The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The idea behind this paper describes a modality about secret interface over the globalization of the communication over the world. To accomplish this phenomenon, two varieties of security mechanism, cryptography and steganography is being applied. At the former stage, encryption is being provided to secret plain text using Vernam cipher (One-Time Pad) transposition technique, since Vernam cipher show...
Today data security is very important and high priority topic. With rapid growth in communication and computer technologies, there is a huge data transaction in mobile, internet, TV, teleconferencing, telemedicine and military applications. For all these applications we need a security. Encryption is one of way to give the security for data; in this regard we propose a hybrid approach for partial...
This paper presents a FPGA (Field Programmable Gate Array) based secured speech signal communication system. The system consists of compression, encryption and water- marking. Watermark provides authentication and ownership verification. Encryption is used for security of watermark and voice signal. As random numbers are used as a key for the encryption process, the signal is secured for both wired...
Hacking is one of the greatest problems in the wireless local area networks. Many algorithms have been used to prevent the outside attacks to eavesdrop or prevent the data to be transferred to the end-user safely and correctly. In this paper ,two type of Symmetric encryption algorithms introduced, they are 1. UMARAM 2. IMAkey Algorithm. These two algorithms a new symmetrical encryption algorithm is...
Against the nature of Hyperchaos dynamic system, a modified hyper-chaotic sequence encryption algorithm was given. This method used the TNC Hyperchaos dynamic system. It proved to be have the effective capability to resistance the attack of exhaustive method and anti nonlinear reorganization attack. Realized the algorithmpsilas encryption and decryption by the use of Matlab simulation platform got...
Base on the randomicity and initial value sensitivity of Lu chaotic sequence, dividing the original image into blocks, carrying out the gray scrambling and location scrambling on each team of the pixel points, making their location and grey distribute evenly at the same time, it can accomplish the encryption of a image. Using Matlab to simulate, the result indicates that this algorithm has great secret...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.