Privacy Security of Multiuser on Multilevel System using XOR
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Privacy security of multiuser on multilevel system is considered in this work. On communication there is a chance for the eavesdropper’s to secretly listen to the conversation. In order to confuse the eavesdropper’s, the transmitter sends information signal to both the receiver and eavesdropper. But the orginal message is send to the receiver and the information signal which looks same as the original message is send to the eavesdropper. The existing system says that if the eavesdropper is of lower quality than the transmitter that is transmitter having higher quality then it is easy for the transmitter to avoid the interface and send the information safely. Client send the original message to the user at the same time the fake message or artificial message which is same as the original message is send to the eavesdropper. The original message which is sending to the client is cleaned before reaching to the recipient. In the previous work there is a chance for the eavesdropper’s to view the message and add any noise to the orginal data. It is not secure so in the enhancement of work I encrypted the original message and send to the receiver . The message which looks same as the original message is send to the eavesdropper .Since the orginal message is encrypted it is not viewed by the eavesdropper. The receiver then obtained the original message which is in the encrypted form is decrypted by using XOR system.
Authors and Affiliations
Siji P. Raj
Skew Detection based on Bounding Edge Approximation
Abstract: Any paper document when converted to electronic form through standard digitizing devices, like scanners, is subject to a small tilt or skew. With recent advances of hand-held devices such as cell-phones,...
Cloud Computing: Environment of Next Generation Technology
Abstract: Cloud computing is the convergence of virtualization, Distributed Applications, Grid, Maturity of enterprise software application and enterprise IT Management. It is a tremendously attractive technology a...
An Efficient Approach for Outlier Detection in Wireless Sensor Network
Wireless Sensor Networks are those networks which include many sensors, sensors have many sensor nodes that are spread all over the world. A wireless sensor network (WSN) normally has many sensor nodes which ar...
Video Transmission over Mobile Adhoc Network Using WEAC Protocol with Zone Routing Algorithm
In mobile adhoc network (MANET), a node communicates directly with the nodes within wireless range and indirectly with other nodes using a dynamically computed, multi-hop route via the other nodes of the manet. In...
Foreground detection by using multi features
Abstract: Foreground detection is an essential task in many applications and a commonly used approach to obtain foreground objects from the background. Many techniques exist, but due to shadows and changes in illum...