Repository of University of Nova Gorica

Search the repository
A+ | A- | Help | SLO | ENG

Query: search in
search in
search in
search in
* old and bologna study programme

Options:
  Reset


51 - 60 / 109
First pagePrevious page234567891011Next pageLast page
51.
A novel lightweight encryption scheme for multimedia data
Rajan Gupta, Saibal K. Pal, Neeharika Chaudhary, 2014, original scientific article

Abstract: The usage of Multimedia data has increased by many folds in recent years. And with so many different types of devices available to access the data, it becomes imperative to protect its sanctity. In this paper, a novel lightweight encryption scheme using a secret key has been proposed for multimedia data especially Videos. Chaos based maps has been used to provide an apt level of confusion and diffusion process at different levels of Video Processing. Proposed technique has a high encryption rate and performs well even with the videos with excessive redundant data. Security Analysis has been performed to validate the high security features against different types of Statistical and Differential attacks and helps to prove the effectiveness of proposed system.
Keywords: chaotic maps, lightweight schemes, multimedia encryption, security analysis
Published in RUNG: 01.04.2021; Views: 3066; Downloads: 12
URL Link to full text
This document has many files! More...

52.
Design and analysis of new shuffle encryption schemes for multimedia
Rajan Gupta, Ankur Aggarwal, Saibal K. Pal, 2012, original scientific article

Abstract: Securing the contents of visual data and multimedia requires specific design consideration for use in different applications. The major issue with this type of data has been occurrence of redundancy, at various places particularly in images, which makes data values repetitive at several places. The focus of this paper is on design of new shuffling schemes that can efficiently destroy redundancy in the visual data ensuring its secured transmission and distribution over public networks. Different variants of these shuffling schemes will be used as pre-processing schemes on multimedia data values especially in light weight devices using images. Standard as well as chaotic permutation and substitution schemes together with S-box rotation have been used to shuffle and map the plain data into random uncorrelated values via various variants of the presented schemes. For further improving the security, the processed data is encrypted using a computationally fast algorithm in its normal mode of operation. Security analysis using different types of images show that the proposed schemes satisfy the parameters required for securing visual contents even with very high redundancy.
Keywords: multimedia security, shuffle, S-box, chaotic encryption, security analysis
Published in RUNG: 01.04.2021; Views: 2810; Downloads: 0
This document has many files! More...

53.
Internet traffic surveillance & network monitoring in India : case study of NETRA
Rajan Gupta, Sunil K. Muttoo, 2016, original scientific article

Abstract: Internet traffic surveillance is gaining importance in today’s digital world. Lots of international agencies are putting in efforts to monitor the network around their countries to see suspicious activities and illegal or illegitimate transmission of messages. India, being a center of attraction for terrorist activities, is also working towards the development of such surveillance systems. NETRA or Network Traffic Analysis is one such effort being taken by the Indian Government to filter suspicious keywords from messages in the network. But is it good enough to be used at the highest level for security analysis or does the system design needs to be improved as compared to other similar systems around the world; this question is answered through this study. The comparison of NETRA is done against Dish Fire, Prism, and Echelon. The design of the NETRA scheme and implementation level analysis of the system shows few weaknesses like limited memory options, limited channels for monitoring, pre-set filters, ignoring big data demands, security concerns, social values breach and ignoring ethical issues. These can be covered through alternate options which can improve the existing system. The Inclusion of self-similarity models, Self-Configuring Network Monitoring, and smart monitoring through early intrusion detections can be embedded in the architecture of existing surveillance system to give it more depth and make it more robust.
Keywords: cyber attacks, NETRA, network monitoring, network traffic analysis, surveillance system, spy system
Published in RUNG: 01.04.2021; Views: 2711; Downloads: 56
URL Link to full text
This document has many files! More...

54.
55.
Observational evidence in favor of scale-free evolution of sunspot groups
Alexander Shapoval, Jean-Louis Le Mouël, M. Shnirman, Vincent Courtillot, 2018, original scientific article

Keywords: sunspots, sun, magnetic fields, data analysis
Published in RUNG: 23.03.2021; Views: 2785; Downloads: 57
URL Link to full text
This document has many files! More...

56.
57.
58.
Studying TDEs in the era of LSST
Katja Bricman, Andreja Gomboc, 2019, published scientific conference contribution abstract

Keywords: The observing strategy with continuous scanning and large sky coverage of the upcoming ground-based Large Synoptic Survey Telescope (LSST) will make it a perfect tool in search of rare transients, such as Tidal Disruption Events (TDEs). Bright optical flares resulting from tidal disruption of stars by their host supermassive black hole (SMBH) can provide us with important information about the mass of the SMBH involved in the disruption and thus enable the study of quiescent SMBHs, which represent a large majority of SMBHs found in centres of galaxies. These types of transients are extremely rare, with only about few tens of candidates discovered so far. It is expected that the LSST will provide a large sample of new TDE light curves. Here we present simulations of TDE observations using an end-to-end LSST simulation framework. Based on the analysis of simulated light curves we estimate the number of TDEs with good quality light curves the LSST is expected to discover in 10 years of observations. In addition, we investigate whether TDEs observed by the LSST could be used to probe the SMBH mass distribution in the universe. The participation at this conference is supported by the Action CA16104 Gravitational waves, black holes and fundamental physics (GWverse), supported by COST (European Cooperation in Science and Technology).
Published in RUNG: 04.01.2021; Views: 3517; Downloads: 0

59.
60.
Search done in 0.04 sec.
Back to top