What is it about?
Every image consisting of signature or information. Which will differ from user to user this will be used as data for encoding and can be used in different application based on wireless network. This will provide security to wireless network or will provide authentication criteria for the information to process.
Featured Image
Why is it important?
There is not available any application or encoding based on image as addressing mechanism.
Perspectives
The work performed in this paper considers the data obtain with the similarity of image and observed the address generated is different. So this address is used as data of information for authenticity of user of device or wireless network.
Sagar Shriram Salwe
Defence Institute of Advanced Technology
Read the Original
This page is a summary of: Wireless Network Security Based on the Image Address Masking (IAM) Mechanism, Wireless Personal Communications, May 2018, Springer Science + Business Media,
DOI: 10.1007/s11277-018-5664-y.
You can read the full text:
Contributors
The following have contributed to this page







