The security of digital images is an essential and challenging task on shared communication Model. Generally, high secure working environment and data are also secured with an …
IoT makes incorporated communication circumstances of interconnected devices and stages by drawing in both practical and substantial worlds simultaneously. The researchers of the …
M Dahiya, R Kumar - 2018 First International Conference on …, 2018 - ieeexplore.ieee.org
In the current world when entire web contains most of multimedia data then protection of that data is our major concern. Different techniques are discovered and developed from time to …
Image is an important digital information that used in many internet of things (IoT) applications such as transport, healthcare, agriculture, military, vehicles and wildlife. etc …
D Zheng, K Liang - Journal of Intelligent Systems and Internet of …, 2021 - americaspg.com
Wireless sensor network (WSN) comprises a set of sensor nodes, mainly used for data collection and tracking process. The imaging sensors in WSN captures the images from the …
A Susanto, T Khotimah, MT Sumadi, J Warsito… - Int. J. Eng …, 2018 - eprints.umk.ac.id
Cryptography is a method of securing text data, images and sound in order to secure its confidentiality and to minimize data stealing, attack, etc. The purpose of this study is to …
Columnar transposition is a technique commonly used in text encryption to produce cipher text which is a permutation of its original text. In this study, the columnar transposition and …
R Darari, E Winarko… - Contemp Math and …, 2020 - pdfs.semanticscholar.org
Digital image is digital pictures on a two-dimensional plane which consists of pixels, where every pixels has Red, Green, Blue (RGB) with varying intensity depending on the image. In …
D Kumar, N Mandal, Y Kumar - Tele‐Healthcare: Applications …, 2022 - Wiley Online Library
Nowadays, the world is moving toward the use of mobile apps and web applications for almost everything, which caused a surge in online data across the world. Cloud computing …