ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Joint Task Migration and Power Management in Wireless Computing

Journal: International Journal of Science and Research (IJSR) (Vol.5, No. 8)

Publication Date:

Authors : ; ;

Page : 1548-1550

Keywords : Network; Task; Security; Multi-tasking; Wireless computing;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

An application is to secure the all files from different users. It is concerned with encrypting the information in most secure and robust manner. It also includes the algorithm that convert the given text data into different form. This project also includes the good key generation that secure the given file from malicious users. This project allows the users to encrypt there important files from various other users. It gives immense security from the harmful users. File Encryption includes Audio Encryption, Video Encryption, Image Encryption and Text File Encryption. Information Hiding of this project includes Watermarking And Steganography to hide the information in the image. Watermarking include key generation to secure the text from other users. Steganography includes the mechanism to convert the data into another based on some Algorithm.

Last modified: 2021-07-01 14:42:41