A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Jagadeesan, S.
- Steganography Using Genetic Algorithm Along with Visual Cryptography for Mobile Environment Applications
Authors
1 Department of Computer Applications, Nandha Engineering College, Perundurai, Erode, Tamilnadu, IN
Source
Wireless Communication, Vol 7, No 9 (2015), Pagination: 269-272Abstract
The term image steganography is an important field in the term of research for securing the data and transmission through networks. The current system proves the important procedure for minimum bits which relay on steganography which is based on Genetic Algorithm (GA) through the Visual Cryptography (VC). The real message is changed into cipher text with the help of secret key and then store into the LSB of real image. The things like Genetic Algorithm and Visual Cryptography is mainly used for ensure the security concepts. Genetic Algorithm is can easily modify the pixel content as well as the location of stego image. Visual Cryptography is mainly focused on encrypting the visual data. This can be easily done by dividing the image into two share base on a threshold. The result of the current system is analyzed by doing the steganalysis and also conducting the various test cases for analyzing the mile stones to improve the quality factors. The main objectives of this current system are to develop an enhanced secure algorithm which includes the cryptography plays an important role in terms of both security as well as reliability.
Keywords
Steganography, Visual Cryptography, Genetic Algorithm, Steganalysis, Mean Squared Error, Peak Signal to Noise Ratio, Least Significant Bit.- Secure and Robust Localization in Wireless Network Protection
Authors
1 Department of Computer Applications, Nandha Engineering College, Perundurai, Erode, Tamilnadu, IN
Source
Wireless Communication, Vol 6, No 7 (2014), Pagination: 280-283Abstract
Measures adopted to prevent the unauthorized use; misuse, modifications, or denial of use of knowledge, facts, data, or capabilities in the network is called Network security. Security is defined as freedom from danger, safety; freedom from fear or anxiety. Security continues to be an issue for organizations. This presentation describes about the network on wireless technologies and the need of securing it. It explains various techniques (attacks) that are adopted by the hackers to destroy the network. It throws light over the most efficient techniques used to secure the network from unauthorized persons.
The main problem related to network security evaluation criteria is the lack of a network understanding. When computers are networked together, new security problems occur and old problems behave in different ways. To solve all these kinds of problems, the technologies have been evolved in these years, which had shown a marvelous improvement in network security. Communications and emissions security were sufficient when Teletype sent messages. Networking and web technologies have evolved which made a wonderful and mass change in the computer field. The information on the web became accessible to anyone who had access to the web. This gave rise to the need for network security.
Keywords
Wireless Local Area Networks, Global Positioning System, Ad Hoc Networks, Connection Less Networks, Line of Sight, Wired Networks, and Structured Networks.- Self Service Mesh Router for Wireless Mesh Network with Missed Workstation Detection
Authors
1 Department of Computer Applications, Nandha Engineering College, Perundurai, Erode, Tamilnadu, IN
Source
Networking and Communication Engineering, Vol 7, No 9 (2015), Pagination: 373-377Abstract
The term Mobile ad hoc networks (MANETs) are ultimate for a permanent framework which is busy or impracticable. Now a days, network partitioning affect MANETs. This drawback makes MANETs inappropriate for applications such as administration and combat zone connections, in which group fellows might have to toil in factions dispersed in the application territory. There will be critical intergroup communication to the team cooperation in such applications. This limitation is labeled by introducing Autonomous Mobile Mesh Network (AMMNET), a new class of ad-hoc network. The cell phone mesh nodes of an AMMNET are skilled of following the mesh patrons in the application territory, and arranging themselves into a proper network topology to make sure that mutually intra and inter faction have high-quality connectivity for interactions than usual mesh networks. A circulated client tracking key, to compact with the vibrant nature of client mobility, and current techniques for vibrant topology revision in accord with the mobility model of the clients is recommended. The outcomes of our recreation, point out that AMMNET is strong against network divisioning and talented of providing lofty relay throughput for the mobile patrons. Indicator Terms- Cell phone Mesh Networks, Vibrant Topology Consumption, and Patron Tracking.