A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Satyavathy, G.
- LSB and DCT Based Steganography in Safe Message Routing and Delivery for Structured Peer-To-Peer Systems
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore-641 044, IN
Source
Networking and Communication Engineering, Vol 2, No 9 (2010), Pagination: 365-369Abstract
In structured P2P systems, message deliverance can be done by identifying the peer IDs of the individual systems. The initiator has to decide the destination and can route the message through one or more hops. The message passes from one hop to another correctly by identifying the IP address and finally reaches the destination. In this paper we propose an efficient routing strategy to control the routing path and to identify the malicious nodes. We also eliminate the drawbacks of encryption by introducing  steganography in message deliverance. This paper proposes a new steganographic encoding scheme which separates the colour channels of the windows bitmap images and then hides messages randomly in the LSB of one colour component of a chosen pixel where the colour components of the other two are found to be equal to the key selected. In addition to this we apply DCT based Steganography which embeds the text message in least significant bits of the Discrete Cosine (DC) coefficient of digital picture. When information is hidden inside video, the program hiding the information usually performs the DCT. DCT works by slightly changing each of the images in the video, only to the extent that is not noticeable by the human eye. An implementation of both these methods and their performance analysis has been done in this paper.Keywords
Peer-To-Peer, Least Significant Bit (LSB), Discrete Cosine Transform (DCT), Steganography.- Overview of Sensor Network
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
2 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 9, No 1 (2017), Pagination: 5-7Abstract
This paper gives an impression of sensor network and its technology and fields of application of sensor networks. It reflects in aspect selected fields of application that have high probability. However studies clearly guess an overall strong positive effect in smart buildings, smart industrial applications as well as precision agriculture and agricultural, consequences for the arena of smart conveyance are diversified due to recoil effects [1]. As significance, demand for transference and thus the consumption of properties both increase which can lead to an overall negative effect.
Keywords
Networks, Programmers, Production, Grid, Environment, Sensors, Technology, Process.- A Study on Cyber Physical System and Network Security
Authors
1 Department of Computer Science, Sri Ramakrishna College of Arts and Science for Women, Coimbatore, IN
Source
Networking and Communication Engineering, Vol 9, No 3 (2017), Pagination: 59-61Abstract
Cyber-Physical (CPSs) are characterized by integrating computation and physical processes. The theories and applications of CPSs face the enormous challenges. The aim of this work is to provide a better understanding of this emerging multi-disciplinary methodology. The research progresses are summarized from different perspectives such as energy control, secure control, transmission and management, control technique, system resource allocation, and model-based software design. The research challenges and some suggestions for future work are in brief outlined. The computer network technology is developing rapidly, and the development of internet technology is more quickly, people more aware of the importance of the network security.
Network security is main issue of computing because many types of attacks are increasing day by day. Protecting computer and network security are critical issues. The malicious nodes create a problem in the network. This malicious nodes acts as selfishness. After analyzing and quantifying the network information security elements confidentiality, integrity and availability. This paper describes the network security confidentiality vector, network security integrity vector and network security availability vector and also some major type of attacks in networks.