-
Enhancing Selective Encryption for H.264/AVC Using Advanced Encryption Standard
Authors:
Mohamed Abomhara,
Omar Zakaria,
Othman O. Khalifa,
A. A Zaidan,
B. B Zaidan
Abstract:
Multimedia information availability has increased dramatically with the advent of mobile devices. but with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information, an…
▽ More
Multimedia information availability has increased dramatically with the advent of mobile devices. but with this availability comes problems of maintaining the security of information that is displayed in public. Many approaches have been used or proposed for providing security for information dissemination over networks, protection system classified with more specific as encryption information, and combination between video compression and encryption to increase information security. The strength of the combination between Video compression and encryption science is due to the nonexistence of standard algorithms to be used in video compression and encrypting secret video stream. Also there are many ways could be used in video encryption methods such as combining several different encryption methods with video compression to pass a secret video streaming. Furthermore, there is no formal method to be followed to discover an encrypted video. For this reason, the task of this paper becomes difficult. In this paper proposed a new system of video encryption is presented. The proposed system aim to gain a deep understanding of video data security on multimedia technologies, to investigate how encryption and decryption could be implemented for real time video applications, and to enhance the selective encryption for H.264/AVC. The system includes two main functions; first is the encoding/encryption of video stream, through the execution of two processes (the input sequences of video is first compressed by the H.264/AVC encoder, and the encoded bit stream (I-frame) is partially encrypted using AES block cipher). And the second function is the decryption/decoding of the encrypted video through two process (specify the encrypted I-frame stream, decryption of the I-frame, and decoding with H.264/AVC decoder). The system is implemented by using Matlab.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Classification of linear operators satisfying $(Au,v)=(u,A^rv)$ or $(Au,A^rv)=(u,v)$ on a vector space with indefinite scalar product
Authors:
Victor Senoguchi Borges,
Iryna Kashuba,
Vladimir V. Sergeichuk,
Eduardo Ventilari Sodré,
André Zaidan
Abstract:
We classify all linear operators $A:V\to V$ satisfying $(Au,v)=(u,A^rv)$ and all linear operators satisfying $(Au,A^rv)=(u,v)$ with $r=2,3,\dots$ on a complex, real, or quaternion vector space with scalar product given by a nonsingular symmetric, skew-symmetric, Hermitian, or skew-Hermitian form.
We classify all linear operators $A:V\to V$ satisfying $(Au,v)=(u,A^rv)$ and all linear operators satisfying $(Au,A^rv)=(u,v)$ with $r=2,3,\dots$ on a complex, real, or quaternion vector space with scalar product given by a nonsingular symmetric, skew-symmetric, Hermitian, or skew-Hermitian form.
△ Less
Submitted 7 December, 2020;
originally announced December 2020.
-
Strain-induced anion ordering in perovskite oxyfluoride films
Authors:
Jiayi Wang,
Yong** Shin,
Jay R. Paudel,
Joseph D. Grassi,
Raj K. Sah,
Weibing Yang,
Evguenia Karapetrova,
Abdulhadi Zaidan,
Vladimir N. Strocov,
Christoph Klewe,
Padraic Shafer,
Alexander X. Gray,
James M. Rondinelli,
Steven J. May
Abstract:
Anionic ordering is a promising route to engineer physical properties in functional heteroanionic materials. A central challenge in the study of anion-ordered compounds lies in develo** robust synthetic strategies to control anion occupation and in understanding the resultant implications for electronic structure. Here, we show that epitaxial strain induces preferential occupation of F and O on…
▽ More
Anionic ordering is a promising route to engineer physical properties in functional heteroanionic materials. A central challenge in the study of anion-ordered compounds lies in develo** robust synthetic strategies to control anion occupation and in understanding the resultant implications for electronic structure. Here, we show that epitaxial strain induces preferential occupation of F and O on the anion sites in perovskite oxyfluoride SrMnO2.5-dFg films grown on different substrates. Under compressive strain, F tends to take the apical-like sites, which was revealed by F and O K-edge linearly polarized x-ray absorption spectroscopy and density functional theory calculations, resulting in an enhanced c-axis expansion. Under tensile strain, F tends to take the equatorial-like sites, enabling the longer Mn-F bonds to lie within the plane. The anion ordered oxyfluoride films exhibit a significant orbital polarization of the 3d electrons, distinct F-site dependence to their valence band density of states, and an enhanced resistivity when F occupies the apical-like anion site compared to the equatorial-like site. By demonstrating a general strategy for inducing anion-site order in oxyfluoride perovskites, this work lays the foundation for future materials design and synthesis efforts that leverage this greater degree of atomic control to realize new polar or quasi-two-dimensional materials.
△ Less
Submitted 2 December, 2020;
originally announced December 2020.
-
Oxide Fermi liquid universality revealed by electron spectroscopy
Authors:
M. Horio,
K. P. Kramer,
Q. Wang,
A. Zaidan,
K. von Arx,
D. Sutter,
C. E. Matt,
Y. Sassa,
N. C. Plumb,
M. Shi,
A. Hanff,
S. K. Mahatha,
H. Bentmann,
F. Reinert,
S. Rohlf,
F. K. Diekmann,
J. Buck,
M. Kalläne,
K. Rossnagel,
E. Rienks,
V. Granata,
R. Fittipaldi,
A. Vecchione,
T. Ohgi,
T. Kawamata
, et al. (5 additional authors not shown)
Abstract:
We present a combined soft x-ray and high-resolution vacuum-ultraviolet angle-resolved photoemission spectroscopy study of the electron-overdoped cuprate Pr$_{1.3-x}$La$_{0.7}$Ce$_{x}$CuO$_4$ (PLCCO). Demonstration of its highly two-dimensional band structure enabled precise determination of the in-plane self-energy dominated by electron-electron scattering. Through analysis of this self-energy an…
▽ More
We present a combined soft x-ray and high-resolution vacuum-ultraviolet angle-resolved photoemission spectroscopy study of the electron-overdoped cuprate Pr$_{1.3-x}$La$_{0.7}$Ce$_{x}$CuO$_4$ (PLCCO). Demonstration of its highly two-dimensional band structure enabled precise determination of the in-plane self-energy dominated by electron-electron scattering. Through analysis of this self-energy and the Fermi-liquid cut-off energy scale, we find -- in contrast to hole-doped cuprates -- a momentum isotropic and comparatively weak electron correlation in PLCCO. Yet, the self-energies extracted from multiple oxide systems combine to demonstrate a logarithmic divergent relation between the quasiparticle scattering rate and mass. This constitutes a spectroscopic version of the Kadowaki-Woods relation with an important merit -- the demonstration of Fermi liquid quasiparticle lifetime and mass being set by a single energy scale.
△ Less
Submitted 25 December, 2020; v1 submitted 23 June, 2020;
originally announced June 2020.
-
Gauge modules for the Lie algebras of vector fields on affine varieties
Authors:
Yuly Billig,
Jonathan Nilsson,
André Zaidan
Abstract:
For a smooth irreducible affine algebraic variety we study a class of gauge modules admitting compatible actions of both the algebra $A$ of functions and the Lie algebra $\mathcal{V}$ of vector fields on the variety. We prove that a gauge module corresponding to a simple $\mathfrak{gl}_N$-module is irreducible as a module over the Lie algebra of vector fields unless it appears in the de Rham compl…
▽ More
For a smooth irreducible affine algebraic variety we study a class of gauge modules admitting compatible actions of both the algebra $A$ of functions and the Lie algebra $\mathcal{V}$ of vector fields on the variety. We prove that a gauge module corresponding to a simple $\mathfrak{gl}_N$-module is irreducible as a module over the Lie algebra of vector fields unless it appears in the de Rham complex.
△ Less
Submitted 6 March, 2019;
originally announced March 2019.
-
Classification of linear map**s between indefinite inner product spaces
Authors:
Juan Meleiro,
Vladimir V. Sergeichuk,
Thiago Solovera,
Andre Zaidan
Abstract:
Let $\mathcal A:U\to V$ be a linear map** between vector spaces $U$ and $V$ over a field or skew field $\mathbb F$ with symmetric, or skew-symmetric, or Hermitian forms $\mathcal B:U\times U\to\mathbb F$ and $\mathcal C:V\times V\to\mathbb F.$ We classify the triples $(\mathcal A,\mathcal B,\mathcal C)$ if $\mathbb F$ is $\mathbb R$, or $\mathbb C$, or the skew field of quaternions $\mathbb H$.…
▽ More
Let $\mathcal A:U\to V$ be a linear map** between vector spaces $U$ and $V$ over a field or skew field $\mathbb F$ with symmetric, or skew-symmetric, or Hermitian forms $\mathcal B:U\times U\to\mathbb F$ and $\mathcal C:V\times V\to\mathbb F.$ We classify the triples $(\mathcal A,\mathcal B,\mathcal C)$ if $\mathbb F$ is $\mathbb R$, or $\mathbb C$, or the skew field of quaternions $\mathbb H$. We also classify the triples $(\mathcal A,\mathcal B,\mathcal C)$ up to classification of symmetric forms and Hermitian forms if the characteristic of $\mathbb F$ is not 2.
△ Less
Submitted 16 June, 2017;
originally announced June 2017.
-
An Overview: Extensible Markup Language Technology
Authors:
Rami Alnaqeib,
Fahad H. Alshammari,
M. A. Zaidan,
A. A. Zaidan,
B. B. Zaidan,
Zubaidah M. Hazza
Abstract:
XML stands for the Extensible Markup Language. It is a markup language for documents, Nowadays XML is a tool to develop and likely to become a much more common tool for sharing data and store. XML can communicate structured information to other users. In other words, if a group of users agree to implement the same kinds of tags to describe a certain kind of information, XML applications can assist…
▽ More
XML stands for the Extensible Markup Language. It is a markup language for documents, Nowadays XML is a tool to develop and likely to become a much more common tool for sharing data and store. XML can communicate structured information to other users. In other words, if a group of users agree to implement the same kinds of tags to describe a certain kind of information, XML applications can assist these users in communicating their information in an more robust and efficient manner. XML can make it easier to exchange information between cooperating entities. In this paper we will present the XML technique by fourth factors Strength of XML, XML Parser, XML Goals and Types of XML Parsers.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
Analytical Study on Internet Banking System
Authors:
Fadhel. S. AlAbdullah,
Fahad H. Alshammari,
Rami Alnaqeib,
Hamid A. Jalab,
A. A. Zaidan,
B. B. Zaidan
Abstract:
The Internet era is a period in the information age in which communication and commerce via the Internet became a central focus for businesses, consumers, government, and the media. The Internet era also marks the convergence of the computer and communications industries and their associated services and products. Nowadays, the availability of the Internet make it widely used for everyday life. In…
▽ More
The Internet era is a period in the information age in which communication and commerce via the Internet became a central focus for businesses, consumers, government, and the media. The Internet era also marks the convergence of the computer and communications industries and their associated services and products. Nowadays, the availability of the Internet make it widely used for everyday life. In order to led business to success, the business and specially the services should provide comfort use to its costumer. The bank system is one of the most important businesses who may use the website. The using for the web-based systems should contain special requirements to achieve the business goal. Since that the paper will present the functional and non-functional for the web-based banking system.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
New Quantitative Study for Dissertations Repository System
Authors:
Fahad H. Alshammari,
Rami Alnaqeib,
M. A. Zaidan,
Ali K. Hmood,
B. B. Zaidan,
A. A. Zaidan
Abstract:
In the age of technology, the information communication technology becomes very important especially in education field. Students must be allowed to learn anytime, anywhere and at their own place. The facility of library in the university should be developed. In this paper we are going to present new Quantitative Study for Dissertations Repository System and also recommend future application of th…
▽ More
In the age of technology, the information communication technology becomes very important especially in education field. Students must be allowed to learn anytime, anywhere and at their own place. The facility of library in the university should be developed. In this paper we are going to present new Quantitative Study for Dissertations Repository System and also recommend future application of the approach.
△ Less
Submitted 23 June, 2010;
originally announced June 2010.
-
Offline Arabic Handwriting Recognition Using Artificial Neural Network
Authors:
A. A Zaidan,
B. B Zaidan,
Hamid. A. Jalab,
Hamdan. O. Alanazi,
Rami Alnaqeib
Abstract:
The ambition of a character recognition system is to transform a text document typed on paper into a digital format that can be manipulated by word processor software Unlike other languages, Arabic has unique features, while other language doesn't have, from this language these are seven or eight language such as ordo, jewie and Persian writing, Arabic has twenty eight letters, each of which can b…
▽ More
The ambition of a character recognition system is to transform a text document typed on paper into a digital format that can be manipulated by word processor software Unlike other languages, Arabic has unique features, while other language doesn't have, from this language these are seven or eight language such as ordo, jewie and Persian writing, Arabic has twenty eight letters, each of which can be linked in three different ways or separated depending on the case. The difficulty of the Arabic handwriting recognition is that, the accuracy of the character recognition which affects on the accuracy of the word recognition, in additional there is also two or three from for each character, the suggested solution by using artificial neural network can solve the problem and overcome the difficulty of Arabic handwriting recognition.
△ Less
Submitted 14 June, 2010;
originally announced June 2010.
-
On the Module of Internet Banking System
Authors:
Hamdan. O. Alanazi,
Rami Alnaqeib,
Ali K. Hmood,
M. A. Zaidan,
Yahya Al-Nabhani
Abstract:
Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days.…
▽ More
Because of the speed, flexibility, and efficiency that it offers, the Internet has become the means for conducting growing numbers of transactions between suppliers and large international corporations. In this way, the Internet has opened new markets to the world and has accelerated the diffusion of knowledge. The meaning of Internet markets or online business has been widely used in these days. The success of the business depends on its flexibility, availability and security. Since that the web-based systems should have a special way to design the system and implement it. Nowadays, the Internet Banking System widely used and the banks looking to provide the best quality system with highly available, fast response, secure and safe to use. The Unified Modelling Language (UML) is the uniquely language which is used to analyse and design any system. In this paper, the UML diagrams has been proposed to illustrate the design phase for any banking system. The authors, presented two types of architecture which is used for the Internet Banking System.
△ Less
Submitted 21 May, 2010;
originally announced May 2010.
-
Internet Banking System Prototype
Authors:
Rami Alnaqeib,
Hamdan. O. Alanazi,
Hamid. A. Jalab,
M. A. Zaidan,
Ali K. Hmood
Abstract:
Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained thr…
▽ More
Internet Banking System refers to systems that enable bank customers to access accounts and general information on bank products and services through a personal computer or other intelligent device. Internet banking products and services can include detailed account information for corporate customers as well as account summery and transfer money. Ultimately, the products and services obtained through Internet Banking may mirror products and services offered through other bank delivery channels. In this paper, Internet Banking System Prototype has been proposed in order to illustrate the services which is provided by the Bank online services.
△ Less
Submitted 21 May, 2010;
originally announced May 2010.
-
Dissertations Repository System Using Context Module
Authors:
Ali K. Hmood,
M. A. Zaidan,
Hamdan. O. Alanazi,
Rami Alnaqeib,
Yahya Al-Nabhani
Abstract:
Without a doubt, the electronic learning makes education quite flexible. Nowadays, all organizations and institutions are trying to avoid Monotony and the delay and inertia. As well the universities should be improving their systems continually to achieve success. Whereas, the students need to access the dissertations in the library. In this paper we will present Dissertations Repository System Us…
▽ More
Without a doubt, the electronic learning makes education quite flexible. Nowadays, all organizations and institutions are trying to avoid Monotony and the delay and inertia. As well the universities should be improving their systems continually to achieve success. Whereas, the students need to access the dissertations in the library. In this paper we will present Dissertations Repository System Using Context Module to allow the students to benefit the dissertations which is in the library flexibly.
△ Less
Submitted 21 May, 2010;
originally announced May 2010.
-
Overview: Main Fundamentals for Steganography
Authors:
Zaidoon Kh. AL-Ani,
A. A. Zaidan,
B. B. Zaidan,
Hamdan. O. Alanazi
Abstract:
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the signi…
▽ More
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information .Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information. Steganography considers one of the techniques which used to protect the important information. The main goals for this paper, to recognize the researchers for the main fundamentals of steganography. In this paper provides a general overview of the following subject areas: Steganography types, General Steganography system, Characterization of Steganography Systems and Classification of Steganography Techniques.
△ Less
Submitted 22 March, 2010;
originally announced March 2010.
-
New Comparative Study Between DES, 3DES and AES within Nine Factors
Authors:
Hamdan. O. Alanazi,
B. B. Zaidan,
A. A. Zaidan,
Hamid A. Jalab,
M. Shabbir,
Y. Al-Nabhani
Abstract:
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, also the internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It…
▽ More
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, also the internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. Besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important. Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question. Cryptography considers one of the techniques which used to protect the important information. In this paper a three algorithm of multimedia encryption schemes have been proposed in the literature and description. The New Comparative Study between DES, 3DES and AES within Nine Factors achieving an efficiency, flexibility and security, which is a challenge of researchers.
△ Less
Submitted 22 March, 2010;
originally announced March 2010.
-
New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files
Authors:
Hamdan. O. Alanazi,
A. A. Zaidan,
B. B. Zaidan,
Hamid A. Jalab,
Zaidoon Kh. AL-Ani
Abstract:
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document a…
▽ More
With the rapid development of various multimedia technologies, more and more multimedia data are generated and transmitted in the medical, commercial, and military fields, which may include some sensitive information which should not be accessed by or can only be partially exposed to the general users. Therefore, security and privacy has become an important, Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question .With the large flood of information and the development of the digital format Information hiding considers one of the techniques which used to protect the important information. The main goals for this paper, provides a general overview of the New Classification Methods for Hiding Information into Two Parts: Multimedia Files and Non Multimedia Files.
△ Less
Submitted 22 March, 2010;
originally announced March 2010.
-
Optimization Digital Image Watermarking Technique for Patent Protection
Authors:
Mahmoud Elnajjar,
A. A Zaidan,
B. B Zaidan,
Mohamed Elhadi M. Sharif,
Hamdan. O. Alanazi
Abstract:
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue. Another problem with digital document and video is that undetectable m…
▽ More
The rapid development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information besides that, digital documents are also easy to copy and distribute, therefore it will be faced by many threats. It is a big security and privacy issue. Another problem with digital document and video is that undetectable modifications can be made with very simple and widely available equipment, which put the digital material for evidential purposes under question With the large flood of information and the development of the digital format, it become necessary to find appropriate protection because of the significance, accuracy and sensitivity of the information, therefore multimedia technology and popularity of internet communications they have great interest in using digital watermarks for the purpose of copy protection and content authentication. Digital watermarking is a technique used to embed a known piece of digital data within another piece of digital data .A digital data may represent a digital signature or digital watermark that is embedded in the host media. The signature or watermark is hidden such that it's perceptually and statistically undetectable. Then this signature or watermark can be extracted from the host media and used to identify the owner of the media.
△ Less
Submitted 21 February, 2010;
originally announced February 2010.
-
Intrusion Detection System: Overview
Authors:
Hamdan. O. Alanazi,
Rafidah Md Noor,
B. B Zaidan,
A. A Zaidan
Abstract:
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised lear…
▽ More
Network Intrusion Detection (NID) is the process of identifying network activity that can lead to the compromise of a security policy. In this paper, we will look at four intrusion detection approaches, which include ANN or Artificial Neural Network, SOM, Fuzzy Logic and SVM. ANN is one of the oldest systems that have been used for Intrusion Detection System (IDS), which presents supervised learning methods. However, in this research, we also came across SOM or Self Organizing Map, which is an ANN-based system, but applies unsupervised methods. Another approach is Fuzzy Logic (IDS-based), which also applies unsupervised learning methods. Lastly, we will look at the SVM system or Support Vector Machine for IDS. The goal of this paper is to draw an image for hybrid approaches using these supervised and unsupervised methods.
△ Less
Submitted 21 February, 2010;
originally announced February 2010.
-
New System for Secure Cover File of Hidden Data in the Image Page within Executable File Using Statistical Steganography Techniques
Authors:
Rafiqul Islam,
A. W. Naji,
A. A. Zaidan,
B. B. Zaidan
Abstract:
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillan…
▽ More
A Previously traditional methods were sufficient to protect the information, since it is simplicity in the past does not need complicated methods but with the progress of information technology, it become easy to attack systems, and detection of encryption methods became necessary to find ways parallel with the differing methods used by hackers, so the embedding methods could be under surveillance from system managers in an organization that requires the high level of security. This fact requires researches on new hiding methods and cover objects which hidden information is embedded in. It is the result from the researches to embed information in executable files, but when will use the executable file for cover they have many challenges must be taken into consideration which is any changes made to the file will be firstly detected by untie viruses, secondly the functionality of the file is not still functioning. In this paper, a new information hiding system is presented. The aim of the proposed system is to hide information (data file) within image page of execution file (EXEfile) to make sure changes made to the file will not be detected by universe and the functionality of the exe.file is still functioning after hiding process. Meanwhile, since the cover file might be used to identify hiding information, the proposed system considers overcoming this dilemma by using the execution file as a cover file.
△ Less
Submitted 11 February, 2010;
originally announced February 2010.
-
3D Skull Recognition Using 3D Matching Technique
Authors:
Hamdan. O. Alanazi,
B. B Zaidan,
A. A Zaidan
Abstract:
Biometrics has become a "hot" area. Governments are funding research programs focused on biometrics. In this paper the problem of person recognition and verification based on a different biometric application has been addressed. The system is based on the 3DSkull recognition using 3D matching technique, in fact this paper present several bio-metric approaches in order of assign the weak point in…
▽ More
Biometrics has become a "hot" area. Governments are funding research programs focused on biometrics. In this paper the problem of person recognition and verification based on a different biometric application has been addressed. The system is based on the 3DSkull recognition using 3D matching technique, in fact this paper present several bio-metric approaches in order of assign the weak point in term of used the biometric from the authorize person and insure the person who access the data is the real person. The feature of the simulate system shows the capability of using 3D matching system as an efficient way to identify the person through his or her skull by match it with database, this technique grantee fast processing with optimizing the false positive and negative as well .
△ Less
Submitted 20 January, 2010;
originally announced January 2010.
-
Frame Selected Approach for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation
Authors:
Hamid. A. Jalab,
A. A Zaidan,
B. B Zaidan
Abstract:
Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image's bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In this framework we will propose a collaborate approach for sel…
▽ More
Bit Plane Complexity Segmentation (BPCS) digital picture steganography is a technique to hide data inside an image file. BPCS achieves high embedding rates with low distortion based on the theory that noise-like regions in an image's bit-planes can be replaced with noise-like secret data without significant loss in image quality. . In this framework we will propose a collaborate approach for select frame for Hiding Data within MPEG Video Using Bit Plane Complexity Segmentation. This approach will invent high secure data hidden using select frame form MPEG Video and furthermore we will assign the well-built of the approach; during this review the author will answer the question why they used select frame steganography. In additional to the security issues we will use the digital video as a cover to the data hidden. The reason behind opt the video cover in this approach is the huge amount of single frames image per sec which in turn overcome the problem of the data hiding quantity, as the experiment result shows the success of the hidden data within select frame, extract data from the frames sequence. These function without affecting the quality of the video.
△ Less
Submitted 20 December, 2009;
originally announced December 2009.
-
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
Authors:
A. W. Naji,
Shihab A. Hameed,
B. B. Zaidan,
Wajdi F. Al-Khateeb,
Othman O. Khalifa,
A. A. Zaidan,
Teddy S. Gunawan
Abstract:
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the infor…
▽ More
The hurried development of multimedia and internet allows for wide distribution of digital media data. It becomes much easier to edit, modify and duplicate digital information. In additional, digital document is also easy to copy and distribute, therefore it may face many threats. It became necessary to find an appropriate protection due to the significance, accuracy and sensitivity of the information. Furthermore, there is no formal method to be followed to discover a hidden data. In this paper, a new information hiding framework is presented.The proposed framework aim is implementation of framework computation between advance encryption standard (AES) and distortion technique (DT) which embeds information in image page within executable file (EXE file) to find a secure solution to cover file without change the size of cover file. The framework includes two main functions; first is the hiding of the information in the image page of EXE file, through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the stego file, extract the information, and decryption of the information).
△ Less
Submitted 3 August, 2009;
originally announced August 2009.