Volume 1 Number 2 July 2010

    
Modification of Finite Automata Public Key Cryptosystem

Siranush Chopuryan, Gevorg Margarov

https://doi.org/

Abstract Existing finite automata public key cryptosystems (FAPKC) are analyzed in this paper. General types of cryptanalytic attacks on FAPKC are discussed and methods of breaking FAPKC by some known types of attacks are introduced. The times needed to perform the usual cryptanalytic attacks on FAPKC are calculated, in order to estimate processing complexity of those attacks. The contrastive analysis of... Read More


Scalar Quantization Based Robust Multiple Image Watermarking

Jaishree Rai, Vijendra Rai, Suneeta Agarwal

https://doi.org/

Abstract With respect to the general information hiding problem, a tradeoff is involved between robustness, visibility and capacity. Security of digital multimedia content has become an important issue for content owners and service providers. As watermarking is identified as a major technology to achieve copyright protection. There are many watermarking techniques for data hiding and each of them has some advantages... Read More


Recursive Reversible Image Watermarking Using Enhancement of Difference Expansion Techniques

Shahidan M. Abdullah, Azizah A. Manaf, Mazdak Zamani

https://doi.org/

Abstract This paper proposes a high capacity reversible image watermarking scheme based on enhancement of difference expansion method. Reversible watermarking enables the embedding of useful information in a host signal without any loss of host information. We propose an enhancement of Difference Expansion technique whereby we can embed recursively into multiple layer of payload for grey scale and also RGB color... Read More


Immune-Inspired Algorithm For Network Intrusion Detection

Ameur Bennaoui, Rabah Hachemani, Belkacem Kouninef

https://doi.org/

Abstract The central challenge with computer security is determining the difference between normal and potentially harmful activity. A promising solution is emerging in the form of Artificial Immune Systems (AIS). These include the theories regarding how the immune system responds to pathogenic material. This paper takes relatively new theory: the Danger theory and Dendritic cells, and explores the relevance of those... Read More