Posts

Showing posts from May, 2020

Security Using Image Processing

Image
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Article: Security Using Image Processing Authors Jyotika Kapur and Akshay. J. Baregar, K.J. Somaiya College Of Engineering, India Abstract Using image stitching and image steganography security can be provided to any image which has to be sent over the network or transferred using any electronic mode. There is a message and a secret image that has to be sent. The secret image is divided into parts.The first phase is the Encrypting Phase, which deals with the process of converting the actual secret message into ciphertext using the AES algorithm. In the second phase which is the Embedding Phase, the cipher text is embedded into any part of the secret image that is to be sent. Third phase is the Hiding Phase, where steganography is performed on the output image of Embedding Phase and other parts of the image whe...

Call for Papers - International Journal of Managing Information Technology (IJMIT)

Image
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Call for Papers! Contact us: ijmitjournal@aircconline.com or ijmit@airccse.org Submission Link http://coneco2009.com/submissions/imagination/home.html

Use of Network Forensic Mechanisms to Formulate Network Security

Image
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Article: Use of Network Forensic Mechanisms to Formulate Network Security Authors Dhishan Dhammearatchi, Sri Lanka Institute of Information Technology Computing (Pvt) Ltd,  Sri Lanka Abstract Network Forensics is fairly a new area of research which would be used after an intrusion in various organizations ranging from small, mid-size private companies and government corporations to the defence secretariat of a country. At the point of an investigation valuable information may be mishandled which leads to difficulties in the examination and time wastage. Additionally the intruder could obliterate tracks such as intrusion entry, vulnerabilities used in an entry, destruction caused, and most importantly the identity of the intruder. The aim of this research was to map the correlation between network security...

Call for Papers - 8th International Conference of Managing Information Technology (CMIT 2020)

Image
8th International Conference of Managing Information Technology (CMIT 2020) June 27-28, 2020, Copenhagen, Denmark https://acsit2020.org/cmit/index.html Paper submission Link : https://acsit2020.org/submission/index.php Contact us: cmit@acsit2020.org

Call for Papers - International Journal of Managing Information Technology (IJMIT)

Image
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Call for Papers! Contact us: ijmitjournal@aircconline.com or ijmit@airccse.org Submission Link http://coneco2009.com/submissions/imagination/home.html

Call for Papers - International Journal of Managing Information Technology (IJMIT)

Image
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Call for Papers! Contact us:  ijmitjournal@aircconline.com  or  ijmit@airccse.org Submission Link http://coneco2009.com/submissions/imagination/home.html

Call for Papers - 8th International Conference of Managing Information Technology (CMIT 2020)

Image
8th International Conference of Managing Information Technology (CMIT 2020) June 27-28, 2020, Copenhagen, Denmark https://acsit2020.org/cmit/index.html Paper submission Link : https://acsit2020.org/submission/index.php Contact us: cmit@acsit2020.org

Submit your Research Articles - International Journal of Managing Information Technology (IJMIT)

Image
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Call for Papers! Contact us:  ijmitjournal@aircconline.com  or  ijmit@airccse.org Submission Link http://coneco2009.com/submissions/imagination/home.html

Call for Papers - 8th International Conference of Managing Information Technology (CMIT 2020)

Image
8th International Conference of Managing Information Technology (CMIT 2020) June 27-28, 2020, Copenhagen, Denmark https://acsit2020.org/cmit/index.html Submission Deadline : May 09, 2020 Paper submission Link : https://acsit2020.org/submission/index.php

Call for Papers - International Journal of Managing Information Technology (IJMIT)

Image
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Call for Papers! Contact us:  ijmitjournal@aircconline.com  or  ijmit@airccse.org Submission Link http://coneco2009.com/submissions/imagination/home.html

Most Viewed Articles for an year in Academia - IJMIT

Image
International Journal of Managing Information Technology (IJMIT) ISSN: 0975-5586 (Online); 0975-5926 (Print) http://airccse.org/journal/ijmit/ijmit.html Call for Papers! Academia Post: Most Viewed Articles for an year in Academia - IJMIT Link: https://www.academia.edu/41971937/Most_Viewed_Article_for_a_year_in_Academia_-International_Journal_of_Managing_Information_Technology_IJMIT_