11 research outputs found

    Secured Transmission of a compressed image by using ECC

    Get PDF
    Security is the main issue concerned with protecting the digital images that are transmitted over the network. By providing the high security, the digital images on the network can be protected from various types of attacks. A Cryptographic technique plays a major role in providing the security goals such as confidentiality and integrity for digital images. Elliptical curve cryptography (ECC) is the asymmetric encryption which is used to apply to the images that result from DWT Compression. Discrete Wavelet Transform (DWT) is an important compression technique which is used to compress the image effectively. It represents the input data in the form of the low pass (approximate) and high pass (detailed) coefficients. These coefficients are entered into the filters. The outputs from these filters are down-sampled for compression. In this paper, the transmitted images via wireless network were secured by encryption using the public key. The sender will generate the private key from the compressed image based on elliptical curve cryptography. The Sender will send the compressed image and private key separately to the receiver. DWT provides high compression ratio and robustness for protecting the digital image integrity. This experiment result provides some performance measures such as Peak Signal to Noise Ratio (PSNR), Bit Error Rate (BER) and Mean Squared Error (MSE). It also provides high integrity for transmitted digital images

    Secured Transmission of a compressed image by using ECC

    Get PDF
    Security is the main issue concerned with protecting the digital images that are transmitted over the network. By providing the high security, the digital images on the network can be protected from various types of attacks. A Cryptographic technique plays a major role in providing the security goals such as confidentiality and integrity for digital images. Elliptical curve cryptography (ECC) is the asymmetric encryption which is used to apply to the images that result from DWT Compression. Discrete Wavelet Transform (DWT) is an important compression technique which is used to compress the image effectively. It represents the input data in the form of the low pass (approximate) and high pass (detailed) coefficients. These coefficients are entered into the filters. The outputs from these filters are down-sampled for compression. In this paper, the transmitted images via wireless network were secured by encryption using the public key. The sender will generate the private key from the compressed image based on elliptical curve cryptography. The Sender will send the compressed image and private key separately to the receiver. DWT provides high compression ratio and robustness for protecting the digital image integrity. This experiment result provides some performance measures such as Peak Signal to Noise Ratio (PSNR), Bit Error Rate (BER) and Mean Squared Error (MSE). It also provides high integrity for transmitted digital images

    An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication

    Get PDF
    Authentication means acknowledging a user’s identity. It is the way of associating a request with a set of identity. The identification provided is an authorized user’s information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system

    An Enhanced Least Significant Bit Steganography to Improve the Effectiveness of Graphical Password Authentication

    Get PDF
    Authentication means acknowledging a user’s identity. It is the way of associating a request with a set of identity. The identification provided is an authorized user’s information on a personal computer system or within an authentication server. A graphical password is a validation system in which user has to select from images, in a particular order, presented in a graphical user + interface (GUI). Graphical passwords can be easily remembered, as users remember images better than words. Also, the system should be more unaffected by brute-force attacks, because there is practically an infinite search space. Complex text passwords are hard to remember and simple textual passwords are easy to guess. Graphical passwords provide more robustness and memorability. It is a secure mechanism to provide authenticated sign up to a system

    Psychological distress and trauma during the COVID-19 pandemic: survey of doctors practising anaesthesia, intensive care medicine, and emergency medicine in the United Kingdom and Republic of Ireland

    No full text
    corecore