• Citations Per Year
Learn More
The rapid growth and development in technology has made computer as a weapon which can cause great loss if used with wrong intentions. Computer forensics aims at collecting, and analyzing evidences from the seized devices in such ways so that they are admissible in court of law. Anti-forensics, on the other hand, is collection of tricks and techniques that(More)
Image compression is a technique to reduce irrelevance and redundancy of the image data in order to be able to store or transmit data in an efficient form. This paper presents a peculiar Hybrid Transform genesis technique for image compression using two orthogonal transforms. The concept of hybrid transform is to combine the attributes of two different(More)
Mobile Ad hoc network (MANET), provides better speed, and make fully symmetric distributed network. As network topology changes dynamically in an unpredictable manner, we can use mobile agents, which is a program code that transfer itself along with data from one host to another and execute themselves accordingly. The host provides execution environment to(More)
  • 1