ENCRYPTION METHOD USING PASCAL’S TRIANGLE BASED SUBSTITUTION AND SIERPINSKI TRIANGLE BASED PERMUTATION
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2016, Vol 15, Issue 13
Abstract
Text messages are often created, shared and a person sends at least ten messages a day. Because of its frequent usage those messages are not been encrypted. Thus it is unable to send confidential messages via SMS service. In this paper, we develop a new encryption technique using the notions of Pascals Triangle and Sierpinski Triangle. The proposed method uses the Pascals triangle for substitution and Sierpinski triangle for permutation. The method is simple and easy to implement in real time. It is difficult for the attackers to predict the original message contained in the ciphertext. The proposed method is not much vulnerable to brute force and letter frequency attacks.
Authors and Affiliations
Sivakumar T, Pauvithraa K. T, Durga Devi V
Identifying Network Anomalies Using Clustering Technique in Weblog Data
In this paper we present an approach for identifying networkanomalies by visualizing network flow data which is stored inweblogs. Various clustering techniques can be used to identifydifferent anomalies in the network. H...
ENHANCED CBIR MECHANISM USING STEERABLE PYRAMID AND MEDIAN VECTOR ALGORITHM
Recently, digital content has become a significant and inevitable asset of or any enterprise and the need for visual content management is on the rise as well. Content-based image retrieval has attracted voluminous resea...
MVICS: a Repository and Search Tool towards Holistic Semantic-Based Precise Component Selection
Driven by the continuous expansions of software applications and the increases in component varieties and sizes, the so-called component mismatch problem has become a more severe hurdle for component selection and integr...
Automated Blood Cells Extraction and counting
Automated blood cells extraction and counting in medical images is an important and sometimes necessary procedure in medical diagnostics and treatment. In this paper an automated blood cells extraction and counting metho...
3-D from 2-D Using Warping Transformations .
Shown in this paper are methods on how to find the third dimension of a single image or from the two views of the image taking in a different angle using the method more accurate and faster to get to the third dimension...