{"title":"SITF:一种使用分形的安全图像传输算法","authors":"Sneh Lata Aswal, A. Negi, A. Saxena","doi":"10.1109/ComPE53109.2021.9752105","DOIUrl":null,"url":null,"abstract":"Unless a powerful algorithm protects data transmitted over a wireless network, it is public. It is still vulnerable to attacks despite several solutions. The paper provides a robust M-encrypt technique for securing a wireless network. M-encrypt is the best option photos sending images over a wireless network. The image is partitioned into four sections in the first step of the method. Using L-Fractal, the proposed approach encrypts each of the four sections separately. The segments are then encrypted and transformed into linear arrays before being sent across the network. To test SITF, an IEEE 802.11g and 802.16 simulation was done. Kali Linux and hacking software running on the Redmi Note 7 were used to test the susceptibility to attacks. There was no evidence of vulnerability to the attacks in the packets. Four parameters were used to assess the quality of the encrypted images. The results show that the image quality transmitted is excellent. Finally, we calculated the encryption, decryption, and overall packet transmission times on Wi-Fi and Wi-Max networks.","PeriodicalId":211704,"journal":{"name":"2021 International Conference on Computational Performance Evaluation (ComPE)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"SITF: an algorithm for secured image transmission using Fractals\",\"authors\":\"Sneh Lata Aswal, A. Negi, A. Saxena\",\"doi\":\"10.1109/ComPE53109.2021.9752105\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Unless a powerful algorithm protects data transmitted over a wireless network, it is public. It is still vulnerable to attacks despite several solutions. The paper provides a robust M-encrypt technique for securing a wireless network. M-encrypt is the best option photos sending images over a wireless network. The image is partitioned into four sections in the first step of the method. Using L-Fractal, the proposed approach encrypts each of the four sections separately. The segments are then encrypted and transformed into linear arrays before being sent across the network. To test SITF, an IEEE 802.11g and 802.16 simulation was done. Kali Linux and hacking software running on the Redmi Note 7 were used to test the susceptibility to attacks. There was no evidence of vulnerability to the attacks in the packets. Four parameters were used to assess the quality of the encrypted images. The results show that the image quality transmitted is excellent. Finally, we calculated the encryption, decryption, and overall packet transmission times on Wi-Fi and Wi-Max networks.\",\"PeriodicalId\":211704,\"journal\":{\"name\":\"2021 International Conference on Computational Performance Evaluation (ComPE)\",\"volume\":\"17 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2021-12-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2021 International Conference on Computational Performance Evaluation (ComPE)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ComPE53109.2021.9752105\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference on Computational Performance Evaluation (ComPE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ComPE53109.2021.9752105","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
SITF: an algorithm for secured image transmission using Fractals
Unless a powerful algorithm protects data transmitted over a wireless network, it is public. It is still vulnerable to attacks despite several solutions. The paper provides a robust M-encrypt technique for securing a wireless network. M-encrypt is the best option photos sending images over a wireless network. The image is partitioned into four sections in the first step of the method. Using L-Fractal, the proposed approach encrypts each of the four sections separately. The segments are then encrypted and transformed into linear arrays before being sent across the network. To test SITF, an IEEE 802.11g and 802.16 simulation was done. Kali Linux and hacking software running on the Redmi Note 7 were used to test the susceptibility to attacks. There was no evidence of vulnerability to the attacks in the packets. Four parameters were used to assess the quality of the encrypted images. The results show that the image quality transmitted is excellent. Finally, we calculated the encryption, decryption, and overall packet transmission times on Wi-Fi and Wi-Max networks.