Research Article

A Model of E-Correspondence with Error Correction

by  Abhishek Shukla, Meenu Sahni, Deo Brat Ojha
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 12 - Issue 10
Published: January 2011
Authors: Abhishek Shukla, Meenu Sahni, Deo Brat Ojha
10.5120/1719-2306
PDF

Abhishek Shukla, Meenu Sahni, Deo Brat Ojha . A Model of E-Correspondence with Error Correction. International Journal of Computer Applications. 12, 10 (January 2011), 25-28. DOI=10.5120/1719-2306

                        @article{ 10.5120/1719-2306,
                        author  = { Abhishek Shukla,Meenu Sahni,Deo Brat Ojha },
                        title   = { A Model of E-Correspondence with Error Correction },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 12 },
                        number  = { 10 },
                        pages   = { 25-28 },
                        doi     = { 10.5120/1719-2306 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A Abhishek Shukla
                        %A Meenu Sahni
                        %A Deo Brat Ojha
                        %T A Model of E-Correspondence with Error Correction%T 
                        %J International Journal of Computer Applications
                        %V 12
                        %N 10
                        %P 25-28
                        %R 10.5120/1719-2306
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we presented a model of e-correspondence with error correction for Internet communication. It is the model of a real-life secure e-correspondence system for any organization. In this model a sender can send a secret message even to a unacquainted person in an anonymous way. The users of this model are assumed to be may or may not be the members of a closed organization.

References
  • A. Menezes, M. Qu, and S. Vanstone, “Key agree-ment and the need for authentication,” in Proceed-ings of PKS’95, pp. 34-42, 1995.
  • M. Niimi, H. Noda and E. Kawaguchi :"An image embedding in image by a complexity based region segmentation method", Proceedings of International Conf. on Image Processing'97, Vol.3, pp.74-77, Santa Barbara, Oct., 1997.
  • E. Kawaguchi and R. O. Eason :"Principle and applications of BPCS- Steganography", Proceedings of SPIE: Multimeda Systems and Applications, Vol.3528, pp.464-463, 1998.
  • L. Law, A. Menezes, M. Qu, J. Solinas, and S. Van- stone, An Efficient Protocol for Authenticated Key Agreement, Technical Report CORR98-05, Department of CO,University of Waterloo, 1998.
  • E. Kawaguchi,et al: “A concept of digital picture envelope for Internet communication”in Information modeling and knowledge bases X,IOS Press, pp.343-349, 1999.
  • Stefan Katzenbeisser and Fabien A.P. Petitcolas (eds) :“Information hiding techniques for steganography and digital watermarking”, Artech House, 2000.
  • Neil F. Johnson, Zoran Duric and Sushil Jajodia :“Information Hiding”, Kluwer Academic Publishers, 2001.
  • K. H. Ko, D. H. Choi, M. S. Cho, and J. W. Lee, “New signature scheme using conjugacy problem.”(http://eprint.iacr.org/2002/168).
  • L. Law, A. Menezes, M. Qu, J. Solinas, and S. Van-stone, “An efficient protocol for authenticated key agreement,” Design, Codes and Cryptography, vol. 28, no. 2, pp. 119-134, 2003.
  • Eiji Kawaguchi, Hideki Noda, Michiharu Niimi and Richard O. Eason, A Model of Anonymous Covert Mailing System Using Steganographic Scheme, Information modelling and knowledge bases X,IOS Press, pp.81-85,2003.
  • X.Yi, An Identity-Based Signature Scheme From the Weil Pairing,IEEE communications letters 7(2),76-78, 2003.
  • URL http://www.know.comp.kyutech.ac.jp/BPCSe/Dpenv-e/DPENVe- pro_ down. html.
  • X.Cheng, L.Guo, X.Wang,An Identity-based Mediated Signature Scheme from Bilinear Pairing, International Journal of Network Security,2(1):29-33, 2006. http://isrc.nchu.edu.tw/ijns.
  • Xiaofeng Wang, Liang Cao, Shangping Wang,Yaling Zhang, ID-Based Convertible Limited (Multi-)Verifier Signature Scheme,2008 International Conference on Computer Science and Software Engineering.774-777.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Steganography e-correspondence system Bilinear pairing Error Correction Code

Powered by PhDFocusTM