Learn More
Securing Network Program update is essential for many crucial military applications. Present Network Programming protocols proposed by Hailun Tan et al. provides confidentiality and authentication with high computational effort and power consumption. We have developed a confidential network program update protocol for clustered wireless sensor networks. Our(More)
We consider the problems of assignment of keys and construction of common key at the Broadcast center, in the zero-message and one-level broadcast encryption schemes of Fiat-Naor [1]. We propose efficient implementations of key assignment and common key construction, and estimate their complexity. We also propose, in the context of one-level schemes, a(More)
In the paper, we deal with the system that hides the data reversibly which is termed as reversible data hiding scheme. In this technique images will be authenticated and then the authenticate image is restored to their original from. This original form is achieved by removing the digital watermark and it replaces the image data that had been overwritten.(More)
—The goal of frequent pattern mining is to determine the frequently occurring group of items in the databases. Here the major contributing task is expediting the frequent itemset by proposing a technique that uses the minimal data available in the shopping cart for the prediction of what other items the customer can get the choice to buy. Several algorithms(More)
— The objective of this work is to develop a hardware-based watermarking system to identify the device using which the photograph was taken. The watermark chip will be fit in any electronic component that acquires the images, which are then watermarked in real time while capturing along with separate key. Watermarking is the process of embedding the(More)
Privacy, security and integrity of the users' data over internet depend on a single piece of user information which is normally a 'password'. It is very important for the user to keep it as secure and safe as possible in order to prevent the information from being revealed to an adversary who can misuse it. But most of the time we fail. Knowingly or(More)
  • 1