Cyber Security in Power Systems Using
Cyber Security in Power Systems Using
confidentiality, integrity, availability, these three main features which prevent from
unauthorized any other third person.
Confidentiality basically if we send the data from one person to another person then
only authorized person can access & integrity if we transfer the information from one
to another then no one can change.
The availability of the resources should be available 24/7 hour or data should be
plain text is Decryption and both methods called as a Cryptology. These processes
depend on two types of keys which is public key & private key
Introduction
In today's generation, data security Most crucial factor which
can achieve by information security system. It protects from
unauthorized third person. In this information system, there are
main two process help to communicate from one person to
another person whit security.
In earlier before we don't have any security system to protect the
video files without affecting its original perception and also not giving any hint to
the intruder.
The objectives are three fold.
secret message and then hiding the encrypted secret message in the image.
The integration of cryptography and steganography provides an additional layer of
security that ensures that the message is delivered securely and reliably to the
intended recipient.
Proposed system
For embedding the secret data for the generation of the best pixels,
Hybrid Neural network technique is used and for classifying the suitable regions in
decomposition technique with the machine learning methods for the enhancement of
the security rate in the realistic applications.
Parameters like PSNR, MSE and entropy are used to check the effective results
After the image has been obtained, different methods of processing can be put
into the image to carry out the many vision tasks be in need of today.
If the data has not been obtained satisfactory, then the awful tasks may not be
from the real image for the purpose of video sequences processing become
simple.
it is also known as foreground extraction and used for detecting the moving
and the input image represented by I(x,y) and B(x,y) is used to represent for the
background image.
Module 4
IMAGE SEGMENTATION
similar properties, for example, a group having same color pixels or border and
a common shape such as a line, circle or ellipse or polygon.
Image segmentation further classified as edge detection, region-based
classification, thresholding, or any combination of these techniques.
Module 5
CLASSIFICATION
After the encryption part (segmentation module) the data is applied into block
chain with DBN algorithms to convert the entire files into ID.
The results with the DBN algorithm and convert the video into text file to save