James Madison’s Constitution: A Double Security and a Parchment Barrier
James Madison’s Constitution: A Double Security and a Parchment Barrier
- Research Article
- 10.3390/su17167242
- Aug 11, 2025
- Sustainability
Under the “double security” goal of achieving both food security and ecological protection, this study explores the green and low-carbon utilization efficiency of cultivated land (GLCUECL) in the Huaihe River Ecological Economic Belt (HREEB). This study identifies the spatiotemporal evolution characteristics and trends, promoting the green, low-carbon, and sustainable utilization of arable land resources in the HREEB, thus contributing to regional and national food and ecological security. Using a global super-efficiency EBM framework that accounts for undesirable outputs, as well as the GML index, the researchers measured and decomposed the GLCUECL in 25 prefecture-level cities of the HREEB from 2005 to 2021. The Theil index and kernel density estimation were applied to analyze regional disparities and changing developmental traits. Spatial convergence and divergence were assessed using the coefficient of variation and spatial convergence models. Key findings include the following: (1) Over time, the GLCUECL in the HREEB exhibited an overall upward trend and a non-equilibrium characteristic, namely the “East Sea-river-lake Linkage Area (ESLA) > Midwest Inland Rising Area (MIRA) > Huaihe River Ecological Economic Belt (HREEB) > North Huaihai Economic Zone (NHEZ)”. The increase in the GML index of the GLCUECL is mainly attributable to a technical progress change. (2) The overall difference in the GLCUECL tends to decline, which is mainly attributable to the intra-regional differences. (3) The overall kernel density curves for the HREEB and its three sub-regions exhibited a “rightward shift” trend. Except for the expansion and polarization of the absolute difference in the GLCUECL in the NHEZ, the absolute difference in GLCUECL in other regions, such as the HREEB, ESLA, and MIRA, exhibited a decreasing trend. (4) Spatial convergence analysis revealed that only the NHEZ lacks σ-convergence, whereas all regions exhibited β-convergence. Moreover, factors such as rural economic development level, cultivated land resource endowment, agricultural subsidy policy, crop planting structure, and technological input exerted a heterogeneous effect on the change in the GLCUECL. Based on these findings, this study offers recommendations for improving GLCUECL in the HREEB. Our recommendations include the implementation of the concept of green new development, optimization of the institution supply, establishing a regional cooperation mechanism for green and low-carbon utilization of cultivated land, and formulation of differentiated paths for improving the green and low-carbon utilization efficiency of cultivated land according to local conditions.
- Conference Article
1
- 10.1109/icit.2018.00035
- Dec 1, 2018
Information security becomes a major concern today. The paper introduces a double layer security approach that use both cryptography and steganography for secure transmission. The secret message is first encrypted using S-DES encryption algorithm. The keys of encryption are generated from edge pixels where the encrypted message is embedded within the non-edge pixels of cover image. The capacity of the method is enhanced through multi-bit embedding in three color channels. The proper extraction of target data is ensured through the non-involvement of lower bit-planes during edge detection. The quality of the stego media is maintained within the acceptable range of PSNR even at the higher embedding capacity. The security strength of the proposed method ensures through the transmission of keys with stego image and with the use of different keys for encryption. The method also reduces the bandwidth required in double layer security for key transmission.
- Conference Article
10
- 10.1109/isncc.2019.8909192
- Jun 1, 2019
With the recent amelioration in digital communication and cloud storage, security remains a concern. Even though cryptographic algorithms have been readily used, they have been proved to be vulnerable to brute force and side channels attacks. Hence an additional security layer must be integrated to overcome the suspicion introduced by cryptography which is only concerned with the secrecy of the transmitted data. Adjacently, steganography tackles the secrecy of communication in the first place and hence a hybrid double layer security scheme that integrates both systems safeguards the data in terms of secrecy and imperceptibility. In this paper, we propose a double layer blind reversible security scheme which deploys Blowfish encryption as a cryptographic layer followed by a least significant bit image steganographic layer which spreads the encrypted secret data required to be transmitted over the pixels of an image cover medium. Our scheme also spreads the data again over the color channels of the pixels selected for embedding according to a gray code sequence. In order to judge the performance of our proposed scheme, the values of peak signal to noise ratio, mean squared error and structural similarity index have been computed and compared to other least significant bit schemes in the literature. The proposed scheme has been proved superior in terms of capacity, imperceptibility and computational complexity.
- Research Article
- 10.24114/cess.v8i1.41212
- Jan 4, 2023
- CESS (Journal of Computer Engineering, System and Science)
This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the development of sales transactions or other services has used digital technology a lot. This situation causes the need to secure digital data from existing transactions, so that transaction data can be stored safely. Transaction data security is carried out by changing data into ciphers or codes that are difficult to read using the AES (Advanced Encryption Standard) and RC4 (Rivest Cipher 4) algorithms. This research begins by collecting existing transaction data and then transforming it into ASCII code. The results of the transformation will be used to perform calculations using the AES algorithm. After completing the calculation process using the AES algorithm, then do the calculations using RC4. These results will be stored in the database so that the transaction data that has turned into these codes cannot be known by other parties. The combination of the AES and RC4 algorithms is carried out to strengthen data encryption because there are more and more rotation systems and double security is carried out so that digital data is not easily read and misused. With the presence of this research, it can be shown that the AES and RC4 algorithms are capable of encrypting existing transaction data with multiple levels of security.
- Conference Article
- 10.1109/ic3i56241.2022.10072728
- Dec 14, 2022
Blockchain is a technique that allows for the decentralized data storage and coin is a form of trade that operates similarly to fiat money. There in old, government’s bankers and the administration acquired possession of and controlled all assets, including money, platinum, and other rare metals, by stealing them from the population. Because of the reasons outlined beneath, crypto aspires to return power to average folks.The first Bitcoin was released in 2008 by either a man going by the moniker Pseudonym. The foundation of this system is encryption, or concealed reading. The privacy of players and activities is ensured via cryptographic autonomously without interference from a 3rd party Blockchain-based crypto currencies is a decentralized mentoring electronic payments and financial transaction system that is secured and decentralized. Elevated info may be securely stored using bitcoins. Although fiat (written) money is widely utilized nowadays, it has certain drawbacks. These problems, which are being abused by strong groups, concern Him. Banknotes has several disadvantages, including the ability to be copied, misappropriated, and being difficult to transport between locations owing to expensive costs. He created Bitcoins, a kind of electronic money that can fulfil all of those promises. With Bit, the goal was to provide a fee-free, open-source, and user-controlled virtual trading. The primary problem with bank notes is it companies and states, however, supervise and regulate it.Bankers are unreliable since they have caused individuals to lose their hard - earned cash. Crypto currencies offers its customers anonymity and returns ownership of their income to ordinary folks. Blockchain technology has the ability to revolutionize many different industries, including voting, medical, estate development, among others. It has the potential to fix system that have been compromised for a long time. However, it is now utilized all over the globe after thirteen years, although there is still a considerable distance to go. It will talk about the history, present, and destiny of crypto currencies and block chains as well as ways to get this innovation more widely used.
- Research Article
2
- 10.17485/ijst/2016/v9i8/79067
- Mar 9, 2016
- Indian Journal of Science and Technology
Objective: To make texts and images secured by placing into. Method: Use of genetic algorithm for the selection of pixel's position in the plain images in which a class of fitness was used based on the intensity of the pixels influenced by neighbouring pixels. The algorithm presented in our previous work was secured and useful for text embedding where intensity of each pixel has an important role both in grey and colour images. Findings: Algorithms for text embedding into images have developed by a number of researchers. They simply placed the text into images sequentially and randomly. This has made text secured and difficult to retrieve but might not be impossible to retrieve. In the present paper, we proposed an added algorithm to Genetic Algorithm on Piece-Wise Linear Chaotic Map (PWLCM) for text embedding. This could have a double security on text encryption into images where images are itself encrypted. This made the diffusion processes more secured. Results and tests analysis are presented for comparison with existing text embedded algorithms in the literature. Applications: Public communication network, medical images are protected from forging, secret data and documents are to be safe from intruders.
- Book Chapter
- 10.4324/9780429337260-5
- Nov 18, 2021
A Double Security: Federalism as Competition
- Research Article
18
- 10.12928/telkomnika.v17i6.13201
- Dec 1, 2019
- TELKOMNIKA (Telecommunication Computing Electronics and Control)
Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text.
- Conference Article
2
- 10.1109/icaeca52838.2021.9675527
- Oct 8, 2021
The security of the electric vehicle can be ensured by incorporating encryption features in sent/received data in the vehicle. By providing encryption to the data in the electric vehicle, it is ensured that it cannot be accessed by intruders. So, even if the vehicle is hacked no damage could happen for the vehicle. Here, two symmetric algorithms (RC6 and Blowfish) are used for encryption which provides double security and is named as double encryption. RC6 and Blowfish both are symmetric-cryptographic algorithm with variable block size and variable key size. Since both are symmetric algorithm there is no requirement of key-generation. The performance of proposed algorithms is validated using software and software simulation. Python programming is used in software simulation time calculation for encryption and decryption process. Hardware simulation is carried out by proteus with Arduino as controller. Results show that algorithms are implementable in hardware with minimum processing time. Hence the proposed algorithms are applicable for electric vehicle application where the security is ensured in practical environment.
- Research Article
- 10.51903/jtie.v2i1.174
- May 15, 2024
- Journal of Technology Informatics and Engineering
Documents are valuable/important letters that can be used as evidence of printed or written information. The company where the author conducted research is a company operating in the logistics sector, which of course has a special document storage room, namely the Accounting room . The use of plastic folders containing documents and safes as a place to store important documents and files still carries a lot of risk of misuse and loss. The title of this research is Document Security System Using Arduino- Based Fingerprint and RFID Modules . One of the aims of this research is to minimize loss and prevent misuse of documents/files placed in plastic folders. A security system using fingerprint and RFID is very good to apply as document security because it has double security. The system created uses a fingerprint as a signal breaker or RFID tag electromagnetic waves which are attached to a folder containing important documents/files belonging to the company. This system is also supported by an Arduino kit Uno with an Atmega328 microcontroller as the brain for processing data from the fingerprint sensor and RFID Reader functions as an electromagnetic wave identification system for RFID Tags , therefore two pieces of hardware are needed, called Tags and Readers . Apart from the three main components mentioned, there are several other components used in making this document security system, namely micro SD kit, buzzer, push button, servo . Creating this system is very important to limit misuse of documents and the risk of losing documents in a company.
- Research Article
- 10.33140/aurdp.01.01.02
- Feb 27, 2024
- Advances in Urban Regional Development and Planning
Background: Cyber Security is to protect online data and software from cyber threats. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt regular corporate activities. It is difficult to keep up a regular follow up with new technologies, so it is necessary to keep the important data safe from cyber threats. There are many types of cyber threats, malware, ransomware, social engineering, phishing etc. To prevent cyber-attacks one can, use password manager tools like LastPass and others. People also use two factor authentication for double security on their accounts. Methods: Boards such as the National Institute of Standards and Technology (NIST) are developing frameworks to assist firms in understanding their security risks, improving cybersecurity procedures, and preventing cyber assaults. The fight against cybercrimes and attack, organizations needed a strong base there are 5 types of cyber securities: Critical Infrastructure Security, application security, network security, cloud security and (IoT) Security. In the modern time the US is highly based on computers and on different software, so it is really important for the US to be more conscious about the security as they get many threats almost every day for hacking their data and accounts. Results and Conclusion: Nowadays, even small businesses rarely recover their loss from the cyber-attacks and many back-off from continuing their businesses after being target of hackers. The first cybercrime attack was recorded in 1988 by a graduate student. Now that large companies and even small businesses are aware of cyber-attacks, they try their best to take every precaution to prevent hacking with double security and password manager tools.
- Conference Article
1
- 10.1109/isemantic55962.2022.9920438
- Sep 17, 2022
Digital certificates are digital files that are conventionally used as proof of participation or a sign of appreciation owned by someone. Cryptographic authentication method using digital signatures that are used as confidential evidence and validation of digital certificate ownership. Digital signatures use cryptographic algorithms such as one-way hashes, non-symmetric key cryptography, and symmetric key cryptography. So this study uses the proposed algorithm used, namely SHA-256, DSA & 3DES. The SHA-256 algorithm is used because of its high security, while the DSA algorithm is a special standard for digital signatures with 2 (two) functions, namely signing & verifying, and the last is the 3DES algorithm as double security which guarantees 3 (three) times the encryption process and description. By implementing a digital signature using the SHA256 hash method, the DSA signing & verifying method, and the 3DES cryptographic algorithm, digital certificates can avoid editing threats, and ensure authentication security and validation of the validity of the file, so that it can detect the original digital certificate. In 10 experiments, it is known that the digital signature method with the SHA-256, DSA and 3DES algorithms has an average run time speed of 0.0518186331 seconds for the signing method and 0.1321175146 seconds for the verify method.
- Conference Article
- 10.1109/icraect.2017.15
- Mar 1, 2017
One of the fears in the field of communication is insecurity of data. Pseudo random noise (PRN), which is similar to noise and also fulfills a greater number of the standard tests for statistical randomness, can be used as a key for encryption. Using Legendre PN sequence which is based on prime numbers, an image encryption technique has been proposed in this paper. Based on the number of pixels in the image, Legendre sequences are generated for a set of prime numbers and concatenated to generate the required length sequence. This sequence is then used to encrypt the secret image that generates noise like pattern. This encrypted image is later embedded into a larger image using DCT technique to have double security. The proposed algorithm using Legendre sequence when tested on various images has always produced a PSNR value of cover image above 20, proving that changes made to cover image is very less. Identification of key to decrypt the original image is impossible to detect as multiple Legendre sequences are used to form PN sequence. Steganography with DCT adds to improvement in security. The above algorithm can be extended to color images and the robustness of the algorithm can be tested using different attacking methods.
- Research Article
26
- 10.1016/j.colsurfb.2020.111022
- Apr 28, 2020
- Colloids and Surfaces B: Biointerfaces
Double security drug delivery system DDS constructed by multi-responsive (pH/redox/US) microgel
- Research Article
- 10.5958/2320-3226.2022.00025.x
- Jan 1, 2022
- Bulletin of Pure & Applied Sciences- Mathematics and Statistics
Maximum Distance Separable (MDS) matrices offer ideal diffusion properties and are of great importance in design of block ciphers and hash functions. A rhotrix as defined by Sani, is a coupled matrix which when used in a cryptosystem provides double security. Many authors constructed MDS Rhotrices over finite fields using matrices which are cryptographically significant. Hankel matrices have wide range of applications in engineering, coding theory and cryptography. In the present paper, we define block rhotrix and block Hankel- like rhotrix. Further, we construct MDS block Hankel-like rhotrices using self-dual basis and conjugate elements of Fpn.
- Ask R Discovery
- Chat PDF
AI summaries and top papers from 250M+ research sources.