Dividend key share for protected information transmit using Watermarking in images and Audio
Journal Title: Indian Journal of Computer Science and Engineering - Year 2016, Vol 7, Issue 4
Abstract
The art and science of hiding information by encrypting messages within other, looks a harmless message. The proposed steganography system, where edges in the spread picture have been utilized to insert messages and another piece of plain content is implanted into a audio.A RC-4 algorithm is used to encrypt the data. Encrypting data are calculated and split into two parts by finding the mid range value using the medium edge detection. From previous research work, to reduce the data losses in the wireless networks the new methods of integrating dividend cryptography for key distribution were implemented. The dividend key distribution can be used in wireless networks to securely distribute the keys. The key provides mutual authentication between the two communication ports and send the data in a secure way. Through existing Simulations, the proposed mechanisms achieve significantly an encrypted data transfer is done through a secure communication to, keep the user’s Information and data safe when connected through the wireless networks.
Authors and Affiliations
S. VENKATESH , Dr. M. A. Dorairangaswamy
GDRP: A NOVEL APPROACH FOR POWER OPTIMIZATION IN WIRED CORE NETWORKS
The numbers of applications in the internet are increasing tremendously day by day which results into degrading the network performance because of heavy traffic load on the core routers which causes into more power consu...
COMPONENT TESTING USING FINITE AUTOMATA
In Component-Based Software Engineering (CBSE), software systems are mainly constructed with reusable components, such as third-party components and in-house built components. Component Based Software Development (CBSD)...
AN EFFICIENT GESTURE RECOGNITION TOOLKIT
The rapid growth of computing has made effective human-computer interaction essential. It is important for the growing number of computer users whose schedules will not allow the elaborate training and experience that wa...
PERFORMANCE ANALYSIS OF DOWNLINK MIMO IN 2X2 MOBILE WIMAX SYSTEM
In this paper, we analyze the error rate performance of downlink coded multiple-input multiple-output orthogonal frequency division multiple access (MIMO OFDMA) systems under frequency selective fading channel conditions...
Signed Numbers Conversions
Signed integers are normally represented using 2’s complement representation. Addition and subtraction of signed numbers is done in the same manner as for unsigned numbers. However carry (or borrow) is simple ignored. Un...