A novel smooth texture-based visual cryptography approach for secure communication

Author(s):  
Ram Chandra Barik ◽  
Sitanshu Sekhar Sahu ◽  
Suvamoy Changder

In this paper, a novel dual image watermarking method is proposed to provide the copyright protection to digital images. In this proposed method, the lower and higher frequency subbands of the decomposed original image are modified by inserting the watermark information using different transforms. The implementation of a method that combines the visual cryptography with dual image watermarking to provide the security for the digital images during an exchange in open networks. The Arnold transform is used to encrypt the second watermark to employ the secure communication. Based on the proposed, the perceptibility and robustness of the distributed images can be increased. The original and watermarked images look like same and the PSNR and NCC are calculated for analyzing the system performance. This method is more robust and secure than existing methods


2020 ◽  
Vol 37 (4) ◽  
pp. 639-645
Author(s):  
Gülden Günay Bulut ◽  
Mehmet Cem Çatalbaş ◽  
Hasan Güler

In recent years, chaotic systems have begun to take a substantial place in literature due to increasing importance of secure communication. Chaotic synchronization which has emerged as a necessity for secure communication can now be performed with many different methods. This study purposes the Master-Slave synchronization via active controller and real time simulation of five different chaotic systems such as Lorenz, Sprott, Rucklidge, Moore-Spiegel, Rössler. Master slave synchronization was performed because of synchronization realized between the same type of chaotic systems with different initial parameters and also because of the systems were expected to behave similarly as a result of synchronization. Active control method was used to amplify the difference signal between master and slave systems which have different initial parameters and to return back synchronization information to the slave system. The real time simulation and synchronization of the master and slave systems performed successfully in LabVIEW environment. Furthermore, for the real time implementation, analogue outputs of NI-DAQ card used and real time results also were observed on an oscilloscope and secure communication application using sinusoidal signal and an image encryption application achieved successfully.


Author(s):  
Amolkirat Singh ◽  
Guneet Saini

Many people lose their life and/or are injured due to accidents or unexpected events taking place on road networks. Besides traffic jams, these accidents generate a tremendous waste of time and fuel. Undoubtedly, if the vehicles are provided with timely and dynamic information related to road traffic conditions, any unexpected events or accidents, the safety and efficiency of the transportation system with respect to time, distance, fuel consumption and environmentally destructive emissions can be improved. In the field of computer and information science, Vehicular Ad hoc Network (VANET) have recently emerged as an effective tool for improving road safety through propagation of warning messages among the vehicles in the network about potential obstacles on the road ahead. VANET is a research area which is in more demand among the researchers, the automobile industries and scientists to discover about the loopholes and advantages of the vehicular networks so that efficient routing algorithms can be developed which can provide reliable and secure communication among the mobile nodes.In this paper, we propose a Groundwork Based Ad hoc On Demand Distance Vector Routing Protocol (GAODV) focus on how the Road Side Units (RSU’s) utilized in the architecture plays an important role for making the communication reliable. In the interval of finding the suitable path from source to destination the packet loss may occur and the delay also is counted if the required packet does not reach the specified destination on time. So to overcome delay, packet loss and to increase throughput GAODV approach is followed. The performance parameters in the GAODV comes out to be much better than computed in the traditional approach.


Author(s):  
P. Jeyadurga ◽  
S. Ebenezer Juliet ◽  
I. Joshua Selwyn ◽  
P. Sivanisha

The Internet of things (IoT) is one of the emerging technologies that brought revolution in many application domains such as smart cities, smart retails, healthcare monitoring and so on. As the physical objects are connected via internet, security risk may arise. This paper analyses the existing technologies and protocols that are designed by different authors to ensure the secure communication over internet. It additionally focuses on the advancement in healthcare systems while deploying IoT services.


Author(s):  
Ekta Y

As IT sector is ruling the world now,confidentiality and security of information has become the most important inseparable aspect in information communication system. Keeping in view the same, a new approach called Visual Cryptography (VC) has been suggested by many researchers but there are some limitations with this scheme and cheating is one of the main problem among them. This paper intends to show the basis of cheating in VC in terms of cheating process, its detection methods and its prevention methods suggested by various researchers along with their merits and demerits. Finally, a good Cheating Immune Visual Cryptography Scheme (CIVCS) has been discussed which states the properties to be adopted by every Visual Cryptography scheme to make it immune to cheating attacks.


Sign in / Sign up

Export Citation Format

Share Document