Learn More
In this paper a new message encryption scheme using a concept called Cheating Text is proposed. The original message is embedded in a meaningful text called Cheating Text. The positions of the characters of the plain text in the Cheating Text are stored as Real Message Index File (RIF). This file is encrypted and sent along with the Cheating Text. The(More)
Cryptography is used to provide the security to the information. At present various security algorithms are used by the users to protect their data from intruders. Even though, attacks are being done by the assailants on the data due to rapid growth of the technology as well as its diffidence also. Hence in this paper we proposed a security approach using(More)
In recent years, there is a rapid growth with amount of data collections in hardware, software and networking, data source sharing, transaction oriented data etc., This type of stream data also contains private and sensitive information. A new topic in the area of privacy preserving data mining in stream data is quite challenging, in which data grows(More)
  • 1