Encryption VoIP based on Generated Biometric Key for RC4 Algorithm

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Email Encryption using RC4 Algorithm

In the communication age, in the daily life people constantly uses communication tools that are e-mail marketing, instant messaging, social networking, search engines, bookmarking systems, affiliate systems, print media and direct mail. These tools are used as an internet communication. However as a result of widespread of internet usage, security problems have become more important year by yea...

متن کامل

Biometric Cryptosystem for VoIP Security using RSA Key Generation

-This paper presents a narrative key generation scheme using biometric methodology for providing high security over the internet applications such as VoIP technology. The present work deals with modern computing systems security issues, focusing on biometric based asymmetric key generation process. The term VoIP refers-“voice over internet protocol (IP)” in which the “voice” to be transmitted u...

متن کامل

Evaluation of the RC4 Algorithm for Data Encryption

Analysis of the effect of different parameters of the RC4 encryption algorithm where examined. Some experimental work was performed to illustrate the performance of this algorithm based on changing some of these parameters. The execution time as a function of the encryption key length and the file size was examined; this has been stated as complexity and security. Various data types were analyz...

متن کامل

RC4 Enrichment Algorithm Approach for Selective Image Encryption

This paper is introduces RC4 Enrichment Algorithm Approach for selective image encryption. This approach is derived from the standard RC4 algorithm. RC4 algorithm is already used for image encryption and also for the selective image encryption. Currently RC4 is vulnerable. Lots of cryptanalytic found the lots of weakness, vulnerable point and attacks inside the RC4 algorithm. So in this concern...

متن کامل

A stack-based chaotic algorithm for encryption of colored images

In this paper, a new method is presented for encryption of colored images. This method is based on using stack data structure and chaos which make the image encryption algorithm more efficient and robust. In the proposed algorithm, a series of data whose range is between 0 and 3 is generated using chaotic logistic system. Then, the original image is divided into four subimages, and these four i...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Engineering and Technology Journal

سال: 2021

ISSN: 2412-0758,1681-6900

DOI: 10.30684/etj.v39i1b.1755