A Novel Method of Generating (Stream Cipher) Keys forSecure Communication
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 1
Abstract
Abstract: Security is an important part of computer science that deals with the protection of importantinformation from access, change or modified, and delete, so there are many ways to improve the security ofinformation like cryptography, steganography, biometrics, passwords, barcode….. However most of thesemethods are considered keys required.These keys are used to implement the changing of the information forsecure style purpose. For that reason, generating and keeping these keys is a major part of the appropriatesecurity system. Moreover, sending the key to the wanted person in unsacred channel is a widely weakness partfor any system. The proposed system is a novel method for generating a secret unique key from an image. Agenerating process is applied by discovering the essential colors in the image and constructing a table values forthese essential colors , after that a suitable threshold is used to considered these values are (0, 1) bits which willbe used as stream bits key.
Authors and Affiliations
Zainalabideen Abdullasamd Rasheed, , Ali Abdul Azeez Mohammad Baker
Multi-Resolution Pruning Based Co-Location Identification In Spatial Data
A co-location spatial pattern is a pattern of multiple groups which co-relates spatial features or events that are frequently located in same zone. Co-location pattern mining emphasizes overall analysis bymanipulating th...
Iris Pattern Recognition
Abstract: The earlier experimental which were conducted has resulted in the biometric templates, which include the iris of human eye and the attributes of the individual, that are produced using different methods of reco...
Abalone Age Prediction using Artificial Neural Network
Abstract: Artificial Neural Networks are the intelligent computation systems that can be used to solve various challenging problems such as compression, optimization, classification, pattern recognition and prediction. I...
Jamming Anticipation and Convolution through Immaculate Hiding Process of Packets
Cached data not only replies local access, but also replies data request issued from other nodes. Wireless Mesh Networks (WMNs) have emerged as an important technology in building next generation fixed wire...
Persuasive Cued Click Based Graphical Password with Scrambling For Knowledge Based Authentication Technique with Image Scrambling
Adequate user authentication is a persistent problem, particularly with hand- held devices such as Personal Digital Assistants (PDAs), which tend to be highly personal and at the fringes of an organization’s &nb...