Abstract-The applications accessing multimedia systems and content over the internet have grown extremely in the earlier few years. Moreover, several end users or intruders can simply use tools to synthesize and modify valuable information. The safety of information over unsafe communication channel has constantly been a primary concern in the consideration of researchers. It became one of the most important problems for information technology and essential to safeguard this valuable information during transmission. It is also important to determine where and how such a multimedia file is confidential. Thus, a need exists for emerging technology that helps to defend the integrity of information and protected the intellectual property privileges of owners. Various approaches are coming up to safeguard the data from unauthorized person. Steganography and Cryptography are two different techniques for security data over communication network. The primary purpose of Cryptography is to create message concept unintelligible or ciphertext might produce suspicious in the mind of opponents. On the other hand, Steganography implant secrete message in to a cover media and hides its existence. As a normal practice, data embedding is employed in communication, image, text or multimedia contents for the purpose of copyright, authentication and digital signature etc.Both techniques provides the sufficient degree of security but are vulnerable to intruder's attacks when used over unsecure communication channel. Attempt to combines the two techniques i.e. Cryptography and Steganography, did results in security improvement. The existing steganographic algorithms primarily focus on embedding approach with less attention to preprocessing of data which offer flexibility, robustness and high security level. Our proposed model is based on Public key cryptosystem or RSA algorithms in which RSA algorithm is used for message encryption in encoding function and the resultant encrypted image is hidden into cover image employing Least Significant Bit (LSB) embedding method.
Mobile Ad Hoc Network (MANET) is an auto Configuring network. Due to its natural characteristics, a MANET is vulnerable to many security threats. Blackhole attack compromises the performance and the reliability of the network. Since nodes are allowed to move freely within the network, it becomes very important to protect the communication among mobile nodes for the sake of security. In this paper we have investigated various techniques that can detect Blackhole attacks in MANET and we have compared the detection techniques with different matrices such as Average Packet Delivery ratio and Average End-To-End delay.
Mobile Ad-hoc Network (MANET) routing is considered a challenging task because of the unpredictable changes in the network topology due to the absence of any centralized control. This routing has led to the development of several different routing protocols for MANET. In MANET, routing plays an important role in providing connectivity for mobile nodes that are not within the same radio range. Existing routing protocols in MANET assume a trusted and reliable environment. Here we have utilized soft computing technique for the selection of nodes in order to provide accurate means of transmission of data. Initially the nodes are clustered using Hybrid K means algorithm. Once the clustering is done path is formed based on optimized link state routing protocol. The routing is done by optimizing the nodes with the aid of Hybrid Genetic algorithm (GA). The implementation is done in NS2/NS3 platform and the results obtained are compared with various existing methods in order to prove the efficiency of our proposed technique.. The data transmission in proposed method (OLSR) occurs with maximum data gathering capacity and cluster head selection and shortest path selection in reaching the sink node. But in the existing method there is no cluster head selection and hence the information is gathered from all the nodes (AODV and DSDV). The results show that our secure QoS versions of the OLSR routing protocol more efficient than existing works.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.