Enviar pesquisa
Carregar
20320140501014 2
•
1 gostou
•
413 visualizações
IAEME Publication
Seguir
Tecnologia
Denunciar
Compartilhar
Denunciar
Compartilhar
1 de 15
Baixar agora
Baixar para ler offline
Recomendados
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
A robust and secure visible watermarking scheme based on multi
A robust and secure visible watermarking scheme based on multi
IAEME Publication
G044082934
G044082934
IJERA Editor
V01 i010410
V01 i010410
IJARBEST JOURNAL
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET Journal
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
RAKESH_CSU
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
Recomendados
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET- Hybrid Approach to Text & Image Steganography using AES and LSB Te...
IRJET Journal
A robust and secure visible watermarking scheme based on multi
A robust and secure visible watermarking scheme based on multi
IAEME Publication
G044082934
G044082934
IJERA Editor
V01 i010410
V01 i010410
IJARBEST JOURNAL
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET - Cryptanalysis of a Text Encryption Scheme based on Bit Plane Extraction
IRJET Journal
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET- Enhance Security for Medical Images through Secure Force Cryptography ...
IRJET Journal
Vishwanath rakesh ece 561
Vishwanath rakesh ece 561
RAKESH_CSU
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET Journal
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL
IJSRED-V2I3P80
IJSRED-V2I3P80
IJSRED
Security for Automotive with Multicore-based Embedded Systems
Security for Automotive with Multicore-based Embedded Systems
Fraunhofer AISEC
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET Journal
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET Journal
E0704019023
E0704019023
IJERD Editor
S4501105108
S4501105108
IJERA Editor
Pdf3
Pdf3
Editor IJARCET
Protection for images transmission
Protection for images transmission
IAEME Publication
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET Journal
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijripublishers Ijri
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
Editor IJARCET
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee wi-fi
eSAT Publishing House
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
20320140501009 2-3-4
20320140501009 2-3-4
IAEME Publication
ELECTRONIC APPROVAL
ELECTRONIC APPROVAL
Rosten Hammond
O Que Faz Bem...
O Que Faz Bem...
Rosa Silva
30120140502004 2
30120140502004 2
IAEME Publication
Mais conteúdo relacionado
Mais procurados
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
irjes
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
IOSR Journals
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJAEMSJORNAL
IJSRED-V2I3P80
IJSRED-V2I3P80
IJSRED
Security for Automotive with Multicore-based Embedded Systems
Security for Automotive with Multicore-based Embedded Systems
Fraunhofer AISEC
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET Journal
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET Journal
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET Journal
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET Journal
E0704019023
E0704019023
IJERD Editor
S4501105108
S4501105108
IJERA Editor
Pdf3
Pdf3
Editor IJARCET
Protection for images transmission
Protection for images transmission
IAEME Publication
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
IRJET Journal
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijripublishers Ijri
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
Editor IJARCET
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee wi-fi
eSAT Publishing House
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET Journal
Mais procurados
(18)
International Refereed Journal of Engineering and Science (IRJES)
International Refereed Journal of Engineering and Science (IRJES)
Video Encryption and Decryption with Authentication using Artificial Neural N...
Video Encryption and Decryption with Authentication using Artificial Neural N...
Efficient Data Aggregation in Wireless Sensor Networks
Efficient Data Aggregation in Wireless Sensor Networks
IJSRED-V2I3P80
IJSRED-V2I3P80
Security for Automotive with Multicore-based Embedded Systems
Security for Automotive with Multicore-based Embedded Systems
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET - Positioning and Tracking of a Person using Embedded Controller in a D...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
IRJET- An Efficient Model for Detecting and Identifying Cyber Attacks in Wire...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
Image Steganography Method using Zero Order Hold Zooming and Reversible Data ...
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
IRJET - Contactless Biometric Security System using Finger Knuckle Patterns
E0704019023
E0704019023
S4501105108
S4501105108
Pdf3
Pdf3
Protection for images transmission
Protection for images transmission
IRJET- Intruder Detection System using Camera with Alert Management
IRJET- Intruder Detection System using Camera with Alert Management
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijri ece-01-01 joint data hiding and compression based on saliency and smvq
Ijarcet vol-2-issue-3-901-903
Ijarcet vol-2-issue-3-901-903
The pattern and realization of zigbee wi-fi
The pattern and realization of zigbee wi-fi
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
IRJET- Security in Ad-Hoc Network using Encrypted Data Transmission and S...
Destaque
20320140501009 2-3-4
20320140501009 2-3-4
IAEME Publication
ELECTRONIC APPROVAL
ELECTRONIC APPROVAL
Rosten Hammond
O Que Faz Bem...
O Que Faz Bem...
Rosa Silva
30120140502004 2
30120140502004 2
IAEME Publication
Dia100sacola - Forum de Sustentabilidade
Dia100sacola - Forum de Sustentabilidade
Val Reis
CMapTools
CMapTools
Gisela Abad UE Valencia
Tendencias final
Tendencias final
Olivovy
20320140501012
20320140501012
IAEME Publication
Destaque
(8)
20320140501009 2-3-4
20320140501009 2-3-4
ELECTRONIC APPROVAL
ELECTRONIC APPROVAL
O Que Faz Bem...
O Que Faz Bem...
30120140502004 2
30120140502004 2
Dia100sacola - Forum de Sustentabilidade
Dia100sacola - Forum de Sustentabilidade
CMapTools
CMapTools
Tendencias final
Tendencias final
20320140501012
20320140501012
Semelhante a 20320140501014 2
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
IAEME Publication
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
Oyeniyi Samuel
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
ijcisjournal
Implement a novel symmetric block
Implement a novel symmetric block
ijcisjournal
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
IAEME Publication
50120140504005
50120140504005
IAEME Publication
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
IRJET Journal
Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...
IJECEIAES
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking Algorithm
CSCJournals
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
IJECEIAES
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
AM Publications
J017667582
J017667582
IOSR Journals
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
iosrjce
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET Journal
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET Journal
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
IJECEIAES
Securing voip communications in an open network
Securing voip communications in an open network
eSAT Publishing House
50120130406038
50120130406038
IAEME Publication
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
Janet Robinson
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
IRJET Journal
Semelhante a 20320140501014 2
(20)
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
Transmitting bulk amount of data in the form of qr code with cbfsc and chunki
5. article azojete vol 11 50 61 mala
5. article azojete vol 11 50 61 mala
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
IMPLEMENT A NOVEL SYMMETRIC BLOCK CIPHER ALGORITHM
Implement a novel symmetric block
Implement a novel symmetric block
Image encryption and decryption using aes algorithm
Image encryption and decryption using aes algorithm
50120140504005
50120140504005
IRJET- I-Share: A Secure Way to Share Images
IRJET- I-Share: A Secure Way to Share Images
Convolutional neural network based key generation for security of data throug...
Convolutional neural network based key generation for security of data throug...
Cryptography Based MSLDIP Watermarking Algorithm
Cryptography Based MSLDIP Watermarking Algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
Hybrid Cryptography security in public cloud using TwoFish and ECC algorithm
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
A Comparative Study of RSA and ECC and Implementation of ECC on Embedded Systems
J017667582
J017667582
Prevention of Cheating Message based on Block Cipher using Digital Envelope
Prevention of Cheating Message based on Block Cipher using Digital Envelope
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Cryptography Encryption and Decryption File Protection based on Mo...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
IRJET- Survey of Cryptographic Techniques to Certify Sharing of Informati...
A dynamic data encryption method based on addressing the data importance on ...
A dynamic data encryption method based on addressing the data importance on ...
Securing voip communications in an open network
Securing voip communications in an open network
50120130406038
50120130406038
Nt1310 Unit 6 Powerpoint
Nt1310 Unit 6 Powerpoint
IRJET- Storage Security in Cloud Computing
IRJET- Storage Security in Cloud Computing
Mais de IAEME Publication
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME Publication
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
IAEME Publication
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
IAEME Publication
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
IAEME Publication
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
IAEME Publication
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
IAEME Publication
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IAEME Publication
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IAEME Publication
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
IAEME Publication
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
IAEME Publication
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
IAEME Publication
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
IAEME Publication
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
IAEME Publication
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
IAEME Publication
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
IAEME Publication
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
IAEME Publication
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
IAEME Publication
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
IAEME Publication
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
IAEME Publication
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
IAEME Publication
Mais de IAEME Publication
(20)
IAEME_Publication_Call_for_Paper_September_2022.pdf
IAEME_Publication_Call_for_Paper_September_2022.pdf
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
MODELING AND ANALYSIS OF SURFACE ROUGHNESS AND WHITE LATER THICKNESS IN WIRE-...
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
A STUDY ON THE REASONS FOR TRANSGENDER TO BECOME ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
BROAD UNEXPOSED SKILLS OF TRANSGENDER ENTREPRENEURS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
DETERMINANTS AFFECTING THE USER'S INTENTION TO USE MOBILE BANKING APPLICATIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
ANALYSE THE USER PREDILECTION ON GPAY AND PHONEPE FOR DIGITAL TRANSACTIONS
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
VOICE BASED ATM FOR VISUALLY IMPAIRED USING ARDUINO
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
IMPACT OF EMOTIONAL INTELLIGENCE ON HUMAN RESOURCE MANAGEMENT PRACTICES AMONG...
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
VISUALISING AGING PARENTS & THEIR CLOSE CARERS LIFE JOURNEY IN AGING ECONOMY
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
A STUDY ON THE IMPACT OF ORGANIZATIONAL CULTURE ON THE EFFECTIVENESS OF PERFO...
GANDHI ON NON-VIOLENT POLICE
GANDHI ON NON-VIOLENT POLICE
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
A STUDY ON TALENT MANAGEMENT AND ITS IMPACT ON EMPLOYEE RETENTION IN SELECTED...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
ATTRITION IN THE IT INDUSTRY DURING COVID-19 PANDEMIC: LINKING EMOTIONAL INTE...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
INFLUENCE OF TALENT MANAGEMENT PRACTICES ON ORGANIZATIONAL PERFORMANCE A STUD...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
A STUDY OF VARIOUS TYPES OF LOANS OF SELECTED PUBLIC AND PRIVATE SECTOR BANKS...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
EXPERIMENTAL STUDY OF MECHANICAL AND TRIBOLOGICAL RELATION OF NYLON/BaSO4 POL...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
ROLE OF SOCIAL ENTREPRENEURSHIP IN RURAL DEVELOPMENT OF INDIA - PROBLEMS AND ...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
OPTIMAL RECONFIGURATION OF POWER DISTRIBUTION RADIAL NETWORK USING HYBRID MET...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
APPLICATION OF FRUGAL APPROACH FOR PRODUCTIVITY IMPROVEMENT - A CASE STUDY OF...
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
A MULTIPLE – CHANNEL QUEUING MODELS ON FUZZY ENVIRONMENT
Último
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
DianaGray10
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Maria Levchenko
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
Khem
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Product Anonymous
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
sudhanshuwaghmare1
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Igalia
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
apidays
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
lior mazor
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Andrey Devyatkin
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
Último
(20)
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
20320140501014 2
1.
International Journal JOURNAL
OF ADVANCED RESEARCH Technology (IJARET), INTERNATIONAL of Advanced Research in Engineering and IN ENGINEERING ISSN 0976 – 6480(Print), ISSNAND – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME 0976 TECHNOLOGY (IJARET) ISSN 0976 - 6480 (Print) ISSN 0976 - 6499 (Online) Volume 5, Issue 1, January (2014), pp. 123-137 © IAEME: www.iaeme.com/ijaret.asp Journal Impact Factor (2013): 5.8376 (Calculated by GISI) www.jifactor.com IJARET ©IAEME HIGHLY SECURED CIPHERED - WATERMARKED BIOMEDICAL IMAGES Ali E. Taki El_Deen1, Mohy E. Abo-Elsoud2, Salma M. Saif3 1 2 (IEEE senior member, Alexandria University, Egypt) (IEEE senior member, Electronics and Communications Dept, Mansoura University, Egypt) 3 (Electronics and Communications Dept, Mansoura University, Egypt) ABSTRACT With the rapid development of digital technology, the treatments for digital data such as copyright protection and ownership demonstration are becoming more and more of greater importance. This paper presents two forms of data protection; digital watermarking and cryptography. Digital watermarking is used to enhance medical images security. The proposed system used is cryptography with watermarking in order to provide high security. In this paper a digital watermarking using LSB or DWT or DWT-SVD-DCT methods is used and then encrypting the result using AES encryption algorithm. The experimental results are evaluated with respect to mean square error, peak signal-to-noise ratio, correlation coefficient, and watermark-to-document ration. It’s known that the LSB is one of the best ways to achieve the data hiding requirements and authentication in medical images. Keywords: AES, Cryptography, Digital Watermarking, DWT, DWT-SVD-DCT, LSB. 1. INTRODUCTION Multimedia contents are easily spread over the Internet. Due to the ease of delivery and modification of digital files, the copyrights might be infringed upon. To deal with this problem, digital rights management (DRM) systems can prevent users from using such contents illegally. In DRM systems, encryption and robust watermarking are two major schemes for applications [1]. 123
2.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME Digital watermarking is a technology that embeds information, in machine-readable form, within the content of a digital media file. By extracting these secret messages, it can protect the copyright of and provide authentication to digital media [2]. Cryptography is the science of secret writing with the goal of hiding the meaning of a message [6]. This paper is organized as follow: Section (2) provides background about watermarking. Section (3) presents cryptography. Section (4) provides the discussion of the experimental results. Finally the paper is concluded in Section (5). 2. WATERMARKING Digital watermarking techniques derive from steganography, which means covered writing (from the Greek words stegano or “covered” and graphos or “to write”). Steganography is the science of communicating information while hiding the existence of the communication. The goal of steganography is to hide an information message inside harmless messages in such a way that it is not possible even to detect that there is a secret message presents [3]. Some general and very common watermarking requirements [4]: 1. The watermark should be accessible only to the authorized users. This issue is referred as security of the watermarking procedure and it is generally achieved by using cryptographic keys (Security). 2. The watermark detect ability should be assured regardless of the conventional signal processing or malicious attacks that may be applied (Robustness). 3. Generally, although one should provide an irremovable watermark, it should be imperceptible within the host data (Perceptual transparency). 4. The watermark should convey a sufficient amount of information. We are going to work on digital image watermarking in both spatial and transformed domain and our consideration will be the generation of imperceptible and robust watermark. Applications of Watermarking [5]: 1. Content labeling and hidden annotations. 2. Broadcast monitoring. 3. Integrity control. 4. Data hiding. 5. Device control. 124
3.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME Types of watermarking: According to working domain Spatial domain Ex.: LSB, CDMA, Correlation Transformed domain Ex.: DCT, DWT Watermarking According to type of document Text Image Audio Video According to human perception Fragile Visible Semi - fragile Invisible Robust Figure 1: Types of watermarking 3. CRYPTOGRAPHY Cryptography is the science of keeping secrets secret [7]. The fundamental objective of cryptography is to enable two people, usually referred to as Alice and Bob, to communicate over an insecure channel in such a way that an opponent, Oscar, cannot understand what is being said. This channel could be a telephone line or computer network, for example [8]. Cryptography can be used to provide [9]: 1. 2. 3. 4. 5. Privacy or confidentiality: keeping information secret from all but those who are authorized to see it. Data integrity: ensuring information has not been altered by unauthorized or unknown means. Entity authentication or identification: corroboration of the identity of an entity (e.g., a person, a computer terminal, a credit card, etc.). Message authentication: corroborating the source of information; also known as data origin authentication. Non-repudiation: preventing the denial of previous commitments or actions. 125
4.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME Types of cryptography: DES Symmetric Key AES Block ciphers Blowfish Stream ciphers RC4 RC6 A5 Cryptography RSA ElGamal Asymmetric Key ECC Diffi-Hellman Figure 2: Types of cryptography We are going to encrypt the image using AES encryption algorithm after watermarking it. We will work on biomedical images but our work can cover many other fields such as space community, military applications, and mobile systems. 4. WORKING AREA Cryptography is the most common method of protecting digital content and is one of the best developed sciences. However, encryption cannot help the seller monitor how a legitimate customer handles the content after decryption. Digital watermarking can protect content even after it is decrypted. I. Least Significant Bit: 1. Using LSB and 128- bits AES: LSB method selects a number of pixels from the cover image, and modifies their luminance to carry watermark bits [10]. The embedding of the watermark is performed choosing a subset of image pixels and substituting the least significant bit or bits of each of the chosen pixels with watermark bits. Extraction of the watermark is performed by extracting the least significant bit of each of the selected image pixels. 126
5.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME A. Watermarking using LSB: Figure 3: Original image, original watermark, and watermarked image B. Encryption and decryption using 128-bits Advanced Encryption Standard (AES): AES is a symmetric-key block cipher. AES operates on 128-bit data blocks and accepts 128-, 192-, and 256-bit keys. It is an iterative cipher, which means that both encryption and decryption consist of multiple iterations of the same basic round function. In each round, a different round (or internal) key is being used. In AES, the number of cipher rounds depends on the size of the key. It is equal to 10, 12, or 14 for 128-, 192-, or 256-bit keys, respectively [11]. AES encryption round employs consecutively four main operations: Sub Bytes, Shift Rows, Mix Columns, and Add Round Key. The inverse transformations are called InvSubBytes, InvShift Rows, InvMix Columns, and InvAddRoundKey. Please note that the last transformation of an encryption round, Add Round Key, is equivalent to a bitwise XOR and therefore is an inverse of itself [11]. The whole encryption and decryption block diagrams of AES algorithm are showed in figure 4. The whole operations are presented in figures 5, 6, and 7. Figure 8 shows the watermarked image, the encrypted – watermarked image, and the recovered watermarked image. Figure 4: AES block diagram 127
6.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME Figure 5: Byte substitution process Figure 6: ShiftRows and its inverse processes Figure 7: Mixcolumns operation with its matrix Figure 8: Watermarked image, encrypted – watermarked image, and recovered watermarked image 128
7.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME C. Watermark recovery Figure 9: Recovered watermarked image and recovered watermark 2. Using LSB and 192- bits AES: A. Watermarking using LSB: Figure 10: Original image, original watermark, and watermarked image B. Encryption and decryption using 192-bits AES: Figure 11: Watermarked image, encrypted – watermarked image, and recovered watermarked image C. Watermark recovery: Figure 12: Recovered watermarked image and recovered watermark 3. Using LSB and 256- bits AES: A. Watermarking using LSB: Figure 13: Original image, original watermark, and watermarked image 129
8.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME B. Encryption and decryption using 256-bits AES: Figure 14: Watermarked image, encrypted – watermarked image, and recovered watermarked image C. Watermark recovery: Figure 15: Recovered watermarked image and recovered watermark II. Discrete Wavelet Transform (DWT): In this technique we will perform watermarking of the input image by decomposing the image using haar wavelet. 1. Using DWT and 128- bits AES: A. Watermarking using DWT: Figure 16: Original image, original watermark, and watermarked image B. Encryption and decryption using 128-bits AES: Figure 17: Watermarked image, encrypted – watermarked image, and recovered watermarked image 130
9.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME C. Watermark recovery: Figure 18: Recovered watermarked image and recovered watermark 2. Using DWT and 192- bits AES: A. Watermarking using DWT: Figure 19: Original image, original watermark, and watermarked image B. Encryption and decryption using 192-bits AES: Figure 20: Watermarked image, encrypted – watermarked image, and recovered watermarked image C. Watermark recovery: Figure 21: Recovered watermarked image and recovered watermark 3. Using DWT and 256- bits AES: A. Watermarking using DWT: Figure 22: Original image, original watermark, and watermarked image 131
10.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME B. Encryption and decryption using 256-bits AES: Figure 23: Watermarked image, encrypted – watermarked image, and recovered watermarked image C. Watermark recovery: Figure 24: Recovered watermarked image and recovered watermark III. Combined DWT-DCT-SVD Digital Image Watermarking: SVD is a numerical technique used to diagonalize matrices in numerical analysis. It is an algorithm developed for a variety of applications. Matrix M is decomposed into three sub matrices [u, s, v] such that: ; (1) Where U and V are the orthogonal matrices such that Ux UT = I and V×VT= I where I is the identity matrix and S is the diagonal matrix (S1, S2, S3…SN). These values are known as singular values, and matrices U and V are known as corresponding singular vectors. 1. Using DWT-DCT-SVD and 128- bits AES: A. Watermarking using DWT-DCT-SVD: Figure 25: Original image, original watermark, and watermarked image B. Encryption and decryption using 128-bits AES: Figure 26: Watermarked image, encrypted – watermarked image, and recovered watermarked image 132
11.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME C. Watermark recovery: Figure 27: Recovered watermarked image and recovered watermark 2. Using DWT-DCT-SVD and 192- bits AES: A. Watermarking using DWT-DCT-SVD: Figure 28: Original image, original watermark, and watermarked image B. Encryption and decryption using 192-bits AES: Figure 29: Original image, original watermark, and watermarked image C. Watermark recovery: Figure 30: Recovered watermarked image and recovered watermark 3. Using DWT-DCT-SVD and 256- bits AES: A. Watermarking using DWT-DCT-SVD: Figure 31: Original image, original watermark, and watermarked image 133
12.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME B. Encryption and decryption using 256-bits AES: Figure 32: Watermarked image, encrypted – watermarked image, and recovered watermarked image C. Watermark recovery: Fig 33: Recovered watermarked image and recovered watermark 5. MEASURING IMPERCEPTIBILITY An important way of evaluating watermarking algorithms is to compare the amount of distortion introduced into a host image by a watermarking algorithm. In our study, the widely used methods are mean square error, peak signal to noise ratio, correlation coefficients, and watermark to document ratio. 1. Mean Square Error: (2) Where: • (M, N) are the image dimensions, • X(i, j) is the pixel value of original (host) image • X'(i, j) is the pixel value of the watermarked image. 2. Peak Signal-to-Noise Ratio: PSNR in decibels (dB) is represented as shown: (3) 134
13.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME Where: • MSE is the mean square error between the original image and the watermarked image. • MAX is the maximum pixel value of the image which is equal to 255 in our implementations since pixels were represented using 8 bits per sample. 3. Correlation Coefficients: The correlation factor measures the similarity between the original watermark and the watermark extracted from the attacked watermarked image (robustness). It take values between 0 (random relationship) to 1 (perfect linear relationship). The correlation factor is computed as follow: (4) Where: • (N) is number of pixel of the image, • (Xi) is the pixel value of the original image, • ( X ) is the average of all pixels value of the original image, • (Yi) is the pixel value of the modified image, • ( Y ) is the average of all pixels value of the modified image. 4. Watermark-to-Document Ratio (WDR): (5 ) Where: • (M, N) are the image dimensions, • X(i, j) is the pixel value of the original image, • X'(i, j) is the pixel value of the watermarked image. Figure 34: PSNR and WDR 135
14.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME Figure 35: MSE and Correlation Table 1: MSE and PSNR of the decrypted watermarked image WATERMARKING, ENCRYPTION MSE PSNR TYPES 128 BITS AES 3.5986 98.0197 3.5986 98.0197 3.1778 99.2632 192 BITS AES 3.1778 99.2632 256 BITS AES 3.1778 99.2632 128 BITS AES 3.0120 99.7992 192 BITS AES 3.0120 99.7992 256 BITS AES DWT-DCTSVD 192 BITS AES 128 BITS AES DWT 98.0197 256 BITS AES LSB 3.5986 3.0120 99.7992 6. CONCLUSION In this paper, different watermarking techniques such as LSB, DWT, and DWT-DCT-SVD have been introduced. Also a brief description of AES encryption algorithm has been presented. This Paper provides highly secured biomedical images by using the mixture of both watermarking and encryption. Here we connected the watermarking techniques with 128-bits AES, 192-bits AES, and 256-bits AES encryption algorithms. This provides a more secured algorithm because digital watermarking can protect content even after it is decrypted. We have also measured the imperceptibility of the watermarked image and the results showed that DWT-DCT-SVD technique is better than LSB and DWT techniques. 136
15.
International Journal of
Advanced Research in Engineering and Technology (IJARET), ISSN 0976 – 6480(Print), ISSN 0976 – 6499(Online) Volume 5, Issue 1, January (2014), © IAEME REFERENCES Books: [1] [2] [3] [4] Jeng-Shyang Pan, Hsiang-Cheh Huang, and Lakhmi C. Jain (Eds.), “Information Hiding and Applications”, ISBN: 978-3-642-02334-7, 2009. Anthony T.S. Ho Yun Q. Shi H.J. Kim Mauro Barni (Eds.), “Digital Watermarking”, ISBN10: 3-642-03687-2 Springer Berlin Heidelberg NewYork, 2009. Chun-Shien Lu, “Multimedia Security: Steganography and Digital Watermarking Techniques for Protection of Intellectual Property”, ISBN: 1-59140-192-5, 2005. Srdjan Stankovic´, Irena Orovic´, Ervin Sejdic, “Multimedia Signals and Systems”, ISBN: 978-1-4614-4207-3, 2012. Theses: [5] Ahmet BAŞTUĞ, “Watermarking Capacity Improvement by Low Density Parity Check Codes”, Boğaziçi University, 2002. Books: [6] [7] Christof Paar, Jan Pelzl, “Understanding Cryptography”, ISBN: 9783642041006, 2010. Hans Delfs, Helmut Knebl, “Introduction to Cryptography: Principles and Applications”, Second Edition, ISBN-13: 978-3-540-49243-6 Springer Berlin Heidelberg New York, 2007. [8] Kenneth H. Rosen, Ph.D., “Cryptography: Theory and Practice”, Third Edition, ISBN-10: 158488-508-4, 2006. [9] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, “Hand Book of Applied Cryptography”, 4th Edition, ISBN: 9780849385230, 2010. [10] Feng-HsingWang, Jeng-Shyang Pan, and Lakhmi C. Jain, “Innovations in Digital Watermarking Techniques”, ISBN: 978-3-642-03186-1, 2009. [11] C¸ etin Kaya Koc, “Cryptographic Engineering”, ISBN: 978-0-387-71816-3, 2009. 137
Baixar agora