Jojo Moses Eghan

  • Citations Per Year
Learn More
With the current emergence of biometric image data applications on devices such as smart phones, security cameras, personal computers etc, there is a need for securing the image templates obtained from crime scenes as well as such devices before storing them in locations such as the cloud etc. In this paper, we proposed an encryption technique of securing(More)
This paper proposed a new algorithm for digital image encryption. The proposed algorithm encrypts an mxn size image by using the set of array pixel values. At the end, plain images will be encrypted using the algorithm and analysis will be performed on the ciphered images to determine the efficiency of the algorithm in ciphering the image. The algorithm(More)
Medical images stored in health information systems, cloud or other systems are of key importance. Privacy and security needs to be guaranteed for such images through encryption and authentication processes. Encrypted and watermarked images in this domain needed to be reversible so that the plain image operated on in the encryption and watermarking process(More)
With the increase in structural complexities in modern cities, many operations, be they military, police, fire service, intelligence, rescue, or other field operations, require localization services and online situation awareness to make them effective. The digital data collected from such systems are sensitive hence security concerns regarding the(More)
Cryptography is the science and art of encrypting and decrypting text data where Steganography is the science and art of hiding information. Steganography deals with composing hidden message so that only the sender and receiver know that the message even exists. A novel approach i. e. CryptSteg is introduced where sender embedding text message in the(More)
Identity management is crucial in cyberspace where infringement of one’s privacy, copy right disputes, theft and other malicious activities are very rampant. There exists a need of ownership identification and authentication of digital images. In solving and contributing to this field, we proposed a cryptographic and watermarking encryption technique for(More)
The high increase in the transmission of digital data over secured and unsecured communications channels poses a lot of security and privacy concerns to both the transmitter and the receiver. Many operations engaged today in urban and warfare, be they for construction, monitory of plants, high voltage lines, military, police, fire service, intelligence etc.(More)