Improving Image Encryption and Decryption Using WU`s Algorithm
Research Paper | Journal Paper
Vol.6 , Issue.1 , pp.413-416, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.413416
Abstract
In this advanced world, pictures are generally utilized in various cycles. Along these lines, the security of picture and information from unapproved utilizes is significant. Presently, data security is turning out to be progressively significant in information capacity and broadcasting. It is fundamental for getting picture, either on the way or store on gadgets. Nonetheless, some picture encryption calculations actually have numerous security issues and can be effortlessly gone after by assailants. This proposed framework plays out the cryptanalysis of a recently proposed variety picture encryption scheme utilizing Wu`s algorithms. For encryption plot, typically utilizes a pseudo-irregular encryption key created by a calculation and which makes the picture safer. An approved recipient can without much of a stretch unscramble the message with the mystery key given by the originator to recipient however not to unapproved clients.
Key-Words / Index Term
Encryption, Wu’s algorithms
References
[1] W. Stallings, “Cryptography and Network Security”,Fourth Edition, Prentice Hall, Vol. 16, 2005.
[2] Eberhart, R. C. "Chaos theory for the biomedical engineer" IEEE engineering in medicine and biology magazine: the quarterly magazine of the Engineering in Medicine & Biology Society,Vol. 8, Issue 3, pp. 41-45,1998.
[3] Lorenz, Edward N. "Deterministic non-periodic flow". Journal of the Atmospheric Sciences Vol.20 Issue.2, pp.130-141,1963.
[4] Zouhozr Ben Jemaa, Safya Belghzth "Correlation properties of binary sequences generated by the logistic map-application to DSCDMA." Proceedings of IEEE International Conference on Systems, Man and Cybernetics, Hammamet, Tunisia. pp. 447-451,2002
[5] Jin-mei Liu, Qiang Qu, "Cryptanalysis of a substitution-diffusion based image cipher using chaotic standard and logistic map" Proceedings of Third International Symposium on Information Processing, pp. 67-69,2010
[6] M. Salleh, S. Ibrahim, I. F. Isnin, "Enhanced chaotic image encryption algorithm based on Baker`s map." Proceedings of IEEE Conference on Circuits and Systems, Vol.2, pp. 508-511,2002
[7] K. Wang, W. Pei, L. Zou, A. Song, Z. He, "On the security of 3D Cat map based symmetric image encryption scheme," Physics Letters A, Vol. 343, pp. 432-439,2005
[8] Vinodh P Vijayan, Deepti John, Merina Thomas, Neetha V Maliackal, Sara Sangeetha Varghese “Multi Agent Path Planning Approach to Dynamic Free Flight Environment”, International Journal of Recent Trends in Engineering (IJRTE), pp.41-46,2009
[9] Juby Joseph, Vinodh P Vijayan” Misdirection Attack in WSN Due to Selfish Nodes; Detection and Suppression usingLonger Path Protocol” International Journal of Advanced Research in Computer Science and Software Engineering, Vol 4, Issue 7, pp. 825-829,2014
[10] V P Vijayan, Biju Paul “Multi Objective Traffic Prediction Using Type-2 Fuzzy Logic and Ambient Intelligence”,IEEE International Conference on Advances in Computer Engineering, Published in IEEE Computer Society Proceedings, 2010
Citation
Simy Mary Kurian, Nimmymol Manuel, Neena Joseph, Neema George, "Improving Image Encryption and Decryption Using WU`s Algorithm," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.413-416, 2018.
A Comprehensive Review on Data Mining Techniques and Applications
Review Paper | Journal Paper
Vol.6 , Issue.1 , pp.417-420, Jan-2018
CrossRef-DOI: https://doi.org/10.26438/ijcse/v6i1.417420
Abstract
Data mining is the study of mining concealed, helpful patterns and information from data. It is a new technology that helps organizations to estimate future trends and actions, allowing them to make real-world, knowledge driven decisions. The current work discusses the data mining process and how it can help the decision makers to opt for better decisions. Practically, data mining is very productive for large sized organizations with enormous amount of data. It also aids to augment the net profit, as a consequence of right decisions taken during the exact time. This paper presents the different steps taken during the data mining process and how organizations can have better answer to the queries from huge datasets. It also presents a systematic review on data mining techniques and applications.
Key-Words / Index Term
Data Mining, Classification, Clustering, Association Rule, Neural Network
References
[1] J. Han, M. Kamber, and J. Pei, “Data Mining Concepts and Techniques”, Third edition The Morgan Kaufmann Series in Data Management Systems Morgan Kaufmann Publishers, July 2011.
[2] R.R Kabra, and R.S. Bichkar, “Performance Prediction of Engineering Students using Decision Tree”, International Journal of computer Applications, Vol.36, Issue.11, pp.8- 12, December 2011.
[3] B.M. Ramageri, “Data Mining Techniques and Applications”, Indian Journal of Computer Science and Engineering Vol.1 No.4, pp.301-305, 2010.
[4] M.H. Dunham, “Data Mining, Introductory and Advanced Topics”, Pearson Education, 2014.
[5] G. Parker, “Data Mining: Modules in emerging fields, CD- ROM”, Vol.7, 2004.
[6] K.E. DiCerbo, and K. Kidwai, “Detecting player goals from game log files,” in Poster presented at the Sixth International Conference on Educational Data Mining (Memphis, TN), 2013.
[7] M. Rafiuzzaman, “Forecasting Chaotic Stock Market Data using Time Series Data Mining”, International journal of computer application (0975-8887) Volume 101- Issue 10, September 2014.
[8] B. Xu, M. Recker, X. Qi, N. Flann, and L. Ye, “Clustering educational digital library usage data: a comparison of latent class analysis and k-means algorithms. J. Educ. Data Mining 5, pp.38–68, 2013.
[9] M. Venkatadri, and L.C. Reddy, “A comparative study on decision tree classification algorithm in data mining”, International Journal of Computer Applications in Engineering, Technology and Sciences, Vol.2, Issue.2, pp. 24-29, 2010.
Citation
A. Thakur, "A Comprehensive Review on Data Mining Techniques and Applications," International Journal of Computer Sciences and Engineering, Vol.6, Issue.1, pp.417-420, 2018.