Wednesday, January 16, 2013

Cryptography and Cyphers

Leave a Comment

Now, it’s been some time now….we are all familiar with the word Cryptography.  Yeah, you guessed it right. It’s the art of encryption and decryption of data. Cryptography maybe a technology of the 21 century, but its roots are from the medieval period. In fact the Alexander the Great himself used a type of cryptography known as Cypher.  

Cryptography or cryptology is derived from a Greek word, ‘crypto’ means ‘hiding’ and graph means ‘writing’ or ‘data’. Therefore the art of concealing the data or information is called as Cryptography. In terms of computers, Cryptography is the practice and study of techniques for secure communication in the presence of third parties. More generally, it is about constructing and analysing protocols that overcome the influence of third parties and which are related to various aspects in information security such as data confidentiality, data integrity and authentication. Modern cryptography intersects the fields of mathematics, computer science, and electrical engineering.

Cryptography before the modern age was effectively synonymous with encryption, the conversion of information from a readable state to nonsense. The originator of an encoded message shared the decoding technique needed to recover the original information only with intended recipients, thereby forbidding unwanted persons to do the same. Since World War I  and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application is more far-flung.

Modern cryptography is to a great extent based on mathematical theory and computer science practice; cryptographic algorithms are designed around computational hardness assumptions, making such algorithms hard to break in practice by any adversary. It is theoretically possible to break such a system but it is infeasible to do so by any known practical means. These schemes are therefore termed computationally secure; theoretical advances and faster computing technology require these solutions to be continually adapted. There exist information-theoretically secure schemes that provably cannot be broken even with unlimited computing power-an example is the one-time pad -but these schemes are more difficult to implement than the best theoretically breakable but computationally secure mechanisms.

The art of protecting information by transforming it into an unreadable format, called cipher text. Only those who possess a secret key can decipher the message into plain text . Encrypted messages can sometimes be broken by cryptanalysis, also called codebreaking, although modern cryptography techniques are virtually unbreakable. 

As the Internet  and other forms of electronic communication become more prevalent, electronic security  is becoming increasingly important. Cryptography is used to protect e-mail  messages, credit card information, and corporate data. One of the most popular cryptography systems used on the Internet is Pretty Good Privacy  because it's effective and free. 

Cryptography systems can be broadly classified into symmetric-key systems  that use a single key that both the sender and recipient have, and public-key  systems that use two keys, a public key known to everyone and a private key that only the recipient of messages uses.
Read More...

Saturday, September 22, 2012

CORNING -a mind-blowing concept of future glass

    CORNING- a made of glass is the about the technology of glass that we are going to use
in near future.


  "CORNING" many of them will not be familiar with this word. now let me tell what it is about!.
   Corning's history is filled with breakthrough role in the way the world works, day-in and day-out.
Drawing on more than 160 years of invention, corning has positioned itself as the world leader in
specialty glass and ceramics,creating and manufacturing keystone components that enable 
high-technology systems. 

    So corning-the future of glass enabling the future communication ,
 collaboration and connectivity.
   The process of is to make the glass ultra-thin,durable and stronger.
Making the stronger glass called gorilla glass  is done by corning process.

  "Gorilla Glass" could one day become a household phrase, but Corning has even larger ideas.

     "A Day Made of Glass 2" is a montage of "how highly engineered glass, with companion technologies, will help shape our world," according to Corning. It is mind-blowing to imagine
everyday objects suddenly having rich, interactive displays and multiple functionalitis.
     After watching the video, I began to think about how intelligent glass, installed on a broad scale, could change the world. There are two key integrations: in the education and medical fields.




    In this video, kids sit in rows of workstations in a classroom with a large, interactive touch-screen display and a teacher. Computers show only what is on the main display with no distractions. The menu system and interactive features, combined with a teacher's expertise, compel the kids to pay attention and learn. I certainly feel this is what education could be, and should be. Just seeing the purported UI reminds me of how it is sad that we'll see something like this in a mobile device before we see it integrated into our schools.

    There's also a portrayal of a hospital with fancy futuristic Corning glass setups. Aside from the expected tablets for carrying around information and status. The clip shows a doctor video-conferencing with another doctor thousands of miles away.


   The psychics at Corning also suggest that hospital rooms in the future could be made entirely of high-tech specialty glass that could offer antimicrobial qualities that "inhibit the growth of microorganisms."
   There are many more examples that we could speak about from this video. By the way, This is
not a story of glass.
    Its a story about shift in a way we comminucate,collaborate and use the technology
 in the future.
Read More...

Sunday, September 16, 2012

Facial Recognition

A facial recognition system is an information processing system application for automatically identifying or validating a person from a digital image or a video frame from a video source. One of the ways to do this is by comparing selected facial features from the image and a facial database.

It is typically used in security systems and can be compared to other biometrics such as fingerprint or eye iris recognition systems.

In recent years automatic face recognition has received significant attention from both research communities and the securities industry, but still remained very difficult in real applications. A number of typical  algorithms are presented, being classified into appearance-based and model-based schemes.

Classification of Face Recognition Scenarios:
Face recognition scenarios can be classified into two types,
(i) Face verification (or authentication)
(ii) Face identification (or recognition).

Face verification is a ”Am I who I say I am” based model. It is a one-to-one match that compares a picture with a previously stored one. To evaluate the verification performance, the verification rate vs. false accept rate is plotted, This is called ROC curve. A good verification system should balance these two rates based on operational needs.

Face identification is a ”Who am I” based model. It is a one-to-many matching process that compares a query face image against all the template images in a face database to determine the identity of the query face . The identification of the test image is done by locating the image in the database who has the highest similarity with the test image.

Recognition algorithms can be divided into two main approaches, geometric, which deals with distinguishing features, or photometric, which distils an image into values and compares the values with templates to eliminate variances.

3-dimensional recognition:

A newly emerging trend, claimed to achieve improved accuracies, is three-dimensional face recognition. This technique uses 3D sensors to capture information about the shape of a face. This information is then used to identify peculiarities on the surface of a face.

One advantage of 3D face recognition is that it is not affected by changes in lighting like other techniques. It can also identify a face from a range of viewing angles. 3D data points from a face immensely improve the preciseness of facial recognition. 3D research is enhanced by the development of sophisticated sensors that do a better job of capturing 3D face imagery. The sensors work by projecting structured light onto the face. Each image sensor captures a different part of the spectrum.

Skin texture analysis:

Another emerging trend uses the visual details of the skin, as captured in standard digital or scanned images. This technique, called skin texture analysis, turns the unique lines, patterns, and spots apparent in a person’s skin into a mathematical space.

Tests have shown that with the addition of skin texture analysis, performance in recognizing faces can increase 20 to 25 percentage.

Read More...

Saturday, August 18, 2012

2-GIGAPIXEL CAMERA by DUKE UNVERSITY

2-GIGAPIXEL CAMERA by DUKE UNIVERSITY


Imagine guys a resolution that would highlight the smallest detail in the picture like 
sky shot that captures a man walking way beneath, 
or a tear drop waiting to hit the ground!....
     Researchers at DUKE UNIVERSITY are developing wide-field,videos-rate,gigapixel cameras in  small, low-cost form factors.

 They are using multiscale designs that combine a mono-centric objective lens with arrays of secondary 
  micro cameras.Then the field-of-view (FOV) is increased by arraying micro-cameras along the focal 
surface of the objective.


  Currently,a two-gigapixel prototype camera has been built.This system is capable of a 120-degree circular
FOV with 226 micro-cameras, 38 micro-radian FOV for a single pixel,and an effective f-number of 2.17.








Each micro-camera operates at 10 fps at full resolution. Cameras performances
 are unimaginable.

 Each micro-camera operates independently, offering much more flexibility in images capture,exposure and focus parameters.


Read More...

Sunday, July 29, 2012

RADIATION-DETECTING PHONE

   Imagine a phone that could detect harmful radiations around you.This unique technology has actually been   brought to the mobile phones by a Japanese company called SOFT BANK.
   
   Soft bank has entered the market with its first Pantone 5 107sh smart-phone,which comes with
in-built Gieger counter (or) Radiation Detector.
       
     It is developed after the nuclear disaster in Fukushima, which raised serious concerns regarding harmful radiation levels in JAPAN.
      The radiation detector phone is user friendly and capable of measuring radiation levels with 20%  accuracy.
      
  The Pantone 5 is an Android 4.0 OS, with an 3.7-inch 854 x 480 LCD, a 4-megapixel camera,   
and a 1.4GHz processor, along with the obligatory 1seg TV tuner, waterproofing, and infrared data port. 
    
   While it's a fairly unimpressive 12mm thick, it feels well-built and the design is very much in line with the pleasingly chunky nature of other Pantone phones. You can take your pick from eight colors, with the purple and teal being particularly fetching.


 
Read More...

Sunday, June 24, 2012

Microsoft Introduces Surface Tablet PC


 


Windows 8 Surface Tablet Image

 

Here you all on the tech at web Microsoft has launched  brand new surface tablet.
 Microsoft surface comes with windows 8 operating system. Surface has a 10.6", 16:9 widescreen HD Display. Microsoft's Clear Type HD Display technology delivers a great picture for movies. 

An ultra-wide viewing angle makes it easy for your friends to share in the better experience. The auto-adjusting screen intensity delivers great visual clarity, indoors and out. The addition of the Micro SD card slot means you can bring your entire movie and music collection with you on vacation.
      From touch to type, office to living room, from your screen to the big screen, you can see more, share more, and do more with Surface.
Microsoft Surface Tablet Image

Explore your world with fast, Fluid Windows 8 apps:

Discover new music, movies, and games in the Windows Store.

1.Type with ease and get stuff done


Some activities call for a keyboard. Surface comes with an integrated Kickstand and a revolutionary, 3mm thin, pressure sensitive cover that doubles as a fully functioning keyboard and track pad. Your Touch Cover connects to your Surface with a single magnetic click. Now you can chat with friends and respond to emails comfortably.

Always on the go


Surface is thin, light and it has a great battery. At 9.3mm, Surface for Windows RT is just thin enough to still sport a full sized USB port . Print,share, or charge your phone on the go. It has got 1.2 lbs  and
NVIDIA -ARM chip built in stand . For the better WiFi connection, it is provided with the 
2x2 Twin MIMO Antennas.

 

 2. Head out knowing that you are ready for anything.

Touch Cover comes in five vibrant colors

Type Cover offers classic typing experience for those who prefer a more traditional keyboard. Pick the one that best meets your needs and represents your sense of style.
Surface Tablet PC Color Ranges Images


Read More...

Wednesday, June 20, 2012

Build Your Own Free Security Suite

3 comments
The All in One Security Suites do give complete protection for your computer. But how long can you keep paying for security and protection of your PC. Cyberspace is a place where you get software for a price at a place and get the same software free at another place. I have spent 100’s of bucks for protection for over 6 years now (more than the price of my laptop). But what was the result? Loss of money and time. And even my dear computer has slowed down like a turtle, due to huge consumption of resources due to paid security solutions.
What should you do to save yourself?

Well you do not have to worry. This is where the freebies come into action. They are costless, low on resources and installing 3 applications for 1 does not slow down your PC.
Alright, let’s move into topic. Here are the steps to build your own security suite for free. We have tested the applications on Windows 7 platform. But remember these apps are only for home users.

The Applications you will need:
  • A Basic Antivirus
  • Firewall
  • Search Safety Toolbar
  • PC Optimizer and Cleaner
  • Bonus Special Tips

Antivirus Software:

For the antivirus base, we prefer the Avast Free Edition. It does not put up ads that remind you of its paid version and registering is as simple as a click of a button and you stay protected for 365 days. It is the no.1 downloaded file in cNet. Avast has its limitations, the Free Edition does not include integrated firewall (but do not worry you can install a separate one).

But hey its free. You can download it from avast official website. You also get avast WebRep add-on that provides the reputation of a website in search results. Its various “shields” protect us from virus and spam real time.

Avast Antivirus Protection
The avast free antivirus has four different scan option to provide you complete protection.

Alternate Antivirus

You can also use AVG Antivirus Free. But also prepare to tackle its ads that ask you to pay for its paid version. We recommend you to opt for Avast Free Edition. But if AVG is your personal favorite go for it. You can download the application from.

But a small warning: Do not install both. Installing two or more antivirus does not increase your protection but just false alerts, conflicts with each other and increased consumption of system resources.

Firewall

Satisfied with your antivirus? Now come back for the firewall part. Windows 7 firewall does a good job along with its UAC (User Account Control) and prevents apps from connecting to the Internet without your permission. But it is of no use when it comes to identity and data protection. Many people use third-party firewall to regulate traffic.

I recommend Zone Alarm Firewall, it is a free one, and its protection is also good. But I had to deal with the pop-ups, whenever a new program (program unknown to the firewall) attempts to access the Internet. But that’s okay the same is the case with most other free firewalls.

After the installation, the Zone Alarm Firewall sits right in your system tray and guards you when programs try to access the Internet, it displays a pop up that asks you to allow or deny Internet access of the program.

Zone Alarm Protects Your PC, Web Browser And Identity In One Interface.

You can get the software from Zone Alarm Official Site.

Alternate Firewalls

There is another firewall called the Online Armor Personal Firewall Free. This is also easier to use.  You can grab it from the its official website.

Search Safety

This is for the one whose antivirus does not have an inbuilt link scanner. Avast and AVG has an included link scanner. But if yours doesn’t (if you prefer anything else than our recommendation) try this free download from McAfee SiteAdvisor.

PC Optimizer and Cleaner

All All-In-One suites offer PC tune up and cleaner that claims to keep your PC fast as new (Well that’s not true in most cases). To do the same thing in your free online suite, Download CCleaner. (Kudos to piriform labs!).

It offers features to clear temporary files, cookies, browser history, system restoration files and keeps the junks away. It also optimizes your PC by fixing your Pc’s registry. It even has the option to backup registry first, in case anything goes wrong.

 CCleaner Does all cleaning and optimizing activities for good

Bonus:

Not the least we give you a special bonus tip. The Virus Total Uploader gives you the option to scan files less than 32 MB with different antivirus engines. If you do not want to scan your file with 1 then scan it with 42. If one does not catch the bug, the other one will.

 Virus Total Just One Upload Gives your file scanned by 40+ antivirus engines

But if you do not prefer to deal with multiple downloads and choose payable all-in- one security suites you could go for it. But this collection could keep your PC safe and sound for free for years. Have your say about the free security suite.
Read More...

Wednesday, June 13, 2012

How Will Tech Trend For The Next 40 Years?

Wondering which new technology is going to hit the streets during the coming years? Don't worry, we made that simple for you. Now, here is a road map for technology and trends for the next 40 years..... yeah you heard us right, it's for the next 40 years. Gaze at this beauty and look out for interesting developments such as augmented reality, face recognition doors, DNA computing, etc.,

Technology trend Map
 Click On Image To Enlarge
You Can Embed This Image On Your Blog

 You can also download a pdf of this map at now and next.

Read More...