Welcome to Guest !
 
       IUP Publications
              (Since 1994)
Home About IUP Journals Books Archives Publication Ethics
     
  Subscriber Services   |   Feedback   |   Subscription Form
 
 
Login:
- - - - - - - - - - - - - - - - - -- - - - - - - - - - - -
-
   
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
The IUP Journal of Information Technology

Mar'15
Focus

Unprecedented use of computer and communication network in our private and professional life gives rise to fraud and malevolence in various forms. These offences may range from simple nuisances aiming at creating chaos and embarrassment to cyber crimes and deadly attacks on critical computing assets.

Articles
   
Price
(INR)
Buy
An Improved Efficient Fault-Tolerant Group Key Agreement Protocol
Binary CD&M Encryption Algorithm for Enhancing Security in Cloud
Genetic Algorithm-Based Bacterial Foraging Optimization Watermarking Model for Fingerprint and Palmprint Multimodal Biometric System
Social Media as a New Trend in Sri Lankan Digital Journalism: A Study
A Review of Security Issues in Mobile Agent-Based E-Commerce
A Comparative Study of Histogram Shifting, Reversible Contrast Mapping and Difference Expansion Methods
Select/Remove All    

An Improved Efficient Fault-Tolerant Group Key Agreement Protocol

--Indu Bala Thingom and Bubu Bhuyan

In order to ensure secure communication between communicating entities, a secret session key needs to be shared between these entities. This avoids any adversary from intruding and hijacking the communication. An authenticated group key agreement protocol is generally designed to accommodate the need of a group of specific entities in communicating over an open network with a shared secret key, which is used to preserve data confidentiality and integrity. A fault-tolerant group key agreement protocol establishes a shared key among participants of a group even when some malicious participants disrupt key agreement processes. Most of the existing group key agreement protocols operate only when all participants are honest, but do not work when some participants are malicious and attempt to destruct the key agreement processes. In 2013, Anmin Fu, Gongxuan Zhang and Zhenchao Zhu proposed a secure and efficient fault-tolerant group key agreement protocol, which is resistant to different key attack and the message tampering attack according to the security analysis. In this paper, we have proposed an improved version of this protocol which proves to be more efficient in terms of computational cost.

Binary CD&M Encryption Algorithm for Enhancing Security in Cloud

--Arshia S Mohammadi and Divya Binish

Cloud computing is the way of providing computing resources in the form of service rather than a product, and utilities are provided to the users over the Internet. The main goal of cloud computing is to secure and protect data and processes which come under the property of users. The security in networked environment, especially in cloud computing, is an exclusive research area that is attracting several research communities. Storage of data and security using standard cryptographic algorithms has become an important topic of research. Cryptography is widely used to protect data from unauthorized access and modifications. In this paper, a new symmetric algorithm is proposed. Binary CD&M encryption algorithm is a simple symmetric key cryptography algorithm for enhancing security of small amount of data in cloud computing environment

Genetic Algorithm-Based Bacterial Foraging Optimization Watermarking Model for Fingerprint and Palmprint Multimodal Biometric System

--S Anu H Nair and P Aruna

The multimodal biometric watermarking system using multiple sources of information has been widely recognized. In this paper, multimodal biometric system is obtained by fusion of biometric features. The biometric features fingerprint and palmprint images are subjected to modality extraction. Different fusion methods like average fusion, minimum fusion, maximum fusion, discrete wavelet transform and stationary wavelet transform are implemented for the fusion of extracting modalities. The best fused image is analyzed by applying various fusion metrics. Generally, optimization watermarking systems provide better results than the other watermarking systems. In this paper, a hybrid of Genetic Algorithm and Bacterial Foraging Optimization Algorithm (GA-Based BFOA) is proposed for watermarking of images. The best fused image along with the cover image is fed as input to the watermarking algorithm. Various metrics such as Peak Signal Noise Ratio (PSNR), Normalized Absolute Error (NAE) and Normalized Cross Correlation (NCC) are used for analyzing the robustness of the algorithm with various cover images.

Social Media as a New Trend in Sri Lankan Digital Journalism: A Study

--S Thuseethan and S Vasanthapriyan

The rapid growth of social media in the last five years is indicative of its importance and its integration into the daily lives of many people in Sri Lanka. In parallel with this, there has also been considerable growth in digital journalism through the online medium. But the reachability of social media is much higher compared to the traditional online media. As a result, social media is converted into online news media, revolutionizing the digital journalism. This study explores the new trend in digital journalism with the presence of social media and carries out empirical research to understand the effectiveness of social media as news media.

A Review of Security Issues in Mobile Agent-Based E-Commerce

--Ananta Charan Ojha

E-commerce is increasingly playing an important role in business organizations and for individuals. Mobile agent technology is very promising for e-commerce applications. However, commercial deployment of mobile agent-based e-commerce system requires several infrastructural supports such as security, trust, agent matching mechanisms, financial and legal services. This infrastructure provides confidence and satisfaction to users while facilitating promotion of large-scale industrialization of mobile agent-based e-commerce systems. In this paper, the security issues for mobile agents are analyzed, and the security requirements for e-commerce and available measures are discussed to mitigate the security threats.

A Comparative Study of Histogram Shifting, Reversible Contrast Mapping and Difference Expansion Methods

--Navnath S Narawade and Rajendra D Kanphade

It is important to restore original image and watermark in many applications such as military and medical. It is also referred to as ‘reversible watermarking’. Individual algorithm is difficult to analyze for a particular application, hence we compare the algorithm on some criteria. Here we present a comparative study of Difference Expansion (DE), Reversible Contrast Mapping (RCM) and Histogram Shifting (HS) methods. The results showed that HS method is the best method. It gave better PSNR than the other two methods, while embedding capacity of DE method proved to be better than the other two methods. We tested all methods for high and low quality images and found that all methods are suitable only for high quality images, while HS method is additionally suitable for cartoon and medical images. DE and RCM methods need improvement for applications in cartoon and medical images.

Search
 

  www
  IUP

Search
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
 
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Click here to upload your Article

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Automated Teller Machines (ATMs): The Changing Face of Banking in India

Bank Management
Information and communication technology has changed the way in which banks provide services to its customers. These days the customers are able to perform their routine banking transactions without even entering the bank premises. ATM is one such development in recent years, which provides remote banking services all over the world, including India. This paper analyzes the development of this self-service banking in India based on the secondary data.

The Information and Communication Technology (ICT) is playing a very important role in the progress and advancement in almost all walks of life. The deregulated environment has provided an opportunity to restructure the means and methods of delivery of services in many areas, including the banking sector. The ICT has been a focused issue in the past two decades in Indian banking. In fact, ICTs are enabling the banks to change the way in which they are functioning. Improved customer service has become very important for the very survival and growth of banking sector in the reforms era. The technological advancements, deregulations, and intense competition due to the entry of private sector and foreign banks have altered the face of banking from one of mere intermediation to one of provider of quick, efficient and customer-friendly services. With the introduction and adoption of ICT in the banking sector, the customers are fast moving away from the traditional branch banking system to the convenient and comfort of virtual banking. The most important virtual banking services are phone banking, mobile banking, Internet banking and ATM banking. These electronic channels have enhanced the delivery of banking services accurately and efficiently to the customers. The ATMs are an important part of a bank’s alternative channel to reach the customers, to showcase products and services and to create brand awareness. This is reflected in the increase in the number of ATMs all over the world. ATM is one of the most widely used remote banking services all over the world, including India. This paper analyzes the growth of ATMs of different bank groups in India.
International Scenario

If ATMs are largely available over geographically dispersed areas, the benefit from using an ATM will increase as customers will be able to access their bank accounts from any geographic location. This would imply that the value of an ATM network increases with the number of available ATM locations, and the value of a bank network to a customer will be determined in part by the final network size of the banking system. The statistical information on the growth of branches and ATM network in select countries.

Indian Scenario

The financial services industry in India has witnessed a phenomenal growth, diversification and specialization since the initiation of financial sector reforms in 1991. Greater customer orientation is the only way to retain customer loyalty and withstand competition in the liberalized world. In a market-driven strategy of development, customer preference is of paramount importance in any economy. Gone are the days when customers used to come to the doorsteps of banks. Now the banks are required to chase the customers; only those banks which are customercentric and extremely focused on the needs of their clients can succeed in their business today.

more...

 
View Previous Issues
Information Technology