A New Encryption Method for Secure Transmission of Images
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 9
Abstract
In this paper, a novel approach is designed for transmitting images securely using a technique called Gödelization followed by the public key encryption. The image which is to be transmitted is transformed into a sequence called Gödel Number Sequence (GNS) using a new technique called Gödelization. This is compressed using Alphabetic coding AC) and encrypted by an encryption method. This encryption string is transmitted and reconstructed at the decoding end by using the reverse process.
Authors and Affiliations
B. V. Rama Devi , D. Lalitha Bhaskari , P. Prapoorna Roja , P. S. Avadhani
QoS Analysis of the Integrated UMTS and WLAN Ad Hoc Network in different Security Schemes with Wormhole Attack under large Scalability for CBR Voice Interactive Traffic
The selection of security schemes against Wormhole Attack (WHA) in next generation heterogeneous networks is based on major factors: authentication, confidentiality, and integrity and data availability. The effect of thi...
Modeling Academic Performance Evaluation Using Soft Computing Techniques: A Fuzzy Logic Approach
We have proposed a Fuzzy Expert System (FES) for student academic performance evaluation based on fuzzy logic techniques. A suitable fuzzy inference mechanism and associated rule has been discussed. It introduces the pri...
UEP based on Proximity Pilot Subcarriers with QAM in OFDM
A novel UEP (Unequal Error Protection) method is proposed that utilizes the subcarrier positions relative to pilot subcarriers in an OFDM multicarrier frame along with QAM (Quadrature Amplitude Modulation) schemes. With...
Fault Tolerance in Real Time Distributed System
In this paper we investigate the different techniques of fault tolerance which are used in many real time distributed systems. The main focus is on types of fault occurring in the system, fault detection techniques and t...
Multicast Routing Protocols in Adhoc Mobile networks
The majority of applications are in areas where rapid eployment and dynamic reconfiguration are necessary and a wire line network is not available. These include military battlefields, emergency search and rescue sites,...