International Journal of Trend in Scientific Research and Development: Computer Security

IJTSRD is a leading Open Access, Peer-Reviewed International Journal which provides rapid publication of your research articles and aims to promote the theory and practice along with knowledge sharing between researchers, developers, engineers, students, and practitioners working in and around the world in many areas. For any further information, feel free to write us on editor.ijtsrd@gmail.com

Showing posts with label Computer Security. Show all posts
Showing posts with label Computer Security. Show all posts

Saturday, 28 August 2021

Data Security by AES Advanced Encryption Standard

August 28, 2021 0
Data Security by AES Advanced Encryption Standard
Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are...

Wednesday, 25 August 2021

Security Issues Related to Biometrics

August 25, 2021 0
Security Issues Related to Biometrics
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals....

Saturday, 7 August 2021

Privacy and Security on Social Media

August 07, 2021 0
Privacy and Security on Social Media
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers...

Tuesday, 29 June 2021

Image Cryptography using RSA Algorithm

June 29, 2021 0
Image Cryptography using RSA Algorithm
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For...

Friday, 25 June 2021

Personal Health Record over Encrypted Data Using Cloud Service

June 25, 2021 0
Personal Health Record over Encrypted Data Using Cloud Service
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR...

Sunday, 20 June 2021

Organised Crime in the Digital Age

June 20, 2021 0
Organised Crime in the Digital Age
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to...

Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique

June 20, 2021 0
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity,...

Ad