Comparison of Cryptography and Steganography

Comparison of Cryptography and Steganography

Source publication
Article
Full-text available
In the recent decade, global community has been one of the world's most prominent targets of terrorist strikes. There is still study being done and improved efficiency procedures needed in this sector, however the security forces and law enforcement agencies are creating and launching high security weaponry to secure their territories. There is a h...

Similar publications

Article
Full-text available
In the recent decade, global community has been one of the world's most prominent targets of terrorist strikes. There is still study being done and improved efficiency procedures needed in this sector, however the security forces and law enforcement agencies are creating and launching high security weaponry to secure their territories. There is a h...

Citations

... The unique algorithm of system computation can realize the initialization of Paillier HE algorithm, create key pairs of public and private entities based on Hash Function (HF), and carry out security processing. Key distribution can be completed by dividing key points (Ahmed 2022;Mouha et al 2018), as follows: ...
Article
Full-text available
Smart grid (SGs) is a highly integrated power system, it is gradually replacing the traditional power grid, but at present there are problems in the SGs data aggregation, such as user privacy leakage, grid data query inflexibly and data leakage. In order to solve these problems, this paper studied the SGs data aggregation method based on Paillier homomorphic encryption (HE). In this paper, the Paillier HE algorithm was used to study the power grid data, and the encrypted data was numerically calculated under different encryption states. It used the cloud computing center in the blockchain to directly aggregate the ciphertext data generated by users, and used the hash function to set the secret key to prevent the ciphertext data from being tampered with, and obtained the aggregate result of the original data after decryption by the power grid management center. When the number of security parameters was 30,000, the encryption time required by this method was 21.71 seconds. When the number of smart meters (SMs) was 80, the signature verification time required by this method was 2.31 seconds.
... Teacher preparation programs in colleges of education include several standards to qualify him before and during service on how to play his role in education. The principles that educators can build on in developing digital citizenship and include them in school curricula are (usage, dealing skills, software...), operational standards (text structure, translating technical text operations with visual images, semantics analysis of symbols and terms...), and law on digital citizenship [51][52][53][54][55][56][57][58][59][60][61]. As in the first figure. ...
Article
Digital Citizenship (DC) is a set of rules, controls, standards, norms, ideas, and principles followed in the optimal and proper use of technology, which citizens, young and old, need to contribute to the progress of the nation. In short, it is guidance and protection, guidance to the benefits of modern technologies, and protection from their dangers. Or more precisely, it is the smart approach to technology. The concept of digital citizenship has a strong relationship with the education system, so academics in higher education and scientific research institutions must be the most experienced, and effective among their students in this field. Especially after the Corona pandemic and the trend that the universe has gone through towards using the internet in all areas of life, including education, especially integrated education, it has become very important for a citizen to be digital. This study dealt with a sample of university professors with (200) questionnaires. All the professors who belong to colleges with a scientific and human specialization possess digital citizenship. There are no differences between genders except in the education axis, which was in favor of the teaching staff male. In addition to the specialization, it was in favor of the colleges of science.
... Making mistakes is part of the learning process. Learning happens when you can get students into real life situations in which they perform certain tasks and get feedback to correct their mistakes [12][13][14]. ...
Article
Full-text available
The aim of the research is to identify the effect of a scenario-based learning in the mathematics achievement and the mental motivation for fifth-scientific grade students in high school. To achieve it, the researchers adopted the experimental research method with two groups (experimental and control) with a post-test. The research community was identified, which represents the fifth scientific grade students from the first Karkh Education Directorate. The sample (60) students were chosen intentionally, and was divided into two groups: an experimental group that studied according to the scenario-based learning model; and a control group studied according to the usual method. For the purpose of collecting data for the experiment, the achievement test was built, in its final form, consisting of (10) test items of the type of essay, and the mental motivation scale, in its final form, consisting of (60) items. Appropriate statistical analyzes were conducted, and the psychometric properties of the test and scale were confirmed. The results indicated that the students of the experimental group who studied according to the scenario-based learning model outperformed the students of the control group who studied according to the traditional method.
... This project will explore "Smart Vacuum Cleaner Robot" and discuss it. [5][6][7][8][9][10][11][12][13][14][15] 2 Literature ...
... Ensure that the trash is in constant contact with the floor from which dirt is being sucked. [17] In electrical design considerations, the power bank uses the services of the Arduino and the motor shield independently because their power consumption rates vary while the motor shield drives all the motors on board the robot, the Arduino board acts as the brain that receives an impulse from the ultrasonic sensors and controls the motor shield also works An additional lithium-ion battery powers the suction fan which makes the battery work overall i.e. the frame is made of cardboard due [10]. ...
Article
Full-text available
the smart robot is an important part of the smart homes system, in this research the Arduino Vacuum Cleaner we built is very compact and practical for potential office and home use. The developed robot is disk-shaped, equipped with vacuuming and cleaning technology and controlled by Arduino nano. It sucks dirt via a retractable dustbin, using a fan within a motor. the device will be deployed for office and home use thereby making cleaning a fully autonomous duty. This robot will have ultrasonic sensors and an IR proximity sensor. The ultrasonic sensor will allow the robot to avoid obstacles so that it can move freely until the room is properly cleaned, and the proximity sensor will help it to avoid falling from stairs. One of the most important features of our floor cleaning robot is that it is fast and flexible in movement, able to deal with all dirt and stains on floors without human intervention. It is also characterized by the fact that it can be disassembled and installed with ease and simplicity, so that in the event of a malfunction, any malfunction will be repaired at the same time. It is also characterized by possessing sensors, so it can identify the .It is possible to develop this technique to become more used in various fields. Because we are in the world of technology development, it becomes very easy to develop such projects to benefit from them in daily life.
Article
Full-text available
Fake images are one of the most widespread phenomena that have a significant influence on our social life, particularly in the world of politics and celeb. Nowadays, generating fake images has become very easy due to the powerful yet simple applications in mobile devices that navigate in the social media world and with the emergence of the Generative Adversarial Network (GAN) that produces images which are indistinguishable to the human eye. Which makes fake images and fake videos easy to perform, difficult to detect, and fast to spread. As a result, image processing and artificial intelligence play an important role in solving such issues. Thus, detecting fake images is a critical problem that must be controlled and to prevent these numerous harmful effects. This research proposed utilizing the most popular algorithm in deep learning is (Convolution Neural Network) to detect the fake images. The first steps includes a preprocessing which start with converting images from RGB to YCbCr color space, after that entering the Gamma correction. finally extract edge detection by entering the Canny filter on them. After that, utilizing two different method of detection by applying (Convolution Neural Network with Principal Component Analysis) and (Convolution Neural Network without Principal Component Analysis) as a classifiers. The results reveal that the use of CNN with PCA in this research results in acceptable accuracy. In contrast, using CNN only gave the highest level of accuracy in detecting manipulated images.
Article
Full-text available
During the past recent years, there has been tremendous development reaming the concept of digital libraries-a knowledge base that can be stored and retrieved through online networks. Digital libraries are the most complex form of information systems that support digital document preservation, distributed database management, hypertext, filtering, information retrieval, and selective dissemination of information. This has really overcome geographical barriers offering a wide range of academic, research, and cultural resources with multimedia effects that can be accessed around the world over the distributed networks. The paper examines the concept of Digital library, the technology that has enabled its emergence & architecture of the digital library system. It also highlights the digital library projects undertaken in USA, UK, and India. Here the authors explored the unique feature of digital library and possible challenges ahead for library and information professionals in the digital environment.