Visual Cryptography for Light Encryption Scheme Using LED Based On Halftoning Algorithm
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2017, Vol 5, Issue 4
Abstract
Visible Light is regarded as a reliable mode of communication in comparison with Radio Frequency communication. It has a great scope in 5G networks. But this visible light communication is prone to security issues like eavesdropping due to its visual nature. This paper deals with the light encryption scheme using Light Emitting Diode.
Authors and Affiliations
S. Vijay Gokul, G. Subashri Meenakshi, S. Mangaiyarkarasi
Detection of Mycotoxins from the ground nuts samples of Warangal District, Telangana State
The main objective of this study is to conduct survey on ground nut fields and to detect the mycotoxin producing fungi and variety of mycotoxin. All the samples were collected from various systems such as freshly harves...
Study and Comparison of Tribological Wear Behavior Characteristics of Titanium Dioxide Coated Mild Steel
Mild steel is the most common form of steel as its price is relatively low while it provides material properties that are acceptable for many applications. Mild steel has a relatively low tensile strength, but it is che...
The combined V-F , P-Q and Droop control of PV in microgrid
this paper provides the solution for critical problems surrounded in PVmicrogrid in the field of control. The main requirement in operating modes ofPVmicrogrid are voltage and frequency maintained constant and both real...
Renewable Energy Based On Compressed Air Energy Storage As a Technology Embedded In Gwalior MP
Compressed air energy storage (CAES) is one technology that is proposed to increase flexibility when integrating renewable energy sources such as wind, solar and tidal generation with the power grid. By creating a stora...
Back Off Mechanism for Enhancement of Zone Routing Protocol in MANETS
In mobile ad hoc networks, researchers defines various solutions for MAC aware routing to improve the network performance. In case of contention at MAC layer, the solution which is provided for routing is not feasible s...