CryptographyPub Date : 2020-01-01DOI: 10.4018/978-1-5225-0920-2.CH013
B. P. Singh, Manjit Singh, Dixit Sharma
{"title":"Chaotic Function Based ECG Encryption System","authors":"B. P. Singh, Manjit Singh, Dixit Sharma","doi":"10.4018/978-1-5225-0920-2.CH013","DOIUrl":"https://doi.org/10.4018/978-1-5225-0920-2.CH013","url":null,"abstract":"Remote health-care monitoring systems communicate biomedical information (e.g. Electrocardiogram (ECG)) over insecure networks. Protection of the integrity, authentication and confidentiality of the medical data is a challenging issue. This chapter proposed an encryption process having a 4-round five steps -encryption structure includes: the random pixel insertion, row separation, substitution of each separated row, row combination and rotation. Accuracy and security analysis of proposed method for 2D ECG encryption is evaluated on MIT-BIH arrhythmia database.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70431386","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2020-01-01DOI: 10.4018/978-1-4666-8723-3.CH006
Adrita Barari, S. Dhavale
{"title":"Video Saliency Detection for Visual Cryptography-Based Watermarking","authors":"Adrita Barari, S. Dhavale","doi":"10.4018/978-1-4666-8723-3.CH006","DOIUrl":"https://doi.org/10.4018/978-1-4666-8723-3.CH006","url":null,"abstract":"The aim of this chapter is to review the application of the technique of Visual cryptography in non-intrusive video watermarking. The power of saliency feature extraction is also highlighted in the context of Visual Cryptography based watermarking systems for videos. All schemes in literature related to Visual cryptography based video watermarking, have been brought together with special attention on the role of saliency feature extraction in each of these schemes. Further a novel approach for VC based video watermarking using motion vectors (MVP Algorithm) as a salient feature is suggested. Experimental results show the robustness of proposed MVP Algorithm against various video processing attacks. Also, compression scale invariance is achieved.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70429273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2020-01-01DOI: 10.4018/978-1-5225-2296-6.CH009
J. Mondal, Debabala Swain
{"title":"A Contemplator on Topical Image Encryption Measures","authors":"J. Mondal, Debabala Swain","doi":"10.4018/978-1-5225-2296-6.CH009","DOIUrl":"https://doi.org/10.4018/978-1-5225-2296-6.CH009","url":null,"abstract":"Images unduly assist digital communication in this aeon of multimedia. During times a person transmits confidential images over a flabby communication network, sheer protection is an accost contention to preserve the privacy of images. Encryption is one of the practice to clutch the reticence of images. Image encryption contributes a preeminent bite to charter security for secure sight data communication over the internet. Our work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70432339","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2020-01-01DOI: 10.4018/978-1-7998-1763-5.ch013
Syed Taqi Ali
{"title":"Provable Security for Public Key Cryptosystems","authors":"Syed Taqi Ali","doi":"10.4018/978-1-7998-1763-5.ch013","DOIUrl":"https://doi.org/10.4018/978-1-7998-1763-5.ch013","url":null,"abstract":"In the early years after the invention of public key cryptography by Diffie and Hellman in 1976, the design and evaluation of public key cryptosystems has been done merely in ad-hoc manner based on trial and error. The public key cryptosystem said to be secure as long as there is no successful cryptanalytic attack on it. But due to various successful attacks on the cryptosystems after development, the cryptographic community understood that this ad-hoc approach might not be good enough. The paradigm of provable security is an attempt to get rid of ad hoc design. The goals of provable security are to define appropriate models of security on the one hand, and to develop cryptographic designs that can be proven to be secure within the defined models on the other. There are two general approaches for structuring the security proof. One is reductionist approach and other is game-based approach. In these approaches, the security proofs reduce a well known problem (such as discrete logarithm, RSA) to an attack against a proposed cryptosystem. With this approach, the security of public key cryptosystem can be proved formally under the various models viz. random oracle model, generic group model and standard model. In this chapter, we will briefly explain these approaches along with the security proofs of well known public key cryptosystems under the appropriate model.","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2020-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"70443023","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2018-08-14DOI: 10.1201/9781315282497-3
Douglas R Stinson, Maura B. Paterson
{"title":"Shannon’s Theory, Perfect Secrecy, and the One-Time Pad","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-3","DOIUrl":"https://doi.org/10.1201/9781315282497-3","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41600937","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2018-08-14DOI: 10.1201/9781315282497-8
Douglas R Stinson, Maura B. Paterson
{"title":"Signature Schemes","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-8","DOIUrl":"https://doi.org/10.1201/9781315282497-8","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43326320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2018-08-14DOI: 10.1007/978-3-319-79063-3
Douglas R Stinson, Maura B. Paterson
{"title":"Post-Quantum Cryptography","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1007/978-3-319-79063-3","DOIUrl":"https://doi.org/10.1007/978-3-319-79063-3","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://sci-hub-pdf.com/10.1007/978-3-319-79063-3","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43765201","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2018-08-14DOI: 10.1201/9781315282497-13
Douglas R Stinson, Maura B. Paterson
{"title":"Miscellaneous Topics","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-13","DOIUrl":"https://doi.org/10.1201/9781315282497-13","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48373778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2018-08-14DOI: 10.1201/9781315282497-11
Douglas R Stinson, Maura B. Paterson
{"title":"Key Distribution","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-11","DOIUrl":"https://doi.org/10.1201/9781315282497-11","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43290600","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
CryptographyPub Date : 2018-08-14DOI: 10.1201/9781315282497-5
Douglas R Stinson, Maura B. Paterson
{"title":"Hash Functions and Message Authentication","authors":"Douglas R Stinson, Maura B. Paterson","doi":"10.1201/9781315282497-5","DOIUrl":"https://doi.org/10.1201/9781315282497-5","url":null,"abstract":"","PeriodicalId":36072,"journal":{"name":"Cryptography","volume":null,"pages":null},"PeriodicalIF":1.6,"publicationDate":"2018-08-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44143854","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}