The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
An automatic system for health data management and service report generation from Android OS smartphones was designed and implemented. QR Code is used as an identifier and a tracking tool for patients involved in rehabilitation treatments. The system was implemented both in a rehabilitation gymnasium and in a hospital ward. The experimental results highlight clearly an efficiency improvement in health...
Privacy of data stored at un-trusted servers is an important problem of today. A solution to this problem can be achieved by encrypting the outsourced data, but simple encryption does not allow efficient query processing. In this paper we propose a novel scheme for encrypting relational databases so that range queries can be efficiently executed on the encrypted data. We formally define the syntax...
Government and private organizations of Bangladesh have started getting adopted to various web applications due to the easy accessibility. Services provided by web applications include online education, banking, reservation, shopping, resources, and information sharing. However the awareness of web application security has not been developed yet. No through study has been done on the existing vulnerabilities...
There is an urgent need to encrypt data in databases to protect sensitive data. But, encrypted data cannot be efficiently queried because the data has to be decrypted. To resolve this problem, many Order Preserving Encryption (OPE) schemes were suggested. The comparisons operation can be directly performed on encrypted data using OPE schemes. According to the literature, the precise security target...
Honey encryption (HE) addresses the challenge of encrypting messages using keys that are vulnerable to guessing attacks, such as the passwords selected by ordinary users. HE creates a ciphertext that, when decrypted with an incorrect key or password, yields a valid-looking but bogus message. So, attackers can't tell when decryption has been successful. Counterintuitively, HE enables the encryption...
The security and privacy of biometric template has become a hot issue with the development of biometric technology. Palmprint verification has a high accuracy thank to texture coding methods, so it is urgent to develop nice cancelable palmprint coding scheme based on texture feature. PalmHash Code is proposed as a secure and effective cancelable palmprint coding framework in this paper. Three generation...
Two-dimensional bar code is one of the most basic and key technologies to achieve the process of identifying information technology for the Internet of things. This paper focuses on book management based on two-dimensional bar code through Visual Basic.NET and SQL Server databases. It can achieve anti-counterfeiting, automatic book information entry, reader identification and library lending management...
Information security is becoming increasingly important in our information driven society. Cryptography is one of the most effective ways to enhance information security. Biometrics based cryptographic key generation techniques, in which biometric features are used to generate cryptographic keys, have been developed to overcome the shortages of the traditional cryptographic methods. An essential issue...
A bit-stream-level method for identifying encrypted JPEG 2000 images without having to decrypt them is described. It is well known that editing the scenes of the movie is often necessary. In the editing process, image identification plays an important role in finding a frame that should be re-encoded. Thus, identification of encrypted images is very useful in digital cinema because all frames in digital...
The encryption mechanism is an effective way to protect the sensitive data in database from various attacks. When the data is encrypted, the query performance degrades greatly. How to query encrypted data efficiently becomes a challenge. In this paper, a scheme to support query over encrypted data is proposed. Firstly, we extend two-phase framework to complete query, constructing different indexes...
Typogenetic algorithms are a break from classical approaches to computation. Based on gene expression and intercellular processes, typo-genetic computation can offer a new approach to the algorithmic problems of system security, data compression and encryption. The method has a potential of much higher compression ratios at the limited computational costs i.e. processing time. This paper presents...
This paper presents two specialized approaches to the design of a database incorporating cryptography in a fundamental way. Most processing is carried out on the encrypted version of the database at an insecure central site. Query initiation and final query interpretation occur at a secure local workstation. The first approach implements a text file with searches based on keywords. The second approach...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.