Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Hussain, Mohammed Ali
- Performance and Security Analysis for Image Encryption using Key Image
Abstract Views :152 |
Authors
Affiliations
1 Research and Development Centre, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of Electronics and Computer Engineering, KL University, Guntur - 522502, Andhra Pradesh, IN
1 Research and Development Centre, Bharathiar University, Coimbatore - 641046, Tamil Nadu, IN
2 Department of Electronics and Computer Engineering, KL University, Guntur - 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 8, No 35 (2015), Pagination:Abstract
Objective: This work is a review of image encryption algorithm using a key image, namely a secure image encryption algorithm based on bitplane principle. Method/Analysis: The analysis of the algorithm is done in terms of the parameters like histogram analysis, Number of Pixels Change Rate (NPCR), Unified Average Changing Intensity (UACI), Mean value analysis and Correlation coefficient. Findings: The results show that the algorithm reviewed offers commendable security against common types of attacks. Conclusion/Application: Most of the image encryption techniques have some security and performance issues. So there is a need to evaluate and analyze the efficiency of the algorithms used for encryption. These parameters are useful in judging the quality of encryption algorithms and can also be used for checking the level of security, the method actually provides to the actual image.Keywords
Image Encryption, Key Image, Performance Analysis, Security Analysis, Statistical AnalysisFull Text
- An Efficient Scheme for Facilitating Secure Data Sharing in Decentralized Disruption Tolerant Networks
Abstract Views :220 |
PDF Views:0
Authors
Affiliations
1 Department of Electronics and Computer Engineering, K L University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, IN
1 Department of Electronics and Computer Engineering, K L University, Vaddeswaram, Guntur District - 522502, Andhra Pradesh, IN
Source
Indian Journal of Science and Technology, Vol 9, No 5 (2016), Pagination:Abstract
Wireless Sensor Nodes in military situations, for example, a war zone or an unfriendly locale are liable to experience the ill effects of discontinuous system network. Objective: To design an efficient data recovery scheme for Decentralized DTNs in military environments, based on CP-ABE methodology, making Security the utmost prioritized characteristic. Analysis: Latest Innovations in Disruption Tolerant Networks (DTN) are getting to be effective arrangements, that permit mobile devices carried by military personnel to correspond with one another and access the classified data or to command effectively by manipulating the independent-autonomous repository nodes. Out of these, the most difficult issues in the situation are the authorization strategies and those approaches' improvisation for secure data recovery. Methodology: Cipher text Policy-Attribute Based Encryption (CP-ABE) is a promising cryptographic technique to address the access authority issues. The issue of applying CP-ABE in decentralized DTNs presents a few security and protection challenges like attribute revoke, key security, and regulation of attributes issued from distinct authorities. So, we implement CP-ABE along with 2PC (Two Phase Commit) protocol and where numerous key authorities deal with their attributes autonomously to overcome the above mentioned challenges. Findings/Improvements: We implement the proposed System as a stand-alone application in Eclipse IDE. We've been successful in implementing this system to achieve the security requirements we've been discussing at length in the paper and we've demonstrated how to recover the data in very hostile military environments in an efficient and a secured manner.Keywords
Attribute Based Encryption, Collusion Protection, Data Confidentiality, Decentralized Key Authorities, Disruption Tolerant Networks, Forward and Backward Secrecy, Military Networks, Privileged Access Permissions, Secured Data Sharing, Wireless Sensor Networks- Use of Smart Antennas in AD HOC Networks
Abstract Views :203 |
PDF Views:106
Authors
Mohammed Ali Hussain
1,
P. Suresh Varma
2,
K. Satya Rajesh
3,
Hussain Basha Pathan
3,
Leela Madhav Sarraju
4
Affiliations
1 Dept.of Computer Science and Engineering, Sri Sai Madhavi Institute of Science and Technology, Rajahmundry, A.P., IN
2 Dept. of Computer Science and Engineering, Adikavi Nannaya University, Rajahmundry, A.P., IN
3 Dept. of Computer Science, Rayalaseema University, Kurnool, A.P., IN
4 Dept. of Computer Science, Dravidian University, Kuppam, A.P., IN
1 Dept.of Computer Science and Engineering, Sri Sai Madhavi Institute of Science and Technology, Rajahmundry, A.P., IN
2 Dept. of Computer Science and Engineering, Adikavi Nannaya University, Rajahmundry, A.P., IN
3 Dept. of Computer Science, Rayalaseema University, Kurnool, A.P., IN
4 Dept. of Computer Science, Dravidian University, Kuppam, A.P., IN