A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2

Abstract

 Abstract: A mobile WSN is considered as a collection of wireless mobile nodes and a base station forming an ad-hoc network. This type of network is used in various areas; such as underwater and underground. Each node has a limited energy and a random mobilization. Since the energy consumption is a very important factor, the Hierarchical protocols can solve this problem for instance the LEACH protocol. W-LEACH is a LEACH extension which extends the network lifetime but this protocol uses sensor location to organize the network so it is not effective in an area where the location of nodes is impossible with mobility. In this paper, we improve an old algorithm (W-LEACH) to a new protocol called W-LEACH Decentralized to increase network lifetime without the use of maps. Besides, we are going to compare this protocol with LEACH in term of network lifetime and energy dissipation using Network Simulator.

Authors and Affiliations

Fameela. K. A , Reshma. V. K

Keywords

Related Articles

 A Secure QOS Distributed Routing Protocol for Hybrid WirelessNetworks

 Abstract: The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service(QoS) requirements in real time transmission for wireless application. But it stream including critical missio...

 Factory Pattern in Model of Object Oriented Application Development

  Design pattern is a salient milestone in the development of coding techniques. Code reusability is the prime motive of design patterns and it promotes code development by finding the existing solution which could...

To Propose Improvement in Probability based object tracking technique for Multiple Object Tracking

Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predic...

 Feature subset selection for high dimensional data with domain analysis using Semantic Mining

Abstract: Feature subset selection involves identifying a subset of the most useful features that produces compatible results as the original entire set of features. A feature selection algorithm may be evaluated from...

 Software Development Effort and Cost Estimation: Neuro-Fuzzy Model

 Software development effort and cost prediction is one of the important activities in software project management. Accuracy in prediction is a challenge for software developers. There are many models exists that...

Download PDF file
  • EP ID EP157792
  • DOI 10.9790/0661-16272631
  • Views 83
  • Downloads 0

How To Cite

Fameela. K. A, Reshma. V. K (2014).  A Secure Data Transmission by Embedding Marked Encrypted Image on Cloak Image. IOSR Journals (IOSR Journal of Computer Engineering), 16(2), 26-31. https://europub.co.uk/articles/-A-157792