Cryptographic Image Distribution
- Version
- Download 11
- File Size 400.63 KB
- File Count 1
- Create Date 5 January 2025
- Last Updated 5 January 2025
Cryptographic Image Distribution
1 Mr P. Rajapandian, 2 A.Puvviyarasi, 3 R.Thirshalakshmi
1Associate Professor, Department of Computer Applications, Sri Manakula Vinayagar Engineering college (Autonomous), Puducherry 605008, India.
2Post Graduate Student, Department of Computer Applications, Sri Manakula Vinayagar Engineering college (Autonomous), Puducherry 605008, India.
3Post Graduate Student, Department of Computer Applications, Sri Manakula Vinayagar Engineering college (Autonomous), Puducherry 605008, India.
*Corresponding author’s email address: puvviyarasi@gmail.com
Abstract- Cryptographic Image Distribution (CID) scheme, which integrates the Cellular Automata algorithm to address potential security vulnerabilities in existing fractal sharing matrices, presents a comprehensive and innovative approach to enhancing the security of confidential information distribution. The Cellular Automata algorithm introduces a dynamic and rule-based computational paradigm, adding an extra layer of complexity and unpredictability to the fortification of secret data before distribution. This strategy not only provides robust protection against unauthorized access but also contributes to the adaptability and resilience of the scheme in the face of evolving cyber threats. The incorporation of Cellular Automata not only enhances security but also introduces a versatile cryptographic technique that can be tailored to specific requirements and threat landscapes. Cybersecurity is a domain focused on protecting systems, networks, and data from cyber threats, unauthorized access, and other digital risks. It involves a range of practices, technologies, and processes designed to safeguard digital assets, maintain data integrity, and ensure secure communications. It Protects computer networks from intruders, including both targeted attackers and opportunistic malware attackes. The simplification of the authentication process is a noteworthy aspect of the proposed scheme, making it user-friendly.
Keywords: Cryptographic Image Distribution, cryptographic technique, Cellular Automata encryption.