scholarly journals A Contemplator on Topical Image Encryption Measures

Cryptography ◽  
2020 ◽  
pp. 556-573
Author(s):  
Jayanta Mondal ◽  
Debabala Swain

Images unduly assist digital communication in this aeon of multimedia. During times a person transmits confidential images over a flabby communication network, sheer protection is an accost contention to preserve the privacy of images. Encryption is one of the practice to clutch the reticence of images. Image encryption contributes a preeminent bite to charter security for secure sight data communication over the internet. Our work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques.

Author(s):  
Jayanta Mondal ◽  
Debabala Swain

Images unduly assist digital communication in this aeon of multimedia. During times a person transmits confidential images over a flabby communication network, sheer protection is an accost contention to preserve the privacy of images. Encryption is one of the practice to clutch the reticence of images. Image encryption contributes a preeminent bite to charter security for secure sight data communication over the internet. Our work illustrates a survey on image encryption in different domains providing concise exordium to cryptography, moreover, furnishing the review of sundry image encryption techniques.


Author(s):  
S. Gopikrishnan ◽  
P. Priakanth ◽  
Gautam Srivastava ◽  
Giancarlo Fortino

2013 ◽  
Vol 824 ◽  
pp. 206-214
Author(s):  
Babatunde A. Adegboye ◽  
B.B. Bello ◽  
K.R. Ekundayo ◽  
Juliet N. Adegboye

This paper deals with data transfer from one computer to another. The serial ports of the computer are used. MAX 232 is used to convert RS 232 logic to TTL logic and then an optical transmitter circuit is used to transmit data via fiber optic cable. The optical transmitter circuit has an LED which is matched with the cable. At the receiver an optical receiver circuit is used which receives data using a photo diode and a MAX 232 again to convert TTL logic to RS 232 for the serial port at the receiving end computer. The desired baud rate can be set. Although the internet can be used, but due to its time consuming nature, one can implement data transfer using wireless medium, though at a relatively high cost. The need, therefore, is felt for fiber optic communication which is cheaper and more suitable for the task. It is cheaper than wireless medium and is prone to lesser loss as compared to wireless medium.


Compiler ◽  
2013 ◽  
Vol 2 (2) ◽  
Author(s):  
Saryanto Saryanto ◽  
Sumarsono Sumarsono ◽  
Nurcahyani Dewi Retnowati

Data communication in the internet today is so complex as an example of the speed factor becomes very important in communicating, everyone wants fast data communication services provided in order to maximum. In relation to the application as a communication liaison with client server applications, web service using a data serialization format to transmit the data. Before the data is sent, either fromthe client to the server or vice versa, should be modified in a specific data format beforehand according to the web service is used. Types of data serialization format used in the web service such as XML and JSON. The method used for testing include data serialization method, data measurement method and data parsing method. Data serialization method is used to calculate the time serialization of data from the database to the form of XML and JSON in applications with PHP platform. Data measurement method used to measure the size of the XML and JSON data which based on many fields of data serialization process. Data parsing method is used to calculate the processing time and JSON parsing XML data. Results o f comparative analysis o f XML and JSON in PHP applications using thearchitecture Rest can be concluded that the test result o f the difference in time and time serialization and JSON parsing XML data is influenced by the number o f records, if the number of records the greater the difference in eating time data serialization and parsing the data the greater the time also itcan be concluded that the faster the process JSON serialization and parsing XML data is compared. Testing results o f the JSON data size is smaller than the size of XML. Data exchange using XML format has a size limit of up to 31456.31 KB while JSON XML exceeds the size limit. Testing results on the Internet when the number o f records up to 50,000 data when the data serialization and parsing time data can not be detected in the database.


Temida ◽  
2016 ◽  
Vol 19 (3-4) ◽  
pp. 355-372 ◽  
Author(s):  
Debarati Halder ◽  
Karuppannan Jaishankar

With the advent of internet and digital communication technology, online crimes targeting celebrities have gained a momentum. This article argues that, among the celebrities, actresses of Hollywood and Bollywood are particularly targeted online mainly because of their sex appeal and easy availability of contents including their images, video clippings, their private geo-location information, etc. The perpetrators are mostly fans who may wish to view the actresses as sex symbols. This article suggests that production houses should take primary responsibilities to prevent such victimisation and the actors themselves may avail legal policies such as right to be forgotten to approach the internet companies including search engines like Google to prevent victimisation and remove the offensive contents.


Author(s):  
Elif Ulker-Demirel

From day to day, an ever-changing and differentiated technological structure has played an essential role in the change of relations between businesses, people, and society in general. Along with the technological innovations being a part of everyday life, besides the traditional communication tools used, many different mechanisms have become a necessity in our lives. However, this change has become a focal point for brands in the way of communicating with their target consumers. In addition to the use of traditional communication tools such as television, radio, and print media, many different aspects of advertising, along with the power of the internet and social media, exist in various forms such as mobile advertising, location-based services, advergames, blogs, online content, viral advertising, and virtual reality. At this point, it is aimed to examine the transformation of communication tools from Web 1.0 to Web 3.0 and to focus new media tools.


Author(s):  
Chitra A. Dhawale ◽  
Naveen D. Jambhekar

Digital data transmitted over the insecure communication can be prone to attacks. Intruders try various attacks to unauthorized access of the confidential information. The Steganography is such as security system that provide the protection to the images, text and other type of data digitally transferred through the data communication network. This chapter elaborates the basics of Digital Image Steganographic techniques from ancient era to digital edge, types of images used for the steganography, payload used for the steganography, various attacks and different algorithms that can provide the information security. The performance analysis of the various Digital Image Steganographic algorithms are discussed. The current applications and their necessities are discussed in this chapter.


Author(s):  
Oladele Abiodun Balogun

The wave of the current unprecedented advancements in Information and Communication Technology, which spread in Nigeria, nay Africa is becoming unfathomable has some linguistic implications worthy of philosophical appraisal. The chapter discusses how the new digital milieu is changing human understanding and use of language in social and formal discourse. Contrary to the popular assumptions that the digital communication feat is holistically advantageous, the chapter argues that the advent of digital communication in Nigeria has occasioned unconsciously, more linguistic and social problems on the psyche of Nigerians. Through a careful survey of the style of sending text messages and mails via mobile phones and the Internet, the chapter establishes that Nigerians adopt pragmatic approach, which defies any respect for grammatical and linguistic rules in digital communication. Though, this ideological basis, the chapter argues, might hold some immediate communication effects for the senders and recipients; in spite of these supposed benefits, the chapter argues that the pragmatic approach to digital communication in Nigeria is inadequate. Thus, a case is made in the chapter for a more resonant underlying philosophy of language, which will guide digital communication in contemporary Nigeria.


Sign in / Sign up

Export Citation Format

Share Document