Volume 6 Number 3 September 2015

    
Design and Implementation of Collaborative Ciphertext-Policy Attribute-Role based Encryption for Data Access Control in Cloud

Somchart Fugkeaw, Hiroyuk Sato

https://doi.org/

Abstract In a real-world collaborative data sharing scenario in cloud computing, there are multiple users who can access the resource shared by multiple data owners anytime and anywhere. The evolution of user status, roles, and privilege in the federated data sharing environment become even more and more complex to handle. Efficiently managing multiple access control policies and providing appropriate access control to different groups... Read More


A Digital Video Watermarking Algorithm Based on LSB and DCT

Kirti Jain, U.S.N Raju

https://doi.org/

Abstract In this paper a new watermarking algorithm is proposed for videos. The developed method embeds a binary image as watermark into a colour avi video..In the proposed method, LSB and DCT both are embedded in the video frames. We compare our algorithm with 2-LSB using Peak signal-to-noise ratio (PSNR). Experimental results show that the quality of the watermarked image is higher. PSNR value... Read More


A Note on Processing Time of Biometric Identification

Serina Egawa1, Ali Ismail Awad2, Kensuke Baba1

https://doi.org/

Abstract This paper evaluates an existing algorithm for biometric identification. In identification based on biometric images, the number of image comparisons is an important factor to estimate the total processing time in addition to the processing time of a single image comparison. Maeda et al. proposed an identification algorithm which reduces the number of image comparisons. This paper evaluates the algorithm in terms of... Read More