The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Camouflaging of twofold images is necessary while information's are communication through image. Technology brings the communication easier, most of the communication today through open network, for this threats also increased frequently. This paper brings the new technique called flow code procedure technique. Given binary image converted into text representation and encrypted using flow code procedure...
This paper describes a steganography technique in which text is concealed in an image. The lower nibble of each image byte is modified so as to contain each nibble of the input text. The steganography algorithm used in this implementation maximises on data capacity and also ensures security. The Java programming language is used for its comprehensive libraries and ease of use. A simple GUI has been...
It can be observed from the past ten years, remarkable progress has been made in the field of science and technology in terms of speed, throughput and computation. Scientists gained the ability to elucidate information from any given advanced computing systems with the help of technology. Efforts have been put forth for a new ciphering scheme with common division and genetic algorithm for image encryption...
The transmission of data over a common transmission media revolute the world of information sharing from personal desktop to cloud computing. But the risk of the information theft has increased in the same ratio by the third party working on the same channel. The risk can be avoided using the suitable encryption algorithm. Using the best suited algorithm the transmitted data will be encrypted before...
Rapidly acceleration in the technological advances throughout the world leads to enormous increase in encrypted Internet traffic. Tremendous progressions and changes are taking place in months rather than in years. From mobility and video to cloud and network programmability, there is no end of vision. Majority of people still believe that computer securely sends the email to the intended recipient...
Various sectors such as such as the retail, hospitality, banking and financial introduced information technology years back. Ongoing enhancements have always offered a wider scope of growth to these sectors. Zooming in the Banking & Financial sector most banks are now offering the Online banking services. The objectives of introducing the e-banking services were profits, fast service, improved...
World is too large in its physical boundaries but it becomes too small due to communication. Through this communication system we can transmit various data from one location to another. This is a great thing at one level but at another level it comes with great risk. Chances of leakage of information during the communication process is always there. We could not control this leak/steeling of information...
This is an encryption and decryption algorithm with the help of genetic functions cryptography. This new algorithm is developed for encryption and decryption process. This algorithm combines the features of Genetic Algorithm in Cryptography. Here we generate random numbers for “Crossover” and “Mutation”. The encryption and decryption algorithms will be made public. The algorithm contains a key, which...
In this paper a session key based encryption system has been proposed and termed as "Session Key Based Manipulated Iteration Encryption Technique (SKBMIET)". A Key is created from the input. Generating different randomized Matrices forms the Key. The value of the generated is manipulated with the individual ASCII values of the plain text. After completion of this process all the different...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.