International Journal of Trend in Scientific Research and Development: Computer Security

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Showing posts with label Computer Security. Show all posts
Showing posts with label Computer Security. Show all posts

Saturday, 28 August 2021

Data Security by AES Advanced Encryption Standard

August 28, 2021 0
Data Security by AES Advanced Encryption Standard

Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are trying to modify the existing algorithm or even develop new algorithms that help to increase security with a little encryption time. Here in this paper, we have furnished a new technology to modify the AES algorithm which gives more security with a little encryption time and which can be used to encrypt using 128 bit key. Theoretical analysis on the proposed algorithm with the existing reveals the novelty of our work. Here we have proposed a technique to randomize the key and hidden the key data into an encrypted digital image using the basics concept of cryptography and also using the concept of digital watermarking, the concept of key hide has also been encrypted. We have also proposed a new technique to reposition the pixels to break the correlation between them. So, the proposed scheme offers a more secure and cost effective mechanism for encryption. Next on the AES criteria list good performance. Widespread market adoption will require reasonably good performance on a variety of platforms, ranging from easy tocrack smart cards to the largest servers. Good algorithm performance includes speed for the encryption and decryption process as well as the key schedule. 

by Prateek Goyal | Ms. Shalini Bhadola | Ms. Kirti Bhatia "Data Security by AES (Advanced Encryption Standard)" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd45073.pdf 

Paper URL: https://www.ijtsrd.com/computer-science/computer-security/45073/data-security-by-aes-advanced-encryption-standard/prateek-goyal


callforpaperphysics, physicsjournal

Wednesday, 25 August 2021

Security Issues Related to Biometrics

August 25, 2021 0
Security Issues Related to Biometrics

With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals. In this paper we will be discussing about biometrics and its types and the threats and security issues which is not talked about usually. The different technologies evolved and had contributed to biometrics in long run and their effects. 

by Sushmita Raulo | Saurabh Gawade "Security Issues Related to Biometrics" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd44951.pdf 

Paper URL: https://www.ijtsrd.com/computer-science/computer-security/44951/security-issues-related-to-biometrics/sushmita-raulo


openaccessjournalofengineering, engineeringjournal, paperpublicationforengineering

Saturday, 7 August 2021

Privacy and Security on Social Media

August 07, 2021 0
Privacy and Security on Social Media

Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers in Business domain. There are various social media platforms like Facebook, Twitter, WhatsApp, Instagram etc. The main purpose of these sites is to allow people to share activities, interests, real life connections. Using social media we can communicate with the people in a world in a powerful and fun way. While enjoying on the social media platform it requires a great knowledge of privacy and security. The Internet is the safe place for only those people who are aware about the risk and the security, and can protect themselves from any fraud. Social media is a sometimes good because it allows you to share what actually we want to share, but it can also be used for negative purpose and in both the cases we are responsible for our security. In this paper we will describe about the privacy and security issues associated with social media. 

Rachana Khandagale | Manali Gamre "Privacy and Security on Social Media" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-5 , August 2021, 

URL: https://www.ijtsrd.com/papers/ijtsrd43821.pdf

Paper URL: https://www.ijtsrd.com/computer-science/computer-security/43821/privacy-and-security-on-social-media/rachana-khandagale


callforpapersocialscience, ugcapprovedjournalsforsocialscience, socialsciencejournal

Tuesday, 29 June 2021

Image Cryptography using RSA Algorithm

June 29, 2021 0
Image Cryptography using RSA Algorithm

Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For cryptography there are algorithms like RSA, IDEA, AES, and DES but here we are using only one algorithm from these that is RSA which is enough to implement combined process using 2 bit rotation. The encrypted image is used as input for network for further implementation.RSA encrypt image with 1 bit rotation. In 1 bit rotation only 1 bit is shifted and at decrypt side shifted bit are reversed. But to make it more secure we are going to perform 2 bit rotation due to which it is more secure as compared to existing algorithm. After applying the 2 bit rotation we perform the permutation of that image that will give us encrypted image. 


by Shivam Kumar | Dr. Ganesh D "Image Cryptography using RSA Algorithm" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd42408.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42408/image-cryptography-using-rsa-algorithm/shivam-kumar

callforpapermathematics, mathematicsjournal, ugcapprovedjournalsinmathemetics

Friday, 25 June 2021

Personal Health Record over Encrypted Data Using Cloud Service

June 25, 2021 0
Personal Health Record over Encrypted Data Using Cloud Service

CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR systems in health care sector. The paper is discussing a cloud based patient health record management scheme which is highly secured. In this approach, indexes are encrypted under different symmetric keys and also the encrypted data indexes from various data providers can be merge by cloud without knowing the index content. It also provides efficient and privacy preserving query processing using a single data query submitted by the data user. Encrypted data will be processed by cloud from all related data providers without knowing its query content. 


by Dinesh Soni | Dr. Lakshmi JVN "Personal Health Record over Encrypted Data Using Cloud Service" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd41230.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41230/personal-health-record-over-encrypted-data-using-cloud-service/dinesh-soni

callforpaperpharmacy, pharmacyjournal, internationalpeerreviewedjournal

Sunday, 20 June 2021

Organised Crime in the Digital Age

June 20, 2021 0
Organised Crime in the Digital Age

Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to enhance the efficiency and effectiveness of their own operations. This paper will discuss the organized criminal exploitation of digital technology, by looking at a number of illustrative cases from Asia and around the world. It will discuss the various types of “conventional” organized crime that can be facilitated by digital technology, as well as terrorism, which itself can be regarded as a special kind of organized criminal activity. One fundamental question that the paper will seek to address is whether the activities of Asian organized crime have become substantively different as a result of technology, or whether traditional organized criminal activities in Asia are merely being conducted on a more efficient and effective basis. The paper will note the transnational nature of much organized criminal activity, and will discuss mechanisms for the control of organized crime in the digital age. 


by Dr. S. Krishnan | Mr Harsh Pratap | Ms Sakshi Gupta "Organised Crime in the Digital Age" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd41185.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/41185/organised-crime-in-the-digital-age/dr-s-krishnan

callforpaperlifesciences, lifesciencesjournal, researchpapers

Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique

June 20, 2021 0
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique

Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity, security, and so on. In our research, we studied the two most popular techniques of image steganography, least significant bit LSB and chaotic logistic mapping to find the similarities, dissimilarities, and many other factors. In this paper, we presented a detailed comparison of the LSB and chaotic logistic mapping based image steganography for various carrier images and messages. 

by Tokey Ahmmed | Ipshita Tasnim Raha | Faizah Safwat | Nakib Aman Turzo "Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique" 

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-5 | Issue-4 , June 2021, 

URL: https://www.ijtsrd.compapers/ijtsrd42494.pdf 

Paper URL: https://www.ijtsrd.comcomputer-science/computer-security/42494/impact-of-message-size-on-least-significant-bit-and-chaotic-logistic-mapping-steganographic-technique/tokey-ahmmed


internationaljournalofmanagement
, callforpapermanagement, managementjournal 

Ad