Claim Missing Document
Check
Articles

Found 2 Documents
Search

Enhancing cloud computing security by paillier homomorphic encryption Muna Mohammed Saeed Altaee; Mafaz Alanezi
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 2: April 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i2.pp1771-1779

Abstract

In recent years, the trend has increased for the use of cloud computing, which provides broad capabilities with the sharing of resources, and thus it is possible to store and process data in the cloud remotely, but this (cloud) is untrusted because some parties can connect to the network such as the internet and read or change data because it is not protected, therefore, protecting data security and privacy is one of the challenges that must be addressed when using cloud computing. Encryption is interested in the field of security, confidentiality and integrity of information that sent by a secure connection between individuals or institutions regardless of the method used to prepare this connection. But using the traditional encryption methods to encrypt the data before sending it will force the data provider to send his private key to the server to decrypt the data to perform computations on it. In this paper we present a proposal to secure banking data transmission through the cloud by using partially homomorphic encryption algorithms such as (paillier, RSA algorithm) that allow performing mathematical operations on encrypted data without needing to decryption. A proxy server will also use for performing re-encryption process to enhance security.
Payload and quality augmentation using steganographic optimization technique based on edge detection Mafaz Alanezi; Iman Subhi Mohammed Altaay; Saja Younis Hamid Malla'aloo
Indonesian Journal of Electrical Engineering and Computer Science Vol 23, No 1: July 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v23.i1.pp529-539

Abstract

Information security is one of the most significant processes that must be taken into account when confidentially transferring information. This paper introduces a steganography technique using the edge detection method. It focused on three basic and important aspects’ payload, quality and security. Well-known edge detectors were used to generate as many edge pixels as possible to hide data and achieve the highest payload. The least significant bit (LSB) algorithm has been improved by extending the bits used to embed between 2-4 bits in smooth and sharp areas. To increase security, the transaction between the two parties is based on dividing the key and the cover image into several parts and agreeing on the type of edge detection.The experiments achieved the maximum load, for instance with a fuzzy edge detector, at first, embedding in 4 bitplanes if edge pixel and in 2 bitplanes if non-edge pixel, the peak signal-to-noise ratio (PSNR) increased from 43.580to 45.790. At second, embedding in 2 bitplanes if edge pixel, and in 4 bitplanes if non-edge pixel, the PSNR decreased between 38.433-41.593. The suggested scheme achieved a high pay load to embed in the cover image and according to human perception, it preserved the nature of the original image.