|
|
Articles
by
G.U. Priyanga |
Total Records (
2 ) for
G.U. Priyanga |
|
 |
|
|
|
Padmapriya Praveenkumar
,
G.U. Priyanga
,
K. Thenmozhi
,
J.B.B. Rayappan
and
R. Amirtharajan
|
|
The intellectual growth of computer communication lead to drastic improvement in wireless technology and shrunken the world into palms of the user which paved the path for the security attack issues. The development of the security system became the ultimate. Popular technique widely used in present scenario that provides a better security to secret information is image encryption. Multiple encryption technique has been adopted in this study. The secret image is block shuffled and then chaotic maps such as baker map, skew tent map and Arnold cat map are used to encrypt the image. Further the image is encrypted using Cipher Block Chaining (CBC) to contribute the final encrypted image. Metrics such as horizontal, vertical, diagonal correlation, Number of Changing Pixel Rate (NPCR) and entropy were calculated for various Digital Imaging and Communication in Medicine (DICOM) test images and the performance of the algorithm was analyzed. |
|
|
|
|
|
Padmapriya Praveenkumar
,
P. Rajalakshmi
,
G.U. Priyanga
,
K. Thenmozhi
,
John Bosco Balaguru Rayappan
and
Rengarajan Amirtharajan
|
|
Security has become the most indispensible part of any form
of communication. There are different ways through which it is brought about,
out of which one of the efficient implementation through steganography and encryption.
Steganography conceals the existence of a secret message throughout the communication
thereby providing enhanced security. In this study, a methodology has been proposed
to perform encryption on an image with the help of Secret Steganography Code
for Embedding (SSCE) code. A mapping technique has been proposed to combine
quantum truth table and LSB based embedding. The SSCE has been employed to provide
encryption, followed by quantum table before embedding the secret data. The
proposed methodology supports both images and text as cover as well as secret
data. In the proposed scheme, embedding has been included with encryption to
provide security multifold. The implementation was carried out using Visual
Basic. NET and results are presented. |
|
|
|
|
|
|