Analysis Of Two Party Security Computation Using Optimal Pixel Expansion

Authors

  • Nirmala Deve P
  • Harish B
  • Harish B
  • Shravan P
  • Dhineshvaran S

Keywords:

Phishing,Visual cryptography, Image Processing

Abstract

Network security could be a broad term that covers a mess of technologies, devices, and processes.In its simplest term, it's a collection of rules and configurations designed to safeguard the integrity, confidentiality, and accessibility of pc networks and knowledge mistreatment of each computer code and hardware technologies. Once businesses connect their systems and computers, one user's issues could have an effect on everybody on the network. Despite the various edges of mistreatment networks, networking raises a larger potential for security problems like knowledge loss, security breaches, malicious attacks, like hackingand viruses. Phishing could be a crime during which a target or targets square measure contacted by email, telephone, or text message by somebody sitting as a legitimate establishment to lure people into providing sensitiv knowledge like in person diagnosable data, banking, and MasterCard details and passwords. tobeat this, the ideology of visual cryptographyisemployed.

Downloads

Published

2023-12-20

How to Cite

Nirmala Deve P, Harish B, Harish B, Shravan P, & Dhineshvaran S. (2023). Analysis Of Two Party Security Computation Using Optimal Pixel Expansion. Elementary Education Online, 19(2), 2097–2104. Retrieved from https://ilkogretim-online.org/index.php/pub/article/view/6846

Issue

Section

Articles