Enriching Process of Image Encryption and Compression Using Hierarchical Decomposition
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 1
Abstract
"Abstract— Most of the times while any message is transferring across the network for security reasons they are normally encrypted directly to make user visibly unreadable or it will be encrypted (hidden) in an image. And now a day’s data hacker becomes too intelligent to break the encrypted images to get the original contents. So many systems are designed to combine the encryption and compression in single mould to provide greater security. So we are presenting a novel approach of encryption by maintaining run time LSB (least significant bit) using image decomposition method. This actually enhances the encryption processes by converting image into small blocks of hierarchical cluster of the LSB’s. These blocks can be holding the user’s message in many different patterns which is actually highly difficult to predict by the hackers. And then all individual blocks can be put in a tree to compress in the same hierarchy of decomposition. "
Effects of Hilly Terrain on UHF Band Radio Frequency Propagation
Effects of Hilly Terrain on UHF Band Radio Frequency Propagation
Implementation of Fast Pipelined AES Algorithm on Xilinx FPGA
The Advanced Encryption Standard (AES) is a specification for the encryption of electronic data also called Rijndael. The algorithm described by AES is a symmetric-key algorithm, meaning the same key is used for both enc...
An Enhanced and Dynamic Network Hardware Devices Security Using MAC Address
Network hardware devices are currently becoming very expensive due to high market demand. As a result, they are at a great risk of theft. Securing or recovering a stolen or lost device is a great challenge in the modern...
Study of Biodiversity of Sariska Tiger Reserve in Aravallis with Particular Emphasis on Medicinal and Endemic Plants
The Sariska tiger reseve in Aravallis has its own importance and specific characteristics endowed with unique biodiversity. In the present study an attempt has been made to ascertain the current status of the flora in al...
Classification of Cloud Data using Bayesian Classification
One of the major security challenges in cloud computing is the detection and prevention of intrusions and attacks. In order to detect and prevent malicious activities at the network layer, we propose a security framework...