Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs
|
|
|
- Blaze Clark
- 10 years ago
- Views:
Transcription
1 Enhancing Data Security in Medical Information System Using the Watermarking Techniques and Oracle SecureFile LOBs Said Aminzou 1, Brahim ER-RAHA 2, Youness Idrissi Khamlichi 3, Mustapha Machkour 4, Karim Afdel 5 1, 2 Laboratory of Industrial and Computer engineering, ENSA Agadir, Morocco 3 Department of Computer Engineering, ENSA of Khouribga 4, 5 Laboratory of the Computing Systems and Vision, Faculty of Sciences Agadir, Morocco 1 [email protected], 2 [email protected], 3 [email protected], 4 [email protected], 5 [email protected] Abstract. In this paper, we propose an efficient digital watermarking scheme to strengthen the security level already present in the database management system and to avoid illegal access to comprehensive content of database including patient s information. Doctors diagnose medical images by seeing Region of Interest (ROI). A ROI of a medical image is an area including important information and must be stored without any distortion. If a medical image is illegally obtained or if its content is changed, it may lead to wrong diagnosis. We substitute the part out of ROI of LSB bitplane of the image with the patient data and a binary feature map. This latter is obtained by extracting edges of the resized image to the quarter of its size using Laplacian operator. This image is directly integrated into the database. The edge map and invariant moments are used to check the integrity of the image. Keywords: Watermarking; ROI; LSB; SecureFile LOB. 1 Introduction With the changes in the computer world and the health data security, securing medical information system is becoming a priority for citizens and for government.
2 Data security has three main properties: confidentiality, integrity and availability. Overall, the property of confidentiality prevents illegal access. The property of integrity guarantees detection of any modification of data, whether accidental or malicious. Finally, the property of availability protects the system against the attacks of denial of service. Digital watermarking is a technology for embedding digital information in digital content (audio, images, video ) [1][2][3]. It has introduced as a tool to improve the security, and different watermarking schemes have been proposed to address the problems of medical privacy and security [4][5][12]. In this article we present a secured system for medical database. The security mentioned in this paper is primarily concerned with the integrity and confidentiality of data. The section 2 includes a description of the software that was used for the implementation of our system, special attention will be reserved for the ORACLE Database Management System and security procedures offered by the latter to ensure confidentiality. The section 3 describes the functionalities of this system in particular the one of watermarking used like an additional mean to enhance the integrity and confidentiality in database system. 2 Environment of achieving system To develop our system we use Java language and Oracle DBMS (Database management system). Java was used to design the user interface and implement the functionalities of the system. The Oracle database was used for the storage and retrieval of data. 2.1 Java We used Java to develop the user interface on the one hand, and implement the functionalities of the system on the other. We chose this language for security, portability and particularly his API (Advanced Programming Interface) with classes of handling of image.
3 2.2 The Oracle DBMS with SecureFiles Oracle is a database system that can manage complex objects like image. In previous versions of Oracle, The image is either integrated into the database (BLOB) or outside (BFILE) storing a descriptor of the file containing this image (Figure 1). [6].gif.jpg Etc DB s BFILE BFILE Reference.gif.jpg Etc External files WWW BLOB Images integrated in DB Images outside of DB Fig. 1. Image BLOB and BFILE In this work, we use the new Oracle Database 11g technology, Oracle SecureFiles. Oracle SecureFiles is a novel architecture that provides the most scalable execution of filesystem-like unstructured content and advanced filesystems while preserving the rich features and benefits of the Oracle database server [7]. SecureFile LOBs allow the integration of images in the database and hence benefit from: Super fast and powerful file storage. Sharing, confidentiality, consistency, etc. 2.3 Interaction Java / Oracle The integration of SQL code in the Java code allows the manipulation of textual data from the database (information about the patient) using the user interface. This manipulation is provided by the JDBC interface. In addition, with the ORDImage class (Java class) we can perform basic operations on images SecureFile LOBs (insertion, extraction and modification).
4 3 Functionalities of the system Our system includes the basic functionalities of any information management system to insert, view and update data. In addition, it should allow the practitioner to achieve the following: Construction of the watermarked image, Storage of the watermarked image, Verify the integrity of the medical image, Retrieve patient information from the watermarked image, Archiving original image. 3.1 Construction of the watermarked image To ensure the integrity of images and confidentiality, we used the technique of watermarking where information and images of the patient are a single entity. The construction of the watermarked image is one of the main functions of our system. It includes the following tasks: retrieve the original image from database, separation of the LSB plane 1 of the image (Figure 2), construction of signature with the moments [8] of the edge map 2 (Figure 3), encryption of patient data and signature, integration of encrypted data in the LSB, construction of the watermarked image. The process of achieving this function is shown on a mammogram in Figure 2. The information is entered in first step, stored in the database without any treatment and in particular on the image. In the second step, to get watermarked image, we proceed to the integration of the ROI part of LSB and patient information and our signature using edge map of the image [9][10][11] and invariant moments [12]. The resulting image 1 Least Significant Bits plane: the back plane of the image. 2 map of points representing contour s image.
5 is then stored in database. For reasons of security and performance of the database, the original image will be saved on an external device: magnetic tape, DVD, etc. Raw Image MSB LSB Encryption LSB Extract the ROI part of LSB & & Information of patient. Database Signature Watermarked image Fig. 2. Process of construction and storage of the watermarked image Construction of the signature The signature is composed of both the edge map and the average value of functions of moments. On the one hand the moments of second and third order are known to be invariants of the image. In other words, the values of these moments remain unchanged during a change in scale [13], rotation and / or orthogonal transformations [10][14][15]. On the other hand, the edge map uniquely characterizes the image. Any intentional or accidental modification of the image of the patient affects this map.
6 3.1.2 Creating the edge map The edge map is obtained by applying the operator Laplacian of Gaussian (LOG) [16] on the original image without LSBs bitplane. To increase the ability to integrate and reduce the space occupied by this map in terms of LSB bits of the image, we have reduced by a factor of 4 the size of the original image before the creation of this map. The logic of using the edge map is that any change on the image will affect the edge and result in the alteration of this map. This map is also used to locate the modified area. Figure 3 shows the steps for creating the edge map of a mammography image. Original Image Image without LSB Resized image Edge map of image (a) (b) (c) (d) Fig. 3. Creating the edge map of a mammography image Integration of the signature The first step is to calculate the average value of the moments of second and third order on the image of mammography without LSBs bitplane. The second step begins with the extraction of the edge map (Figure 4 (a)), which will be subdivided into blocks of 6x6 pixels. These blocks are divided in terms of LSB bits to make the difficult reconstruction of the map to illegal access. The technique of arrangement consists to replace the right part of the block by the left part of the neighbouring block and this along a circular well definite way (Figure 4 (b)). The LSBs bitplane of the image is then replaced by the ROI part of LSB and encrypted data consists of information of the patient, the average value of the moments of the second and third order, and blocks of edge. We used the symmetric AES (Advanced Encryption Standard) algorithm [17] for data encryption.
7 a b c d (a) l k p m n o e f j i h g (b) a b c p Fig. 4. Rearranging the edge map in blocks of size 6x6 pixels. (a) The edge map is divided into blocks alphabetically ordered along a circular path; (b) The blocks are arranged continuously. 3.2 Locating of tamper region The verification of the image integrity is a crucial function in our system. To check the integrity of an image already stored in the database, we begin by extracting patient s data and the average of moments (above cited) from the LSBs bitplane of this image. Then we recalculate moment invariants of the image without the LSBs bitplane. If the calculated moments is identical to that extracted from the LSBs bitplane, then the retrieved image is intact. Otherwise, the image has been altered and its integrity is not preserved. This process is illustrated in Figure 5. In the case where the image is altered, we can identify the altered region. We rearrange the edge map integrated in the LSBs bitplane by reversing the steps described above. We then compare the results to edge map of the retrieved image without the LSBs bitplane. A simple comparison of two maps allows localizing the affected region (see Figure 5).
8 Image restored from the DB Separating the level of grey of each pixel in: MSB( b7-b1) and LSB( b0 ) Deciphering tattooes from the LSB Calculating the average value of the invariant moments of the MSB Average of the invariant moments Yes = No And Intact image Image and data of Patient Extracting the map of edge Modified Image The image of the MSB reduced in 1/4 of his initial size - Extracting the edge using the LoG operator Identifying the altered region Fig. 5. The process of verifying the integrity of the image. This verification process is also shown in Figure 6 with experimental values on a mammography image. Watermarked Image Intact image Image and data of patient Difference of the Moments = 0 Verification of the integrity of the image Différence des moments = 0,0394 Modified image DB Detection of the altered region Fig. 6. The process of verifying the integrity of a mammography image.
9 4 Conclusion International Journal of Computer Engineering Science (IJCES) In this article we have implemented a security architecture using watermarking and encryption techniques in addition to the security provided by database management system. As proprieties of the security, we have treated the confidentiality (Figures 2, 3 and 4) and integrity (Figures 5 and 6) of both data and image. References 1. Jagadish, N., Subbanna Bhat, P., Acharya, R. and Niranjan, UC.: Simultaneous storage of medical images in the spatial and frequency domain: A comparative study. BioMedical Engineering OnLine (2004). 2. Cox, J., Miller, ML., Bloom, JA.: Digital Watermarking. Morgan Kauffman, San Francisco (2002). 3. Knopp, R., Robert, A.: Detection Theory and Digital Watermarking. Proceedings of SPIE, 3971:14-23 (2000). 4. Coatrieux, G., Maitre, H., Sankur, B., Rolland, Y., Collorec, R.: Relevance of Watermarking in Medical Imaging. Proceedings of the IEEE EMBS Conf. on Information Technology Applications in Biomedicine, p Arlington, USA (2000). 5. El Hajji, M., Ouaha, H., Afdel, K., Douzi, H.: Multiple Watermark for Authentication and Tamper Detection using Mixed Scales DWT. International Journal of Computer Applications ( ), Volume 28 No.6 (2011). 6. Sears, R., Ingen, C., Gray, J.: To BLOB or not to BLOB: Large Object Storage in a database or Filesystem?. Microsoft Research Technical Report, MSR-TR (2006). 7. Rajamani, R.: Oracle Database 11g: SecureFiles, An Oracle White Paper (2007). 8. Ming-Kuel, H.: Visual pattern recognition by moment invariants, IRE Trans. Information Theory, IT (8), (1962).
10 9. Lavanya, A., Natarajan, V.: Enhancing security of DICOM images during storage and transmission in distributed environment. Sadhana,Vol. 36, Part 4 (2011). 10. Siva Sankar, A., Jayachandra Prasad, T., Giri Prasad, M.N.: LSB Based Lossless Digital Image Watermarking using Polynomials in Spatial Domain for DRM. IJCA Proceedings on International Conference and workshop on Emerging Trends in Technology, 13, 18-23, (2011). 11. Khamlichi, Y.I., Zaz, Y., Machkour, M., AFDEL, K.: Authentication Watermarked System for Content Based Medical Image. WSEAS Transactions on Signal Processing, Issue 5, Volume 2, ISSN , pp (2006). 12. Khamlichi, Y.I., Machkour, M., AFDEL, K., Moudden, A.: Multiple Watermark for Tamper Detection in Mammography Images, WSEAS Transactions on Computers, Issue 6, Volume 5, ISSN , pp (2006). 13. Mamistvalov, A. G.: n-dimensial moment invariants and conceptual theory of recognition n-dimensional solids. IEEE Trans. On PAMI, 20 (8) : (1998). 14. Schmid, C.: Image Matching by local invariants of gray levels: application to the indexing of a database of objects, PhD thesis, INRIA-France (1996). 15. Tahri, O., Chaumette, F.: Determination of Moment Invariants and Their Application to Visual Servoing, Research Report No June 2003, INRIA- France (2003). 16. Hildreth, E. C.: The Detection of Intensity Changes by Computer and Biological Vision Systems, Computer Vision, Graphics, and Image Processing, 22, 1-27 (1983). 17. Daemen, J., Rijmen, V.: AES Proposal Rijndael, Networks, 2nd ed. (1999). [Online]. Available:
CHAPTER 7 CONCLUSION AND FUTURE WORK
158 CHAPTER 7 CONCLUSION AND FUTURE WORK The aim of this thesis was to present robust watermarking techniques for medical image. Section 7.1, consolidates the contributions made by the researcher and Section
Keywords Android, Copyright Protection, Discrete Cosine Transform (DCT), Digital Watermarking, Discrete Wavelet Transform (DWT), YCbCr.
Volume 3, Issue 7, July 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Web Based Novel
WATERMARKING FOR IMAGE AUTHENTICATION
WATERMARKING FOR IMAGE AUTHENTICATION Min Wu Bede Liu Department of Electrical Engineering Princeton University, Princeton, NJ 08544, USA Fax: +1-609-258-3745 {minwu, liu}@ee.princeton.edu ABSTRACT A data
Image Authentication Scheme using Digital Signature and Digital Watermarking
www..org 59 Image Authentication Scheme using Digital Signature and Digital Watermarking Seyed Mohammad Mousavi Industrial Management Institute, Tehran, Iran Abstract Usual digital signature schemes for
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING
SECURE DATA TRANSMISSION USING DIGITAL IMAGE WATERMARKING 1 Maulik Srivastava, 2 Anuradha Sharma 1,2 Department of Computer Science & Engineering, Amity University, Uttar Pradesh Abstract: As we all know
Euler Vector: A Combinatorial Signature for Gray-Tone Images
Euler Vector: A Combinatorial Signature for Gray-Tone Images Arijit Bishnu, Bhargab B. Bhattacharya y, Malay K. Kundu, C. A. Murthy fbishnu t, bhargab, malay, [email protected] Indian Statistical Institute,
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 12, December 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com
Reversible Data Hiding for Security Applications
Reversible Data Hiding for Security Applications Baig Firdous Sulthana, M.Tech Student (DECS), Gudlavalleru engineering college, Gudlavalleru, Krishna (District), Andhra Pradesh (state), PIN-521356 S.
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS)
A PERFORMANCE EVALUATION OF COMMON ENCRYPTION TECHNIQUES WITH SECURE WATERMARK SYSTEM (SWS) Ashraf Odeh 1, Shadi R.Masadeh 2, Ahmad Azzazi 3 1 Computer Information Systems Department, Isra University,
International Journal of Emerging Technology and Advanced Engineering Website: www.ijetae.com (ISSN 2250-2459, Volume 2, Issue 9, September 2012)
Authentication of Medical Images using Integer Transforms A.Kannammal 1, Dr.S.Subha Rani 2 1 Assistant professor, 2 Professor and Head, ECE Department, PSG College of Technology, Peelamedu, Coimbatore
2695 P a g e. IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India
Integrity Preservation and Privacy Protection for Digital Medical Images M.Krishna Rani Dr.S.Bhargavi IV Semester M.Tech (DCN) SJCIT Chickballapur Karnataka India Abstract- In medical treatments, the integrity
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques
A Secure File Transfer based on Discrete Wavelet Transformation and Audio Watermarking Techniques Vineela Behara,Y Ramesh Department of Computer Science and Engineering Aditya institute of Technology and
Security and protection of digital images by using watermarking methods
Security and protection of digital images by using watermarking methods Andreja Samčović Faculty of Transport and Traffic Engineering University of Belgrade, Serbia Gjovik, june 2014. Digital watermarking
Friendly Medical Image Sharing Scheme
Journal of Information Hiding and Multimedia Signal Processing 2014 ISSN 2073-4212 Ubiquitous International Volume 5, Number 3, July 2014 Frily Medical Image Sharing Scheme Hao-Kuan Tso Department of Computer
Experimental DRM Architecture Using Watermarking and PKI
Experimental DRM Architecture Using Watermarking and PKI Mikko Löytynoja, Tapio Seppänen, Nedeljko Cvejic MediaTeam Oulu Information Processing Laboratory University of Oulu, Finland {mikko.loytynoja,
Secure cloud access system using JAR ABSTRACT:
Secure cloud access system using JAR ABSTRACT: Cloud computing enables highly scalable services to be easily consumed over the Internet on an as-needed basis. A major feature of the cloud services is that
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY
AN ENHANCED MECHANISM FOR SECURE DATA TRANSMISSION USING STEGANOGRAPHY MERGED WITH VISUAL CRYPTOGRAPHY Chandan Mohapatra 1, Manajusha Pandey 2 1 PG Student in Computer Science Dept., KIIT University, Bhubaneswar,
Application-Specific Biometric Templates
Application-Specific Biometric s Michael Braithwaite, Ulf Cahn von Seelen, James Cambier, John Daugman, Randy Glass, Russ Moore, Ian Scott, Iridian Technologies Inc. Introduction Biometric technologies
ROI Based Medical Image Watermarking with Zero Distortion and Enhanced Security
I.J. Modern Education and Computer Science, 2014, 10, 40-48 Published Online October 2014 in MECS (http://www.mecs-press.org/) DOI: 10.5815/ijmecs.2014.10.06 ROI Based Medical Image Watermarking with Zero
Master s Program in Information Systems
The University of Jordan King Abdullah II School for Information Technology Department of Information Systems Master s Program in Information Systems 2006/2007 Study Plan Master Degree in Information Systems
A comprehensive survey on various ETC techniques for secure Data transmission
A comprehensive survey on various ETC techniques for secure Data transmission Shaikh Nasreen 1, Prof. Suchita Wankhade 2 1, 2 Department of Computer Engineering 1, 2 Trinity College of Engineering and
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment
Watermarking Techniques for Protecting Intellectual Properties in a Digital Environment Isinkaye F. O*. and Aroge T. K. Department of Computer Science and Information Technology University of Science and
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022
STEGANOGRAPHY: TEXT FILE HIDING IN IMAGE YAW CHOON KIT CA10022 FACULTY OF COMPUTER SYSTEM AND SOFTWARE ENGINEERING 2012/2013 1 ABSTRACT Steganography is the art or science in hiding. It is origin from
Triple Security of Information Using Stegnography and Cryptography
Triple Security of Information Using Stegnography and Cryptography Abstract In this growing age information sharing and transfer has increased exponentially so, security is a primary requirement for all
Data Integrity by Aes Algorithm ISSN 2319-9725
Data Integrity by Aes Algorithm ISSN 2319-9725 Alpha Vijayan Nidhiya Krishna Sreelakshmi T N Jyotsna Shukla Abstract: In the cloud computing, data is moved to a remotely located cloud server. Cloud will
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES
AUTHORIZED WATERMARKING AND ENCRYPTION SYSTEM BASED ON WAVELET TRANSFORM FOR TELERADIOLOGY SECURITY ISSUES S.NANDHINI PG SCHOLAR NandhaEngg. College Erode, Tamilnadu, India. Dr.S.KAVITHA M.E.,Ph.d PROFESSOR
MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO SOX COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But it s
ISSN: 2348 9510. A Review: Image Retrieval Using Web Multimedia Mining
A Review: Image Retrieval Using Web Multimedia Satish Bansal*, K K Yadav** *, **Assistant Professor Prestige Institute Of Management, Gwalior (MP), India Abstract Multimedia object include audio, video,
Information Security for Modern Enterprises
Information Security for Modern Enterprises Kamal Jyoti 1. Abstract Many enterprises are using Enterprise Content Management (ECM) systems, in order to manage sensitive information related to the organization.
Multimedia Document Authentication using On-line Signatures as Watermarks
Multimedia Document Authentication using On-line Signatures as Watermarks Anoop M Namboodiri and Anil K Jain Department of Computer Science and Engineering Michigan State University East Lansing, MI 48824
Journal of Electronic Banking Systems
Journal of Electronic Banking Systems Vol. 2015 (2015), Article ID 614386, 44 minipages. DOI:10.5171/2015.614386 www.ibimapublishing.com Copyright 2015. Khaled Ahmed Nagaty. Distributed under Creative
INTERNATIONAL JOURNAL OF APPLIED ENGINEERING RESEARCH, DINDIGUL Volume 1, No 3, 2010
Lossless Medical Image Security Shrikhande Rohini 1, Vinayak Bairagi 2 1 Researcher, Electronics & Telecommunication Department, Sinhgad Academy Of Engg. 2 Assistant Professor, Electronics & Telecommunication
Safer data transmission using Steganography
Safer data transmission using Steganography Arul Bharathi, B.K.Akshay, M.Priy a, K.Latha Department of Computer Science and Engineering Sri Sairam Engineering College Chennai, India Email: [email protected],
Multi-factor Authentication in Banking Sector
Multi-factor Authentication in Banking Sector Tushar Bhivgade, Mithilesh Bhusari, Ajay Kuthe, Bhavna Jiddewar,Prof. Pooja Dubey Department of Computer Science & Engineering, Rajiv Gandhi College of Engineering
REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES
REGION OF INTEREST CODING IN MEDICAL IMAGES USING DIAGNOSTICALLY SIGNIFICANT BITPLANES Sharath T. ChandraShekar Sarayu Technologies, India Gomata L. Varanasi Samskruti, India ABSTRACT Accelerated expansion
Chapter 23. Database Security. Security Issues. Database Security
Chapter 23 Database Security Security Issues Legal and ethical issues Policy issues System-related issues The need to identify multiple security levels 2 Database Security A DBMS typically includes a database
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device
Multifactor Graphical Password Authentication System using Sound Signature and Handheld Device Jyoti Rao *1,Kishan Mistry #2, Bhumika Mistry #3, Divya Malviya #4, Devesh Gudway #5 # Student & Department
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS.
PSG College of Technology, Coimbatore-641 004 Department of Computer & Information Sciences BSc (CT) G1 & G2 Sixth Semester PROJECT DETAILS Project Project Title Area of Abstract No Specialization 1. Software
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption
Partitioning Data and Domain Integrity Checking for Storage - Improving Cloud Storage Security Using Data Partitioning Technique Santosh Jogade *, Ravi Sharma, Prof. Rajani Kadam Department Of Computer
How To Encrypt Data With A Power Of N On A K Disk
Towards High Security and Fault Tolerant Dispersed Storage System with Optimized Information Dispersal Algorithm I Hrishikesh Lahkar, II Manjunath C R I,II Jain University, School of Engineering and Technology,
Colour Image Encryption and Decryption by using Scan Approach
Colour Image Encryption and Decryption by using Scan Approach, Rinkee Gupta,Master of Engineering Scholar, Email: [email protected] Jaipal Bisht, Asst. Professor Radharaman Institute Of Technology
An Oracle White Paper February 2009. Managing Unstructured Data with Oracle Database 11g
An Oracle White Paper February 2009 Managing Unstructured Data with Oracle Database 11g Introduction The vast majority of the information used by corporations, enterprises, and other organizations is referred
1 File Processing Systems
COMP 378 Database Systems Notes for Chapter 1 of Database System Concepts Introduction A database management system (DBMS) is a collection of data and an integrated set of programs that access that data.
Security Based Data Transfer and Privacy Storage through Watermark Detection
Security Based Data Transfer and Privacy Storage through Watermark Detection Gowtham.T 1 Pradeep Kumar.G 2 1PG Scholar, Applied Electronics, Nandha Engineering College, Anna University, Erode, India. 2Assistant
Secured Lossless Medical Image Compression Based On Adaptive Binary Optimization
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. IV (Mar-Apr. 2014), PP 43-47 Secured Lossless Medical Image Compression Based On Adaptive Binary
JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS. Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany
JAVA-BASED FRAMEWORK FOR REMOTE ACCESS TO LABORATORY EXPERIMENTS Christof Röhrig, 1 Andreas Jochheim 2 Department of Electrical Engineering University of Hagen D-58084 Hagen, Germany Abstract: This paper
A Study of New Trends in Blowfish Algorithm
A Study of New Trends in Blowfish Algorithm Gurjeevan Singh*, Ashwani Kumar**, K. S. Sandha*** *(Department of ECE, Shaheed Bhagat Singh College of Engg. & Tech. (Polywing), Ferozepur-152004) **(Department
Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003. Presented by An In seok. 2010.12.
Digital Rights Management for Content Distribution Qiong Liu, Reihaneh Safavi Naini and Nicholas Paul Sheppard Australasian Information Security Workshop 2003 Presented by An In seok. 2010.12.1 Contents
Extracting, Storing And Viewing The Data From Dicom Files
Extracting, Storing And Viewing The Data From Dicom Files L. Stanescu, D.D Burdescu, A. Ion, A. Caldare, E. Georgescu University of Kraiova, Romania Faculty of Control Computers and Electronics www.software.ucv.ro/en.
Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns
RESEARCH ARTICLE OPEN ACCESS Novel Unique Technique for Generating Ticket Identifier Using Image Texture Patterns Mrs. Jayashree Katti, Sharadchandra Chavan, Dr. Sudeep Thepade, Samruddhi Puranik, Triloknath
SCAN-CA Based Image Security System
SCAN-CA Based Image Security System Bhagyashree.S.Anantwar 1, S.P.Sonavane 2 Student, Department of Computer Science and Engg, Walchand College of Engg, Sanli, India 1 Asso. Professor, Department of Information
How To Ensure Correctness Of Data In The Cloud
A MECHANICS FOR ASSURING DATA STORAGE SECURITY IN CLOUD COMPUTING 1, 2 Pratibha Gangwar, 3 Mamta Gadoria 1 M. Tech. Scholar, Jayoti Vidyapeeth Women s University, Jaipur, [email protected] 2 M. Tech.
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms
A Robust and Lossless Information Embedding in Image Based on DCT and Scrambling Algorithms Dr. Mohammad V. Malakooti Faculty and Head of Department of Computer Engineering, Islamic Azad University, UAE
ADVANCE SECURITY TO CLOUD DATA STORAGE
Journal homepage: www.mjret.in ADVANCE SECURITY TO CLOUD DATA STORAGE ISSN:2348-6953 Yogesh Bhapkar, Mitali Patil, Kishor Kale,Rakesh Gaikwad ISB&M, SOT, Pune, India Abstract: Cloud Computing is the next
DATABASE SECURITY, INTEGRITY AND RECOVERY
DATABASE SECURITY, INTEGRITY AND RECOVERY DATABASE SECURITY, INTEGRITY AND RECOVERY Database Security and Integrity Definitions Threats to security and integrity Resolution of problems DEFINITIONS SECURITY:
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance
Chapter 3: Data Mining Driven Learning Apprentice System for Medical Billing Compliance 3.1 Introduction This research has been conducted at back office of a medical billing company situated in a custom
International Journal of Engineering Technology, Management and Applied Sciences. www.ijetmas.com November 2014, Volume 2 Issue 6, ISSN 2349-4476
ERP SYSYTEM Nitika Jain 1 Niriksha 2 1 Student, RKGITW 2 Student, RKGITW Uttar Pradesh Tech. University Uttar Pradesh Tech. University Ghaziabad, U.P., India Ghaziabad, U.P., India ABSTRACT Student ERP
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE. [email protected]
LOCAL SURFACE PATCH BASED TIME ATTENDANCE SYSTEM USING FACE 1 S.Manikandan, 2 S.Abirami, 2 R.Indumathi, 2 R.Nandhini, 2 T.Nanthini 1 Assistant Professor, VSA group of institution, Salem. 2 BE(ECE), VSA
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING
REAL TIME TRAFFIC LIGHT CONTROL USING IMAGE PROCESSING Ms.PALLAVI CHOUDEKAR Ajay Kumar Garg Engineering College, Department of electrical and electronics Ms.SAYANTI BANERJEE Ajay Kumar Garg Engineering
How To Secure Cloud Computing, Public Auditing, Security, And Access Control In A Cloud Storage System
REVIEW ARTICAL A Novel Privacy-Preserving Public Auditing and Secure Searchable Data Cloud Storage Dumala Harisha 1, V.Gouthami 2 1 Student, Computer Science & Engineering-Department, JNTU Hyderabad India
A Survey on Security Issues and Security Schemes for Cloud and Multi-Cloud Computing
International Journal of Emerging Engineering Research and Technology Volume 3, Issue 5, May 2015, PP 1-7 ISSN 2349-4395 (Print) & ISSN 2349-4409 (Online) A Survey on Security Issues and Security Schemes
Paper-based Document Authentication using Digital Signature and QR Code
2012 4T International Conference on Computer Engineering and Technology (ICCET 2012) Paper-based Document Authentication using Digital Signature and QR Code Maykin Warasart and Pramote Kuacharoen Department
White Paper: Librestream Security Overview
White Paper: Librestream Security Overview TABLE OF CONTENTS 1 SECURITY OVERVIEW... 3 2 USE OF SECURE DATA CENTERS... 3 3 SECURITY MONITORING, INTERNAL TESTING AND ASSESSMENTS... 4 3.1 Penetration Testing
A Robust Multimedia Contents Distribution over IP based Mobile Networks
, pp. 283-288 http://dx.doi.org/10.14257/ijseia.2015.9.9.24 A Robust Multimedia Contents Distribution over IP based Mobile Networks Ronnie D. Caytiles, Seungyong Shin and Byungjoo Park * Multimedia Engineering
Network Security. Security Attacks. Normal flow: Interruption: 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室
Network Security 孫 宏 民 [email protected] Phone: 03-5742968 國 立 清 華 大 學 資 訊 工 程 系 資 訊 安 全 實 驗 室 Security Attacks Normal flow: sender receiver Interruption: Information source Information destination
Design of Distributed Pharmaceutical Retail Management System Based on Advanced Encryption Standard Algorithm
, pp. 35-42 http://dx.doi.org/10.14257/ijsia.2015.9.6.04 Design of Distributed Pharmaceutical Retail System Based on Advanced Encryption Standard Algorithm Jingjing Yang, Yuanqiang Wang and Xiao Zhang*
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies
Volume 3, Issue 6, June 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at: www.ijarcsms.com Image
Oracle Plug-in for Windows Agent 7.1 User Guide
Oracle Plug-in for Windows Agent 7.1 User Guide Revision: This manual has been updated for Version 7.1 for Windows (November 2012). Software Version: 7.10 for Windows 1997-2012 The software manufacturer
Integration of Sound Signature in 3D Password Authentication System
Integration of Sound Signature in 3D Password Authentication System Mr.Jaywant N. Khedkar 1, Ms.Pragati P. Katalkar 2, Ms.Shalini V. Pathak 3, Mrs.Rohini V.Agawane 4 1, 2, 3 Student, Dept. of Computer
Healthcare Compliance Solutions
Privacy Compliance Healthcare Compliance Solutions Trust and privacy are essential for building meaningful human relationships. Let Protected Trust be your Safe Harbor The U.S. Department of Health and
Oracle Database 11g Comparison Chart
Key Feature Summary Express 10g Standard One Standard Enterprise Maximum 1 CPU 2 Sockets 4 Sockets No Limit RAM 1GB OS Max OS Max OS Max Database Size 4GB No Limit No Limit No Limit Windows Linux Unix
MULTIFACTOR AUTHENTICATION FOR SOFTWARE PROTECTION
Diyala Journal of Engineering Sciences Second Engineering Scientific Conference College of Engineering University of Diyala 16-17 December. 2015, pp. 479-492 ISSN 1999-8716 Printed in Iraq MULTIFACTOR
Data Mining in Web Search Engine Optimization and User Assisted Rank Results
Data Mining in Web Search Engine Optimization and User Assisted Rank Results Minky Jindal Institute of Technology and Management Gurgaon 122017, Haryana, India Nisha kharb Institute of Technology and Management
Implementation and Design of AES S-Box on FPGA
International Journal of Research in Engineering and Science (IJRES) ISSN (Online): 232-9364, ISSN (Print): 232-9356 Volume 3 Issue ǁ Jan. 25 ǁ PP.9-4 Implementation and Design of AES S-Box on FPGA Chandrasekhar
SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD
Volume 1, Issue 7, PP:, JAN JUL 2015. SECURE CLOUD STORAGE PRIVACY-PRESERVING PUBLIC AUDITING FOR DATA STORAGE SECURITY IN CLOUD B ANNAPURNA 1*, G RAVI 2*, 1. II-M.Tech Student, MRCET 2. Assoc. Prof, Dept.
Simple Encryption/Decryption Application
Simple Encryption/Decryption Application Majdi Al-qdah Faculty of Information Technology Multimedia University Cyberjaya, 63100, Malaysia [email protected] Lin Yi Hui Faculty of Information Technology
15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM
RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN
MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO PCI DSS COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both. But
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT
Dynamic Binary Location based Multi-watermark Embedding Algorithm in DWT Ammar Jameel Hussein, Seda Yuksel, and Ersin Elbasi Abstract In order to achieve a good imperceptibility and robustness, using 4-level
<Insert Picture Here> Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region
Oracle Database Directions Fred Louis Principal Sales Consultant Ohio Valley Region 1977 Oracle Database 30 Years of Sustained Innovation Database Vault Transparent Data Encryption
MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE
WHITE PAPER MANAGED FILE TRANSFER: 10 STEPS TO HIPAA/HITECH COMPLIANCE 1. OVERVIEW Do you want to design a file transfer process that is secure? Or one that is compliant? Of course, the answer is both.
A CASE STUDY OF ELECTRONIC SIGNATURE APPLIED IN PRE-EMPLOYMENT SCREENING INDUSTRY
100 A CASE STUDY OF ELECTRONIC SIGNATURE APPLIED IN PRE-EMPLOYMENT SCREENING INDUSTRY Miao Kang, Haris Mouratidis School of Computing, IT and Engineering, University of East London [email protected], [email protected]
Secure Cloud Architecture for Preserving Privacy in Cloud Computing using OTPWTP
Global Journal of Computer Science and Technology Cloud and Distributed Volume 13 Issue 3 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Sports Management Information Systems. Camilo Rostoker November 22, 2002
Sports Management Information Systems Camilo Rostoker November 22, 2002 Introduction We are in the information age The availability of technology has brought forth a new problem domain how do we manage
Improving data integrity on cloud storage services
International Journal of Engineering Science Invention ISSN (Online): 2319 6734, ISSN (Print): 2319 6726 Volume 2 Issue 2 ǁ February. 2013 ǁ PP.49-55 Improving data integrity on cloud storage services
Secret Sharing based on XOR for Efficient Data Recovery in Cloud
Secret Sharing based on XOR for Efficient Data Recovery in Cloud Computing Environment Su-Hyun Kim, Im-Yeong Lee, First Author Division of Computer Software Engineering, Soonchunhyang University, [email protected]
