The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Digital Image Security is still or recent topic of research in computer science engineering. Images are sharing very frequently from one device to another device. Due to this functionality and features it is very complicated situation for all of the application users because users share their personal images publically. A very unsolvable problem is still there is no appropriate method for image security...
The utilization of the online services especially the access to Internet Banking services has grown rapidly from last five years. The Internet Banking services provide the customers with the secure and reliable environment to deal with. But with the technology advancement, it is mandatory for the banks to put into practice the ideal technologies or the best security strategies and procedures to authorize...
Connection pooling is a technique to allow multiple clients to Shared and reusable connection to provide access to a database of objects using a cached set. The connection pooling can be called as a key to improve performance of real time web application where large number of connection are to created and destroyed. Active database connection pooling is a connection reuse, rather than creating a new...
When private data or sensitive information is stored in the database, a typical way to protect the data is to encrypt the data before storing it. For efficiently retrieving the data, an effective search mechanism is needed that works over the encrypted data smoothly. When data is encrypted the performance of querying the database is degraded. In this paper we are going through the various search techniques...
This research paper concentrates on the concept of Digital Authentication using QR Code in Digital Education System. This paper aimed to provide a better solution to the Digital Security. There are two challenges of the work i.e. first one is to explore the usability of QR Code in general life and second is to incorporate QR Code technology with an educational document for security to avoid duplicity...
In many organizations large amount of data are collected. These data are sometimes used by the organizations for data mining tasks. However, the data collected may contain private or sensitive information which should be protected. Privacy protection is an important issue if we release data for the mining or sharing purpose. Privacy preserving data mining techniques allow publishing data for the mining...
In these days, people are using social networking sites for sharing their life moments as images. And another side other users can access or even download those digital images. Faker can exploits by editing and modifying the original image. Modify images can then be upload and share. The illegal use of personal image comes under copyright law. This research paper introduces a prototype for Digital...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.