Information security using chains matrix multiplication

1Citations
Citations of this article
1Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Information technology is facing lots of problems, while transmitting sensitive data and confidential data due to rapid growth of technology. The sensitive data is intended to share between only authorized persons, not for all. Information security concentrates on sensitive knowledge pattern that can be exposed when extracting the data. Therefore, researchers, for a long time period, have been investigating paths to improve privacy for sensitive data in information security analysis task process. So, many techniques have been introduced on privacy preserving issues in information security by using cryptography, steganography and their combination. In this paper we proposed an effective and efficient approach based on cryptography and Chains Matrix Multiplication (CMM) steganography uses optimal substructure property for generating random key to hide the data. It has to be improved privacy of sensitive data in information security analysis. © 2012 Springer-Verlag GmbH.

Cite

CITATION STYLE

APA

Rupa, C., & Avadhani, P. S. (2012). Information security using chains matrix multiplication. In Advances in Intelligent and Soft Computing (Vol. 167 AISC, pp. 703–712). https://doi.org/10.1007/978-3-642-30111-7_67

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free