­
­
­
­

Inventi Impact - Information Security

  • Journal Image
    Journal Scope:

    Quarterly published ‘Inventi Rapid/Impact: Information Security’ publishes high quality unpublished, as well as high impact pre-published research and reviews related to securing information from unauthorized access, modification, disruption, inspection, recording and destruction. Its readership includes scientific, industrial and military professionals.

  • A SURVEY OF RFID AUTHENTICATION PROTOCOLS
    Mohammed Issam Younis*, Mustafa Hashim Abdulkareem    Download Full Text

    Security and privacy are significant issues in radio frequency identification (RFID) systems. There are many RFID authentication protocols have been proposed to address those issues. Some of these protocols employ way hashing function as a mechanism for addressing security and privacy issues of RFID systems, other protocols employ random number generator (RNG) and simple functions like cyclic redu...

    Read More
  • HONEYWORD: APPROACH FOR DETECTING DISCLOSURE OF PASSWORD FILE
    Arati A Gadgil*, S D Khatawkar    Download Full Text

    Honeyword system used to detect password file disclosure. For each user set of honeyword is generated. When adversary have a password file, then it get confused which one is real password in honeyword set. Adversary enters all honeywords in the set. When honeywords are entered notification will be send to the admin. Author gives hybrid method for generation of honeyword. Hybrid method provides str...

    Read More
  • IMPLEMENTATION OF AES-256 BIT: A REVIEW
    Rahul Lanjewar*, Gaurav Pande    Download Full Text

    Now days due to increasing transactions via wireless communication and internet, electronic data security is necessary for users so that sending data securely transmitted through the link. In Oct 2000 NIST adopted new AES Rijndael algorithm to replace data encryption standard (DES). Compared to software implementation, hardware implementation of Rijndael algorithm provides more physical security a...

    Read More
  • AUGMENTATION OF SECURITY WITH COMBINATION OF PASS POINTS AND PERSUASIVE CUED CLICK-POINTS PASSWORD
    Amit Kashinath Barate, Sunita S Shinde*, Prajakta Umesh Mohite    Download Full Text

    The authentication system provides the secure environment for the resources. Authentication and identification of the user has always represented the challenging aspects of security systems. The text based user authentication and identification are not sufficient to address these issues. The text based security is considered retrograde and out-dated for current security threats that easily undermi...

    Read More
  • UNIVERSAL DISTORTION FUNCTION FOR STEGANOGRAPHY IN AN ARBITRARY DOMAIN
    Vojtech Holub, Jessica Fridrich, Tomas Denemark    Download Full Text

    Currently, the most successful approach to steganography in empirical objects, such as digital media, is to embed the payload while minimizing a suitably defined distortion function. The design of the distortion is essentially the only task left to the steganographer since efficient practical codes exist that embed near the payload-distortion bound. The practitioner’s goal is to design the disto...

    Read More
  • AN ENHANCED AUDIO OWNERSHIP PROTECTION SCHEME BASED ON VISUAL CRYPTOGRAPHY
    Rimba Whidiana Ciptasari, Kyung-Hyune Rhee, Kouichi Sakurai    Download Full Text

    Recently, several ownership protection schemes which combine encryption and secret sharing technology have been proposed. To reveal the original message, however, they exploited XOR operation which is similar to a one-time pad. It is fairly losing the reconstruction simplicity due to the human visual system (HVS). It should be noted that it is completely different from the original concept...

    Read More