A Novel Approach to Communicate Secret Message between Users Using Sponge Function Technique on NTRU
نویسندگان
چکیده
منابع مشابه
iranian english learners’ perception and personality: a dual approach to investigating influential factors on willingness to communicate
abstract previous studies on willingness to communicate (wtc) have shown the influence of many individual or situational factors on students’ tendency to engage in classroom communication, in which wtc has been viewed either at the trait-level or situational level. however, due to the complexity of the notion of willingness to communicate, the present study suggests that these two strands are ...
Authentication and Secret Message Transmission Technique Using Discrete Fourier Transformation
In this paper a novel technique, Authentication and Secret Message Transmission using Discrete Fourier Transformation (ASMTDFT) has been proposed to authenticate an image and also some secret message or image can be transmitted over the network. Instead of direct embedding a message or image within the source image, choosing a window of size 2 x 2 of the source image in sliding window manner an...
متن کاملon the relationship between self- regulated learning strategies use and willingness to communicate in the context of writing
این تحقیق به منظور بررسی رابطه بین میزان استراتژیهای خود-تنظیم شده یادگیری و تمایل به ایجاد ارتباط دانشجویان زبان انگلیسی انجام شده است.علاوه بر این،روابط و کنش های موجود بین ریزسنجه های استراتژیهای خود-تنظیم شده یادگُیری ، مهارت نگارش و تمایل به برقراری ارتباط و همچنین تاٍثیرجنسیت دانشجویان زبان انگلیسی در استراتژیهای خود-تنظیم شده یادگیری و تمایل به برقراری ارتباط آنها مورد بررسی قرار گرفته شد.
15 صفحه اولA Novel Technique for Secret Message / Image Transmission through (2, 2)Visual Cryptographic Protocol (SMITVCP)
In this paper a secret message/image transmission technique has been proposed through (2, 2) visual cryptographic share which is non-interpretable in general. A binary image is taken as cover image and authenticating message/image has been fabricated into it through a hash function where two bits in each pixel within four bits from LSB of the pixel is embedded and as a result it converts the bi...
متن کاملSecured Image Transmission Using a Novel Neural Network Approach and Secret Image Sharing Technique
In this paper we have combined both cryptography and steganography techniques. This provides the higher level of secure system in which the secret information can be transferred over any unsecured communication channel and to overcome the threat of intrusion. The presented work aims at secure image transmission where a random encryption algorithm is used to encrypt different shares of stego ima...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Science and Engineering
سال: 2013
ISSN: 2086-5023,2302-5743
DOI: 10.12777/ijse.4.2.2013.44-51