scholarly journals Secured Data Transfer Using Voronoi Approach

Author(s):  
K. Arun Kumar
Keyword(s):  
Author(s):  
S. K. Saravanan ◽  
G. N. K. Suresh Babu

In contemporary days the more secured data transfer occurs almost through internet. At same duration the risk also augments in secure data transfer. Having the rise and also light progressiveness in e – commerce, the usage of credit card (CC) online transactions has been also dramatically augmenting. The CC (credit card) usage for a safety balance transfer has been a time requirement. Credit-card fraud finding is the most significant thing like fraudsters that are augmenting every day. The intention of this survey has been assaying regarding the issues associated with credit card deception behavior utilizing data-mining methodologies. Data mining has been a clear procedure which takes data like input and also proffers throughput in the models forms or patterns forms. This investigation is very beneficial for any credit card supplier for choosing a suitable solution for their issue and for the researchers for having a comprehensive assessment of the literature in this field.


2016 ◽  
Vol 9 (17) ◽  
Author(s):  
A. S. R. Murty ◽  
K. Phani Mounika ◽  
K. Anusha Reddy ◽  
K. Bhanu Karthik
Keyword(s):  

2019 ◽  
Vol 8 (3) ◽  
pp. 3498-3503

Keeping the Information Sharing to manage cyber risks as a key, Security Intelligence speaks about secured data every day in today’s world. Hence it is considered that Cyber security is a Data Analytics challenge. For this reason, many researchers were effectively working on privacy protection and Liability protection. As a supporting hand for these global issues to secure data transfer, we propose a method to encrypt and decrypt the messages instantly by spanning trees of a graph with labelled tree sequences.


Ad hoc network paved way to various researches and application due to its wide acceptance over wired network. The advance has also led to various drawbacks or problems that can result in unauthorized usage of data or in data loss. So secured data transfer has become an important requirement in any Ad hoc network. Various issues exist in Ad hoc network while data transmission and hence it has become a major requirement to develop an efficient routing protocol that can transmit the data securely over the network. So, this paper provides a solution, intend to develop an approach for making the data transmission more secured and feasible. This paper incorporates double encryption scheme to secure the data where we use Hybrid DNA based cryptosystem and blow fish algorithm for authentication of users. Also, we design an efficient optimal routing protocol that makes the transmission secured by reducing various attacks that occur in the network. It provides the security for image transmission over internet effectively. This technique also can be extended in multimedia security over the internet. The network parameters will be approximately judged in order to demonstrate the performance of the scheme we develop.


2021 ◽  
Vol 33 (6) ◽  
pp. 0-0

In the mobile cloud computing era, the sharing of secured large-scale data which have major challenges. From an existing quantum based security mechanism randomly chosen the photon detector which creates small length of qubits so it cannot provide much security in MCC also data storage in the cloud server doesn’t guarantees the lossless back up and data recovery as well attains more computation complex during secure access of stored data. Therefore to solve those issues a unique combination of the Trefoil Congruity framework is proposed which consist Quantum Key Fibo Privacy Approach (QKFPA) performing the quantum key generation for encrypt and decrypt the data with the aid of Fibonacci chain-slanting matrix. Based on that quantum key data is uploaded, then secured data should be stored, ultra-widely distributed data transfer mechanism does the scrambling with sorting the stored data by implementing novel HS-DRT technique that improves the lossless backup and recovery of data storage.


2021 ◽  
pp. 417-422
Author(s):  
R. Priyadarshini ◽  
N. Malarvizhi
Keyword(s):  

Author(s):  
Amit Dengre ◽  
A.D. Gawande

The growth of high speed computer networks and that of the Internet, in particular, has increased the ease of Information Communication. Ironically, the cause for the development is also of the apprehension - use of digital formatted data. In comparison with Analog media, Digital media offers several distinct advantages such as high quality, easy editing, high fidelity copying, compression etc. But this type advancement in the field of data communication in other sense has hiked the fear of getting the data snooped at the time of sending it from the sender to the receiver. So, Information Security is becoming an inseparable part of Data Communication. In order to address this Information Security, Steganography plays an important role. Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. In the current internet community, secure data transfer is limited due to its attack made on data communication. So more robust methods are chosen so that they ensure secured data transfer. One of the solutions which came to the rescue is the audio Steganography. But existing audio steganographic systems have poor interface, very low level implementation, difficult to understand and valid only for certain audio formats with restricted message size. Enhanced Audio Steganography (EAS) is one proposed system which is based on audio Steganography and cryptography & watermarking, ensures secure data transfer between the source and destination.


Author(s):  
Hazim Noman Abed

The great development obtained with digital communication system depends on the improvement of the amount and security of transmitting information, the secrecy of data transmitted becomes a main subject for the researcher. Cryptography and Steganography play a major role for secured data transfer. In this research, the cryptography and steganography method was proposed for information security. In cryptography, the encrypted message was obtained by XOR the secret message with QR code. While, in Steganography the encrypted  message was embedded inside cover image using LSB technique. The new approach in this research is use of the QR technique as well as the encrypted message was hidden in places selected using the bat algorithm. Secret message with different sizes was tested with many cover imagesto verify the efficiency of the proposed method. In the end, to measure the quality of cover image after the process of embedding, a group of standard parameters has adopted. The results of parameters showed the proposed method hasthe highest security and integrity.


Sign in / Sign up

Export Citation Format

Share Document