Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/2157
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Gowda, V Dankan | - |
dc.contributor.author | Kumar, Pullela SVVSR | - |
dc.contributor.author | Latha, J | - |
dc.contributor.author | Selvakumar, C | - |
dc.contributor.author | Shekhar, R | - |
dc.contributor.author | Chaturvedi, Abhay | - |
dc.date.accessioned | 2023-12-04T10:28:56Z | - |
dc.date.available | 2023-12-04T10:28:56Z | - |
dc.date.issued | 2023-01-04 | - |
dc.identifier.citation | Vol. 26, No. 3; pp. 779-791 | en_US |
dc.identifier.issn | 0972-0529 | - |
dc.identifier.issn | 2169-0065 | - |
dc.identifier.uri | https://doi.org/10.47974/JDMSC-1754 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/2157 | - |
dc.description.abstract | Nowadays, the data transmission in the network is working with the latest technology including 3G, 4G, and 5G. These technologies are replacing old technologies including 2G. Many techniques were proposed and implemented by different researchers in the directions of encryption, decryption, digital signatures, secure routing, WSNs, and cryptographic algorithms. Even though, no systems provide a better result as per the real world requirement. For this purpose, a new model is designed and implemented in this research work. Moreover, it provides data security while performing data transmission in WSN with the incorporation of steganography and digital signatures. The different cryptosystem is the novelty of different algorithms is proposed for providing security services. In this field, there are many combinations with different result were classified under various types. However, in the existing scheme, accommodate their type that forms the algorithms into cryptography oriented methods and other different techniques combined to get a high secured image. Moreover, the various related works in this direction were discussed under all types. © 2023, Taru Publications. All rights reserved. | en_US |
dc.language.iso | en | en_US |
dc.publisher | Journal of Discrete Mathematical Sciences and Cryptography | en_US |
dc.subject | Cryptosystem | en_US |
dc.subject | Digital signatures | en_US |
dc.subject | Encryption and decryption | en_US |
dc.subject | Image processing | en_US |
dc.subject | Steganography | en_US |
dc.title | Securing Networked Image Transmission Using Public-Key Cryptography and Identity Authentication | en_US |
dc.type | Article | en_US |
Appears in Collections: | Journal Articles |
Files in This Item:
File | Size | Format | |
---|---|---|---|
jdmsc-1754.pdf Restricted Access | 1.29 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.