Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction data.Securing the data during transmission is of utmost importance these days.T...Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction data.Securing the data during transmission is of utmost importance these days.The confidentiality,integrity,and availability of the data are at risk because of the emerging technologies and complexity in software applications,and therefore,there is a need to secure such systems and data.There are various methodologies to deal with security issues when utilizing an open system like the Internet.This research proposes a new technique in steganography within RGB shading space to achieve enhanced security compared with existing systems.We evaluate our approach with the help of diverse image quality evaluation techniques including MSE(Mean Square Error),RMSE(Root Mean Square Error),PSNR(Peak Signal-to-Noise Ratio),MAE(Mean Absolute Error),NCC(Normalized Cross-Correlation)and SSIM(Structural Similarity Index).Our experimental results demonstrate improved strength,intangibility,and security when contrasted with existing techniques and vindicate the effectiveness of this exploration work.The proposed approach achieved a 3.6701%average higher score for PSNR Correlation than the next best existing approach.Moreover,in PSNR with a variable amount of cipher embedded in the same images of the same dimensions,the proposed approach attained a 5.22%better score.Embedding the same size of cipher in images of different size resulted a 3.56%better score.展开更多
Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such...Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.展开更多
After a large improvement in health care services, Wireless Body Area Sensor Network (WBASN) is used in different fields where health care monitoring can be done continuously and from a distance. Many selected protoco...After a large improvement in health care services, Wireless Body Area Sensor Network (WBASN) is used in different fields where health care monitoring can be done continuously and from a distance. Many selected protocols are given in literature work which can improve the performance of WBASN by focusing on delay, routing and energy efficiency. In our research, we will focus on improving throughput, network life time, and decrease end-to-delay. In given research, the two sink nodes utilized and AnyCasting concept will be used. Dual Sinks based Scheme (DSS) for WBASN will be compared with existing DARE, SIMPLE, LAEEBA and M-ATTEMPT protocols. DSS performance found more efficient than DARE, SIMPLE, LAEEBA and M-ATTEMPT respectively in throughput. From results, DSS network life time is greater than DARE, SIMPLE, LAEEBA and M-ATTEMPT with minimum delay. In DSS, energy parameter is in tradeoff with the improved parameters, because of a computation of RSSI which do more process and utilize more energy.展开更多
Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive amb...Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time, and provide real-time updates of the patient’s status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applications. We present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic. We further discuss in-body antenna design and low-power MAC protocol for a WBAN. In addition, we briefly outline some of the WBAN applications with examples. Our discussion realizes a need for new power-efficient solu-tions towards in-body and on-body sensor networks.展开更多
Plasma catalysis is drawing increasing attention worldwide. Plasma is a partially ionized gas comprising electrons, ions, molecules, radicals, and photons. Integration of catalysis and plasma can enhance catalytic act...Plasma catalysis is drawing increasing attention worldwide. Plasma is a partially ionized gas comprising electrons, ions, molecules, radicals, and photons. Integration of catalysis and plasma can enhance catalytic activity and stability. Some thermodynamically unfavorable reactions can easily occur with plasma assistance. Compared to traditional thermal catalysis, plasma reactors can save energy because they can be operated at much lower temperatures or even room temperature. Additionally, the low bulk temperature of cold plasma makes it a good alternative for treatment of temperature-sensitive materials. In this review, we summarize the plasmaassisted reactions involved in dry reforming of methane, CO2 methanation, the methane coupling reaction, and volatile organic compound abatement. Applications of plasma for modification of metal-organic frameworks are discussed.展开更多
基金This research is supported by the Higher Education Commission(HEC),Pakistan through its initiative of National Center for Cyber Security for the affiliated Security Testing-Innovative Secured Systems Lab(ISSL)established at University of Engineering&Technology(UET)Peshawar,Grant No.2(1078)/HEC/M&E/2018/707.
文摘Steganography aims to hide the messages from unauthorized persons for various purposes,e.g.,military correspondence,financial transaction data.Securing the data during transmission is of utmost importance these days.The confidentiality,integrity,and availability of the data are at risk because of the emerging technologies and complexity in software applications,and therefore,there is a need to secure such systems and data.There are various methodologies to deal with security issues when utilizing an open system like the Internet.This research proposes a new technique in steganography within RGB shading space to achieve enhanced security compared with existing systems.We evaluate our approach with the help of diverse image quality evaluation techniques including MSE(Mean Square Error),RMSE(Root Mean Square Error),PSNR(Peak Signal-to-Noise Ratio),MAE(Mean Absolute Error),NCC(Normalized Cross-Correlation)and SSIM(Structural Similarity Index).Our experimental results demonstrate improved strength,intangibility,and security when contrasted with existing techniques and vindicate the effectiveness of this exploration work.The proposed approach achieved a 3.6701%average higher score for PSNR Correlation than the next best existing approach.Moreover,in PSNR with a variable amount of cipher embedded in the same images of the same dimensions,the proposed approach attained a 5.22%better score.Embedding the same size of cipher in images of different size resulted a 3.56%better score.
基金the Higher Education Commission(HEC),Pakistan throughits initiative of National Center for Cyber Security for the affiliated Security Testing-Innovative SecuredSystems Lab(ISSL)established at University of Engineering&Technology(UET)Peshawar,Grant No.2(1078)/HEC/M&E/2018/707.
文摘Over the last decade,a significant increase has been observed in the use of web-based Information systems that process sensitive information,e.g.,personal,financial,medical.With this increased use,the security of such systems became a crucial aspect to ensure safety,integrity and authenticity of the data.To achieve the objectives of data safety,security testing is performed.However,with growth and diversity of information systems,it is challenging to apply security testing for each and every system.Therefore,it is important to classify the assets based on their required level of security using an appropriate technique.In this paper,we propose an asset security classification technique to classify the System Under Test(SUT)based on various factors such as system exposure,data criticality and security requirements.We perform an extensive evaluation of our technique on a sample of 451 information systems.Further,we use security testing on a sample extracted from the resulting prioritized systems to investigate the presence of vulnerabilities.Our technique achieved promising results of successfully assigning security levels to various assets in the tested environments and also found several vulnerabilities in them.
文摘After a large improvement in health care services, Wireless Body Area Sensor Network (WBASN) is used in different fields where health care monitoring can be done continuously and from a distance. Many selected protocols are given in literature work which can improve the performance of WBASN by focusing on delay, routing and energy efficiency. In our research, we will focus on improving throughput, network life time, and decrease end-to-delay. In given research, the two sink nodes utilized and AnyCasting concept will be used. Dual Sinks based Scheme (DSS) for WBASN will be compared with existing DARE, SIMPLE, LAEEBA and M-ATTEMPT protocols. DSS performance found more efficient than DARE, SIMPLE, LAEEBA and M-ATTEMPT respectively in throughput. From results, DSS network life time is greater than DARE, SIMPLE, LAEEBA and M-ATTEMPT with minimum delay. In DSS, energy parameter is in tradeoff with the improved parameters, because of a computation of RSSI which do more process and utilize more energy.
文摘Recent advances in Micro-Electro-Mechanical Systems (MEMS) technology, integrated circuits, and wireless communication have allowed the realization of Wireless Body Area Networks (WBANs). WBANs promise unobtrusive ambulatory health monitoring for a long period of time, and provide real-time updates of the patient’s status to the physician. They are widely used for ubiquitous healthcare, entertainment, and military applications. This paper reviews the key aspects of WBANs for numerous applications. We present a WBAN infrastructure that provides solutions to on-demand, emergency, and normal traffic. We further discuss in-body antenna design and low-power MAC protocol for a WBAN. In addition, we briefly outline some of the WBAN applications with examples. Our discussion realizes a need for new power-efficient solu-tions towards in-body and on-body sensor networks.
文摘Plasma catalysis is drawing increasing attention worldwide. Plasma is a partially ionized gas comprising electrons, ions, molecules, radicals, and photons. Integration of catalysis and plasma can enhance catalytic activity and stability. Some thermodynamically unfavorable reactions can easily occur with plasma assistance. Compared to traditional thermal catalysis, plasma reactors can save energy because they can be operated at much lower temperatures or even room temperature. Additionally, the low bulk temperature of cold plasma makes it a good alternative for treatment of temperature-sensitive materials. In this review, we summarize the plasmaassisted reactions involved in dry reforming of methane, CO2 methanation, the methane coupling reaction, and volatile organic compound abatement. Applications of plasma for modification of metal-organic frameworks are discussed.