• No results found

Secret Data

Hiding Secret Data Using Image Steganography

Hiding Secret Data Using Image Steganography

... requires data to be transmitted in a secure manner. Data transmission in public communication system is not secure because of interception and improper manipulation by ...Hiding Secret Data ...

6

An improved mechanism of secret data hiding in an image and enhanced security by minimized detection

An improved mechanism of secret data hiding in an image and enhanced security by minimized detection

... of data is embedded into an image the visual specifications of image such as colour and smoothness are ...the secret data so as not to be visible to users, and the changes applied in the image are ...

6

A Survey on Visual Cryptography for Secret Data
          Sharing

A Survey on Visual Cryptography for Secret Data Sharing

... the secret image in a single share, and that share should be the small as ...on secret data sharing found in the recently published peer reviewed ...

7

SECRET DATA SHARING THROUGH VIDEO USING DWT & LSB

SECRET DATA SHARING THROUGH VIDEO USING DWT & LSB

... hiding data into a carrying Video file. This data can be text, audio, image or a video ...high data security and it can accommodate large amount of secret ...based data insertion into a ...

8

Confidential Communication and Secret Data Storing by Embedding Files – Survey

Confidential Communication and Secret Data Storing by Embedding Files – Survey

... a secret data inside an audio file, such that the audio file won’t be ...the secret message is embedded using LSB method in the audio cover file and the stego audio file is ...the secret ...

7

Efficient Secret Data Sharing Using Multimedia Compression Paradigm

Efficient Secret Data Sharing Using Multimedia Compression Paradigm

... the data hiding key and have to manipulate data in encrypted domain and this video information is changed into decompressed ...containing secret data is very low even for large ...with ...

6

Deleting secret data with public verifiability

Deleting secret data with public verifiability

... plaintext data normally contain redundan- cies, the TPM can compress the data first before doing ...decrypt data as normal. This attack may be mitigated by always requiring the data ...

15

Enriching Secure Secret Data Deletion through Public Variability

Enriching Secure Secret Data Deletion through Public Variability

... the data increases at the user's end, they often outsource the task of data storage to the third ...or Data Repositories or may be small data storage ...every data storage service ...

8

A LITERATURE SURVEY ON  COST EFFICIENT RELIABLE AND SECRET DATA SHARING SCHEME

A LITERATURE SURVEY ON COST EFFICIENT RELIABLE AND SECRET DATA SHARING SCHEME

... In 2011 J. Yu et.al proposed this scheme in [8, 9].Forward-secure threshold signature combines the advantages of previous forward-secure signature and threshold signature, which not only make key exposure difficult but ...

6

Security Schemes for Sharing Secret Data and Key Distribution in Cloud Storage

Security Schemes for Sharing Secret Data and Key Distribution in Cloud Storage

... In this scheme, any t out of n shares may be used to recover the secret. The system relies on the idea that you can fit a unique polynomial of degree (t-1) to any set of t points that lie on the polynomial. It ...

6

Embedded Hiding and Extracting Secret Data in Compress Video File

Embedded Hiding and Extracting Secret Data in Compress Video File

... The secret message must not be changed in any way such as additional information being added, loss of information or changes to the Information after it has been ...If secret Information is changed during ...

5

Deleting  Secret  Data  with  Public  Verifiability

Deleting Secret Data with Public Verifiability

... decryption (Figure 4b) is about half of that in encryp- tion (Figure 4a). The latency of card communication remains the roughly same in both cases. For an input ciphertext file of 1 KB, the decryption takes about 2 ...

14

A Simultaneous Implementation of Message Encoding using LSB Stegnography & Image Compression using Lifting Scheme on FPGA

A Simultaneous Implementation of Message Encoding using LSB Stegnography & Image Compression using Lifting Scheme on FPGA

... communicating secret data in an appropriate multimedia carrier, ...hidden data, are the main factors that separate it from related techniques such as watermarking and ...secure data because ...

5

Image Data Authentication using Contrast Enhancement Scheme by RDH based Data Embedding Approach

Image Data Authentication using Contrast Enhancement Scheme by RDH based Data Embedding Approach

... the data is helping the technology user to be able to handle more data with the help of computers and other electronic ...The data that is available on internet is thus increasing the chance of being ...

7

A SURVEY AND COMPARISON OF STEGANOGRAPHY TECHNIQUES

A SURVEY AND COMPARISON OF STEGANOGRAPHY TECHNIQUES

... send secret message for their privacy. The secret data of message is known as embedded ...A secret-key is used to secure and control the hiding process so that any unauthorised person must not ...

6

Reversible Data Hiding Using Run Length Coding

Reversible Data Hiding Using Run Length Coding

... Reversible data hiding so normal RDH method is changed to most effective ...and secret key ...for secret key ensuring that ensure the security of our secret message that means that ...

5

A Robust Audio and Video Steganographic Scheme

A Robust Audio and Video Steganographic Scheme

... for secret data embedding in video file and Parity bit encoding algorithm is used to embed secret information in audio ...after secret data ...

5

Application of Capital Asset Pricing Model in Indian Stock Market

Application of Capital Asset Pricing Model in Indian Stock Market

... secure data communication. In such a manner image based data hiding is one of ...different data hiding techniques in ...different data hiding techniques. Data hiding in the image is art ...

6

A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model Vandana Yadav, Sanjay Kumar Sharma

A New Approach for Image Steganography Using Edge Detection Method for Hiding Text in Color Images Using HSI Color Model Vandana Yadav, Sanjay Kumar Sharma

... the data in images. The science and art of secret communication is by ...The secret communication is finished by encoding or embedding secret data in such a way such, to the point that ...

13

An Efficient Data Hiding Approach on Digital Color Image for Secret Communication

An Efficient Data Hiding Approach on Digital Color Image for Secret Communication

... efficient data hiding approach on digital color image for secret ...confidential data transfer, secret communication, copyright protection for digital media and military ...hiding ...

7

Show all 10000 documents...

Related subjects