Identity-recognition technologies require assistive equipment, whereas they are poor in recogniti... more Identity-recognition technologies require assistive equipment, whereas they are poor in recognition accuracy and expensive. To overcome this deficiency, this paper proposes several gait feature identification algorithms. First, in combination with the collected gait information of individuals from triaxial accelerometers on smartphones, the collected information is preprocessed, and multimodal fusion is used with the existing standard datasets to yield a multimodal synthetic dataset; then, with the multimodal characteristics of the collected biological gait information, a Convolutional Neural Network based Gait Recognition (CNN-GR) model and the related scheme for the multimodal features are developed; at last, regarding the proposed CNN-GR model and scheme, a unimodal gait feature identity single-gait feature identification algorithm and a multimodal gait feature fusion identity multimodal gait information algorithm are proposed. Experimental results show that the proposed algorithms perform well in recognition accuracy, the confusion matrix, and the kappa statistic, and they have better recognition scores and robustness than the compared algorithms; thus, the proposed algorithm has prominent promise in practice.
Big Data Mining and Analytics ( Volume: 4, Issue: 4), 2021
Identity-recognition technologies require assistive equipment, whereas they are poor in recogniti... more Identity-recognition technologies require assistive equipment, whereas they are poor in recognition accuracy and expensive. To overcome this deficiency, this paper proposes several gait feature identification algorithms. First, in combination with the collected gait information of individuals from triaxial accelerometers on smartphones, the collected information is preprocessed, and multimodal fusion is used with the existing standard datasets to yield a multimodal synthetic dataset; then, with the multimodal characteristics of the collected biological gait information, a Convolutional Neural Network based Gait Recognition (CNN-GR) model and the related scheme for the multimodal features are developed; at last, regarding the proposed CNN-GR model and scheme, a unimodal gait feature identity single-gait feature identification algorithm and a multimodal gait feature fusion identity multimodal gait information algorithm are proposed. Experimental results show that the proposed algorithms perform well in recognition accuracy, the confusion matrix, and the kappa statistic, and they have better recognition scores and robustness than the compared algorithms; thus, the proposed algorithm has prominent promise in practice.
Enhancing Information Security in Android Smart Devices Implementing Steganography and AES to Hide Secret Messages inside an Image, 2020
The use of modern devices such as android, blackberry and other smartphones is the result of impr... more The use of modern devices such as android, blackberry and other smartphones is the result of improved communication technology over the years. As a result, there are several security concerns that continue to arise because there are inadequate mechanisms in place to ensure that data and information are protected. Many have tried to use either cryptography or steganography, others have tried to combine the two techniques, but have not been able to use the optimal methods of both cryptography and steganography. However, this research combines the use of the best techniques in both steganography and cryptography to create a system that is more robust and therefore resistant to attack. With the help of steganography technology and Advanced Encryption Scheme, the authors propose a new algorithm for hiding data within the image. The suggested algorithm uses binary codes and pixels in the image. The proposed algorithm is used to develop a system called Hide Me. The system is then tested to determine the viability of the proposed algorithm. Various data dimensions are processed inside the images and the PSNR (Peak signal-to-noise ratio), for each of the images tested. Depending on the PSNR value of each image, the stego image has a higher PSNR value. The new steganography algorithm is therefore very effective in hiding the data inside the image. The process of encoding a message or data to a non-readable file format in such a way that a third party or an attacker, other than the intended receiver, does not know the meaning of the message lie as cryptography. Steganography often deals with the act of hiding a message from an unauthorized person in a cover item. This work utilizes maximal steganography and cryptography. The Least Significant Bit (LSB) technique is used to incorporate or embed a message into a cover element. The cryptography employed in this research uses the symmetric cryptography known as AES. The pairing of both the LSB insertion technique and the AES technique for use by the proposed system makes it one of the best applications to ensure data security and confidentiality on smart Android devices. It can be realized that the security and strength of the proposed smartphone system lies in the combination of cryptography and steganography. One remarkable thing about the proposed system is that unlike other existing steganographic systems that are unable to support different types of image files, the proposed system is capable of doing so.
KEYWORDS-Steganography, cryptography, stego image, PSNR (Peak signal-to-noise ratio), Least Significant Bit (LSB)
With the ushering in of the information age, a wide range of technologies in the field of
compute... more With the ushering in of the information age, a wide range of technologies in the field of computer science have emerged such that many network techniques are broadly utilized in different sectors of the society at large and in its wake not only has made great economic and social benefits, but also have immensely promoted the rapid development in culture and systems. While the openness and adaptability of computer network has brought us a ton of benefits both throughout our lives and work, it also has caused a series of information security problems which put our life at risk. With the fast advancement of computer network technology, ensuring the security of the computer becomes a very essential factor that cannot be disregarded. Three major threats confronting computer network security include: threat from hackers, computer virus and denial of service attacks whiles some measures leading to the safety of the network also include legal measures, technical measures as well as management measures. This paper seeks to investigate the primary risk confronting computer network security, address system security innovations and advances to help tackle the shrouded risk of the current basic system security. KEYWORDS-Information age, Computer network, information security
Identity-recognition technologies require assistive equipment, whereas they are poor in recogniti... more Identity-recognition technologies require assistive equipment, whereas they are poor in recognition accuracy and expensive. To overcome this deficiency, this paper proposes several gait feature identification algorithms. First, in combination with the collected gait information of individuals from triaxial accelerometers on smartphones, the collected information is preprocessed, and multimodal fusion is used with the existing standard datasets to yield a multimodal synthetic dataset; then, with the multimodal characteristics of the collected biological gait information, a Convolutional Neural Network based Gait Recognition (CNN-GR) model and the related scheme for the multimodal features are developed; at last, regarding the proposed CNN-GR model and scheme, a unimodal gait feature identity single-gait feature identification algorithm and a multimodal gait feature fusion identity multimodal gait information algorithm are proposed. Experimental results show that the proposed algorithms perform well in recognition accuracy, the confusion matrix, and the kappa statistic, and they have better recognition scores and robustness than the compared algorithms; thus, the proposed algorithm has prominent promise in practice.
Big Data Mining and Analytics ( Volume: 4, Issue: 4), 2021
Identity-recognition technologies require assistive equipment, whereas they are poor in recogniti... more Identity-recognition technologies require assistive equipment, whereas they are poor in recognition accuracy and expensive. To overcome this deficiency, this paper proposes several gait feature identification algorithms. First, in combination with the collected gait information of individuals from triaxial accelerometers on smartphones, the collected information is preprocessed, and multimodal fusion is used with the existing standard datasets to yield a multimodal synthetic dataset; then, with the multimodal characteristics of the collected biological gait information, a Convolutional Neural Network based Gait Recognition (CNN-GR) model and the related scheme for the multimodal features are developed; at last, regarding the proposed CNN-GR model and scheme, a unimodal gait feature identity single-gait feature identification algorithm and a multimodal gait feature fusion identity multimodal gait information algorithm are proposed. Experimental results show that the proposed algorithms perform well in recognition accuracy, the confusion matrix, and the kappa statistic, and they have better recognition scores and robustness than the compared algorithms; thus, the proposed algorithm has prominent promise in practice.
Enhancing Information Security in Android Smart Devices Implementing Steganography and AES to Hide Secret Messages inside an Image, 2020
The use of modern devices such as android, blackberry and other smartphones is the result of impr... more The use of modern devices such as android, blackberry and other smartphones is the result of improved communication technology over the years. As a result, there are several security concerns that continue to arise because there are inadequate mechanisms in place to ensure that data and information are protected. Many have tried to use either cryptography or steganography, others have tried to combine the two techniques, but have not been able to use the optimal methods of both cryptography and steganography. However, this research combines the use of the best techniques in both steganography and cryptography to create a system that is more robust and therefore resistant to attack. With the help of steganography technology and Advanced Encryption Scheme, the authors propose a new algorithm for hiding data within the image. The suggested algorithm uses binary codes and pixels in the image. The proposed algorithm is used to develop a system called Hide Me. The system is then tested to determine the viability of the proposed algorithm. Various data dimensions are processed inside the images and the PSNR (Peak signal-to-noise ratio), for each of the images tested. Depending on the PSNR value of each image, the stego image has a higher PSNR value. The new steganography algorithm is therefore very effective in hiding the data inside the image. The process of encoding a message or data to a non-readable file format in such a way that a third party or an attacker, other than the intended receiver, does not know the meaning of the message lie as cryptography. Steganography often deals with the act of hiding a message from an unauthorized person in a cover item. This work utilizes maximal steganography and cryptography. The Least Significant Bit (LSB) technique is used to incorporate or embed a message into a cover element. The cryptography employed in this research uses the symmetric cryptography known as AES. The pairing of both the LSB insertion technique and the AES technique for use by the proposed system makes it one of the best applications to ensure data security and confidentiality on smart Android devices. It can be realized that the security and strength of the proposed smartphone system lies in the combination of cryptography and steganography. One remarkable thing about the proposed system is that unlike other existing steganographic systems that are unable to support different types of image files, the proposed system is capable of doing so.
KEYWORDS-Steganography, cryptography, stego image, PSNR (Peak signal-to-noise ratio), Least Significant Bit (LSB)
With the ushering in of the information age, a wide range of technologies in the field of
compute... more With the ushering in of the information age, a wide range of technologies in the field of computer science have emerged such that many network techniques are broadly utilized in different sectors of the society at large and in its wake not only has made great economic and social benefits, but also have immensely promoted the rapid development in culture and systems. While the openness and adaptability of computer network has brought us a ton of benefits both throughout our lives and work, it also has caused a series of information security problems which put our life at risk. With the fast advancement of computer network technology, ensuring the security of the computer becomes a very essential factor that cannot be disregarded. Three major threats confronting computer network security include: threat from hackers, computer virus and denial of service attacks whiles some measures leading to the safety of the network also include legal measures, technical measures as well as management measures. This paper seeks to investigate the primary risk confronting computer network security, address system security innovations and advances to help tackle the shrouded risk of the current basic system security. KEYWORDS-Information age, Computer network, information security
Uploads
Papers by Kwame Sarpong
KEYWORDS-Steganography, cryptography, stego image, PSNR (Peak signal-to-noise ratio), Least Significant Bit (LSB)
computer science have emerged such that many network techniques are broadly utilized in different sectors of
the society at large and in its wake not only has made great economic and social benefits, but also have
immensely promoted the rapid development in culture and systems. While the openness and adaptability of
computer network has brought us a ton of benefits both throughout our lives and work, it also has caused a
series of information security problems which put our life at risk. With the fast advancement of computer
network technology, ensuring the security of the computer becomes a very essential factor that cannot be
disregarded. Three major threats confronting computer network security include: threat from hackers, computer
virus and denial of service attacks whiles some measures leading to the safety of the network also include legal
measures, technical measures as well as management measures. This paper seeks to investigate the primary risk
confronting computer network security, address system security innovations and advances to help tackle the
shrouded risk of the current basic system security.
KEYWORDS-Information age, Computer network, information security
KEYWORDS-Steganography, cryptography, stego image, PSNR (Peak signal-to-noise ratio), Least Significant Bit (LSB)
computer science have emerged such that many network techniques are broadly utilized in different sectors of
the society at large and in its wake not only has made great economic and social benefits, but also have
immensely promoted the rapid development in culture and systems. While the openness and adaptability of
computer network has brought us a ton of benefits both throughout our lives and work, it also has caused a
series of information security problems which put our life at risk. With the fast advancement of computer
network technology, ensuring the security of the computer becomes a very essential factor that cannot be
disregarded. Three major threats confronting computer network security include: threat from hackers, computer
virus and denial of service attacks whiles some measures leading to the safety of the network also include legal
measures, technical measures as well as management measures. This paper seeks to investigate the primary risk
confronting computer network security, address system security innovations and advances to help tackle the
shrouded risk of the current basic system security.
KEYWORDS-Information age, Computer network, information security