Volume 7 Number 1 March 2016

    
A Novel Progressive Visual Cryptography Approach with Chaotic Map for Securing Digital Contents

Dhiraj Pandey, Uma Shankar Rawat

https://doi.org/

Abstract Progressive Visual Cryptography (PVC) is quite suitable for sharing sensitive digital data where, as the number of stacked share increases, more black regions will be decrypted. Over the past few years, designing of progressive visual recovery technique has been studied by many researchers. Previous research on PVC, such as Fang et al. (2006) and W.P.Fang et al. (2008) were all carrying pixel-expansion problem... Read More


A Framework for Service Formalization and Negotiation for Trust Maintenance in Digital Environments

Olivia Fachrunnisa

https://doi.org/

Abstract Virtual environments are increasingly being used as a medium for conducting business activities. Compared with the physical environments, they offer a faster medium for carrying out activities, especially so when geographical distances are great. The key factor impeding the adoption of e-business is trust. This is because trusting agent and trusted agent might never meet each other in face-to-face or at best this... Read More


Secure and Cost Effective Cryptosystem Design Based on Random Multiple Key Streams

Penchalaiah Padugupati, Ramesh Reddy K

https://doi.org/

Abstract There are many cryptographic systems that use complex operations involving substitutions and permutations to produce resistant ciphertext, even if the level of the security of these cryptosystems are good, there should be tradeoff between security level and operational cost and the ever increasing virtual infrastructure and mobile, cloud computing technologies creating much more complexities and demanding cost effective and secure cryptographic algorithms. In order... Read More