In this article, the efficient image compression which consists of Burrows–Wheeler transform (BWT) with set partitioning in hierarchical trees (SPIHT). The main phases of the proposed system are: partitioning, compression of non‐ROI areas, Fusion and compression of ROI areas. To enhance the propose of the proposed methodology, the morphological functions are updated by dividing two types of images with the consideration of dilation and erosion control. After that, the convolution and correlation in the deformation provide good accuracy of the segmentation at the fastest speed. In this proposed methodology, SPIHT encryption is a lossy compression technique aimed at understanding the non‐ROI area, while the BWT is a lossless compression technique performed to achieve a summary of the ROI area. Finally, separating these two parts of the image merges the image and reconstructs it to the desired quality. The test sends a variety of images and analyzes the performance of the proposed system using compression ratio and PSNR measurements.
-Cryptography gets an essential role for secure the information's. In Every second, Enormous data is swap over through the communication channel, at this level the information security is required to digital data transaction. Without using the cryptography technique, the data sharing is inadequate. However, crypto method is extremely essential rather than the transaction speed. Even data as encrypted format, that data may steal in-between the communication. The embezzle technique has been threatening in mounting technology world. Security needs unbreakable cryptography mechanism better than the convention. Genetic algorithm is the powerful impartial optimization method and helps to encrypt the information in elegant way, which has some properties like selection, crossover, and mutation. The novel encryption method called image en-cipherment using genetic algorithm (IEGA). Which provides data security and it is propagated by the combination of cryptography and genetic algorithm. The images are encrypted and decrypted using IEGA method and results were compared in this paper by using some existing methods. The quality metrics such as SNR, PSNR, and MSE is used to justify the quality of our proposed IEGA methodology. Keyword -Cryptography, Genetic Algorithm, Security, Cross-over, Mutation I. INTRODUCTION A. CryptographyCryptography is the cram of information hiding and substantiation. It consist the algorithms, strategies and protocols to secure prevent or impediment unauthorized access to perceptive information and enable the verifiability of each component in a communication. Secret value is in cryptography, which can be identified as key. In addition to an algorithm which has a key that is difficult to maintain devising new fangled algorithm .which can be agree to reversible scramble of information. Cryptography is classified into two types such as Secret Key and Public Key. Secret key algorithms are used mainly for the core encryption of data. Huge number of probable keys and tremendously fast is to be in these algorithms. The vital symmetric key algorithm offer admirable secrecy. Already the information is encrypted with specified key there is no prompt way to decrypt the data without possessing the identical key. Mutually the dispatcher and the intentional receiver have to agree upon the key earlier than any communication begins [3] .Symmetric key algorithm could be divided into two phases: Stream and Block. Block algorithm are encrypt the data as distinct block at a time, whereas stream algorithm encrypt byte by byte or even bit by bit. Generally, encryption is a one of the methods to provide high security, which is well known that image encryption has extensively applications in internet communication, telemedicine, multimedia system etc [2].An efficient well-built and consistent encryption scheme is mandatory for surmount a secure communication of secret data over the network [6]. B. Genetic algorithm BasicsThe genetic algorithm is a method for resolve the both constraint and unconstraint optimiza...
Biometric authentication is one of the highly secured and feasible techniques in many applications .it requires Physiological evidences as input and with behavioral references. The authentication has done by matching the submitted evidences along with physical current input. Today Aadhar is a widely using biometric database allows India for bank transaction card to avail the PDS services etc. The present system can be efficiently used when IoT is implemented on it. The present system requires photographs, fingerprint or Aadhar number for personal verification .It is a partial automated technique, which requires human support. However, in real time certain applications like surveillance search of personalized information in a group which requires automated authentication process. This paper is focus on to implement the IoT supported Aadhar biometric authentication for real time application.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.