Results 1 -
4 of
4
Construction of a Real-Time and Secure Mobile Ticket System
"... With the technology improving, many content-services have been digitalized constantly in our daily life. To be more convenient and efficient, many kinds of high technological products have also been personalized, mobilized, and people can handle their businesses at any time from anywhere. For exampl ..."
Abstract
- Add to MetaCart
(Show Context)
With the technology improving, many content-services have been digitalized constantly in our daily life. To be more convenient and efficient, many kinds of high technological products have also been personalized, mobilized, and people can handle their businesses at any time from anywhere. For example, mobile users can perform the Internet transactions via mobile devices (such as cell phone and Personal Digital Assistant). Nowadays, the cell phone is not only used in communication, but it can be combined with Personal Digital Assistant (PDA) functions. The progress of technology makes the commercial activities efficient; moreover, it also provides consumers with more convenient and intimate services. On the basis of the tendency, we implement a digital valueadded services platform via PDA in this research. We integrate the related cryptography mechanisms (for example: public key, secret key cryptography system and digital signature) wireless and SQL technologies to construct a real-time and secure mobile ticket system. The consumer can use a mobile device to get a requested value-added service such that the buyers and sellers can perform a secure transaction. Therefore, the security and reliability of the system are assured in our scheme.
Secure Image encryption through key hashing and wavelet transform techniques
"... Abstract:- To provide security of the images in the multimedia environment encryption plays an important role. The traditional cryptographic algorithm such as AES, DES, TDES, RSA, IDEA, etc. are not so effective for image encryption because of their slow processing speed, inherent features of image ..."
Abstract
- Add to MetaCart
(Show Context)
Abstract:- To provide security of the images in the multimedia environment encryption plays an important role. The traditional cryptographic algorithm such as AES, DES, TDES, RSA, IDEA, etc. are not so effective for image encryption because of their slow processing speed, inherent features of image data like bulk data capacity, high redundancy and ineffectiveness in removing the correlations of the adjacent pixels of the image[1],[2]. In order to cope with this problem a noble technique of digital image encryption is proposed. In this technique the symmetric key is used for image encryption. The hash value (SHA1) of the key file is generated and stored as text file [4],[5]. The SHA test is converted to binary string. The key hash value is now expanded to match with the image dimension. For creating confusion the image to be encrypted is wavelet transform is first calculated and then converted into binary string and the hash of the secret key value (SHA1) is finally bitxored to create the encrypted image. The experimental results, correlation analysis of adjacent pixels of encrypted image in the horizontally, vertically and diagonally spaced pixels, histogram analysis and Structural Similarity Index Measure (SSIM), tests have been carried out and results are found to be quite satisfactory in terms of security and performance.
Application-Level and Database Security for E- Commerce Application
"... E-commerce applications are becoming popular day by day as they are working like a virtual shop. Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an underlying database. The c ..."
Abstract
- Add to MetaCart
E-commerce applications are becoming popular day by day as they are working like a virtual shop. Today’s distributed e-commerce applications typically rely upon various technologies in their realization, including the web, scripting languages, server-side processing and an underlying database. The combination of these technologies creates a system that requires attention to the security issues of each component and the system as a whole. Hence security related to authentication, authorization and transaction database need to be managed carefully.