A Secured Data Transmission using Genetic based Encryption Techniques over Wireless Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
The speedy development in wireless networks entails the defending data while transmitting in the network. To employ cryptographic algorithm is difficult view in wireless networks. Biometric features such as face, voice, fingerprint, iris, and retina can be possible options to produce a cryptographic key over a predictable cryptography and improve the security. In this paper cryptographic key production using cancelable iris to grant security, authentication code is discussed. This proposed technique has three benefits in excess of previous method. First, authentication code is produced to grant authentication and rectitude. Second, to grant security records is encrypted using two fish encryption key produced from the iris biometric of the receiver. Third, randomization is offers using genetic operator to save from a variety of attacks. The proposed model is examined next to security attributes authentication, confidentiality, integrity. It is establish that it endures against cryptanalytic attack. Analysis taken place by the means of performance and security
Authors and Affiliations
Mrs. K. Rajasri , Ms. S. Sathiyadevi , Mrs. S. Tamilarasi
BBO Comparison with other Nature Inspired Algorithms to Resolve Mixels
Remote sensing is defined as a technique for acquiring the information about an object without making physical contact with that image via remote sensors. But the major problem of remotely sensed images is mixed...
A Survey on Various Median Filtering Techniques for Removal of Impulse Noise from Digital Images.
The existence of impulse noise is one of the most frequent problems in many digital image processing applications. So for the removal of such impulse noise median based filter becomes widely used. However, there ar...
An Overview of Partial Shuffle for Database Access Pattern Protection Using Reverse Encryption Algorithm
Encryption of database is an important topic for research, as secure and efficient encryption algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption...
Context Awareness for Effective Software Structure Quality
This paper presents an approach that helps developers to maintain source code identifiers and comments dependable with high-level artifact. This approach calculates and shows the textual similarity source code and...
E-commerce and the Rural Sector
In the modern times E-commerce is giving a tough competition to the traditional trade and business. Due to the advancement of technology the world has became a global village. E-commerce has reached most of the...