Security Technique and Congestion Avoidance in Mesh Network IJTSRD
Security in wireless network is one of the prime concern in today’s Information Age, where information is an asset not only to an organisation but also to an individual. Security to a great extent is able to protect the network from various unauthorized attacks. On the other side implementation of security mechanisms also causes an […]
Image Realization Steganography by Secure Key Transmission IJTSRD
This work proposes a novel scheme for separable reversible data hiding in encrypted images. In the first phase, a content owner encrypts the original uncompressed image using an encryption key. Then, a data-hider may compress the least significant bits of the encrypted image using a data-hiding key to create a sparse space to accommodate some […]
Back Propagated K-Mean Clustering for Prediction of Slow Learners IJTSRD
The data mining is the technique to analyze the complex data. The prediction analysis is the technique which is applied to predict the data according to the input dataset. In the recent times, various techniques have been applied for the prediction analysis. In this paper, k-mean and SVM classifier based prediction analysis technique is improved […]
Data Prevention from Network Hacking IJTSRD
We are sending data from source node to destination using wireless sensor networks (WSNs), In wireless sensor networks, it is a typical threat to source privacy that an attacker performs back tracing strategy to locate source nodes by analyzing transmission paths. So there is lot of chances to lose data and information theft by network […]
Security on Cloud using High Level Encryption Techniques IJTSRD
In today’s life security of data is most important for everyone so it’s very important that how secure data at the run time. With cloud computing platform it is very easy to transfer data between users and store any amount of data on cloud so it is easy to use anytime anywhere. To provide security […]