Learn More
Image encryption is a suitable method to protect image data. Image and text data has their unique features. The available encryption algorithms are good for text data. They may not be suitable for multimedia data. In fact the pixels of natural images are highly correlated to their neighboring pixels. Due to this strong correlation any pixel can be(More)
Visual cryptography scheme is a cryptographic technique which allows visual information to be encrypted in such a way that the decryption can be performed by the human visual system, without the aid of computers. In this article, we propose a novel scheme for copyright protection for digital images based on visual cryptography. The proposed method employs(More)
Ad hoc network consists of a set of identical nodes that move freely and independently and communicate among themselves via wireless links. The most interesting feature of this network is that they do not require any existing infrastructure of central administration and hence it is very suitable for temporary communication links in an emergency situation.(More)
Ad-hoc network consists of a set of identical nodes that move freely and independently and communicate via wireless links. The most interesting feature of this network is that it does not require any predefined infrastructure or central administration and hence it is very suitable for establishing temporary communication links in emergency situations. This(More)
Ad hoc network consists of a set of identical nodes that move freely and independently and communicate among themselves via wireless links. The most interesting feature of this network is that they do not require any existing infrastructure of central administration and hence is very suitable for temporary communication links in an emergency situation. This(More)
Mobile Ad-hoc networks(MANET)s are self organizing networks which can form a communication network without any fixed infrastructure. The constant bit rate (CBR) traffic is very well known traffic model for mobile Ad-hoc network. CBR traffic generates data packets at a constant rate. This constant rate packet generational is good enough for text data(More)
Ad hoc network consists of a set of identical nodes that move freely and independently and communicate among themselves via wireless links. The most interesting feature of this network is that they do not require any existing infrastructure of central administration and hence is very suitable for temporary communication links in an emergency situation. This(More)
This paper presents an image secret sharing method based on some random matrices that acts as a key for secret sharing. The technique allows a secret image to be divided into four image shares with each share individually looks meaningless. To reconstruct the secret image all four shares have to be used. Any subset m (1< m ≤ 4) shares cannot get sufficient(More)