Kshiramani Naik

Learn More
Mobile nodes in Wire less a d-hoc networ k need to operate as routers in or d er to maintain the informa tion ab out network connectivity as there is no centralized infrastructure. Therefore, Routing Protocols are required which could adapt dynamically to the changing topologies and works at low data rates. As are sult, there arises a need for the compreh(More)
In this paper, the authors have proposed an image cryptosystem for protecting the confidential image data with a high level of security. The encryption algorithm is developed into two phases where in the first phase, the secret image data set is scrambled or shuffled based on the Arnold's cat map and in the second phase the scrambled image is diffused(More)
  • 1