1Department of Computer Sc. & Engineering RCC Institute of Information Technology Kolkata, West Bengal-700.015 (INDIA)
2Department of Computer Application RCC Institute of Information technology Kolkata, West Bengal-700.015 (INDIA)
This paper proposes a copyright protection scheme for color images and colored watermarks using visual secret sharing based on the concept of visual cryptography. Most watermarking algorithms call for a piece of information to be hidden directly in media content, in such a way that it is imperceptible to a human observer, but detectable by a computer. This paper presents an improved cryptographic watermark method based on Hwang and Naor-Shamir approaches. The technique does not require that the watermark pattern to be embedded in to the original digital image. Verification information is generated and used to validate the ownership of the image. The method is expected to be proved robust for various image processing operations such as filtering, compression, additive noise, and various geometrical attacks such as rotation, scaling, cropping, flipping, and shearing.
1Department of Computer Science & Applications Kurukshetra University Kurukshetra (INDIA)
2Research Scholar,Singhania University Rajsthan (INDIA)
3PG Computer Science & Engineering,Shri Sowdambiga College of Engineering, Aruppukottai,Tamilnadu (INDIA)
Email email@example.com, firstname.lastname@example.org email@example.com
Vehicular networks are very likely to be deployed in the coming years and thus become the most relevant form of mobile ad hoc networks. In this paper, we address the security of these networks. We provide a detailed threat analysis and devise appropriate security architecture. We also describe some major design decisions still to be made, which in some cases have more than mere technical implications. In this paper we review the standardization work and researches related to vehicular networks and discuss the challenges Security Aspect for vehicular networks.
1Department of Computer Science & Engg., GITA, Bhubaneswar, Odisha (INDIA)
2Department of Computer Science, Utkal University, Odisha (INDIA)
3P.G. Department of Statistics, Sambalpur University, Odisha (INDIA)
In this research, anomaly detection using neural network is introduced. This research aims to experiment with user behaviour as parameters in anomaly intrusion detection using a backpropagation neural network. Here we wanted to see if a neural network is able to classify normal traffic correctly, and detect known and unknown attacks without using a huge amount of training data. For the training and testing of the neural network, we used the DARPA Intrusion Detection Evaluation data sets. In our final experiment, we have got a classification rate of 88% on known and unknown attacks. Compared with other researches our result is very promising.
1Research Scholar, Dept. Of Computer Science, The University of Burdwan, W.B. (INDIA) Assistant Professor, Dept. Of Computer Application, Durgapur Society of Management Science, W.B. (INDIA)
2Associate Professor, Dept. Of Computer Science, The University of Burdwan, W.B, INDIA
Email: firstname.lastname@example.org ,Email: email@example.com
The success rate of various electronic mechanisms such as E-Governance, E-Learning, E-Shopping, E-Voting, etc. is absolutely dependent on the security, authenticity and the integrity of the information that is being transmitted between the users of sending end and the users of receiving end. To attain all these parameters, these sensitive information must be digitally signed by its original sender which should be verified categorically by its intended receiver. Since digital signature schemes are basically various complex cryptographic algorithms which are embedded with the plain text message, the performance level of these E-services vary based on certain attributes like key size, block size, computational complexities, security parameters, application specific customizations, etc. In this paper the authors have made a thorough study of the industry standard digital signature schemes to obtain optimum security level for the electronic mechanisms and explored its probable applications in various domains.
This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License