Title | Managing Information and Network Security using Chaotic Bio Molecular Computing Technique |
Publication Type | Conference Paper |
Year of Publication | 2022 |
Authors | Al-Qanour, Fahd bin Abdullah, Rajeyyagari, Sivaram |
Conference Name | 2022 6th International Conference on Intelligent Computing and Control Systems (ICICCS) |
Keywords | Bio Molecular, chaotic cryptography, Chaotic Key series, Costs, DNA, Metrics, molecular computing, Network security, Organizations, privacy, pubcrawl, resilience, Resiliency, Scalability, Software |
Abstract | Requirement Elicitation is a key phase in software development. The fundamental goal of security requirement elicitation is to gather appropriate security needs and policies from stakeholders or organizations. The majority of systems fail due to incorrect elicitation procedures, affecting development time and cost. Security requirement elicitation is a major activity of requirement engineering that requires the attention of developers and other stakeholders. To produce quality requirements during software development, the authors suggested a methodology for effective requirement elicitation. Many challenges surround requirement engineering. These concerns can be connected to scope, preconceptions in requirements, etc. Other difficulties include user confusion over technological specifics, leading to confusing system aims. They also don't realize that the requirements are dynamic and prone to change. To protect the privacy of medical images, the proposed image cryptosystem uses a CCM-generated chaotic key series to confuse and diffuse them. A hexadecimal pre-processing technique is used to increase the security of color images utilising a hyper chaos-based image cryptosystem. Finally, a double-layered security system for biometric photos is built employing chaos and DNA cryptography. |
Notes | ISSN: 2768-5330 |
DOI | 10.1109/ICICCS53718.2022.9788181 |
Citation Key | al-qanour_managing_2022 |