scholarly journals Efficient WPT Based Speech Signal Protection

Author(s):  
Hatim Zaini ◽  
Ziad A.A Alqadi

Speech files are now widely circulated using various means of communication, and sometimes the speech file can be secret, which requires protecting it from any unauthorized person to hear and understand it. The methods which use DES standard for data encryption-decryption are considered ineffective because they need a long time to implement the protection of speech files due to their large size and containing double data with fractions. In this paper research a method which uses WPT decomposition will be proposed, tested and implemented. It will be shown how the new introduced method will increase the cryptography process efficiency by minimizing the encryption-decryption times keeping at the same time excellent values for quality parameters.

Author(s):  
Rodica MARGAOAN ◽  
Liviu Alexandru MARGHITAS ◽  
Daniel Severus DEZMIREAN ◽  
Otilia BOBIS ◽  
Victorita BONTA ◽  
...  

Given their beneficial effects in terms of health, the natural products, especially beehive products, have drawn the attention of consumers since long time ago. In order to guarantee the quality of these products on the market, their chemical composition needs to be analyzed. Thus, this current research had as objective the establishment of quality parameters for beehive brood food derived products: apilarnil and queen bee larvae triturate. These two products were compared with royal jelly which is the basis of brood food in the first 3 days of larval stage. The carbohydrates were determined by HPLC-IR and allowed the identification of seven carbohydrate compounds, predominantly glucose, fructose and sucrose. The lipid profile was analyzed by the Soxhlet method. The total protein content was determined by the Kjeldahl method. Free amino acids were analyzed by LC-MS. A total of 31 amino acids were identified of which nine are essential amino acids for humans. 


The Analyst ◽  
2020 ◽  
Vol 145 (15) ◽  
pp. 5325-5332
Author(s):  
Hanjun Zhang ◽  
Zhen Xu ◽  
Furong Tao ◽  
Yan Li ◽  
Yuezhi Cui ◽  
...  

CB-Ph and CB-Me have similar color and fluorescence properties, while they exhibit specific differences under the same stimulus. Based on the unique optical properties of CB-Ph and CB-Me, a new data encryption–decryption technology is developed.


2016 ◽  
Vol 138 (3) ◽  
Author(s):  
Shengguang Zhang ◽  
Wenzhong Wang ◽  
Xinming Li ◽  
Feng Guo

Oil–air lubrication is widely used in the high-speed rotary machines; the oil is usually in the form of discrete droplets. The lubrication behavior of the oil droplet is rarely investigated. This paper investigates the effect of the oil droplet on lubrication performance based on the developed transient lubrication model with consideration of starvation conditions. The oil droplet is modeled as spherical segment with different heights, base radius, and positions, which will change the inlet oil supply conditions. The results show that the oil droplet with large size can generate thick oil film which is close to the one in fully flooded condition and can remain long time; the position of the oil droplet entering the contact region also has significant effect on the lubrication performance.


Author(s):  
MING-SHENG LIU ◽  
HUI LIU ◽  
JIAN-WU ZHENG

The smart card is being used all over the world, because of its power to store data securely and execute calculations confidentially. This paper proposes an easy way to implement the strategy which can guarantee data integrity and privacy in the transmission path between the terminal application of the smart card and the smart card. This strategy consists of cryptographic functions of message and methods for transmitting APDU and managing secret keys. Some cryptographic functions of message are defined and developed for transmitting APDU confidentially. These cryptographic functions can keep the byte length of input and output messages identical. This strategy for transmitting APDU points out how to call cryptographic functions to encode or decode the data body of APDU, and how to construct a modified APDU message structure according to the original APDU message structure, which will be sent to its intended recipient instead of the original APDU message structure. With the proper secret keys, the authorized party can recover this modified APDU to its corresponding original APDU properly, without any information leakage. The transfer of secret keys to other parties is the most difficult aspect of secure APDU transmission, whereas data encryption/decryption is relatively straightforward. Two distinct strategies for managing secret keys, namely the static and the dynamic are introduced and compared. The dynamic strategy is preferred for a terminal application and smart card which do not need to authenticate each other. The implementation of this dynamic strategy has been detailed.


2016 ◽  
Vol 49 (25) ◽  
pp. 241-246
Author(s):  
Václav Kaczmarczyk ◽  
Zdeněk Bradáč ◽  
Petr Fiedler ◽  
Jakub Arm

2018 ◽  
Vol 1 (2) ◽  
pp. 124-129
Author(s):  
Po Abas Sunarya ◽  
Tuti Nurhaeni ◽  
Haris Haris

In the company the development of technology and knowledge which is marked by various advances in the field of communication and information technology is currently developing so rapidly. Clear information is information that presents data that is very accurate and complete and has benefits for the recipient of information or the leader of the company in monitoring. one of them is in the financial field within the company. In the current era of globalization an online computerized system becomes a very important requirement because it can reduce bad things and risk losing important data, difficulty in reconciliation like total bill not balance. therefore the web-based online accounting system provides Cash & Bank facilities so it can be reconciled both traditionally and modernly to facilitate in the process of bookkeeping of financial statements and certainly very effective because it does not require a long time, so effective and efficient.


Author(s):  
G. Golovko ◽  
A. Matiashenko ◽  
N. Solopihin

This article offers an example of using an application whose main task is to encrypt data such as files and private messages. Data encryption is performed using an encryption algorithm - xor. The XOR cipher is a data encryption algorithm using exclusive disjunction. Acquired widespread use in computer networks in the 90's due to the ease of implementation. Used to encrypt Microsoft Word documents in Windows. The XOR encryption algorithm is to "overlay" a sequence of random numbers on the text to be encrypted. A sequence of random numbers is called a gamma sequence, and is used to encrypt and decrypt data. If you use a key with a length at least equal to the length of the message, the XOR cipher becomes much more crypto-resistant than when using a duplicate key. For cryptological protection of information of the travel company Rest & Travel, EDcrypt software has been created, which performs the following functions: account login; inability to use the system without logging in to the account; notification of entering incorrect user data; message encryption; decryption of messages; the ability to select the recipient of the message; encryption of text files; decryption of text files; sending text files to selected recipients; three interface languages: English, Russian, Ukrainian


2017 ◽  
Vol 52 (2) ◽  
pp. 176-188
Author(s):  
Triantafyllia-Maria Perivolioti ◽  
Antonios Mouratidis ◽  
Dimitra Bobori ◽  
Georgia Doxani ◽  
Dimitrios Terzopoulos

2021 ◽  
Author(s):  
Vinay Michael

Abstract Internet of Things (IoT) based applications and systems are gaining attention in the recent days because of their vast benefits such as efficient utilization of resources, enhanced data collection, improved security, lesser human efforts and reduced time. Security of sensitive data in IoT based fog environments is inevitable to prevent those data to be misused by the attackers. In this study, we present an improved hybrid algorithm termed as HQCP-ABE (Hybrid Quantum key Cipher text Policy Attribute based Encryption with Cipher text update) that integrates highly effective algorithms such as CP-ABE, Quantum key cryptography and cipher text update. The proposed algorithm eliminates the need of costly pairing during decryptions and efficiently performs data encryption, decryption and user authorization. The proposed protocol is demonstrated to be highly efficient in terms of encryption and decryption while compared to other existing methods. It also achieves lesser packet loss, reduced control overheads, reduced computational overhead during encryption and decryption processes, lesser delay, improved security, packet delivery ratio, throughput, network lifetime with limited bandwidth and user privacy. We further considered energy consumption in this study. The proposed HQCP-ABE method is demonstrated using ns3 simulation and compared with existing CP-ABE and PA-CPABE methods.


Sign in / Sign up

Export Citation Format

Share Document