This article is concerned with a pair of second-order symmetric duals in the context of non-differentiable multiobjective fractional programming problems. We establish the weak and strong duality theorems for the new pair of dual models. Discussion on some special cases shows that results in this paper extend previous work in this area.
Abstract-In this paper, we proposed a new scheme to enhance the security of data Encryption scheme. With cascading of data encryption standard in three times, we become able to counter the famous meet in middle attack in double and triple data encryption standard. We show how the random key stream can be used to create lifetime supply of keys for one time pads. Here we provided the practical approach that we can use to set up our own one-time pad encryption. For simplicity let's study how randomized key can be achieved. Random key generation can simply be obtained via use of permutation. Permutation technique can be used in conjunction with other technique includes substitution, encryption function etc. for effective performance. The goal of this article to show how the one-time pad encryption technique can be achieved by the suitable combination of these techniques.
In present epoch, secure online access to enterprises resources is very important for any organization. To protect valuable data become one of the big challenge for today's business as enterprise customers or clients involved in business-to-customer (B2C) and business-to-business (B2B) e-commerce need to feel that their transactions are secured from system hackers. Biometric technology provides a solution to this problem in enterprise network security. In this article we enhance the security of online transaction using secure and unique biometric template. The uniqueness of our process is that we store biometric template and password together in encrypted form both without the fusion of score level and decision level, which leads a successful way to combine multiple technologies, different from earlier methods. Password hardened biometric system helps to generate many different secure biometric templates for the same biometric system. It also generates unique biometric templates for multiple biometric systems from the same biometric trait
Today's era of communication is too much important. An effective communication requires major factors like: Authentication, Confidentiality, Integrity, etc. In this current paper, we introduce a complete security that provides by the combination of stegnographic approach and cryptographic scheme-EHDES (Enhanced Data Encryption Standard). Stagnographic approach facilitates data hiding and EHDES encrypts the data to be transmitted. A lossless compression provides us integrity. Fuzzy error correction provides error less message over noisy channel.
In this paper, we present an efficient and authentic transmission scheme without digital signature on an algebraic coding theory based public key cryptosystem of medical information like Image, Audio, Video etc. via the combination of stegnographic and cryptographic approach. Stegnographic approach facilitates data hiding, McEliece public-key cryptosystem to encrypts the data,.lossless compression provides us integrity and Fuzzy error correction provides error less message over noisy channel.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.