Home|Journals|Articles by Year|Audio Abstracts
 

Research Article

EEO. 2020; 19(2): 2097-2104


Analysis Of Two Party Security Computation Using Optimal Pixel Expansion

Nirmala Deve P, Harish B, Shravan P, Dhineshvaran S.




Abstract

Network security could be a broad term that covers a mess of technologies, devices, and processes.In its simplest term, it's a collection of rules and configurations designed to safeguard the integrity, confidentiality, and accessibility of pc networks and knowledge mistreatment of each computer code and hardware technologies. Once businesses connect their systems and computers, one user's issues could have an effect on everybody on the network. Despite the various edges of mistreatment networks, networking raises a larger potential for security problems like knowledge loss, security breaches, malicious attacks, like hackingand viruses. Phishing could be a crime during which a target or targets square measure contacted by email, telephone, or text message by somebody sitting as a legitimate establishment to lure people into providing sensitive knowledge like in person diagnosable data, banking, and MasterCard details and passwords. tobeat this, the ideology of visual cryptographyisemployed.

Key words: Phishing,Visual cryptography, Image Processing.






Full-text options


Share this Article


Online Article Submission
• ejmanager.com




ejPort - eJManager.com
Refer & Earn
JournalList
About BiblioMed
License Information
Terms & Conditions
Privacy Policy
Contact Us

The articles in Bibliomed are open access articles licensed under Creative Commons Attribution 4.0 International License (CC BY), which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.