Joint Task Migration and Power Management in Wireless Computing
Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 8)Publication Date: 2016-08-05
Authors : Dayanand G Savakar; Anand S Ghuli;
Page : 1548-1550
Keywords : Network; Task; Security; Multi-tasking; Wireless computing;
Abstract
An application is to secure the all files from different users. It is concerned with encrypting the information in most secure and robust manner. It also includes the algorithm that convert the given text data into different form. This project also includes the good key generation that secure the given file from malicious users. This project allows the users to encrypt there important files from various other users. It gives immense security from the harmful users. File Encryption includes Audio Encryption, Video Encryption, Image Encryption and Text File Encryption. Information Hiding of this project includes Watermarking And Steganography to hide the information in the image. Watermarking include key generation to secure the text from other users. Steganography includes the mechanism to convert the data into another based on some Algorithm.
Other Latest Articles
- A Multimodel Rehabilitation Program for a Patient with Relapsing Remitting Multiple Sclerosis: A Case Report
- Analysis of Cracks Starting from a Square Hole in a Rectangular Plate
- An Electronic Improvisation Embedded Technology in Automobiles for Run-of-Roads
- Estimation of the Height of an Individual to the Forearm Length
- Growth and Physiology of in Vitro Planted Seedlings of Flax (Linum usitatissimum) Under Aluminum Stress
Last modified: 2021-07-01 14:42:41