public Key Cryptosystems Constructed Based on Reed-Solomon Codes, K(XII)SEPKC. Along with a presentation of K(XII)SEPKC over the extension field F 2 8 extensively used for present day various
Developing and Investigation of a New Technique Combining Message Authentication and Encryption
Developing and Investigation of a New Technique Combining Message Authentication and Encryption Eyas El-Qawasmeh and Saleem Masadeh Computer Science Dept. Jordan University for Science and Technology P.O.
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Excel Intermediate Session 2: Charts and Tables
Excel Intermediate Session 2: Charts and Tables Agenda 1. Introduction (10 minutes) 2. Tables and Ranges (5 minutes) 3. The Report Part 1: Creating and Manipulating Tables (45 min) 4. Charts and other
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
How To Change Your Site On Drupal Cloud On A Pcode On A Microsoft Powerstone On A Macbook Or Ipad (For Free) On A Freebie (For A Free Download) On An Ipad Or Ipa (For
How-to Guide: MIT DLC Drupal Cloud Theme This guide will show you how to take your initial Drupal Cloud site... and turn it into something more like this, using the MIT DLC Drupal Cloud theme. See this
USING STUFFIT DELUXE THE STUFFIT START PAGE CREATING ARCHIVES (COMPRESSED FILES)
USING STUFFIT DELUXE StuffIt Deluxe provides many ways for you to create zipped file or archives. The benefit of using the New Archive Wizard is that it provides a way to access some of the more powerful
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
ELECTRONIC COMMERCE OBJECTIVE QUESTIONS
MODULE 13 ELECTRONIC COMMERCE OBJECTIVE QUESTIONS There are 4 alternative answers to each question. One of them is correct. Pick the correct answer. Do not guess. A key is given at the end of the module
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur
Cryptography and Network Security Prof. D. Mukhopadhyay Department of Computer Science and Engineering Indian Institute of Technology, Karagpur Lecture No. #06 Cryptanalysis of Classical Ciphers (Refer
Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers!
Protect Your Privacy Online P 7/1 Keep Yourself Safe from the Prying Eyes of Hackers and Snoopers! With the information in this article you can: Find out what secret information your PC is sharing with
Module One: Getting Started... 6. Opening Outlook... 6. Setting Up Outlook for the First Time... 7. Understanding the Interface...
2 CONTENTS Module One: Getting Started... 6 Opening Outlook... 6 Setting Up Outlook for the First Time... 7 Understanding the Interface...12 Using Backstage View...14 Viewing Your Inbox...15 Closing Outlook...17
Cryptography: Motivation. Data Structures and Algorithms Cryptography. Secret Writing Methods. Many areas have sensitive information, e.g.
Cryptography: Motivation Many areas have sensitive information, e.g. Data Structures and Algorithms Cryptography Goodrich & Tamassia Sections 3.1.3 & 3.1.4 Introduction Simple Methods Asymmetric methods:
To export data formatted for Avery labels -
Information used to create labels in the Client Data System (CDS) can be exported out of CDS and used to create labels in Microsoft Word, making it possible to customize the font style, size, and color.
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring
Breaking Generalized Diffie-Hellman Modulo a Composite is no Easier than Factoring Eli Biham Dan Boneh Omer Reingold Abstract The Diffie-Hellman key-exchange protocol may naturally be extended to k > 2
