-
Adaptive Steganography Based on bargain Game
Authors:
Behbod Keshavarzi,
Hamidreza Navidi,
Parvaneh Asghari,
Seyyed Hamid Haji Seyyed Javadi
Abstract:
The capacity and security of the confidential message on the channel are two important challenges in steganography. In this paper, a new block steganography model is presented using the bargain method so that a competitive model is introduced. In this game, the blocks are the same players. The bargain is provided with the aim of embedding information without reducing capacity as well as increasing…
▽ More
The capacity and security of the confidential message on the channel are two important challenges in steganography. In this paper, a new block steganography model is presented using the bargain method so that a competitive model is introduced. In this game, the blocks are the same players. The bargain is provided with the aim of embedding information without reducing capacity as well as increasing security. The proposed model shows that it can be used both of the special domain and the transform domain, which are two important methods of steganography. For this purpose, an example of a special domain model is introduced in which, In the first step, the image is divided into $n \times n$ blocks, and in the second step using the graph coloring algorithm, pixels are considered to embed confidential information in each block. In the third step, regarding the bargaining method in game theory, each block plays the role of a player, that the competition between players is based on the defined goal function, and in the best blocks in terms of two criteria of capacity and security, which here means each block has a higher security-to-capacity ratio, so it has a higher priority, which is determined based on the bargaining model. Also, information embedded in LSB two bits. An example of a conversion domain method is also shows that security increases without decreasing in capacity. The conclusion is evaluated by three criteria: PSNR, histogram, and $ε-secure$ also, 2000 standard images were evaluated and observed that the proposed method improves the block methods of embedding information.
△ Less
Submitted 10 May, 2022; v1 submitted 8 November, 2021;
originally announced November 2021.
-
Binary code optimization
Authors:
Parviz Gharehbagheri,
Sayeed Hamid Haji Sayeed Javadi,
Parvaneh Asghari,
Naser Gharehbagheri
Abstract:
This article shows that any type of binary data can be defined as a collection from codewords of variable length. This feature helps us to define an Injective and surjective function from the suggested codewords to the required codewords. Therefore, by replacing the new codewords, the binary data becomes another binary data regarding the intended goals. One of these goals is to reduce data size. I…
▽ More
This article shows that any type of binary data can be defined as a collection from codewords of variable length. This feature helps us to define an Injective and surjective function from the suggested codewords to the required codewords. Therefore, by replacing the new codewords, the binary data becomes another binary data regarding the intended goals. One of these goals is to reduce data size. It means that instead of the original codewords of each binary data, it replaced the Huffman codewords to reduce the data size. One of the features of this method is the result of positive compression for any type of binary data, that is, regardless of the size of the code table, the difference between the original data size and the data size after compression will be greater than or equal to zero. Another important and practical feature of this method is the use of symmetric codewords instead of the suggested codewords in order to create symmetry, reversibility and error resistance properties with two-way decoding.
△ Less
Submitted 2 October, 2021;
originally announced October 2021.
-
Providing a hybrid cryptography algorithm for lightweight authentication protocol in RFID with urban traffic usage case
Authors:
V. Chegeni,
H. Haj Seyyed javadi,
M. R Moazami Goudarzi,
A. Rezakhani
Abstract:
Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume in urban areas, the existing intelligent urban traffic management system based on IoT can be vital.…
▽ More
Today, the Internet of Things (IoT) is one of the emerging technologies that enable the connection and transfer of information through communication networks. The main idea of the IoT is the widespread presence of objects such as mobile devices, sensors, and RFID. With the increase in traffic volume in urban areas, the existing intelligent urban traffic management system based on IoT can be vital. Therefore, this paper focused on security in urban traffic based on using RFID. In our scheme, RFID tags chose as the purpose of this article. We, in this paper, present a mutual authentication protocol that leads to privacy based on hybrid cryptography. Also, an authentication process with RFID tags is proposed that can be read at high speed. The protocol has attempted to reduce the complexity of computing. At the same time, the proposed method can withstand attacks such as spoofing of tag and reader, tag tracking, and replay attack.
△ Less
Submitted 15 April, 2021;
originally announced April 2021.
-
Lightweight Key-Dependent Dynamic S-Boxes based on Hyperelliptic Curve for IoT Devices
Authors:
Parvaneh Asghari,
Seyyed Hamid Haj Seyyed Javadi
Abstract:
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT nodes, providing a lightweight S-Box is a challenging problem. This paper presents a key-dependent S-Box using Hyperelliptic curve. The proposed…
▽ More
Security is one of the main issues in Internet of Things (IoT). Encryption plays a curtail role in making these systems secure. Substitution Box (S-Box) has an effective impact in block encryption methods. Due to the restricted resource capacities of IoT nodes, providing a lightweight S-Box is a challenging problem. This paper presents a key-dependent S-Box using Hyperelliptic curve. The proposed S-Box is analytically evaluated using performance criteria including bijection, nonlinearity, strict avalanche effect, and algebraic degree. The evaluation results endorse that the offered S-Box production algorithm is considerably an effective way to generate cryptographic strong S-Box.
△ Less
Submitted 26 February, 2021;
originally announced February 2021.
-
A novel key pre-distribution scheme based on $μ$-PBIBD combinatorial design in the resource-constrained IoT network
Authors:
Akbar Morshed Aski,
Hamid Haj Seyyed Javadi
Abstract:
In a resource-constrained IoT network, end nodes like WSN, RFID, and embedded systems are used which have memory, processing, and energy limitations. One of the key distribution solutions in these types of networks is to use the key pre-distribution scheme, which accomplishes the key distribution operation offline before the resource-constrained devices deployment in the environment. Also, in orde…
▽ More
In a resource-constrained IoT network, end nodes like WSN, RFID, and embedded systems are used which have memory, processing, and energy limitations. One of the key distribution solutions in these types of networks is to use the key pre-distribution scheme, which accomplishes the key distribution operation offline before the resource-constrained devices deployment in the environment. Also, in order to reduce the shared key discovery computing and communication overhead, the use of combinatorial design in key pre-distribution has been proposed as a solution in recent years. In this study, a $μ$-PBIBD combinatorial design is introduced and constructed and the map** of such design as a key pre-distribution scheme in the resource-constrained IoT network is explained. Through using such key pre-distribution scheme, more keys are obtained for communication between two devices in the IoT network. This means that there will be a maximum of q + 2 keys between the two devices in the network, where q is the prime power, that is, instead of having a common key for a direct secure connection, the two devices can have q + 2 common keys in their key chain. Accordingly, we would increase the resilience of the key pre-distribution scheme compared to the SBIBD, TD, Trade-KP, UKP *, RD * and 2-D $μ$-PBIBD designs.
Keywords: resource-constrained IoT network; combinatorial design; $μ$-PBIBD; resilience.
△ Less
Submitted 14 February, 2021;
originally announced February 2021.
-
On a generalization of McCoy Rings
Authors:
Mohammad Vahdani Mehrabadi,
Shervin Sahebi,
Hamid H. S. Javadi
Abstract:
We introduce Central McCoy rings, which are a generalization of McCoy rings and investigate their properties. For a ring R, we prove that R is right Central McCoy if and only if the polynomial ring R[x] is right Central McCoy. Also, we give some examples to show that if R is right Central McCoy, then Mn(R) and Tn(R) are not necessary right Central McCoy, but Dn(R) and Vn(R) are right Central McCoy…
▽ More
We introduce Central McCoy rings, which are a generalization of McCoy rings and investigate their properties. For a ring R, we prove that R is right Central McCoy if and only if the polynomial ring R[x] is right Central McCoy. Also, we give some examples to show that if R is right Central McCoy, then Mn(R) and Tn(R) are not necessary right Central McCoy, but Dn(R) and Vn(R) are right Central McCoy, where Dn(R) and Vn(R) are the subrings of the triangular matrices with constant main diagonal and constant main diagonals, respectively.
△ Less
Submitted 13 October, 2014;
originally announced October 2014.
-
On a generalization of NC-McCoy Rings
Authors:
Mohammad Vahdani Mehrabadi,
Shervin Sahebi,
Hamid H. S. Javadi
Abstract:
In the present paper we concentrate on a natural generalization of NC-McCoy rings that is called J-McCoy and investigate their properties. We prove that local rings are J-McCoy. Also, for an abelian ring R, we show that R is J-McCoy if and only if eR is J-McCoy, where e is an idempotent element of R. Moreover, we give an example to show that the J-McCoy property does not pass Mn(R), but S(R; n);A(…
▽ More
In the present paper we concentrate on a natural generalization of NC-McCoy rings that is called J-McCoy and investigate their properties. We prove that local rings are J-McCoy. Also, for an abelian ring R, we show that R is J-McCoy if and only if eR is J-McCoy, where e is an idempotent element of R. Moreover, we give an example to show that the J-McCoy property does not pass Mn(R), but S(R; n);A(R; n);B(R; n) and T(R; n) are J-McCoy
△ Less
Submitted 12 October, 2014;
originally announced October 2014.
-
On A Generalization of Weak Armendariz Rings
Authors:
Mahboubeh Sanaei,
Shervin Sahebi,
Hamid H. S. Javadi
Abstract:
We introduce the notion of J-Armendariz rings, which are a generalization of weak Armendariz rings and investigate their properties. We show that any local ring is J-Armendariz, and then fined a local ring that is not weak Armendariz.
We introduce the notion of J-Armendariz rings, which are a generalization of weak Armendariz rings and investigate their properties. We show that any local ring is J-Armendariz, and then fined a local ring that is not weak Armendariz.
△ Less
Submitted 6 October, 2014;
originally announced October 2014.
-
On Central Skew Armendariz rings
Authors:
Mahboubeh Sanaei,
Shervin Sahebi,
Hamid H. S. Javadi
Abstract:
For a ring endomirphism, we introduce the central skew Armendariz rings, which are a generalization of skew Armendariz rings and central Armendariz rings, and investigate their properties.
For a ring endomirphism, we introduce the central skew Armendariz rings, which are a generalization of skew Armendariz rings and central Armendariz rings, and investigate their properties.
△ Less
Submitted 29 September, 2014;
originally announced September 2014.