A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jagadeesan, S.
- Steganography Using Genetic Algorithm Along with Visual Cryptography for Mobile Environment Applications
Authors
1 Department of Computer Applications, Nandha Engineering College, Perundurai, Erode, Tamilnadu, IN
Source
Wireless Communication, Vol 7, No 9 (2015), Pagination: 269-272Abstract
The term image steganography is an important field in the term of research for securing the data and transmission through networks. The current system proves the important procedure for minimum bits which relay on steganography which is based on Genetic Algorithm (GA) through the Visual Cryptography (VC). The real message is changed into cipher text with the help of secret key and then store into the LSB of real image. The things like Genetic Algorithm and Visual Cryptography is mainly used for ensure the security concepts. Genetic Algorithm is can easily modify the pixel content as well as the location of stego image. Visual Cryptography is mainly focused on encrypting the visual data. This can be easily done by dividing the image into two share base on a threshold. The result of the current system is analyzed by doing the steganalysis and also conducting the various test cases for analyzing the mile stones to improve the quality factors. The main objectives of this current system are to develop an enhanced secure algorithm which includes the cryptography plays an important role in terms of both security as well as reliability.
Keywords
Steganography, Visual Cryptography, Genetic Algorithm, Steganalysis, Mean Squared Error, Peak Signal to Noise Ratio, Least Significant Bit.- Secure and Robust Localization in Wireless Network Protection
Authors
1 Department of Computer Applications, Nandha Engineering College, Perundurai, Erode, Tamilnadu, IN
Source
Wireless Communication, Vol 6, No 7 (2014), Pagination: 280-283Abstract
Measures adopted to prevent the unauthorized use; misuse, modifications, or denial of use of knowledge, facts, data, or capabilities in the network is called Network security. Security is defined as freedom from danger, safety; freedom from fear or anxiety. Security continues to be an issue for organizations. This presentation describes about the network on wireless technologies and the need of securing it. It explains various techniques (attacks) that are adopted by the hackers to destroy the network. It throws light over the most efficient techniques used to secure the network from unauthorized persons.
The main problem related to network security evaluation criteria is the lack of a network understanding. When computers are networked together, new security problems occur and old problems behave in different ways. To solve all these kinds of problems, the technologies have been evolved in these years, which had shown a marvelous improvement in network security. Communications and emissions security were sufficient when Teletype sent messages. Networking and web technologies have evolved which made a wonderful and mass change in the computer field. The information on the web became accessible to anyone who had access to the web. This gave rise to the need for network security.