Open Access Open Access  Restricted Access Subscription Access
Open Access Open Access Open Access  Restricted Access Restricted Access Subscription Access

Security for Image Processing Uses AES in MANET


Affiliations
1 Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, India
     

   Subscribe/Renew Journal


The Mobile adhoc network is self-configuring (a temporary network). MANET is becoming more popular due to their flexibility, low cost and ease of deployment.  Advantages of MANET are easy to install, easy to transfer data from source to destination and also easy to hack the data by hacker through MANET, image splitting, data hiding is used in image splitting processing. Data Security is the main concern for each communication system. The unremitting development of the Internet and communication skills has made the wide use of images obligatory. There are many ways to provide refuge for data that is being interconnected. This paper defines an effective security for communication by AES algorithm for encryption and decryption. It is constructed on AES Key Extension in which the encryption process is a bit wise private or operation of a set of image pixels along with the a 128 bit key which vicissitudes for every set of pixels.


Keywords

Decryption, Encryption, Image Processing, Splitting, Steganography.
User
Subscription Login to verify subscription
Notifications
Font Size

Abstract Views: 153

PDF Views: 2




  • Security for Image Processing Uses AES in MANET

Abstract Views: 153  |  PDF Views: 2

Authors

N. M. Abroja
Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, India
K. Shaheena Banu
Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, India
R. Ambikapathy
Department of MCA, Krishnasamy College of Engineering & Technology, Tamilnadu, India

Abstract


The Mobile adhoc network is self-configuring (a temporary network). MANET is becoming more popular due to their flexibility, low cost and ease of deployment.  Advantages of MANET are easy to install, easy to transfer data from source to destination and also easy to hack the data by hacker through MANET, image splitting, data hiding is used in image splitting processing. Data Security is the main concern for each communication system. The unremitting development of the Internet and communication skills has made the wide use of images obligatory. There are many ways to provide refuge for data that is being interconnected. This paper defines an effective security for communication by AES algorithm for encryption and decryption. It is constructed on AES Key Extension in which the encryption process is a bit wise private or operation of a set of image pixels along with the a 128 bit key which vicissitudes for every set of pixels.


Keywords


Decryption, Encryption, Image Processing, Splitting, Steganography.