To Improve Data Security by Using Secure Data Transmission
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 5
Abstract
The “Secure data transmission” is a software solution which provides security during transmission .Present day security is the main issue that the third person attacks on the data. To provide security Tiny Encsryption Algorithm (TEA) is used. TEA is used for encryption and decryption of data. Encryption plays a cordial role in security. Encryption alters the data in unreadable form. Encrypted file embed in a video file by using steganography. Steganography is the concealing of secrete data inside image, video, audio. That video file sends via an email .On the receiver end receiver receive the video file and decrypted it by using Tiny encryption Algorithm (TEA). Then de-embed the information by steganography .This is the process that we are discuss in the paper . The goal of our project is to design a tool for providing security to the system during transmission of data. The project is developed using graphics in java swings.
Authors and Affiliations
Manisha Yadav
Powder Milk Rn222 Exhalation Rate Measurements in Different Kinds
The application of CR-39 SSNTD technique to the determination of radioactive contaminants in different kinds of milk can be very useful. Radon concentrations in animal milk samples collected from different countries were...
Novel Implementation of O-Pass Security Model Design of User Authentication for Password Stealing and Reuse Attacks
Text password is the most popular form of user authentication on websites due to its convenience and simplicity. However, users’ passwords are prone to be stolen and compromised under different threats and vulnerabilitie...
Enhancing Adaptive Content Based Face Image Retrieval in Database
To address one of the important and challenging problems – large-scale content-based face image retrieval. Given a query face image, content-based face image retrieval tries to find similar face images from a large image...
PMA-Chord: Peer Mobility Adaptable Lookup for Chord Protocol
Structured Overlay Networks provide a promising system for high-performance applications because they may be fault-tolerant, scalable and self managing. Organized overlays provide lookup services that guide keys to nodes...
Software Platforms for Mobile Distributed Systems
As a result of the computing technology that becomes ever smaller and cheaper it is now possible to integrate it into everyday material objects. This advanced integration of technology allows the underlying computer to d...