Chandranath Adak bes

نویسنده

  • Chandranath Adak
چکیده

This paper introduces a new concept of textual message encryption and decryption through a pool of randomized symmetric key and the dual layer cryptosystem with the concept of visual cryptography and steganography. A textual message is converted into two image slides, and the images are encrypted through two different randomized sequences of symmetric key. The decryption is done in the reverse way. The encrypted images are decrypted by those two symmetric keys. The decrypted image slides are merged together and converted into textual message. Here the image sharing is done through the concept of visual cryptography and the textual message to image conversion is done through the concept of steganography.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

OPTICS Based Coverage in Wireless Sensor Network

This paper deals with the coverage problem of wireless sensor network. We use the density based clustering technique OPTICS to cover a target region with less number of sensor nodes. OPTICS works well to identify the outliers, core points and it obtains the denser regions. We define a level of acceptance to find next appropriate sensor in the region. We eliminate overlapped area and obtain a de...

متن کامل

Rough Clustering Based Unsupervised Image Change Detection

This paper introduces an unsupervised technique to detect the changed region of multitemporal images on a same reference plane with the help of rough clustering. The proposed technique is a soft-computing approach, based on the concept of rough set with rough clustering and Pawlak’s accuracy. It is less noisy and avoids pre-deterministic knowledge about the distribution of the changed and uncha...

متن کامل

Robust Steganography Using LSB-XOR and Image Sharing

Hiding and securing the secret digital information and data that are transmitted over the internet is of widespread and most challenging interest. This paper presents a new idea of robust steganography using bitwise-XOR operation between stego-key-image-pixel LSB (Least Significant Bit) value and secret messagecharacter ASCII-binary value (or, secret imagepixel value). The stego-key-image is sh...

متن کامل

Writer Identification and Verification from Intra-variable Individual Handwriting

The handwriting of an individual may vary excessively with many factors such as mood, time, space, writing speed, writing medium, utensils etc. Therefore, it becomes more challenging to perform automated writer verification/ identification on a particular set of handwritten patterns (e.g. speedy handwriting) of a person, especially when the system is trained using a different set of writing pat...

متن کامل

Hypobaric-hypoxia induces alteration in microbes and microbes-associated enzyme profile in rat colonic samples.

Present study deals with the straight impact of hypobaric hypoxia on the quantity and composition of some predominant fecal microflora and its functional aspects. For that, isolated fecal contents of rat were exposed to two different simulated air pressures (70 kPa and 40 kPa) for different time durations (1, 3, and 5 h) and the bacterial community composition was compared with normobaric group...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013