Search results for: reversible information hiding
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 10955

Search results for: reversible information hiding

10925 Blind Data Hiding Technique Using Interpolation of Subsampled Images

Authors: Singara Singh Kasana, Pankaj Garg

Abstract:

In this paper, a blind data hiding technique based on interpolation of sub sampled versions of a cover image is proposed. Sub sampled image is taken as a reference image and an interpolated image is generated from this reference image. Then difference between original cover image and interpolated image is used to embed secret data. Comparisons with the existing interpolation based techniques show that proposed technique provides higher embedding capacity and better visual quality marked images. Moreover, the performance of the proposed technique is more stable for different images.

Keywords: interpolation, image subsampling, PSNR, SIM

Procedia PDF Downloads 578
10924 The Views of Health Care Professionals outside of the General Practice Setting on the Provision of Oral Contraception in Comparison to Long-Acting Reversible Contraception

Authors: Carri Welsby, Jessie Gunson, Pen Roe

Abstract:

Currently, there is limited research examining health care professionals (HCPs) views on long-acting reversible contraception (LARC) advice and prescription, particularly outside of the general practice (GP) setting. The aim of this study is to systematically review existing evidence around the barriers and enablers of oral contraception (OC) in comparison to LARC, as perceived by HCPs in non-GP settings. Five electronic databases were searched in April 2018 using terms related to LARC, OC, HCPs, and views, but not terms related to GPs. Studies were excluded if they concerned emergency oral contraception, male contraceptives, contraceptive use in conjunction with a health condition(s), developing countries, GPs and GP settings, were non-English or was not published before 2013. A total of six studies were included for systematic reviewing. Five key areas emerged, under which themes were categorised, including (1) understanding HCP attitudes and counselling practices towards contraceptive methods; (2) assessment of HCP attitudes and beliefs about contraceptive methods; (3) misconceptions and concerns towards contraceptive methods; and (4) influences on views, attitudes, and beliefs of contraceptive methods. Limited education and training of HCPs exists around LARC provision, particularly compared to OC. The most common misconception inhibiting HCPs contraceptive information delivery to women was the belief that LARC was inappropriate for nulliparous women. In turn, by not providing the correct information on a variety of contraceptive methods, HCP counselling practices were disempowering for women and restricted them from accessing reproductive justice. Educating HCPs to be able to provide accurate and factual information to women on all contraception is vital to encourage a woman-centered approach during contraceptive counselling and promote informed choices by women.

Keywords: advice, contraceptives, health care professionals, long acting reversible contraception, oral contraception, reproductive justice

Procedia PDF Downloads 160
10923 New Estimation in Autoregressive Models with Exponential White Noise by Using Reversible Jump MCMC Algorithm

Authors: Suparman Suparman

Abstract:

A white noise in autoregressive (AR) model is often assumed to be normally distributed. In application, the white noise usually do not follows a normal distribution. This paper aims to estimate a parameter of AR model that has a exponential white noise. A Bayesian method is adopted. A prior distribution of the parameter of AR model is selected and then this prior distribution is combined with a likelihood function of data to get a posterior distribution. Based on this posterior distribution, a Bayesian estimator for the parameter of AR model is estimated. Because the order of AR model is considered a parameter, this Bayesian estimator cannot be explicitly calculated. To resolve this problem, a method of reversible jump Markov Chain Monte Carlo (MCMC) is adopted. A result is a estimation of the parameter AR model can be simultaneously calculated.

Keywords: autoregressive (AR) model, exponential white Noise, bayesian, reversible jump Markov Chain Monte Carlo (MCMC)

Procedia PDF Downloads 355
10922 Factors Associated with the Use of Long-Acting Reversible Contraceptive Methods among Women of Reproductive Age 15-49 Years in Jinja District

Authors: Helen Nelly Naiga, Christopher Garimoi Orach

Abstract:

Introduction: Long-acting reversible contraceptive (LARC) methods are highly effective. However, LARC use in Uganda is low (13%). We assessed the factors associated with the use of long-acting reversible contraceptives among women of reproductive age (15-49 yrs) in Jinja District. Methods: We conducted a facility-based cross-sectional study. A total of 314 women aged 15–49 years attending public health facilities (1 hospital and 3 health center IV) in Jinja district, were randomly selected. A total of 6 key informants and 6 in-depth interviews were conducted. Logistic regression analysis was conducted using Stata version 14. Qualitative data were analysed using thematic analysis. Results: The study found that 40.45% of the respondents had ever used LARC. The commonest LARC method used was implanting (38.22%). The factors significantly associated with use of LARC were employment (AOR =2.91; 95% CI (1.05-8.08), access to LARC methods (AOR =4.48; 95% CI (1.24-16.21), husband support (AOR =4.90; 95% CI (1.56-15.41), and experience of no side effects (AOR =3.48; 95% CI (1.00-12.19). Conclusion and recommendations: The study showed that 4 in 10 women of reproductive age in Jinja District were using LARC. The factors associated with LARC use were employment, husband support, access to LARC methods, and the lack of side effects. There is a need to strengthen client education, improve accessibility to LARC methods at all levels of health centers, improve male partner’s decision-making in LARC use and manage the side effects effectively.

Keywords: family planning, implants, intrauterine device, long-acting reversible contraceptives (LARC)

Procedia PDF Downloads 245
10921 Image Steganography Using Predictive Coding for Secure Transmission

Authors: Baljit Singh Khehra, Jagreeti Kaur

Abstract:

In this paper, steganographic strategy is used to hide the text file inside an image. To increase the storage limit, predictive coding is utilized to implant information. In the proposed plan, one can exchange secure information by means of predictive coding methodology. The predictive coding produces high stego-image. The pixels are utilized to insert mystery information in it. The proposed information concealing plan is powerful as contrasted with the existing methodologies. By applying this strategy, a provision helps clients to productively conceal the information. Entropy, standard deviation, mean square error and peak signal noise ratio are the parameters used to evaluate the proposed methodology. The results of proposed approach are quite promising.

Keywords: cryptography, steganography, reversible image, predictive coding

Procedia PDF Downloads 417
10920 High Performance Electrocardiogram Steganography Based on Fast Discrete Cosine Transform

Authors: Liang-Ta Cheng, Ching-Yu Yang

Abstract:

Based on fast discrete cosine transform (FDCT), the authors present a high capacity and high perceived quality method for electrocardiogram (ECG) signal. By using a simple adjusting policy to the 1-dimentional (1-D) DCT coefficients, a large volume of secret message can be effectively embedded in an ECG host signal and be successfully extracted at the intended receiver. Simulations confirmed that the resulting perceived quality is good, while the hiding capability of the proposed method significantly outperforms that of existing techniques. In addition, our proposed method has a certain degree of robustness. Since the computational complexity is low, it is feasible for our method being employed in real-time applications.

Keywords: data hiding, ECG steganography, fast discrete cosine transform, 1-D DCT bundle, real-time applications

Procedia PDF Downloads 194
10919 An Optimal Steganalysis Based Approach for Embedding Information in Image Cover Media with Security

Authors: Ahlem Fatnassi, Hamza Gharsellaoui, Sadok Bouamama

Abstract:

This paper deals with the study of interest in the fields of Steganography and Steganalysis. Steganography involves hiding information in a cover media to obtain the stego media in such a way that the cover media is perceived not to have any embedded message for its unintended recipients. Steganalysis is the mechanism of detecting the presence of hidden information in the stego media and it can lead to the prevention of disastrous security incidents. In this paper, we provide a critical review of the steganalysis algorithms available to analyze the characteristics of an image stego media against the corresponding cover media and understand the process of embedding the information and its detection. We anticipate that this paper can also give a clear picture of the current trends in steganography so that we can develop and improvise appropriate steganalysis algorithms.

Keywords: optimization, heuristics and metaheuristics algorithms, embedded systems, low-power consumption, steganalysis heuristic approach

Procedia PDF Downloads 292
10918 Design of Reconfigurable Fixed-Point LMS Adaptive FIR Filter

Authors: S. Padmapriya, V. Lakshmi Prabha

Abstract:

In this paper, an efficient reconfigurable fixed-point Least Mean Square Adaptive FIR filter is proposed. The proposed architecture has two methods of operation: one is area efficient design and the other is optimized power. Pipelining of the adder blocks and partial product generator are used to achieve low area and reversible logic is used to obtain low power design. Depending upon the input samples and filter coefficients, one of the techniques is chosen. Least-Mean-Square adaptation is performed to update the weights. The architecture is coded using Verilog and synthesized in cadence encounter 0.18μm technology. The synthesized results show that the area reduction ratio of the proposed when compared with conventional technique is about 1.2%.

Keywords: adaptive filter, carry select adder, least mean square algorithm, reversible logic

Procedia PDF Downloads 330
10917 Secret Sharing in Visual Cryptography Using NVSS and Data Hiding Techniques

Authors: Misha Alexander, S. B. Waykar

Abstract:

Visual Cryptography is a special unbreakable encryption technique that transforms the secret image into random noisy pixels. These shares are transmitted over the network and because of its noisy texture it attracts the hackers. To address this issue a Natural Visual Secret Sharing Scheme (NVSS) was introduced that uses natural shares either in digital or printed form to generate the noisy secret share. This scheme greatly reduces the transmission risk but causes distortion in the retrieved secret image through variation in settings and properties of digital devices used to capture the natural image during encryption / decryption phase. This paper proposes a new NVSS scheme that extracts the secret key from randomly selected unaltered multiple natural images. To further improve the security of the shares data hiding techniques such as Steganography and Alpha channel watermarking are proposed.

Keywords: decryption, encryption, natural visual secret sharing, natural images, noisy share, pixel swapping

Procedia PDF Downloads 404
10916 Integrated Model for Enhancing Data Security Performance in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud Ccomputing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 477
10915 High Secure Data Hiding Using Cropping Image and Least Significant Bit Steganography

Authors: Khalid A. Al-Afandy, El-Sayyed El-Rabaie, Osama Salah, Ahmed El-Mhalaway

Abstract:

This paper presents a high secure data hiding technique using image cropping and Least Significant Bit (LSB) steganography. The predefined certain secret coordinate crops will be extracted from the cover image. The secret text message will be divided into sections. These sections quantity is equal the image crops quantity. Each section from the secret text message will embed into an image crop with a secret sequence using LSB technique. The embedding is done using the cover image color channels. Stego image is given by reassembling the image and the stego crops. The results of the technique will be compared to the other state of art techniques. Evaluation is based on visualization to detect any degradation of stego image, the difficulty of extracting the embedded data by any unauthorized viewer, Peak Signal-to-Noise Ratio of stego image (PSNR), and the embedding algorithm CPU time. Experimental results ensure that the proposed technique is more secure compared with the other traditional techniques.

Keywords: steganography, stego, LSB, crop

Procedia PDF Downloads 269
10914 Integrated Model for Enhancing Data Security Processing Time in Cloud Computing

Authors: Amani A. Saad, Ahmed A. El-Farag, El-Sayed A. Helali

Abstract:

Cloud computing is an important and promising field in the recent decade. Cloud computing allows sharing resources, services and information among the people of the whole world. Although the advantages of using clouds are great, but there are many risks in a cloud. The data security is the most important and critical problem of cloud computing. In this research a new security model for cloud computing is proposed for ensuring secure communication system, hiding information from other users and saving the user's times. In this proposed model Blowfish encryption algorithm is used for exchanging information or data, and SHA-2 cryptographic hash algorithm is used for data integrity. For user authentication process a simple user-name and password is used, the password uses SHA-2 for one way encryption. The proposed system shows an improvement of the processing time of uploading and downloading files on the cloud in secure form.

Keywords: cloud computing, data security, SAAS, PAAS, IAAS, Blowfish

Procedia PDF Downloads 359
10913 Utilization of Long Acting Reversible Contraceptive Methods, and Associated Factors among Female College Students in Gondar Town, Northwest Ethiopia, 2018

Authors: Woledegebrieal Aregay

Abstract:

Introduction: Family planning is defined as the ability of individuals and couples to anticipate and attain their desired number of children and the spacing and timing of their births. It is part of a strategy to reduce poverty, maternal, infant and child mortality; empowers women by lightening the burden of excessive childbearing. Family planning is achieved through the use of different contraceptive methods among which the most effective method is modern family planning methods like Long-Acting Reversible Contraceptive (LARCs) which are IUCD and Implant and these methods have multiple advantages over other reversible methods. Most importantly, once in place, they do not require maintenance and their duration of action is long, ranging from 3 to10 years. Methods: An institutional-based cross-sectional study was conducted in Gondar town among female college students from April-May. A simple random sampling technique was employed to recruit a total of 1166 study subjects. Descriptive variables were computed for all predictors & dependent variables. The presence of an association between covariates & LARC use was observed by two tables’ findings using the chi-square test. Bivariate logistic regression was conducted to identify all possible factors affecting LARC utilization & its crude Odds Ratio, 95% Confidence Interval (CI) & P-value was observed. A multivariable logistic regression model was developed to control possible confounding variables. Adjusted Odds Ratio (AOR) with 95% Confidence Interval (CI) &P-values will be computed to identify significantly associated factors (P < 0.05) with LARC utilization. Result: Utilization of LARCs was 20.4%, the most common is Implant 86(96.5%), and followed by Intra-Uterine Contraceptive Device (IUCD) 3(3.5%). The result of the multivariate analysis revealed that the significant association of marital status of the respondent on utilization of LARC [AOR 3.965(2.051-7.665)], discussion of the respondent about LARC utilization with the husband/boyfriend [AOR 2.198(1.191-4.058)], and attitude of the respondent on implant was found to be associated [AOR 0.365(0.143-0.933)].Conclusion: The level of knowledge and attitude in this study was not satisfactory, the utilization of long-acting reversible contraceptives among college students was relatively satisfactory but if the knowledge and attitude of the participant has improved the prevalence of LARC were increased.

Keywords: utilization, long-acting reversible contraceptive, Ethiopia, Gondar

Procedia PDF Downloads 224
10912 Digital Image Steganography with Multilayer Security

Authors: Amar Partap Singh Pharwaha, Balkrishan Jindal

Abstract:

In this paper, a new method is developed for hiding image in a digital image with multilayer security. In the proposed method, the secret image is encrypted in the first instance using a flexible matrix based symmetric key to add first layer of security. Then another layer of security is added to the secret data by encrypting the ciphered data using Pythagorean Theorem method. The ciphered data bits (4 bits) produced after double encryption are then embedded within digital image in the spatial domain using Least Significant Bits (LSBs) substitution. To improve the image quality of the stego-image, an improved form of pixel adjustment process is proposed. To evaluate the effectiveness of the proposed method, image quality metrics including Peak Signal-to-Noise Ratio (PSNR), Mean Square Error (MSE), entropy, correlation, mean value and Universal Image Quality Index (UIQI) are measured. It has been found experimentally that the proposed method provides higher security as well as robustness. In fact, the results of this study are quite promising.

Keywords: Pythagorean theorem, pixel adjustment, ciphered data, image hiding, least significant bit, flexible matrix

Procedia PDF Downloads 337
10911 Vibration Damping Properties of Electrorheological Materials Based on Chitosan/Perlite Composite

Authors: M. Cabuk, M. Yavuz, T. A. Yesil, H. I. Unal

Abstract:

Electrorheological (ER) fluids are a class of smart materials exhibiting reversible changes in their rheological and mechanical properties under an applied electric field (E). ER fluids generally are composed of polarisable solid particles dispersed in non-conducting oil. ER fluids are fluids which exhibit. The resistance to motion of the ER fluid can be controlled by adjusting the applied E, due to their fast and reversible changes in their rheological properties presence of E. In this study, a series of chitosan/expanded perlite (CS/EP) composites with different chitosan mass fractions (10%, 20%, and 50%) was used. Characterizations of the composites were carried out by Fourier Transform Infrared (FTIR), X-ray diffraction (XRD) and Scanning electron microscopy with energy dispersive X-ray spectroscopy (SEM-EDX) techniques. Antisedimentation stability and dielectric properties of the composites were also determined. The effects of volume fraction, electric field strength, shear rate, shear stress, and temperature onto ER properties of the CS/EP composite particles dispersed in silicone oil (SO) were investigated in detail. Vibration damping behavior of the CS/EP composites were determined as a function of frequence, storage (Gʹ) and loss (Gʹ ʹ) moduli. It was observed that ER response of the CS/EP/SO ER fluids increased with increasing electric field strength and exhibited the typical shear thinning non-Newtonian viscoelastic behaviors with increasing shear rate. The maximum yield stress was obtained with 1250 Pa under E = 3 kV/mm. Further, the CS/EP/SO ER fluids were observed to sensitive to vibration control by showing reversible viscosity enhancements (Gʹ > Gʹ ʹ). Acknowledgements: The authors thank the TÜBİTAK (214Z199) for the financial support of this work.

Keywords: chitosan, electrorheology, perlite, vibration control

Procedia PDF Downloads 236
10910 Homoleptic Complexes of a Tetraphenylporphyrinatozinc(II)-conjugated 2,2':6',6"-Terpyridine

Authors: Angelo Lanzilotto, Martin Kuss-Petermann, Catherine E. Housecroft, Edwin C. Constable, Oliver S. Wenger

Abstract:

We recently described the synthesis of a new tetraphenylporphyrinatozinc(II)-conjugated 2,2':6',6"-terpyridine (1) in which the tpy domain enables the molecule to act as a metalloligand. The synthetic route to 1 has been optimized, the importance of selecting a particular sequence of synthetic steps will be discussed. Three homoleptic complexes have been prepared, [Zn(1)₂]²⁺, [Fe(1)₂]²⁺ and [Ru(1)₂]²⁺, and have been isolated as the hexafluoridophosphate salts. Spectroelectrochemical measurements have been performed and the spectral changes ascribed to redox processes are partitioned on either the porphyrin or the terpyridine units. Compound 1 undergoes a reversible one-electron oxidation/reduction. The removal/gain of a second electron leads to a further irreversible chemical transformation. For the homoleptic [M(1)₂]²⁺ complexes, a suitable potential can be chosen at which both the oxidation and the reduction of the {ZnTPP} core are reversible. When the homoleptic complex contains a redox active metal such as Fe or Ru, spectroelectrochemistry has been used to investigate the metal to ligand charge transfer (MLCT) transition. The latter is sensitive to the oxidation state of the metal, and electrochemical oxidation of the metal center suppresses it. Detailed spectroelectrochemical studies will be presented.

Keywords: homoleptic complexes, spectroelectrochemistry, tetraphenylporphyrinatozinc(II), 2, 2':6', 6"-terpyridine

Procedia PDF Downloads 220
10909 Improved Operating Strategies for the Optimization of Proton Exchange Membrane Fuel Cell System Performance

Authors: Guillaume Soubeyran, Fabrice Micoud, Benoit Morin, Jean-Philippe Poirot-Crouvezier, Magali Reytier

Abstract:

Proton Exchange Membrane Fuel Cell (PEMFC) technology is considered as a solution for the reduction of CO2 emissions. However, this technology still meets several challenges for high-scale industrialization. In this context, the increase of durability remains a critical aspect for competitiveness of this technology. Fortunately, performance degradations in nominal operating conditions is partially reversible, meaning that if specific conditions are applied, a partial recovery of fuel cell performance can be achieved, while irreversible degradations can only be mitigated. Thus, it is worth studying the optimal conditions to rejuvenate these reversible degradations and assessing the long-term impact of such procedures on the performance of the cell. Reversible degradations consist mainly of anode Pt active sites poisoning by carbon monoxide at the anode, heterogeneities in water management during use, and oxidation/deactivation of Pt active sites at the cathode. The latter is identified as a major source of reversible performance loss caused by the presence oxygen, high temperature and high cathode potential that favor platinum oxidation, especially in high efficiency operating points. Hence, we studied here a recovery procedure aiming at reducing the platinum oxides by decreasing cathode potential during operation. Indeed, the application of short air starvation phase leads to a drop of cathode potential. Cell performances are temporarily increased afterwards. Nevertheless, local temperature and current heterogeneities within the cells are favored and shall be minimized. The consumption of fuel during the recovery phase shall also be considered to evaluate the global efficiency. Consequently, the purpose of this work is to find an optimal compromise between the recovery of reversible degradations by air starvation, the increase of global cell efficiency and the mitigation of irreversible degradations effects. Different operating parameters have first been studied such as cell voltage, temperature and humidity in single cell set-up. Considering the global PEMFC system efficiency, tests showed that reducing duration of recovery phase and reducing cell voltage was the key to ensure an efficient recovery. Recovery phase frequency was a major factor as well. A specific method was established to find the optimal frequency depending on the duration and voltage of the recovery phase. Then, long-term degradations have also been studied by applying FC-DLC cycles based on NEDC cycles on a 4-cell short stack by alternating test sequences with and without recovery phases. Depending on recovery phase timing, cell efficiency during the cycle was increased up to 2% thanks to a mean voltage increase of 10 mV during test sequences with recovery phases. However, cyclic voltammetry tests results suggest that the implementation of recovery phases causes an acceleration of the decrease of platinum active areas that could be due to the high potential variations applied to the cathode electrode during operation.

Keywords: durability, PEMFC, recovery procedure, reversible degradation

Procedia PDF Downloads 134
10908 Brain Stem Posterior Reversible Encephalopathy Syndrome in Nephrotic Syndrome

Authors: S. H. Jang

Abstract:

Posterior reversible encephalopathy syndrome (PRES) is characterized by acute neurologic symptoms (visual loss, headache, altered mentality and seizures) and by typical imaging findings (bilateral subcortical and cortical edema with predominatly posterior distribution). Nephrotic syndrome is a syndrome comprising signs of proteinuria, hypoalbuminemia, and edema. It is well known that hypertension predispose patient with nephrotic syndrome to PRES. A 45-year old male was referred for suddenly developed vertigo, disequilibrium. He had previous history of nephrotic syndrome. His medical history included diabetes controlled with medication. He was hospitalized because of generalized edema a few days ago. His vital signs were stable. On neurologic examination, his mental state was alert. Horizontal nystagmus to right side on return to primary position was observed. He showed good grade motor weakness and ataxia in right upper and lower limbs without other sensory abnormality. Brain MRI showed increased signal intensity in FLAIR image, decreased signal intensity in T1 image and focal enhanced lesion in T1 contrast image at whole midbrain, pons and cerebellar peduncle symmetrically, which was compatible with vasogenic edema. Laboratory findings showed severe proteinuria and hypoalbuminemia. He was given intravenous dexamethasone and diuretics to reduce vasogenic edema and raise the intra-vascular osmotic pressure. Nystagmus, motor weakness and limb ataxia improved gradually over 2 weeks; He recovered without any neurologic symptom and sign. Follow-up MRI showed decreased vasogenic edema fairly. We report a case of brain stem PRES in normotensive, nephrotic syndrome patient.

Keywords: posterior reversible encephalopathy syndrome, MRI, nephrotic syndrome, vasogenic brain edema

Procedia PDF Downloads 276
10907 Frequency of Occurrence Hybrid Watermarking Scheme

Authors: Hamza A. Ali, Adnan H. M. Al-Helali

Abstract:

Generally, a watermark is information that identifies the ownership of multimedia (text, image, audio or video files). It is achieved by introducing modifications into these files that are imperceptible to the human senses but easily recoverable by a computer program. These modifications are done according to a secret key in a descriptive model that would be either in the time domain or frequency domain or both. This paper presents a procedure for watermarking by mixing amplitude modulation with frequency transformation histogram; namely a specific value is used to modulate the intensity component Y of the YIQ components of the carrier image. This scheme is referred to as histogram embedding technique (HET). Results comparison with those of other techniques such as discrete wavelet transform (DWT), discrete cosine transform (DCT) and singular value decomposition (SVD) have shown an enhance efficiency in terms of ease and performance. It has manifested a good degree of robustness against various environment effects such as resizing, rotation and different kinds of noise. This method would prove very useful technique for copyright protection and ownership judgment.

Keywords: watermarking, ownership, copyright protection, steganography, information hiding, authentication

Procedia PDF Downloads 368
10906 Establishment of Kinetic Zone Diagrams via Simulated Linear Sweep Voltammograms for Soluble-Insoluble Systems

Authors: Imene Atek, Abed M. Affoune, Hubert Girault, Pekka Peljo

Abstract:

Due to the need for a rigorous mathematical model that can help to estimate kinetic properties for soluble-insoluble systems, through voltammetric experiments, a Nicholson Semi Analytical Approach was used in this work for modeling and prediction of theoretical linear sweep voltammetry responses for reversible, quasi reversible or irreversible electron transfer reactions. The redox system of interest is a one-step metal electrodeposition process. A rigorous analysis of simulated linear scan voltammetric responses following variation of dimensionless factors, the rate constant and charge transfer coefficients in a broad range was studied and presented in the form of the so called kinetic zones diagrams. These kinetic diagrams were divided into three kinetics zones. Interpreting these zones leads to empirical mathematical models which can allow the experimenter to determine electrodeposition reactions kinetics whatever the degree of reversibility. The validity of the obtained results was tested and an excellent experiment–theory agreement has been showed.

Keywords: electrodeposition, kinetics diagrams, modeling, voltammetry

Procedia PDF Downloads 141
10905 Robust Medical Image Watermarking Using Frequency Domain and Least Significant Bits Algorithms

Authors: Volkan Kaya, Ersin Elbasi

Abstract:

Watermarking and stenography are getting importance recently because of copyright protection and authentication. In watermarking we embed stamp, logo, noise or image to multimedia elements such as image, video, audio, animation and text. There are several works have been done in watermarking for different purposes. In this research work, we used watermarking techniques to embed patient information into the medical magnetic resonance (MR) images. There are two methods have been used; frequency domain (Digital Wavelet Transform-DWT, Digital Cosine Transform-DCT, and Digital Fourier Transform-DFT) and spatial domain (Least Significant Bits-LSB) domain. Experimental results show that embedding in frequency domains resist against one type of attacks, and embedding in spatial domain is resist against another group of attacks. Peak Signal Noise Ratio (PSNR) and Similarity Ratio (SR) values are two measurement values for testing. These two values give very promising result for information hiding in medical MR images.

Keywords: watermarking, medical image, frequency domain, least significant bits, security

Procedia PDF Downloads 287
10904 Photo-Induced Reversible Surface Wettability Analysis of GLAD Synthesized In2O3/TiO2 Heterostructure Nanocolumn

Authors: Pheiroijam Pooja, P. Chinnamuthu

Abstract:

A novel vertical 1D In2O3/TiO2 nanocolumn (NC) axial heterostructure has been successfully synthesized using Glancing Angle Deposition (GLAD) technique inside E-Beam Evaporator chamber. Field emission scanning electron microscope (FESEM) has been used to evaluate the morphology of the structure grown. The estimated length of In2O3/TiO2 NC is ~250 nm and ~300nm for In2O3 and TiO2 respectively with diameter ~60-90 nm. The surface of the heterostructure is porous in nature which can affect the interfacial wettability properties. The grown structure has been further characterized using X-ray Diffraction (XRD) and UV-Visible absorption measurement. The polycrystalline nature of the sample has been examined using XRD with prominent peaks obtained with phase (101) for anatase TiO2 and (211) for In2O3. Here, 1D axial heterostructure NC thus favors efficient segregation of photo-excited carriers due to their type II band alignment between the constituent materials. Moreover, the 1D nanostructure is known for their large surface area and excellent ionic charge transport property. On exposure to UV light illumination, the surface properties of In2O3/TiO2 NC changes whereby the hydrophobic nature of the heterostructure changes to hydrophilic. As a result, the reversible surface wettability of heterostructure on interaction with UV light can give potential applications as antifogging and self-cleaning surfaces.

Keywords: GLAD, heterostructure, In2O3/TiO2 NC, surface wettability

Procedia PDF Downloads 163
10903 Determinants of Long Acting Reversible Contraception Utilization among Women (15-49) in Uganda: Analysis of 2016 PMA2020 Uganda Survey

Authors: Nulu Nanono

Abstract:

Background: The Ugandan national health policy and the national population policy all recognize the need to increase access to quality, affordable, acceptable and sustainable contraceptive services for all people but provision and utilization of quality services remains low. Two contraceptive methods are categorized as long-acting temporary methods: intrauterine contraceptive devices (IUCDs) and implants. Copper-containing IUCDs, generally available in Ministry of Health (MoH) family planning programs and is effective for at least 12 years while Implants, depending on the type, last for up to three to seven years. Uganda’s current policy and political environment are favorable towards achieving national access to quality and safe contraceptives for all people as evidenced by increasing government commitments and innovative family planning programs. Despite the increase of modern contraception use from 14% to 26%, long acting reversible contraceptive (LARC) utilization has relatively remained low with less than 5% using IUDs & Implants which in a way explains Uganda’s persistent high fertility rates. Main question/hypothesis: The purpose of the study was to examine relationship between the demographic, socio-economic characteristics of women, health facility factors and long acting reversible contraception utilization. Methodology: LARC utilization was investigated comprising of the two questions namely are you or your partner currently doing something or using any method to delay or avoid getting pregnant? And which method or methods are you using? Data for the study was sourced from the 2016 Uganda Performance Monitoring and Accountability 2020 Survey comprising of 3816 female respondents aged 15 to 49 years. The analysis was done using the Chi-squared tests and the probit regression at bivariate and multivariate levels respectively. The model was further tested for validity and normality of the residuals using the Sharipo wilks test and test for kurtosis and skewness. Results: The results showed the model the age, parity, marital status, region, knowledge of LARCs, availability of LARCs to be significantly associated with long acting contraceptive utilization with p value of less than 0.05. At the multivariate analysis level, women who had higher parities (0.000) tertiary education (0.013), no knowledge about LARCs (0.006) increases their probability of using LARCs. Furthermore while women age 45-49, those who live in the eastern region reduces their probability of using LARCs. Knowledge contribution: The findings of this study join the debate of prior research in this field and add to the body of knowledge related to long acting reversible contraception. An outstanding and queer finding from the study is the non-utilization of LARCs by women who are aware and have knowledge about them, this may be an opportunity for further research to investigate the attribution to this.

Keywords: contraception, long acting, utilization, women (15-49)

Procedia PDF Downloads 204
10902 Denoising Convolutional Neural Network Assisted Electrocardiogram Signal Watermarking for Secure Transmission in E-Healthcare Applications

Authors: Jyoti Rani, Ashima Anand, Shivendra Shivani

Abstract:

In recent years, physiological signals obtained in telemedicine have been stored independently from patient information. In addition, people have increasingly turned to mobile devices for information on health-related topics. Major authentication and security issues may arise from this storing, degrading the reliability of diagnostics. This study introduces an approach to reversible watermarking, which ensures security by utilizing the electrocardiogram (ECG) signal as a carrier for embedding patient information. In the proposed work, Pan-Tompkins++ is employed to convert the 1D ECG signal into a 2D signal. The frequency subbands of a signal are extracted using RDWT(Redundant discrete wavelet transform), and then one of the subbands is subjected to MSVD (Multiresolution singular valued decomposition for masking. Finally, the encrypted watermark is embedded within the signal. The experimental results show that the watermarked signal obtained is indistinguishable from the original signals, ensuring the preservation of all diagnostic information. In addition, the DnCNN (Denoising convolutional neural network) concept is used to denoise the retrieved watermark for improved accuracy. The proposed ECG signal-based watermarking method is supported by experimental results and evaluations of its effectiveness. The results of the robustness tests demonstrate that the watermark is susceptible to the most prevalent watermarking attacks.

Keywords: ECG, VMD, watermarking, PanTompkins++, RDWT, DnCNN, MSVD, chaotic encryption, attacks

Procedia PDF Downloads 101
10901 Anti-Forensic Countermeasure: An Examination and Analysis Extended Procedure for Information Hiding of Android SMS Encryption Applications

Authors: Ariq Bani Hardi

Abstract:

Empowerment of smartphone technology is growing very rapidly in various fields of science. One of the mobile operating systems that dominate the smartphone market today is Android by Google. Unfortunately, the expansion of mobile technology is misused by criminals to hide the information that they store or exchange with each other. It makes law enforcement more difficult to prove crimes committed in the judicial process (anti-forensic). One of technique that used to hide the information is encryption, such as the usages of SMS encryption applications. A Mobile Forensic Examiner or an investigator should prepare a countermeasure technique if he finds such things during the investigation process. This paper will discuss an extension procedure if the investigator found unreadable SMS in android evidence because of encryption. To define the extended procedure, we create and analyzing a dataset of android SMS encryption application. The dataset was grouped by application characteristics related to communication permissions, as well as the availability of source code and the documentation of encryption scheme. Permissions indicate the possibility of how applications exchange the data and keys. Availability of the source code and the encryption scheme documentation can show what the cryptographic algorithm specification is used, how long the key length, how the process of key generation, key exchanges, encryption/decryption is done, and other related information. The output of this paper is an extended or alternative procedure for examination and analysis process of android digital forensic. It can be used to help the investigators while they got a confused cause of SMS encryption during examining and analyzing. What steps should the investigator take, so they still have a chance to discover the encrypted SMS in android evidence?

Keywords: anti-forensic countermeasure, SMS encryption android, examination and analysis, digital forensic

Procedia PDF Downloads 127
10900 A Business-to-Business Collaboration System That Promotes Data Utilization While Encrypting Information on the Blockchain

Authors: Hiroaki Nasu, Ryota Miyamoto, Yuta Kodera, Yasuyuki Nogami

Abstract:

To promote Industry 4.0 and Society 5.0 and so on, it is important to connect and share data so that every member can trust it. Blockchain (BC) technology is currently attracting attention as the most advanced tool and has been used in the financial field and so on. However, the data collaboration using BC has not progressed sufficiently among companies on the supply chain of manufacturing industry that handle sensitive data such as product quality, manufacturing conditions, etc. There are two main reasons why data utilization is not sufficiently advanced in the industrial supply chain. The first reason is that manufacturing information is top secret and a source for companies to generate profits. It is difficult to disclose data even between companies with transactions in the supply chain. In the blockchain mechanism such as Bitcoin using PKI (Public Key Infrastructure), in order to confirm the identity of the company that has sent the data, the plaintext must be shared between the companies. Another reason is that the merits (scenarios) of collaboration data between companies are not specifically specified in the industrial supply chain. For these problems this paper proposes a Business to Business (B2B) collaboration system using homomorphic encryption and BC technique. Using the proposed system, each company on the supply chain can exchange confidential information on encrypted data and utilize the data for their own business. In addition, this paper considers a scenario focusing on quality data, which was difficult to collaborate because it is a top secret. In this scenario, we show a implementation scheme and a benefit of concrete data collaboration by proposing a comparison protocol that can grasp the change in quality while hiding the numerical value of quality data.

Keywords: business to business data collaboration, industrial supply chain, blockchain, homomorphic encryption

Procedia PDF Downloads 136
10899 Competitive Coordination Strategy Towards Reversible Hybrid Hetero-Homogeneous Oxygen-Evolving Catalyst

Authors: Peikun Zhang, Chunhua Cui

Abstract:

Photoelectrochemical (PEC) water splitting provides a promising pathway to convert solar energy into renewable fuels. However, the main and seemingly insurmountable obstacle is that the sluggish kinetics of oxygen evolution reaction (OER) severely jeopardizes the overall efficiency, thus exploring highly active, stable, and appreciable catalysts is urgently requested. Herein a competitive coordination strategy was demonstrated to form a reversible hybrid homo-heterogeneous catalyst for efficient OER in alkaline media. The dynamic process involves an in-situ anchoring of soluble nickel–bipyridine pre-catalyst to a conductive substrate under OER and a re-dissolution course under open circuit potential, induced by the competitive coordination between nickel–bipyridine and nickel-hydroxyls. This catalyst allows to elaborately self-modulate a charge-transfer layer thickness upon the catalytic on-off operation, which affords substantially increased active sites, yet remains light transparency, and sustains the stability of over 200 hours of continuous operation. The integration of this catalyst with exemplified state-of-the-art Ni-sputtered Si photoanode can facilitate a ~250 mV cathodic shift at a current density of 20 mA cm-2. This finding helps the understanding of catalyst from a “dynamic” perspective, which represents a viable alternative to address remaining hurdles toward solar-driven water oxidation.

Keywords: molecular catalyst, oxygen evolution reaction, solar energy, transition metal complex, water splitting

Procedia PDF Downloads 123
10898 Formulation Development and Evaluation Chlorpheniramine Maleate Containing Nanoparticles Loaded Thermo Sensitive in situ Gel for Treatment of Allergic Rhinitis

Authors: Vipin Saini, Manish Kumar, Shailendra Bhatt, A. Pandurangan

Abstract:

The aim of the present study was to fabricate a thermo sensitive gel containing Chlorpheniramine maleate (CPM) loaded nanoparticles following intranasal administration for effective treatment of allergic rhinitis. Chitosan based nanoparticles were prepared by precipitation method followed by the addition of developed NPs within the Poloxamer 407 and carbopol 934P based mucoadhesive thermo-reversible gel. Developed formulations were evaluated for Particle size, PDI, % entrapment efficiency and % cumulative drug permeation. NP3 formulation was found to be optimized on the basis of minimum particle size (143.9 nm), maximum entrapment efficiency (80.10±0.414 %) and highest drug permeation (90.92±0.531 %). The optimized formulation NP3 was then formulated into thermo reversible in situ gel. This intensifies the contact between nasal mucosa and the drug, increases and facilitates the drug absorption which results in increased bioavailability. G4 formulation was selected as the optimize on the basis of gelation ability and mucoadhesive strength. Histology was carried out to examine the damage caused by the optimized G4 formulation. Results revealed no visual signs of tissue damage thus indicated safe nasal delivery of nanoparticulate in situ gel formulation G4. Thus, intranasal CPM NP-loaded in situ gel was found to be a promising formulation for the treatment of allergic rhinitis.

Keywords: chitosan, nanoparticles, in situ gel, chlorpheniramine maleate, poloxamer 407

Procedia PDF Downloads 178
10897 Reversible Cerebral Vasoconstriction Syndrome at Emergency Department

Authors: Taerim Kim, Shin Ahn, Chang Hwan Sohn, Dong Woo Seo, Won Young Kim

Abstract:

Object: Reversible cerebral vasospasm syndrome (RCVS) remains an underrated cause of thunderclap headache which shares similar history of the ‘worst-ever’ headache with subarachnoid hemorrhage (SAH) to the emergency physicians. This study evaluated the clinical manifestations, radiological features, and outcomes of patients with RCVS so that the physicians could raise the high index of suspicion to detect RCVS in more patients with thunderclap headache before having life-threatening complications. Methods: The electric medical records of 18 patients with diagnostic criteria of RCVS at the emergency department (ED) between January 2013 and December 2014 were retrospective reviewed. Results: The mean age was 50.7 years, and 80% were women. Patients with RCVS visit an average of 4.7 physicians before receiving an accurate diagnosis and mean duration of symptom until diagnosis is 9.3 days. All patients except one experienced severe headache, from 8 to 10 pain intensity on a numerical rating scale (NRS). 44% of patients had nausea as an associated symptom, 66% of patients experienced worsening of headache while gagging, leaning forward, defecating, urinating or having sex. The most frequently affected vessels are middle cerebral arteries demonstrating the characteristic diffuse “string of beads” appearance. Four patients had SAH as a complication. Conclusion: Patients with RCVS have a unique set of clinical and imaging features. Emergency physicians should raise the high index of suspicion to detect RCVS in more patients with thunderclap headache before life-threatening complications.

Keywords: headache, thunderclap, subarachnoid haemorrhage, stroke

Procedia PDF Downloads 427
10896 Information Literacy Initiatives in India in Present Era Age

Authors: Darshan Lal

Abstract:

The paper describes the concept of Information literacy. It is a critical component of this information age. Information literacy is the vital process in modern changing world. Information Literacy initiatives in India was also discussed. Paper also discussed Information literacy programmes for LIS professionals. Information literacy makes person capable to recognize when information is needed and how to locate, evaluate and use effectively of the needed information.

Keywords: information literacy, information communication technology (ICT), information literacy programmes

Procedia PDF Downloads 371