5 research outputs found

    Enhancement of Security of Digital Data with Steganography Technique

    Get PDF
    In this era of Internet and Technology there is a need to secure digital data from unauthorized users. This can be done with the use steganography techniques. The selling of softwares in the form of digital images and video sequences is very much enhanced due to the cost effectiveness and improvement in technology. But this digital are also at risk to accidental attacks. Nowadays the most important concern is the protection of digital data and therefore it is gaining interest among researchers. The storing and transferring of digital data, needs many security concerns that are sensitive and if this data is lost, counterfeited, or hacked, it may be impossible to recover. The security of this transmitted data can be increased by the application of steganography techniques. In this the digital data can be hidden in the host image and this image is transferred to the receiving end instead of the actual software data. Then by using a secret key, the hidden data are extracted accurately from the carrier image. The data is hidden in such a way to minimize the degradation of actual data. In this paper a method is described to handle attacks on the carrier image

    A Framework for Enhancing the Energy Efficiency of IoT Devices in 5G Network

    Get PDF
    A wide range of services, such as improved mobile broadband, extensive machine-type communication, ultra-reliability, and low latency, are anticipated to be delivered via the 5G network. The 5G network has developed as a multi-layer network that uses numerous technological advancements to provide a wide array of wireless services to fulfil such a diversified set of requirements. Several technologies, including software-defined networking, network function virtualization, edge computing, cloud computing, and tiny cells, are being integrated into the 5G networks to meet the needs of various requirements. Due to the higher power consumption that will arise from such a complicated network design, energy efficiency becomes crucial. The network machine learning technique has attracted a lot of interest from the scientific community because it has the potential to play a crucial role in helping to achieve energy efficiency. Utilization factor, access latency, arrival rate, and other metrics are used to study the proposed scheme. It is determined that our system outperforms the present scheme after comparing the suggested scheme to these parameters

    A REVIEW OF SECURITY, PRIVACY AND INFORMATION LEAKAGE IN IOT BASED SMART CARPOOL SYSTEM

    Get PDF
    Internet of Things (IoT) age has now started and it'll very much change our way of life. The most important purpose for IoT is formation of smart environments using self-aware things like smart transport, smart city, etc. for novel and innovative applications. Internet of things allows us to control objects that we use distantly through the internet. Negative effects of IoT technology are defenseless against to attack. So, there is increase in possibility of privacy information leakage which is causing economical damage to individuals thus also causing social and political damage. To address this problem, many risk measurement methods for information Leakage in IoT have been proposed in the past years.This overview paper highlights possible application of the concept of IoT within smart city traffic surroundings that supported instance of carpooling system with utilization of a personal vehicle. It also discusses IoT security and privacy threats which cause information leakage. This paper presented and analyzed the IoT Security, Safety, and Privacy risks that provide a complete view of current issues due to the implementation of this technology

    SELF EMBEDDING FINGERPRINTWATERMARKING AND STEGANOGRAPHY USING LSB,RSA, 3-DWT AND MLPSVM ALGORITHM

    Get PDF
    Digital watermarking methods are used to biometric document protect from attacks of either intentional and accident. These attacks are intended to either circumvent the afforded security throughsystem or to normal functioning deter of the system.In this research,verification of fingerprint methods with watermarking technology combination to provide copyright protection and authentication of digital images is proposed. In proposed algorithm for higher performancepresent self embedding fingerprint watermarking and steganography using least significant bit (LSB), RSA, three level discrete wavelet transform (DWT) and multilayer perceptron support vector machine (MLPSVM) classification. In this study, we take cover image and create self watermark images using bi-cubic interpolation (BCI) method for memory saving.The proposed approach gives perfect results from previous work. The experimental database contains 3 person fingerprint images with 8 different images. In this study, we calculate false matching ratio (FMR), false rejection ratio (FRR), accuracy, time and peak signal noise ratio (PSNR). The experimental outcomes for FMR and FRR is 0.5833and 0.7500. PSNR value is varying from 70-95%. Accuracylies between 0 and 3. Also, we applied attacks on watermarked image (like noise and rotate). Also, calculate time of each image and it lies between 65-76%

    To Study The Impact of Information and Communication Technology Tools on Society of Hilly and Rural Area of Bhor Taluka, District- Pune, Maharashtra

    Get PDF
    This paper deals with the implications of Information and Communication Technology Tools on Society of Hilly and Rural area of Bhor Taluka of district Pune, Maharashtra, India. With the advent of Information and Communication Technology and its Tools, it has become possible for common man to connect, communicate and access global information. Information and Communication Technology provides better, faster and robust communication and has capability to connect the rural community with main stream of universe. Geographical boundary of this study is Bhor taluka (Tahsil) of Pune district of Maharashtra, India. Investigator has adopted survey based methodology to conduct the study and the questionnaire technique was used for data collection. The study revealed that the awareness of ICT and its Tools among the hilly and rural population of Bhor Tahsil is now growing and has positive impact on their livelihood especially on Education sector
    corecore