Preferencje help
Widoczny [Schowaj] Abstrakt
Liczba wyników

Znaleziono wyników: 2

Liczba wyników na stronie
first rewind previous Strona / 1 next fast forward last
Wyniki wyszukiwania
Wyszukiwano:
w słowach kluczowych:  rsa
help Sortuj według:

help Ogranicz wyniki do:
first rewind previous Strona / 1 next fast forward last
EN
Elliptical curve cryptography (ecc) is a public key encryption approach based on elliptic curve idea that may be used to create quicker, smaller, and greater green cryptographic keys. Ecc generates keys through the houses of the elliptic curve equation in area of the traditional approach of generation as the manufactured from very huge prime numbers. The technology may be used at the side of maximum public key encryption strategies, together with rsa, and diffiehellman. Consistent with some researchers, ecc can yield a degree of safety with a 164-bit key that different structures require a 1,024-bit key to advantage. Because of the fact ecc helps to establish equivalent safety with decrease computing power and battery useful resource usage, it's far turning into widely used for cellular programs. In this work we implement ECC Algorithm with altered approach for encrypting and decrypting the probe image and encrypted images respectively. Our proposed approach has proposed that the elapsed time to perform the task for same input image is less than the conventional approach. We have run the cryptography procedure for n number of iterations in order to get the accurate results and compared that particular elapsed time with the conventional approach. We have contemplated an approach in which we consider region of interest (ROI) unlike the conventional approach, the advantage of the proposed work is we n need not to cover all the pixel vectors but only those which is required to be encrypted or decrypted. The proposed work has applied ecc algorithm for error calculations which has been shown in the experimental results. The proposed work has compared the result in both the aspects in terms of elapsed time to perform the algorithm and ROI feature to get implemented at the same time.
EN
The applications of different dimension of multimedia have been grown rapidly on daily basis. Digital media brings about the changes in the conveniences to the people, The cons of this technology is security threat if that security issue exist there is no meaning of conveniences We have segmented the proposed work in such a way unlike conventional approach the module of work includes sub-plotting the image in three directional coordinates plot(x), plot (g), plot(y). The security of information may have the distinct dimension in growing effective techniques to discourage the unauthenticated technique of duplication of virtual signals. Digital watermarking is the mathematical technique of embedding information right into a virtual signal in a way that it is difficult to eliminate. in order to overcome this, robust dwt watermarking approach is proposed. We've contemplated a way a good way to use t the temporary statistics to apply the inversion of dwt in row way and decompose the picture in the same length of width and height. Robustness can be defined as a watermark to stay unaffected even if digital content is passed thru diverse approaches and attacks. we've got proposed invisible sturdy watermarking for you to proved to be is the most accurate method. in conjunction with conventional technique embed a watermark containing key facts consisting of authentication codes.We have considered different dynamic conditions where the copyright and basic constituent of distributed images/photos is violated. Handiest one picture in active mode and all different is inactive mode. Since the images/pics posted on social networks or any networks are normally changed and/or compressed to the original template supplied through the carrier carriers, we suggest a digital photo watermarking based on dwt coefficients modification for use for such snapshots/images. we've got carry out the watermarking with proposed approach for the bilateral method which means for encrypting the digital information and for retrieval of the original information from the encoded dataset have alerted the convention concept of Dwt by adding an Adaptive filter into it for extracting the data.The contemplated approach has reduced the noise and unnecessary constituent to provide better efficiency and retrieve the accurate original image without distorting the pixel vectors.
first rewind previous Strona / 1 next fast forward last
JavaScript jest wyłączony w Twojej przeglądarce internetowej. Włącz go, a następnie odśwież stronę, aby móc w pełni z niej korzystać.