E-government security is a key problem to restrict the construction and development of E-government systems in any country over the world. E-Government security models are widely used in the implementation and development of e-government systems. Due to the deference situation of the countries over the world there are various security models applied in each country. This paper reviews different security models in e-government in order to determine important parameters for e-government strategic planning.
A lot of techniques are used to protect and hide information from any unauthorized users such as Steganography and Cryptography. Steganography hides a message inside another message without any suspicion, and Cryptography scrambles a message to conceal its contents. This paper uses a new text steganography that is applicable to work with different languages, the approach, based on the Pseudorandom Number Generation (PRNG), embeds the secret message into a generated Random Cover-text. The output (Stego-Text) is compressed to reduce the size. At the receiver side the reverse of these operations must be carried out to get back the original message. Two secret keys (Hiding Key & Extraction Key) for authentication are used at both ends in order to achieve a high level of security. The model has been applied to different message languages and both encrypted and unencrypted messages. The experimental results show the model"s capacity and the similarity test values..
This paper presents a new technique of embedding text data into an audio file using tone insertion method. The new technique generates two frequency f1 and f2 and inserts them into audio file in a suitable power level according to specific table (stego-table). The proposed technique aimed to increase the payload capacity of the audio file using two bits in the frame without increases the number of the inserted frequencies to four frequencies, as well as using another convoy frequency (CF) for specific pattern. The proposed method conceals the English text into the .wave audio. The performance of the proposed method has been checked by spectrogram, MSE and PSNR.
Abstract. Optical Character Recognition (OCR) is one of the important branches. One segmenting words into character is one of the most challenging steps on OCR. As the results of advances in machine speeds and memory sizes as well as the availability of large training dataset, researchers currently study Holistic Approach "recognition of a word without segmentation". This paper describes a method to recognize off-line handwritten Arabic names. The classification approach is based on Hidden Markov models.. For each Arabic word many HMM models with different number of states have been trained. The experiments result are encouraging, it also show that best number of state for each word need careful selection and considerations.
Security is one of the most important issues in E-government projects. E-government applications will be increasingly used by the citizens of many countries to access a set of services. Currently, the use of the E-government applications arises many challenges; one of these challenges is the security issues. E-government applications security is a very important characteristic that should be taken into account. This paper makes an analysis over the security as required for E-government and specify the risks and challenges that faces E-government projects in Sudan. Finally, the study has proposed security model for Sudanese E-government. The proposed security model for the Sudanese electronic government is a four layers' model that is divided into sub layers. Each layer will mitigate group of threats related to an e-services. The model is not generic; it cannot be applied by other countries. It is precisely designed for Sudanese situation.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.