• No results found

Secure Data Transmission by Combining Genetic Algorithm and Steganography Techniques with Visual Cryptography Technique

N/A
N/A
Protected

Academic year: 2020

Share "Secure Data Transmission by Combining Genetic Algorithm and Steganography Techniques with Visual Cryptography Technique"

Copied!
5
0
0

Loading.... (view fulltext now)

Full text

Loading

Figure

Figure 1: Two Point Crossover
Figure 2: Visual Cryptography Technique
Figure 3: Advanced Encryption Technique

References

Related documents

rapid membrane signaling pathway including extracellular signal-regulated protein kinases 1 (ERK1), osteopontin (OPG), alkaline phosphatase (ALP), and matrix metallopeptidase 13

The proposed E-LHEFT algorithm satisfies the QoS requirements in terms of minimizing the overall application completion time by 5.7%, significantly maintains the

In der vorliegenden einfachverblindeten Studie wurde die Veränderung der sensorischen Parameter (Kälte- und Wärmeempfindungsschwelle, Kalt- und

As we have discussed in this report that there are various techniques available for Automatic Speech recognition (ASR) namely: Vector quantization, Neural Networks, Dynamic

The experimental results show that the ensem- ble classifier can achieve higher recognition accuracy than the knowledge-based classifiers, and our pro- posed ensemble learning

The mean amplitude of the pulse-synchronous oscillations increased with the absolute level of the intramuscular pressure (IMP) when the model of abnormally elevated IMP

[2, 4]. TB is prevalent and a serious national health problem in Pakistan. The smear microscopy is rapid and an inexpensive method. However, it lacks sensitivity and

Renal tubular epithelial cell injury and oxidative stress induce calcium oxalate crystal formation in mouse kidney. International journal of