A Novel Approach for Data Security Enhancement Using Multi Level Encryption Scheme
Journal Title: International Journal of Computer Science and Information Technologies - Year 2011, Vol 2, Issue 1
Abstract
In this Information era, where all the transactions and files are digitized, the need for secure channel is eminent for transactions and confidential files. Information security is vital for many systems like core banking, defence systems, Satellite control systems, etc. wherein breach of secure data can lead to major consequences. Hence there is a demand for a stronger encryption which is very hard to crack. In this paper we proposed a multi level of multiple encryption schemes which enhances the security of the algorithm.
Authors and Affiliations
Sairam Natarajan , Manikandan Ganesan , Krishnan Ganesan
A Two Stage Language Independent Named Entity Recognition for Indian Languages
This paper describes about the development of a two stage hybrid Named Entity Recognition (NER) system for Indian Languages particularly for Hindi, Oriya, Bengali and Telugu. We have used both statistical Maximum Entrop...
Software Architectures Design Patterns Mining for Security Engineering
Data Mining for Software Engineering involves Architectural mining intelligence operations, which are knowledge gathering procedures. These intelligence operations go beyond basic data collection (assembling uncorrelate...
Application of Free and Open source software and its Impact on society
Free and open source software is one of the effective tool that can make the world self-dependent. It facilitates the design and use of your own software. This can also lead to economic liberty as the FOSS...
Use of Local Minimization for Lossless Gray Image Compression
A novel approach for the lossless compression of gray images is presented. A prediction process is performed followed by the mapping of prediction residuals. The prediction residuals are then split into bi...
METADATA STANDARD HARVESTING
The rapid growth of Internet resources, digital collections and libraries are constructed with the help of metadata schemas. Each metadata schema has been designed based on the requirements of the particular user communi...