Fifth International Conference on Computing, Communications and Networking Technologies (ICCCNT) 2014
DOI: 10.1109/icccnt.2014.6963148
|View full text |Cite
|
Sign up to set email alerts
|

Secure Mail using Visual Cryptography (SMVC)

Abstract: The E-mail messaging is one of the most popular uses of the Internet and the multiple Internet users can exchange messages within short span of time. Although the security of the E-mail messages is an important issue, no such security is supported by the Internet standards. One well known scheme, called PGP (Pretty Good Privacy) is used for personal security of E-mail messages. There is an attack on CFB Mode Encryption as used by OpenPGP. To overcome the attacks and to improve the security a new model is propo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
2

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(2 citation statements)
references
References 13 publications
(5 reference statements)
0
2
0
Order By: Relevance
“…As we know, the email messages are very popular and important uses in the global network. Ajish and Rajasree proposed that it is to apply this algorithm on the mail messages splitting it into two shares then encrypted using the Choas-Based image encryption algorithm using Wavelet transform [7]. Least Significant Bit steganography (LSB) is one of the most popular methods used for hiding messages inside images.…”
Section: Introductionmentioning
confidence: 99%
“…As we know, the email messages are very popular and important uses in the global network. Ajish and Rajasree proposed that it is to apply this algorithm on the mail messages splitting it into two shares then encrypted using the Choas-Based image encryption algorithm using Wavelet transform [7]. Least Significant Bit steganography (LSB) is one of the most popular methods used for hiding messages inside images.…”
Section: Introductionmentioning
confidence: 99%
“…If an attacker has from two shares just one part, so no information can the attacker obtain concerning the message at the recipient side, he can recovery the grey scale image through of fetch the two shares, decrypted and stacked. Finally, the message is restoring from the grey scale image [21].…”
Section: Secure Mail Using Visual Cryptographymentioning
confidence: 99%