Now a days with the rapid development of multimedia technologies, research on safety and security are becoming more important. Multimedia data are generated and transmitted through the communication channels and the wireless media. The efficiencies of encryption based on different existing algorithms are not up to the satisfactory limit. Hence researchers are...
Showing posts with label Computer Security. Show all posts
Showing posts with label Computer Security. Show all posts
Saturday, 28 August 2021
Wednesday, 25 August 2021
Security Issues Related to Biometrics
Team IJTSRD
August 25, 2021
0
With the growth of technology their grows threat to our data which is just secured by passwords so to make it more secure biometrics came into existence. As biometric systems are adopted and accepted for security purpose for various information and security systems. Hence it is immune to attacks. This paper deals with the security of biometric details of individuals....
Saturday, 7 August 2021
Privacy and Security on Social Media
Team IJTSRD
August 07, 2021
0
Social Media have become a integral part of human life. With over 1 billion users connected through online network. Social media is an online platform where we can share our information like text, photos, thoughts, videos, messages and many people have started to share seminar, workshop in Education domain and online survey, marketing, and targeting customers...
Tuesday, 29 June 2021
Image Cryptography using RSA Algorithm
Team IJTSRD
June 29, 2021
0
Cryptography is a process used for sending information in secret way. Goal of this process is to provide protection for information but in different way. In this paper our motive to represent a new method for protection that is generated by combination of RSA and 2 bit rotation mechanism of cryptography. There are many algorithms exist for this process. For...
Friday, 25 June 2021
Personal Health Record over Encrypted Data Using Cloud Service
Team IJTSRD
June 25, 2021
0
CBPHR Cloud Based Personal Health Record systems are used for storage and management of patient records. Cloud computing provides real time health care data in a convenient and cost effective manner. Due to the lack of visibility in cloud platform, the users are always concerned with data privacy and security. This is the main obstacle in widely adopting CBPHR...
Sunday, 20 June 2021
Organised Crime in the Digital Age
Team IJTSRD
June 20, 2021
0
Digital technology has transformed organizational life. Developments in communications, and in information storage and retrieval, to name just two areas, have greatly enhanced the efficiency with which legitimate organizations operate. Unfortunately, the benefits of digital technology are not lost on criminal organizations, which exploit digital technology to...
Impact of Message Size on Least Significant Bit and Chaotic Logistic Mapping Steganographic Technique
Team IJTSRD
June 20, 2021
0
Steganography is the technique of hiding information in other objects. Although many carrier objects can be used, digital images are the most popular because of their usage over the internet. For this purpose, many types of images steganographic techniques have been invented. Each of them has both pros and cons. It depends on the complexity, hiding capacity,...