Password-oriented Image Encryption with multiple dependent factors.
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The goal of this project was to develop a password-based image encryption algorithm that would be virtually safe from brute-force attacks, resulting in an image that would have no recognizable pattern. The algorithms designed were implemented in a java program. To increase the security of the algorithm, dual encryption keys generated based on the user’s password are used and have an increased number of factors dependent upon the password. Apart from the pixel values, the location of pixels and the number of cycles of encryption, which the image will undergo, are also based on the password entered.
Authors and Affiliations
Ishaan Agarwal
Various Methods for Object Tracking- A Review
Abstract: The object tracking is the technique which is used to track object from the image or from the video. The video consists of multiple frames and in each frame location of that object had been predicted. To predic...
Effect of Thermal Radiation on Unsteady Gravity Flow of a Power-Law Fluid with Viscous Dissipation through a Porous Medium
Abstract:In this work, we studied the effect of thermal radiation on unsteady gravity flow of a power-law fluid with viscous dissipation through a porous medium. The modified Darcy’s law is considered together with...
Data attribute security and privacy in distributed database system
Now a days there are a need of data attribute security in distributed database while preserving privacy. In the proposed work, we consider problem related in publishing collaborative data for anonymizing,vertically and h...
Evolution of Cloud Storage as Cloud Computing Infrastructure Service
Enterprises are driving towards less cost, more availability, agility, managed risk - all of which is accelerated towards Cloud Computing. Cloud is not a particular product, but a way of delivering IT services that are...
Optimal Content Downloading in Vehicular Networks
Abstract: We consider a system where users aboardcommunication-enabled vehicles are interested in downloading different contents from Internet-based servers. This scenario captures many of the infotainment services...