Browse Items (11809 total)
Sort by:
-
Securing the Digital Realm: Unmasking Fraud in Online Transactions Using Supervised Machine Learning Techniques
A key component of contemporary banking systems and e-commerce platforms is identifying fraud in online transactions. Traditional rule-based techniques are insufficient for preventing sophisticated fraud schemes because of the increasing complexity and number of expanding online transactions. This research study examines the development of fraud detection methods, emphasizing data analytics and machine learning (ML) models. The study also focuses on the fact that developing efficient fraud detection systems requires continuous observation, data preprocessing, feature selection, and testing of models. Seven ML models, Logistic Regression (LR), Decision Trees (DT), k-Nearest Neighbors (kNN), Nae Bayes (NB), Support Vector Machine (SVM), Random Forests (RF), and Extreme Gradient Boosting (XGBoost) are considered for classifying the dataset into fraudulent or not. During the experimentation study, it was observed that XGBoost yielded the highest accuracy of 99% when compared to other models. Users can determine which features significantly influence the model's predictions by using XGBoost's feature significance insights. Additionally, XGBoost provides integrated support for managing missing values in data, negating the requirement for imputation and other preprocessing procedures. Due to these, it performed better. The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2024. -
Securing Provenance Data with Secret Sharing Mechanism: Model Perspective
Elicitation about the genesis of an entity is referred to as provenance. With regards to data objects and their relationships the same is termed as data provenance. In majority of the instances, provenance data is sensitive and a small variation or adjustment leads to change in the entire chain of the data connected. This genesis needed to be secured and access is granted for authorized party. Individual control in preserving the privacy of data is common scenario and there are a good number of approaches with respect to cryptography. We propose a unique model, wherein the control of the data is available with multiple bodies however not with one; and when an access has to be granted for a genuine purpose, all the bodies holding their share will have to agree on a common platform. Combining these shares in a peculiar pattern allows the grant for accessing data. The method of allocating control to multiple bodies and allowing grant based on combining stakes is called as secret sharing mechanism. Division of the shares can be drawn from visual encryption approach. It provides transparencies for a given input message. This paper throws light on a framework associated to securing provenance via secret sharing security notion. 2019 IEEE. -
Securing patient information: A multilayered cryptographic approach in IoT healthcare
The increasing integration of devices utilising the of Internet of Things (IoT) in healthcare has resulted in the collection of an unparalleled volume of patient data. Personal identifiers, insurance information, medical history, and health monitoring measures are all included in a complete dataset. Ensuring security and privacy of IoT devices is crucial in the healthcare sector. The goal of this project is to combine steganography with three different cryptographic algorithms to develop a hybrid cryptographic technique. Among the algorithms under investigation are steganography, Caesar cipher, columnar transposition cipher, and one-time pad. Every encryption scheme uses three keys to encrypt patient data. The encrypted data is subsequently encoded into an image file through image-based steganography. To ensure confidentiality and authentication, an authorised user can decrypt the file through a designated decryption process, maintaining the integrity of patient data. 2025 selection and editorial matter, Keshav Kumar and Bishwajeet Kumar Pandey; individual chapters, the contributors. -
Securing medical images using encryption and LSB steganography
Medical imaging plays a vital role in the healthcare industry. Due to the advancements in the healthcare industry medical images are being transferred between geographically spread regions. As the medical images are transmitted through public networks several security challenges may arise such as authentication, integrity, and confidentiality. In this paper, the research focus is on preserving the confidentiality and integrity of the medical images. In general, integrity and confidentiality can be achieved by encryption (a piece of cryptography). To incorporate one more layer of security, steganography is applied to the medical image. In this paper, a one-time pad encryption algorithm is used to encrypt the medical image, then the encrypted image is implanted into a cover image to give a stego image making the system more resilient to the attacker. Further in this paper, the above said method is being implemented using MATLAB and the experimental results are compared with hiding the medical image using LSB steganography without encryption (one layer of security). Various formats of medical images have been taken into consideration such as DICOM, TIFF, BMP, and JPEG. Results show that the combination of encryption and steganography performs better than applying only steganography, concerning MSE and PSNR values. 2021 IEEE -
Securing iot networks using an onion routing based approach
Internet of Things (IoT) comprises of small, connected, power-efficient devices with minimal to average computing power. The devices are autonomous, cyber-physical objects capable of sensing, processing, storing and networking. Due to their connected nature, they are exposed to a huge number of threats and vulnerabilities. A new gateway to ensure anonymity in IoT networks using The Onion Router (TOR) hidden services in a Single-Board Computer (SBC) is proposed in this paper. IAEME Publication. -
Securing International Law Against Cyber Attacks through Blockchain Integration
Cyber-attacks have become a growing concern for governments, organizations, and individuals worldwide. In this paper, we explore the use of blockchain technology to secure international law against cyber-attacks. We discuss the advantages of blockchain technology in providing secure and transparent data storage and transmission, and how it can enhance the security of international law. We also review the current state of international law regarding cyber-attacks and the need for a robust and effective legal framework to address cyber threats. The study proposes a blockchain-based approach to secure international law against cyber-attacks. We examine the potential of blockchain technology in providing a decentralized and tamper-proof database that can record and track the implementation of international laws related to cyber-attacks. We also discuss how smart contracts can be utilized to automate compliance with international laws and regulations related to cybersecurity. The study also discusses the challenges and limitations of using blockchain technology to secure international law against cyber-attacks. These include the need for interoperability between different blockchain networks, the high energy consumption of blockchain technology, and the need for international cooperation in implementing and enforcing international laws related to cybersecurity. Overall, this study provides a comprehensive overview of the potential of blockchain technology in securing international law against cyber-attacks. It highlights the need for a robust legal framework to address cyber threats and emphasizes the importance of international cooperation in implementing and enforcing international laws related to cybersecurity. 2023 IEEE. -
Securing her digital footprint: AI for women's safety
This chapter emphasizes the importance of artificial intelligence (AI) tools, analysis about the existing AI tools, and recommendations for future AI tools for women's safety. AI is experiencing significant growth and influence in the current era. Several key trends and developments highlight the role of AI in various domains: AI is being used for medical diagnosis, drug discovery, and patient care. Machine learning models are helping doctors analyse medical images, predict disease outcomes, and personalize treatment plans. Self-driving cars and drones are utilizing AI algorithms for navigation, obstacle detection, and decision-making. These technologies are advancing transportation and logistics. Natural language processing models like GPT-3 are transforming language-related tasks, from chatbots and virtual assistants to content generation, translation, and sentiment analysis. This chapter highlights the AI tools that exist for women's safety in the digital world and future apps needs for the same. 2024, IGI Global. All rights reserved. -
Securing grayscale image using improved Arnold transform and ElGamal encryption
The security of sensitive data is critical, and it opens up a wide area of research to find efficient and effective methods to prevent unauthorized access. Our study provides a secure framework for sending visual information over an untrusted channel, such as a social networking site. The proposed framework is a combination of scrambling and encryption techniques. Initially, a hybrid block-wise and pixel-wise scrambling approach is administered to the grayscale image, followed by the Arnold transform, which causes all pixel points to move within the image. Finally, to improve the efficiency of the diffusion process, the asymmetric encryption ElGamal algorithm has been mastered. Peak-signal-To-noise ratio (PSNR), structural similarity index metric (SSIM), number of pixels change rate (NPCR), and unified average changing intensity (UACI) are the metrics utilized to evaluate the efficiency of the proposed scheme. The efficiency of the suggested scheme validates the low-Average PSNR value of <9 dB and the SSIM average value of <0.01 for the encrypted images. The NPCR and UACI values achieved in our study are above the threshold values of 99.6% and 33.33%, respectively, exhibiting the strength of the proposed framework. 2022 SPIE and IS&T. -
Securing end user computing environments using blockchain
COVID-19's phenomenal effect has expedited the adoption of digital technologies over several years, indicating that several of these breakthroughs are here to stay. Several enabling technologies are currently being implemented as major solutions for improving and responding to the pandemic's numerous issues, with blockchain being one of the preferred solution options. Blockchain can be used to re-structure processes, resulting in most effective operational and business models (e.g., democratising quality cancer detection with advanced artificial intelligence based radiomics technologies). The authors posit here that while there is a lot of anticipation about using blockchain to improve business capabilities, the lessons learned from the many pilots and proofs of concept so far should be considered. The necessity for a structured, formal decision-making process, based on good business logic and an awareness of the problem's process lifecycle, is however critical. Blockchain is a means to an end, not an end in and of itself. 2024, IGI Global. All rights reserved. -
Securing cloud data against cyber-attacks using hybrid aes with MHT algorithm
Cloud computing is dealing with large amount of data during data communication. This data processing is named as big data. The big data is growth of the demand in accessing the storage, computation and communication. This big data has the major defects. A raising issue in emerging big data is cost minimization. The architecture of big data ranges over multiple machines and cluster which have sub system. The major challenge of this big data is preprocessing and analysing the data patterns. This research article is dealing with different data pre-processing and secure data storage. There are many research challenges during this data process. The possible gap and drawbacks in the technology are identified through this survey and the efficient big data service is provided through MHT and AES algorithm. The main aim of this proposed method is to provide better data security during larger data process. The proposed hybrid MHT with AES algorithm is to minimize the encryption and decryption time apart from that it reduces the attacker ratio. All these parameters automatically increase the Quality of Service. Copyright Research Institute for Intelligent Computer Systems, 2020. All rights reserved. -
Securing Automated Systems with BT: Opportunities and Challenges
The use of automated systems is becoming increasingly prevalent in various industries; however, they pose significant security risks. In order to enhance the security of these systems, Blockchain Technology (BT) provides a promising solution. This chapter discusses the opportunities and challenges associated with using BT to secure automated systems. The role of BT in securing automated systems is discussed, emphasizing its ability to improve security and transparency. Additionally, BT-based systems with enhanced security are examined, such as decentralized data management, immutable and transparent ledgers, reduced cyber-attacks, and secure data sharing. Despite these opportunities, challenges such as high computational power requirements, integration challenges, BT scalability, and regulatory challenges must be addressed. Utilizing BT can create a more secure and transparent system that can help to prevent fraud, hacking, and other forms of cyber-attacks, ultimately enhancing the reliability and safety of automated systems. In conclusion, this paper highlights the potential of using BT for securing automated systems and the need for continued research and development to overcome the challenges associated with its implementation. 2024 selection and editorial matter, Nidhi Sindhwani, Rohit Anand, A. Shaji George and Digvijay Pandey; individual chapters, the contributors. -
Secured personal health records using pattern-based verification and two-way polynomial protocol in cloud infrastructure
This present research proposes the digitalised healthcare system that enables patients to generate, aggregate and store in the form of personal health records (PHRs). This requires more attention on cost effectiveness and less response time on public cloud platform. The existing cloud platforms have failed to implement the systemic approach for immediate verification and correction models on increasing PHR datasets. The storage and computation are two prime factors. Moreover, cloud systems need more attention on security and privacy breaches. In this proposed model the publisher-observer pattern-based healthcare systems allow the patients to verify and correct the PHRs before any type of computations. The cloud system acts as a backend framework that offers openness and easy accessibility. The experimental segment ensures the computational cost and response time for multiple polynomial PHR variations. The details evaluation also ensures the security and privacy preservation on sensitive healthcare datasets. Copyright 2022 Inderscience Enterprises Ltd. -
Secured Health Insurance Management
Many Low- and Middle-Income Countries (LMICs) have expanded their healthcare coverage over the past decade thanks to reforms and investments motivated by Universal Health Coverage (UHC). UHC strives to guarantee that all individuals have access to high-quality healthcare, protecting them from public health hazards and financial hardship caused by the need to treat sick family members. With UHC as its end objective, this study examines health insurances function as a policy instrument to address health funding. Here, researchers study the laws to ensure that all Indians have access to health care and how technology facilitates quicker participation in health insurance programs. The data was collected between August and October of 2022. The study was designed as a cross-sectional case study: (i) the research on the effects of UHC, (ii) documents about Indias health insurance systems (HIS), and (iii) a discussion of the benefits and challenges of using MedStrat, a homegrown digital Health Insurance Management System (HIMS), to run health insurance programs across different states in India. Data from research and document evaluations, as well as health insurance statistics, were triangulated with modern technology adoption models to determine (i) factors that influence the rate at which digital insurance plans are adopted, (ii) the effect of technology on increasing peoples access to health insurance; and (iii) the potential for the digital insurance intervention to be scaled further. Digital insurance administration systems can increase insurance enrolment, especially among low-income households. There are three enabling contexts for digital insurance plan adoption: supportive regulation, public-private partnerships, and ongoing stakeholder contact and education. There are three essential requirements for digital health insurance programs to be widely adopted in India and other similar situations. (i) user-friendliness; (ii) an established network for digital insurance policies; and (iii) confidence, which may be shown through measures like encrypted data storage, complete audit trails, and built-in fraud protection. Our results prove that digital health technologies hold great promise for achieving UHC in LMICs. 2024 Scrivener Publishing LLC. -
Secured Electronic Transactions Using Visual Encryption: An E-Commerce Instance
The developments in the information technology has led the modern world to rely on the internet for digital information. People around the world depend on the internet for every information from general information to sharing confidential data over the network. Technology has grown so wide that even all the transactions are happening through online platforms. Along with this, there has been a rise in the security threats of the user's confidential data which are shared by the users while buying goods online. To maintain the security there are many authentication techniques available today like OTP, CAPTCHA etc. These security measures taken till now have been adequate till the present day but over time the hackers would find out ways to attack. Data breaches and hacking of user data would increase day by day if preventive measures are not taken time to time. This project focuses on providing security to the user's confidential data with a two way authentication technique. The aim of the project is to include one more security level to the existing online transaction system. The visual cryptographic method is used along with the OTP generating system. 2018 IEEE. -
Secured Cloud Computing for Medical Database Monitoring Using Machine Learning Techniques
A growing number of people are calling on the health-care industry to adopt new technologies that are becoming accessible on the market in order to improve the overall quality of their services. Telecommunications systems are integrated with computers, connectivity, mobility, data storage, and information analytics to make a complete information infrastructure system. It is the order of the day to use technology that is based on the Internet of Things (IoT). Given the limited availability of human resources and infrastructure, it is becoming more vital to monitor chronic patients on an ongoing basis as their diseases deteriorate and become more severe. A cloud-based architecture that is capable of dealing with all of the issues stated above may be able to provide effective solutions for the health-care industry. With the purpose of building software that would mix cloud computing and mobile technologies for health-care monitoring systems, we have assigned ourselves the task of designing software. Using a method devised by Higuchi, it is possible to extract stable fractal values from electrocardiogram (ECG) data, something that has never been attempted previously by any other researcher working on the development of a computer-aided diagnosis system for arrhythmia. As a result of the results, it is feasible to infer that the support vector machine has attained the best classification accuracy attainable for fractal features. When compared to the other two classifiers, the feed forward neural network model and the feedback neural network model, the support vector machine excels them both. Furthermore, it should be noted that the sensitivity of both the feed forward neural network and the support vector machine yields results that are equivalent in quality (92.08% and 90.36%, respectively). 2022, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. -
Secured automated voice controller based on security parameters /
Patent Number: 202241001260, Applicant: Jabez samuel F.
A smart home security system (700) comprising: a wearable (701) worn by a family user, wherein the wearable (701) comprises: sensors (711a-711e) configured to sense signals representing security parameters of the registered family user; a location detector (712) configured to detect real-time coordinates the family user. -
Secured automated contactless vehicle door access system based on thermal mechanism of sensory devices /
Patent Number: 202141043350, Applicant: Dr.S.Balakrishnan.
Automatic entrance/exit door control is widely used in public places such as grocery stores, businesses, transportation stations, airports, and wholesale department stores to eliminate the need of manually opening and closing actions in this pandemic outbreak. Contemporary sensor based automatic door control technologies include infrared, ultrasonic/radio, or other wireless sensing methods. In this work, we designed a smart device which helps to perform a contact less temperature sensing door opening system. -
Secured and Provisioned Access Authentication using Subscribed User Identity in Federated Clouds
Cloud computing has become an essential source for modern trade or market environments by abled frameworks. The exponential growth of cloud computing services in the last few years has resulted in extensive use, especially in storing and sharing the data on various cloud servers. The current trend in the cloud shows that the cloud owners use relative functions and target areas in such a way that cloud customers access or store their data either in the same servers or related servers. Simultaneously, from the security point of view, the lack of confidence about the customer's data on the cloud server is still questionable. The hour's need is to provide the cloud service in a single port way by forming the joint management policy to increase customer satisfaction and profitability. In addition to this, the authentication steps also need to be improvised. This paper discusses issues on the security authentication and access provisioning of the cloud service consumers in federated clouds using subscribed user identity. This work proposes the user identity verification module (UidVM) in the cloud service consumer's authentication process to serve as a cloud broker to minimize the work overloads on the central cloud federation management system, thus enhancing the cloud security. 2021. All Rights Reserved. -
Secured and flexible user authentication protocol for wireless sensor network
Purpose: In wireless sensor network (WSN), user authentication plays as a vital role in which data sensing, as well as sharing, will be spoiled by hackers. To enhance user security, user authentication must be focused. Design/methodology/approach: In previous works, for secured authentication, Enhanced User Authentication Protocol (EUAP) is presented. On the other hand, the user free password generation is permitted in the previous technique. Findings: Here, password leakage may cause a malevolent user's contribution to the WSN environment. By presenting the Flexible and Secured User Authentication Protocol (FSUAP), this is solved in the presented technique in which secured as well as reliable sharing of data contents via unsecured wireless sensor devices was accomplished. Originality/value: The foremost objective of the present technique is to device the protocol that would verify the users beforehand letting them access the sensor devices situated in various sites. The use of a sensor device could be reduced in a significant way. Three-factor authentication protocols are presented in place of two-factor authentication protocol in the presented technique that could deal with and safeguard the environment from a brute force attack in an effective manner. 2020, Emerald Publishing Limited. -
Secure visual cryptography scheme with meaningful shares
Visual cryptography is an outstanding design, which is also known as visual secret sharing. It used to encode a secret portrait into various pointless share images. Normally, item bossed on transparencies and decrypts as loading one or two or the entire share images by means of the human visual system. Suppose, if we encompass great sets of secret shares then the pointless shares are complicated to handle. In this paper, a meaningful secret sharing algorithm and a modified Signcryption algorithm is used to enhance the security of the Visual Cryptography encryption schemes. The foremost intend of the anticipated format is to extend consequential shares and similarly make sure the isolation on conveying the secret data. The anticipated process is executed in the functioning platform of MATLAB and the presentation results are investigated. 2020, Engg Journals Publications. All rights reserved.