Dividend key share for protected information transmit using Watermarking in images and Audio

Journal Title: Indian Journal of Computer Science and Engineering - Year 2016, Vol 7, Issue 4

Abstract

The art and science of hiding information by encrypting messages within other, looks a harmless message. The proposed steganography system, where edges in the spread picture have been utilized to insert messages and another piece of plain content is implanted into a audio.A RC-4 algorithm is used to encrypt the data. Encrypting data are calculated and split into two parts by finding the mid range value using the medium edge detection. From previous research work, to reduce the data losses in the wireless networks the new methods of integrating dividend cryptography for key distribution were implemented. The dividend key distribution can be used in wireless networks to securely distribute the keys. The key provides mutual authentication between the two communication ports and send the data in a secure way. Through existing Simulations, the proposed mechanisms achieve significantly an encrypted data transfer is done through a secure communication to, keep the user’s Information and data safe when connected through the wireless networks.

Authors and Affiliations

S. VENKATESH , Dr. M. A. Dorairangaswamy

Keywords

Related Articles

A STUDY ON DIFFERENT FEATURE EXTRACTION TECHNIQUES FOR LESION IDENTIFICATION IN MRI BREAST IMAGES

This study discusses the different feature extraction techniques for lesion identification in Dynamic Contrast Enhancement - Magnetic Resonance Imaging (DCE - MRI) of Breast. In DCE- MRI, kinetic feature extraction is a...

POWER CONTROL AND ANTENNA GAIN OPTIMIZATION DURING WIMAX HANDOVER

Wireless systems have recently been becoming faster and more intelligent. However the high speed access and intelligence make the power consumption of wireless systems high. In the WiMAX system, the MS transmission power...

ENERGY AWARE ROUTING ALGORITHM FOR WIRELESS SENSOR NETWORK

Technological advancements made major research challenges in the area of wireless sensor network. Power saving is the foremost criteria in this field. Consumption of energy is considerably reduced on properly designed pr...

SPURIOUS POWER SUPPRESSION TECHNIQUE FOR VLSI ARCHITECTURE

Using spurious power suppression technique (SPST) in VLSI will reduce the power consumption of the system significantly. Here we are going to implement this design in Infinite Impulse Response (IIR) and Finite Impulse Re...

NETWORK INTRUSION DETECTION SYSTEM USING FUZZY LOGIC

IDS which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional intrusion detection relies on the extensive knowledge of security experts...

Download PDF file
  • EP ID EP138875
  • DOI -
  • Views 110
  • Downloads 0

How To Cite

S. VENKATESH, Dr. M. A. Dorairangaswamy (2016). Dividend key share for protected information transmit using Watermarking in images and Audio. Indian Journal of Computer Science and Engineering, 7(4), 141-146. https://europub.co.uk/articles/-A-138875