Please use this identifier to cite or link to this item: https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2157
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGowda, V Dankan-
dc.contributor.authorKumar, Pullela SVVSR-
dc.contributor.authorLatha, J-
dc.contributor.authorSelvakumar, C-
dc.contributor.authorShekhar, R-
dc.contributor.authorChaturvedi, Abhay-
dc.date.accessioned2023-12-04T10:28:56Z-
dc.date.available2023-12-04T10:28:56Z-
dc.date.issued2023-01-04-
dc.identifier.citationVol. 26, No. 3; pp. 779-791en_US
dc.identifier.issn0972-0529-
dc.identifier.issn2169-0065-
dc.identifier.urihttps://doi.org/10.47974/JDMSC-1754-
dc.identifier.urihttp://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2157-
dc.description.abstractNowadays, the data transmission in the network is working with the latest technology including 3G, 4G, and 5G. These technologies are replacing old technologies including 2G. Many techniques were proposed and implemented by different researchers in the directions of encryption, decryption, digital signatures, secure routing, WSNs, and cryptographic algorithms. Even though, no systems provide a better result as per the real world requirement. For this purpose, a new model is designed and implemented in this research work. Moreover, it provides data security while performing data transmission in WSN with the incorporation of steganography and digital signatures. The different cryptosystem is the novelty of different algorithms is proposed for providing security services. In this field, there are many combinations with different result were classified under various types. However, in the existing scheme, accommodate their type that forms the algorithms into cryptography oriented methods and other different techniques combined to get a high secured image. Moreover, the various related works in this direction were discussed under all types. © 2023, Taru Publications. All rights reserved.en_US
dc.language.isoenen_US
dc.publisherJournal of Discrete Mathematical Sciences and Cryptographyen_US
dc.subjectCryptosystemen_US
dc.subjectDigital signaturesen_US
dc.subjectEncryption and decryptionen_US
dc.subjectImage processingen_US
dc.subjectSteganographyen_US
dc.titleSecuring Networked Image Transmission Using Public-Key Cryptography and Identity Authenticationen_US
dc.typeArticleen_US
Appears in Collections:Journal Articles

Files in This Item:
File SizeFormat 
jdmsc-1754.pdf
  Restricted Access
1.29 MBAdobe PDFView/Open Request a copy


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.