It has been known for a while [35,36,12] that program transformation techniques, in particular, program specialization, can be used to prove the properties of programs automatically. For example, if a program actually implements (in a given context of use) a constant function sufficiently powerful and semantics preserving program transformation may reduce the program to a syntactically trivial "constant" program, pruning unreachable branches and proving thereby the property. Viability of such an approach to verification has been demonstrated in previous works [16,19,18] where it was applied to the verification of parameterized cache coherence protocols and Petri Nets models [11,20]. In this paper we further extend the method and present a case study on its application to the verification of a cryptographic protocol. The protocol is modeled by functional programs at different levels of abstraction and verification via program specialization is done by using Turchin's supercompilation method.
With the advancement of technology and the methods of information storage and exchange, the security of information and data became a vital issue for many institutions, especially higher education institutions. This paper introduces a novel and efficient information security system based on steganography and compression techniques to address the issues related to the security and efficient transmission of secret data in higher education institutions. In this system, the Lempel Ziv Welch (LZW) compression technique is used to compress the data to be hidden, to reduce their size and thereby reduce the percentage of distortion that may occur to the cover image. In addition, a new data hiding algorithm has been developed depending on the second bit, where data are hidden based on LSB without making any changes to the values of the second bit. If any changes are made, these will be only within LSB, which reduces the distortion in the cover image and increases the similarity between the cover image before and after hiding. In the retrieval stage, hidden data are retrieved from the second bit only. The proposed system performance was evaluated in terms of MSE (mean square of error), PSNR (peak signal-to-noise ratio), PD (pixel distortion) and BER (bit error rate). The experimental results confirm the efficiency of the proposed system that achieves good results with higher PSNR and lower MSE.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.