A Secured Data Transmission using Genetic based Encryption Techniques over Wireless Networks
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 3
Abstract
The speedy development in wireless networks entails the defending data while transmitting in the network. To employ cryptographic algorithm is difficult view in wireless networks. Biometric features such as face, voice, fingerprint, iris, and retina can be possible options to produce a cryptographic key over a predictable cryptography and improve the security. In this paper cryptographic key production using cancelable iris to grant security, authentication code is discussed. This proposed technique has three benefits in excess of previous method. First, authentication code is produced to grant authentication and rectitude. Second, to grant security records is encrypted using two fish encryption key produced from the iris biometric of the receiver. Third, randomization is offers using genetic operator to save from a variety of attacks. The proposed model is examined next to security attributes authentication, confidentiality, integrity. It is establish that it endures against cryptanalytic attack. Analysis taken place by the means of performance and security
Authors and Affiliations
Mrs. K. Rajasri , Ms. S. Sathiyadevi , Mrs. S. Tamilarasi
CLASSIFICATION BY K-MEANS CLUSTERING
Enhancement of the Security of a Digital Image using the Moduli Set
Digital images have found usage in many applications. These images may contain confidential information and need to be protected when stored on memory or transmitted over networks. Many techniques have been proposed...
DIVERSITY IMPROVEMENT IN RECOMMENDER SYSTEM
Recommender Systems are software tools and techniques for providing suggestions to a user. The suggestions relate to decision-making processes, like what items to buy, what music to listen to, or what online news t...
Data Mining: Estimation of Missing Values Using Lagrange Interpolation Technique
In the real world Most of the datasets have missing data. The presence of missing values in a dataset can affect the performance of Mining Algorithms. In this paper we are using Lagrange interpolation method for predicti...
lant Recognition through Leaf Features Mapping
There are thousands of plants around us and they are useful in many ways, but in day today life we are so busy that we can’t even recognize few important ones e.g. everyone loves mango, lemon is a well known fruits...