ARCHIVE

Implementation of NVSS Scheme In Encryption And Decryption System

Authors : Prof. Swati B.Patil, Miss .Pranali  W. Walde,Miss.Prajakta S. Khobragade Abstract – The main aim of this paper is to reduce the transmission risk problem during sharing an image in a network. In ancient time period most of the users use CVSS scheme.But thisscheme arouse suspicion and increase interception riskduring transmission of the shares. […]

READ MORE

Review on Privacy Preserving in VANET

Authors :Bhagyashree Vaze , Miss Ranjana Shende, Mrs.Vaishali Sahare Abstract–Due to increase in traffic it is very necessary to enhance the efficiency and safety of road traffic. Vehicular ad-hoc networks which are created by applying the principles of mobile ad hoc networks (MANETs),whichallow vehicles to broadcast ad hoc messages to other vehicles and remind drivers […]

READ MORE

Review Paper On Cryptoleq : Performance and Security

Authors : Miss Meenal P.Talekar, Mr. Ravindra Kale Abstract – The rapid expansion and increased popularity of cloud computing comes with no shortage of privacy communication mainly depends upon digital data communication. Cryptoleq: an abstract machine based on the concept of one instruction set computer, and  performing general-purpose computation on encrypted programs. The addition on […]

READ MORE

Securing Data with Steganography Techniques

Authors : Kedar Jawarkar , Lalit Patil , Riya Patel , Farha Naz DOI : 10.46335/IJIES.2025.10.6.10  Abstract – Image steganography, or data hiding in photographs, is used to conceal private or sensitive information within digital images. The data is embedded into the image’s pixels so that the image appears normal to the human eyes. Hidden […]

READ MORE