• Nenhum resultado encontrado

WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING

N/A
N/A
Protected

Academic year: 2017

Share "WSES: HIGH SECURED DATA ENCRYPTION AND AUTHENTICATION USING WEAVING, ROTATION AND FLIPPING"

Copied!
8
0
0

Texto

Loading

Referências

Documentos relacionados

The algorithm encryption and decryption of an image transform an image into cipher code using the random keys, which allow users to have confidentiality and security in

In this study the proposed e-visa verification system uses Identity Based Encryption (IBE) or Public Key Infrastructure (PKI), which contains a highly secured

The cloud computing security based on fully Homomorphic encryption, is a new concept of security which enables providing results of calculations on encrypted

The entropy of the watermarked image and correlation coefficient of extracted watermark image is very close to ideal values, proving the correctness of proposed

Some algorithms are proposed according to the characteristics of the image itself, such as Yuen’s proposal of a chaos-based joint image compression and encryption algorithm

if timeout period of sender node is x then timeout period of receiver node will be (x-m), where m will be critical factor. This factor [16] helps us to control the

Jantan, Image Encryption Using Block- Based Transformation Algorithm ', IAENG International Journal of Computer Science, 2003, 35:1. LIAN, A Novel Fast Image Encryption Scheme

paign against tuberculosis, and under the auspices of the Secretariat of Health and Welfare it has secured a considerable number of members and has been able to