Upload Code
loading-left
loading loading loading
loading-right

Loading

Profile
No self-introduction
codes (5)
NOVEL DATA HIDING
no vote
There are also a number of works on data hiding in the encrypted domain. The reversible data hiding in encrypted image is investigated in. Most of the work on reversible data hiding focuses on the data embedding/extracting on the plain spatial domain. A content owner encrypts the original image using an encryption key, and a data-hider can embed additional data into the encrypted image using a data-hiding key though he does not know the original content. With an encrypted image containing additional data, a receiver may first decrypt it according to the encryption key, and then extract the embedded data and recover the original image according to the data-hiding key. In a novel scheme for separable reversible data hiding in encrypted image. In the proposed scheme, the original image is encrypted using an encryption key and the additional data are embedded into the encrypted image using a data-hiding key.If
Nithyan
2016-08-23
0
1
routing misbehavior in MANETs
no vote
We study routing misbehavior in MANETs (Mobile Ad Hoc Networks) in this paper. In general, routing protocols for MANETs are designed based on the assumption that all participating nodes are fully cooperative. However, due to the open structure and scarcely available battery-based energy, node misbehaviors may exist. One such routing misbehavior is that some selfish nodes will participate in the route discovery and maintenance processes but refuse to forward data packets. In this paper, we propose the 2ACK scheme that serves as an add-on technique for routing schemes to detect routing misbehavior and to mitigate their adverse effect. The main idea of the 2ACK scheme is to send two-hop acknowledgment packets in the opposite direction of the routing path. In order to reduce additional routing overhead, only a fraction of the received data packets are acknowledged in the 2ACK scheme. Analytical and simulation results are prese
Nithyan
2016-08-23
0
1
Engineering Physics Question Bank
no vote
Engineering Physics Question Bank. Important questions with answers. its contain with anna university syllabus 2013
Nithyan
2016-08-23
0
1
AODV in NS2
no vote
Adhoc on demand distance vector routing protocol is implemented in NS2.35 with all features it will used for all kind of research
Nithyan
2016-08-23
0
1
Dot net Project source Code
4.0
This call is required by the ASP.NET Web Form Designer. This project Source Code and  Database with this.
Nithyan
2016-08-23
1
1
No more~