Learn More
In this paper we have present the architecture and module for internet firewall. The central component is fuzzy controller while properties of packets are fuzzified as inputs. On the basis of proposed fuzzy security algorithm, we have figured out security level of each packet and adjust according to packets dynamic states. Internet firewall can respond to(More)
Radio frequency identification (RFID) is getting popularity among identification technologies owing to its low cost, light weight, reduced size and inexpensive maintenance. Due to the recognition of RFID in the area of manufacturing, retail, pharmaceuticals and logistics, it is now in consideration for use in many different areas like ubiquitous computing,(More)
A new block cipher for gray images is proposed in this paper which fully utilizes whole set of DNA complementary rules dynamically for encoding and decoding each pixel of a block. The most significant (MSB) part of each block is added under DNA addition operation with least significant (LSB) while LSB part itself get encrypted by chaotically selecting(More)
A novel image encryption algorithm in streaming mode is proposed which exhaustively employs an entire set of DNA complementary rules alongwith one dimensional chaotic maps. The proposed algorithm is highly efficient due to encrypting the subset of digital image which contains 92.125 % of information. DNA addition operation is carried out on this MSB part.(More)
In the existing agriculture, critical decisions related to irrigation, fertilization and pesticides management are often left to farmers' discretion. They use irrelevant fertilizers and pesticides, and perform improper irrigation, which may lead disastrous effects on their crops. Different approaches have been proposed to enhance the Eco-sustainable(More)
A Modified Dual Fusion (MDF) technique of image encryption is proposed in this paper to overcome the limitations that exist in the original research work of Q. Zhang et al. (Optik 124:3596–3600, 2013). A novel technique of DNA encoding is applied through chaotic maps on pixel level and SHA-256 hash of the plain image is used to generate secret keys to avoid(More)