What is it about?

Every image consisting of signature or information. Which will differ from user to user this will be used as data for encoding and can be used in different application based on wireless network. This will provide security to wireless network or will provide authentication criteria for the information to process.

Featured Image

Why is it important?

There is not available any application or encoding based on image as addressing mechanism.

Perspectives

The work performed in this paper considers the data obtain with the similarity of image and observed the address generated is different. So this address is used as data of information for authenticity of user of device or wireless network.

Sagar Shriram Salwe
Defence Institute of Advanced Technology

Read the Original

This page is a summary of: Wireless Network Security Based on the Image Address Masking (IAM) Mechanism, Wireless Personal Communications, May 2018, Springer Science + Business Media,
DOI: 10.1007/s11277-018-5664-y.
You can read the full text:

Read

Contributors

The following have contributed to this page