Due to tremendous growth in communication technology, now it is a real problem / challenge to send some confidential data / information through communication network. For this reason, Nath et al. developed several information security systems, combining cryptography and steganography together, and the present method, ASA_QR, is also one of them. In the present paper, the authors present a new steganography algorithm to hide any small encrypted secret message inside QR Code TM , which is then randomized and then, finally embed that randomized QR Code inside some common image. Quick Response Codes (or QR Codes) are a type of two-dimensional matrix barcodes used for encoding information. It has become very popular recently for its high storage capacity. The present method is ASA_QR is a combination of strong encryption algorithm and data hiding in two stages to make the entire process extremely hard to break. Here, the secret message is encrypted first and hide it in a QR Code TM and then again that QR Code TM is embed in a cover file (picture file) in random manner, using the standard method of steganography. In this way the data, which is secured, is almost impossible to be retrieved without knowing the cryptography key, steganography password and the exact unhide method. For encrypting data The authors used a method developed by Nath et al i.e. TTJSA, which is based on generalized modified Vernam Cipher, MSA and NJJSA method; and from the cryptanalysis it is seen that TTJSA is free from any standard cryptographic attacks, like differential attack, plain-text attack or any brute force attack. After encrypting the data using TTJSA,the authors have used standard steganographic method To hide data inside some host file. The present method may be used for sharing secret key, password, digital signature etc.
A facile and efficacious route to the benzooxabicyclo[3.2.1]octane system has been developed and applied to a synthesis of filiformin (1). The cycloaddition of ethylene to the methoxychromone 13 furnished the oxetanol 14 through a tandem cycloaddition and gamma-hydrogen abstraction sequence. Lithium aluminum hydride reduction to the diol 15 followed by acid-catalyzed rearrangement produced benzooxabicyclooctanone (16), arising from exclusive external bond migration. Similarly, ethoxychromone (17) under the same sequence of reactions afforded the homologous bridged ketone 20. For the synthesis of filiformin (1), methoxychromone 24 on ethylene cycloaddition followed by reduction of resultant oxetanol 25 with lithium aluminum hydride furnished diol 10. Acid-catalyzed rearrangement of 10 provided the bridged ketone 11 which was brominated to give 26. This bromo ketone had previously been converted to filiformin (1), and also aplysin 9, and hence, the present work represents a short, high-yield formal synthesis of these sequiterpenes from a single starting material.
This review focuses on marine compounds with anti-prostate cancer properties. Marine species are unique and have great potential for the discovery of anticancer drugs. Marine sources are taxonomically diverse and include bacteria, cyanobacteria, fungi, algae, and mangroves. Marine-derived compounds, including nucleotides, amides, quinones, polyethers, and peptides are biologically active compounds isolated from marine organisms such as sponges, ascidians, gorgonians, soft corals, and bryozoans, including those mentioned above. Several compound classes such as macrolides and alkaloids include drugs with anti-cancer mechanisms, such as antioxidants, anti-angiogenics, antiproliferatives, and apoptosis-inducing drugs. Despite the diversity of marine species, most marine-derived bioactive compounds have not yet been evaluated. Our objective is to explore marine compounds to identify new treatment strategies for prostate cancer. This review discusses chemically and pharmacologically diverse marine natural compounds and their sources in the context of prostate cancer drug treatment.
reaction mixture was stirred at room temperature with a H2 balloon until the reaction was complete. After filtration, the filtrate was evaporated to give diol 13 (116 mg, 80%). The product was purified by bulb-to-bulb distillation (56-57 °C (0.1 Torr)):[a]D +10.5°(c 1.1, CHClg) (lit.14 [a]D +11.6°(c 2.12, CHC13);
In the present work the authors introduced a new symmetric key cryptographic method for encryption as well as decryption of any file such as binary file, text file or any other file. Nath et. al.(1) developed an algorithm called MSA for encryption and decryption of any file using a random key square matrix containing 256 elements. The weak point of MSA algorithm is that if someone applies the brute force method then he has to give a trial for factorial 256 to find the actual key matrix. Now in the modern world this number of trial runs may not be impossible for the hacker. To get rid of this problem here the authors suggest a better algorithm than MSA. In the present method the authors considered the size of the key matrix to be 65536 and in each cell we store 2 characters pattern instead of 1 character unlike MSA method. If someone wants to give a brute force method to find our actual key then one has to give a trial for factorial 65536 runs! Theoretically this is an intractable problem. Moreover the authors have also introduced multiple encryptions here to make the system more secured. This method will be suitable in any business house, government sectors, communication network, defense network system, sensor networks etc. In the present work the authors have introduced a square key matrix of size 256 by 256 where in each cell there are all possible 2-lettered words (ASCII code 0-255). The total number of words possible is 65536. The key matrix is then randomized using the method proposed by Nath et. al(1). The user has to enter some secret text-key. The maximum length of the text key should be 16 characters long. To calculate the randomization number and the number of encryption to be done is calculated from the text-key using a method proposed by Nath et.al(1). The present method will be most suitable for encryption of a file whose size is less than or equal to 2MB. If the file size is very big then we suggest choosing small encryption number to speed up the sytem.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.