Secure Image Transmission Through Unreliable Channels
Journal Title: International Journal on Computer Science and Engineering - Year 2010, Vol 2, Issue 6
Abstract
The research in the literature on the design of image security by using Arithmetic Coding and Advanced Encryption Standard. Arithmetic Coding offers extremely high coding efficiency and it provides little or no security as traditionally implemented. We present a modified scheme that offers both security and compression of images. The system utilizes an Arithmetic Coder and Advanced Encryption Standard in which the overall length within the range allocated to each symbol is preserved. The overall system provides simultaneous compression and encryption with negligible coding efficiency by accelerated hardware implementations.
Authors and Affiliations
P. VIJAYRAM REDDY , Dr. P. Mallesham , K. VENKATESH SHARMA , P. RADHADEVI
An Incremental framework for a Thai-English Machine Translation System using a LFG tree structure as an Interlingua
Abstract—Developing a machine translation system which can correctly translate any sentence from one language to another is a formidable and challenging task. This suggests that such a system should be implemented increm...
ARPE : An Attack-Resilient and Power Efficient Multihop WiMAX Network
IEEE 802.16 standard known as WiMAX (Worldwide Interoperability for Microwave Access), is one of the most promising wireless access technology for next generation all-IP networks. The fundamental requirements for WiMAX...
AN EFFICIENT APPROACH FOR EXTRACTION OF LINEAR FEATURES FROM HIGH RESOLUTION INDIAN SATELLITE IMAGERIES
This paper presents an Object oriented feature extraction pproach in order to classify the linear features like drainage, roads etc. from high resolution Indian satellite imageries. It starts with the multiresolution se...
A PATTERN BASED KEY GENERATION TO AUTHENTICATION FOR MULTIHOP ROUTING IN WMSN
Recent research work in the Wireless Sensor Networks involves the homogeneous networks in which the sensor nodes in the specific cluster can get the key value from any other cluster. Most existing key management schemes...
TRACING REAL TIME LOCATION OF A FRIEND IN MOBILE SYSTEM
The application of this project is to track a number of people even in crowded natural environments. A system of this sort would be useful in a number of applications, such as human-computer interaction, surveillance, an...