A Novel Approach to Design Time Efficient and Secure encryption Algorithm (T-SEA)
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
A recent field of study is the security of the information over public network through encryption in efficient way. Even if there are no efficiency gains to be made, there are practical and usability issues. This paper is proposing a new encryption/decryption technique and fulfilling the basic security principle like confidential and authenticity. This paper developed an algorithm with variable key length to improve the security. Presented results are showing the performance of the proposed concept in terms of efficiency and security.
Authors and Affiliations
Prachi Saxena
Virtual Teaching and Painting Platform for the Colour Blind
Abstract: Education involves perception of colour and unfortunately some of us are not blessed with this gift of proper vision. Lacking the ability to distinguish certain colours is commonly known as Colour Blindne...
DCT based Steganographic Evaluation parameter analysis inFrequency domain by using modified JPEG luminanceQuantization Table
Abstract : Steganography is the process of hiding one file inside another such that others can neither identifythe meaning of the embedded object, nor even recognize its existence. In this paper we want to increase...
Reducing Cross-ISP Traffic in P2P Systems Using Adaptive Search Radius
Peer to Peer communication has become very popular these days .This popularity and increase in P2P traffic has given birth to many internet traffic management problems for service providers. One of these problems...
Intrusion Detection Systems By Anamoly-Based Using Neural Network
To improve network security different steps has been taken as size and importance of the network has increases day by day. Then chances of a network attacks increases Network is mainly attacked by some  ...
Copy-Move Image Forgery Detection Based on Center-SymmetricLocal Binary Pattern
Abstract: This paper presents a method to detect copy-move image forgery using CS-LBP (centre symmetriclocal binary pattern), an extension of basic local binary pattern. In the proposed method, firstly gray levelco...