James Madison’s Constitution: A Double Security and a Parchment Barrier

  • Abstract
  • Literature Map
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

James Madison’s Constitution: A Double Security and a Parchment Barrier

Similar Papers
  • Research Article
  • 10.3390/su17167242
Measurement, Dynamic Evolution, and Spatial Convergence of the Efficiency of the Green and Low-Carbon Utilization of Cultivated Land Under the Goal of Food and Ecological “Double Security”: Empirical Evidence from the Huaihe River Ecological Economic Belt of China
  • Aug 11, 2025
  • Sustainability
  • Hao Yu + 1 more

Under the “double security” goal of achieving both food security and ecological protection, this study explores the green and low-carbon utilization efficiency of cultivated land (GLCUECL) in the Huaihe River Ecological Economic Belt (HREEB). This study identifies the spatiotemporal evolution characteristics and trends, promoting the green, low-carbon, and sustainable utilization of arable land resources in the HREEB, thus contributing to regional and national food and ecological security. Using a global super-efficiency EBM framework that accounts for undesirable outputs, as well as the GML index, the researchers measured and decomposed the GLCUECL in 25 prefecture-level cities of the HREEB from 2005 to 2021. The Theil index and kernel density estimation were applied to analyze regional disparities and changing developmental traits. Spatial convergence and divergence were assessed using the coefficient of variation and spatial convergence models. Key findings include the following: (1) Over time, the GLCUECL in the HREEB exhibited an overall upward trend and a non-equilibrium characteristic, namely the “East Sea-river-lake Linkage Area (ESLA) > Midwest Inland Rising Area (MIRA) > Huaihe River Ecological Economic Belt (HREEB) > North Huaihai Economic Zone (NHEZ)”. The increase in the GML index of the GLCUECL is mainly attributable to a technical progress change. (2) The overall difference in the GLCUECL tends to decline, which is mainly attributable to the intra-regional differences. (3) The overall kernel density curves for the HREEB and its three sub-regions exhibited a “rightward shift” trend. Except for the expansion and polarization of the absolute difference in the GLCUECL in the NHEZ, the absolute difference in GLCUECL in other regions, such as the HREEB, ESLA, and MIRA, exhibited a decreasing trend. (4) Spatial convergence analysis revealed that only the NHEZ lacks σ-convergence, whereas all regions exhibited β-convergence. Moreover, factors such as rural economic development level, cultivated land resource endowment, agricultural subsidy policy, crop planting structure, and technological input exerted a heterogeneous effect on the change in the GLCUECL. Based on these findings, this study offers recommendations for improving GLCUECL in the HREEB. Our recommendations include the implementation of the concept of green new development, optimization of the institution supply, establishing a regional cooperation mechanism for green and low-carbon utilization of cultivated land, and formulation of differentiated paths for improving the green and low-carbon utilization efficiency of cultivated land according to local conditions.

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/icit.2018.00035
Secure Communication through Double Layer Security with Efficient Key Transmission
  • Dec 1, 2018
  • Biswajita Datta + 3 more

Information security becomes a major concern today. The paper introduces a double layer security approach that use both cryptography and steganography for secure transmission. The secret message is first encrypted using S-DES encryption algorithm. The keys of encryption are generated from edge pixels where the encrypted message is embedded within the non-edge pixels of cover image. The capacity of the method is enhanced through multi-bit embedding in three color channels. The proper extraction of target data is ensured through the non-involvement of lower bit-planes during edge detection. The quality of the stego media is maintained within the acceptable range of PSNR even at the higher embedding capacity. The security strength of the proposed method ensures through the transmission of keys with stego image and with the use of different keys for encryption. The method also reduces the bandwidth required in double layer security for key transmission.

  • Conference Article
  • Cite Count Icon 10
  • 10.1109/isncc.2019.8909192
A High capacity Double-Layer Gray Code Based Security Scheme for Secure Data Embedding
  • Jun 1, 2019
  • Ghadir Mostafa + 1 more

With the recent amelioration in digital communication and cloud storage, security remains a concern. Even though cryptographic algorithms have been readily used, they have been proved to be vulnerable to brute force and side channels attacks. Hence an additional security layer must be integrated to overcome the suspicion introduced by cryptography which is only concerned with the secrecy of the transmitted data. Adjacently, steganography tackles the secrecy of communication in the first place and hence a hybrid double layer security scheme that integrates both systems safeguards the data in terms of secrecy and imperceptibility. In this paper, we propose a double layer blind reversible security scheme which deploys Blowfish encryption as a cryptographic layer followed by a least significant bit image steganographic layer which spreads the encrypted secret data required to be transmitted over the pixels of an image cover medium. Our scheme also spreads the data again over the color channels of the pixels selected for embedding according to a gray code sequence. In order to judge the performance of our proposed scheme, the values of peak signal to noise ratio, mean squared error and structural similarity index have been computed and compared to other least significant bit schemes in the literature. The proposed scheme has been proved superior in terms of capacity, imperceptibility and computational complexity.

  • Research Article
  • 10.24114/cess.v8i1.41212
Transaction Data Security Using AES and RC4
  • Jan 4, 2023
  • CESS (Journal of Computer Engineering, System and Science)
  • Puji Sari Ramadhan + 4 more

This study discusses the effectiveness of using AES (Advanced Encryption Standard) and RC4 (Rivest Chipper 4) as digital data security algorithms to prevent and protect transaction data from irresponsible parties. This needs to be done because the development of sales transactions or other services has used digital technology a lot. This situation causes the need to secure digital data from existing transactions, so that transaction data can be stored safely. Transaction data security is carried out by changing data into ciphers or codes that are difficult to read using the AES (Advanced Encryption Standard) and RC4 (Rivest Cipher 4) algorithms. This research begins by collecting existing transaction data and then transforming it into ASCII code. The results of the transformation will be used to perform calculations using the AES algorithm. After completing the calculation process using the AES algorithm, then do the calculations using RC4. These results will be stored in the database so that the transaction data that has turned into these codes cannot be known by other parties. The combination of the AES and RC4 algorithms is carried out to strengthen data encryption because there are more and more rotation systems and double security is carried out so that digital data is not easily read and misused. With the presence of this research, it can be shown that the AES and RC4 algorithms are capable of encrypting existing transaction data with multiple levels of security.

  • Conference Article
  • 10.1109/ic3i56241.2022.10072728
Block chain Technology Adoption in various Domains and the way of getting Double Security
  • Dec 14, 2022
  • Merin Thomas + 1 more

Blockchain is a technique that allows for the decentralized data storage and coin is a form of trade that operates similarly to fiat money. There in old, government’s bankers and the administration acquired possession of and controlled all assets, including money, platinum, and other rare metals, by stealing them from the population. Because of the reasons outlined beneath, crypto aspires to return power to average folks.The first Bitcoin was released in 2008 by either a man going by the moniker Pseudonym. The foundation of this system is encryption, or concealed reading. The privacy of players and activities is ensured via cryptographic autonomously without interference from a 3rd party Blockchain-based crypto currencies is a decentralized mentoring electronic payments and financial transaction system that is secured and decentralized. Elevated info may be securely stored using bitcoins. Although fiat (written) money is widely utilized nowadays, it has certain drawbacks. These problems, which are being abused by strong groups, concern Him. Banknotes has several disadvantages, including the ability to be copied, misappropriated, and being difficult to transport between locations owing to expensive costs. He created Bitcoins, a kind of electronic money that can fulfil all of those promises. With Bit, the goal was to provide a fee-free, open-source, and user-controlled virtual trading. The primary problem with bank notes is it companies and states, however, supervise and regulate it.Bankers are unreliable since they have caused individuals to lose their hard - earned cash. Crypto currencies offers its customers anonymity and returns ownership of their income to ordinary folks. Blockchain technology has the ability to revolutionize many different industries, including voting, medical, estate development, among others. It has the potential to fix system that have been compromised for a long time. However, it is now utilized all over the globe after thirteen years, although there is still a considerable distance to go. It will talk about the history, present, and destiny of crypto currencies and block chains as well as ways to get this innovation more widely used.

  • Research Article
  • Cite Count Icon 2
  • 10.17485/ijst/2016/v9i8/79067
Text Embedded into Encrypted Image based on Genetic Algorithm on Piece-Wise Linear Chaotic Map
  • Mar 9, 2016
  • Indian Journal of Science and Technology
  • Bano Mahwish + 2 more

Objective: To make texts and images secured by placing into. Method: Use of genetic algorithm for the selection of pixel's position in the plain images in which a class of fitness was used based on the intensity of the pixels influenced by neighbouring pixels. The algorithm presented in our previous work was secured and useful for text embedding where intensity of each pixel has an important role both in grey and colour images. Findings: Algorithms for text embedding into images have developed by a number of researchers. They simply placed the text into images sequentially and randomly. This has made text secured and difficult to retrieve but might not be impossible to retrieve. In the present paper, we proposed an added algorithm to Genetic Algorithm on Piece-Wise Linear Chaotic Map (PWLCM) for text embedding. This could have a double security on text encryption into images where images are itself encrypted. This made the diffusion processes more secured. Results and tests analysis are presented for comparison with existing text embedded algorithms in the literature. Applications: Public communication network, medical images are protected from forging, secret data and documents are to be safe from intruders.

  • Book Chapter
  • 10.4324/9780429337260-5
A Double Security: Federalism as Competition
  • Nov 18, 2021
  • Daniel J Elazar + 3 more

A Double Security: Federalism as Competition

  • Research Article
  • Cite Count Icon 18
  • 10.12928/telkomnika.v17i6.13201
Modified RSA-based algorithm: a double secure approach
  • Dec 1, 2019
  • TELKOMNIKA (Telecommunication Computing Electronics and Control)
  • Israa Al_Barazanchi + 3 more

Security algorithms like RSA are becoming increasingly important for communications to provide companies, organizations, and users around the world, secure applications who rely heavily on them in their daily work. Security algorithms use different acquaintances among companies which might belong to various countries or even cities. Such data should essentially be encrypted to make sure that there is security in transportation. Thus, the current research paper leads to the novel system of security for the safe transfer of data. This paper examines the general principles of encryption and focuses on the development of RSA and the complexity of the encryption key so that it becomes more secure in the applications used. In this project, we will work on the RSA algorithm by adding some complexity to the 3keys (3k). This addition will increase the security and complexity of the algorithm's speed while maintaining encryption and decryption time. The paper also presents an approach by means of public key encryption to enhance cryptographic security. Moreover, double security is provided by the algorithm of RSA. This novel RSA algorithm was investigated in MATLAB. Numerical results for the various parameters such as Mean Square Error (MSE), correlation and Bit Error Ratio (BER) were implemented for the encryption of the message. The experimental results demonstrated that the proposed algorithm for 3 keys has small error rate in the retrieval of the encoded text.

  • Conference Article
  • Cite Count Icon 2
  • 10.1109/icaeca52838.2021.9675527
Design and Validation of CAN Protocol with Double Encryption for Electric Vehicle Applications
  • Oct 8, 2021
  • R Deeksha + 1 more

The security of the electric vehicle can be ensured by incorporating encryption features in sent/received data in the vehicle. By providing encryption to the data in the electric vehicle, it is ensured that it cannot be accessed by intruders. So, even if the vehicle is hacked no damage could happen for the vehicle. Here, two symmetric algorithms (RC6 and Blowfish) are used for encryption which provides double security and is named as double encryption. RC6 and Blowfish both are symmetric-cryptographic algorithm with variable block size and variable key size. Since both are symmetric algorithm there is no requirement of key-generation. The performance of proposed algorithms is validated using software and software simulation. Python programming is used in software simulation time calculation for encryption and decryption process. Hardware simulation is carried out by proteus with Arduino as controller. Results show that algorithms are implementable in hardware with minimum processing time. Hence the proposed algorithms are applicable for electric vehicle application where the security is ensured in practical environment.

  • Research Article
  • 10.51903/jtie.v2i1.174
Document Security System Using Arduino-Based Fingerprint And Rfid Module
  • May 15, 2024
  • Journal of Technology Informatics and Engineering
  • Mohamad Irkam + 1 more

Documents are valuable/important letters that can be used as evidence of printed or written information. The company where the author conducted research is a company operating in the logistics sector, which of course has a special document storage room, namely the Accounting room . The use of plastic folders containing documents and safes as a place to store important documents and files still carries a lot of risk of misuse and loss. The title of this research is Document Security System Using Arduino- Based Fingerprint and RFID Modules . One of the aims of this research is to minimize loss and prevent misuse of documents/files placed in plastic folders. A security system using fingerprint and RFID is very good to apply as document security because it has double security. The system created uses a fingerprint as a signal breaker or RFID tag electromagnetic waves which are attached to a folder containing important documents/files belonging to the company. This system is also supported by an Arduino kit Uno with an Atmega328 microcontroller as the brain for processing data from the fingerprint sensor and RFID Reader functions as an electromagnetic wave identification system for RFID Tags , therefore two pieces of hardware are needed, called Tags and Readers . Apart from the three main components mentioned, there are several other components used in making this document security system, namely micro SD kit, buzzer, push button, servo . Creating this system is very important to limit misuse of documents and the risk of losing documents in a company.

  • Research Article
  • 10.33140/aurdp.01.01.02
Cyber Security; Etiology and Importance
  • Feb 27, 2024
  • Advances in Urban Regional Development and Planning

Background: Cyber Security is to protect online data and software from cyber threats. These cyberattacks are typically intended to gain access to, change, or delete sensitive information; extort money from users; or disrupt regular corporate activities. It is difficult to keep up a regular follow up with new technologies, so it is necessary to keep the important data safe from cyber threats. There are many types of cyber threats, malware, ransomware, social engineering, phishing etc. To prevent cyber-attacks one can, use password manager tools like LastPass and others. People also use two factor authentication for double security on their accounts. Methods: Boards such as the National Institute of Standards and Technology (NIST) are developing frameworks to assist firms in understanding their security risks, improving cybersecurity procedures, and preventing cyber assaults. The fight against cybercrimes and attack, organizations needed a strong base there are 5 types of cyber securities: Critical Infrastructure Security, application security, network security, cloud security and (IoT) Security. In the modern time the US is highly based on computers and on different software, so it is really important for the US to be more conscious about the security as they get many threats almost every day for hacking their data and accounts. Results and Conclusion: Nowadays, even small businesses rarely recover their loss from the cyber-attacks and many back-off from continuing their businesses after being target of hackers. The first cybercrime attack was recorded in 1988 by a graduate student. Now that large companies and even small businesses are aware of cyber-attacks, they try their best to take every precaution to prevent hacking with double security and password manager tools.

  • Conference Article
  • Cite Count Icon 1
  • 10.1109/isemantic55962.2022.9920438
Triple DES Cryptography Based on Hash Function and DSA for Digital Certificate Authentication
  • Sep 17, 2022
  • Eko Hari Rachmawanto + 4 more

Digital certificates are digital files that are conventionally used as proof of participation or a sign of appreciation owned by someone. Cryptographic authentication method using digital signatures that are used as confidential evidence and validation of digital certificate ownership. Digital signatures use cryptographic algorithms such as one-way hashes, non-symmetric key cryptography, and symmetric key cryptography. So this study uses the proposed algorithm used, namely SHA-256, DSA & 3DES. The SHA-256 algorithm is used because of its high security, while the DSA algorithm is a special standard for digital signatures with 2 (two) functions, namely signing & verifying, and the last is the 3DES algorithm as double security which guarantees 3 (three) times the encryption process and description. By implementing a digital signature using the SHA256 hash method, the DSA signing & verifying method, and the 3DES cryptographic algorithm, digital certificates can avoid editing threats, and ensure authentication security and validation of the validity of the file, so that it can detect the original digital certificate. In 10 experiments, it is known that the digital signature method with the SHA-256, DSA and 3DES algorithms has an average run time speed of 0.0518186331 seconds for the signing method and 0.1321175146 seconds for the verify method.

  • Conference Article
  • 10.1109/icraect.2017.15
Image Encryption Using Legendre Sequence and DCT
  • Mar 1, 2017
  • G Savithri + 3 more

One of the fears in the field of communication is insecurity of data. Pseudo random noise (PRN), which is similar to noise and also fulfills a greater number of the standard tests for statistical randomness, can be used as a key for encryption. Using Legendre PN sequence which is based on prime numbers, an image encryption technique has been proposed in this paper. Based on the number of pixels in the image, Legendre sequences are generated for a set of prime numbers and concatenated to generate the required length sequence. This sequence is then used to encrypt the secret image that generates noise like pattern. This encrypted image is later embedded into a larger image using DCT technique to have double security. The proposed algorithm using Legendre sequence when tested on various images has always produced a PSNR value of cover image above 20, proving that changes made to cover image is very less. Identification of key to decrypt the original image is impossible to detect as multiple Legendre sequences are used to form PN sequence. Steganography with DCT adds to improvement in security. The above algorithm can be extended to color images and the robustness of the algorithm can be tested using different attacking methods.

  • Research Article
  • Cite Count Icon 26
  • 10.1016/j.colsurfb.2020.111022
Double security drug delivery system DDS constructed by multi-responsive (pH/redox/US) microgel
  • Apr 28, 2020
  • Colloids and Surfaces B: Biointerfaces
  • Bin Lei + 5 more

Double security drug delivery system DDS constructed by multi-responsive (pH/redox/US) microgel

  • Research Article
  • 10.5958/2320-3226.2022.00025.x
MDS block hankel-like rhotrices using conjugate elements and self-dual bases of finite fields
  • Jan 1, 2022
  • Bulletin of Pure & Applied Sciences- Mathematics and Statistics
  • Shalini Gupta + 3 more

Maximum Distance Separable (MDS) matrices offer ideal diffusion properties and are of great importance in design of block ciphers and hash functions. A rhotrix as defined by Sani, is a coupled matrix which when used in a cryptosystem provides double security. Many authors constructed MDS Rhotrices over finite fields using matrices which are cryptographically significant. Hankel matrices have wide range of applications in engineering, coding theory and cryptography. In the present paper, we define block rhotrix and block Hankel- like rhotrix. Further, we construct MDS block Hankel-like rhotrices using self-dual basis and conjugate elements of Fpn.

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.