• No results found

Steganography and Cryptography

A Novel Approach for Audiography - A Combination of Audio Steganography and Cryptography

A Novel Approach for Audiography - A Combination of Audio Steganography and Cryptography

... Steganography is not the same as cryptography data hiding techniques have been widely used to transmission of hiding secret message for long time. Ensuring data security is a big challenge for computer ...

6

Securing Text Message Using Audio Steganography And Cryptography

Securing Text Message Using Audio Steganography And Cryptography

... is Steganography and Cryptography. Steganography hides secret information into a cover medium and Cryptography convert data into an unrecognizable ...audio steganography and audio ...

7

The Combination of Steganography and Cryptography for Medical Image Applications

The Combination of Steganography and Cryptography for Medical Image Applications

... namely steganography form and cryptography module from the input image random chosen of image or text from the proposed system and then by using image conversion means MRI image has been converted into ...

5

Review Paper on Image Steganography and Security Using Cryptography

Review Paper on Image Steganography and Security Using Cryptography

... Domenico Bloisi and Luca Iocchi works on image based steganography and cryptography. They used LSB algorithm for steganography And DES algorithm for encryption and decryption. DES is a symmetric key ...

6

Message Hiding using Steganography and Cryptography

Message Hiding using Steganography and Cryptography

... hiding steganography and ...Image Steganography and AES encryption Technique. LSB based image Steganography is a good method of embedding sensitive information behind some cover media Text, Image, ...

6

Steganography using Cryptography and Pseudo Random Numbers

Steganography using Cryptography and Pseudo Random Numbers

... use Steganography or cryptography. Cryptography scrambles the message so that is it unrecognizable and without proper key the Encrypted message is ...of steganography messages can be passed ...

6

Image Steganography combined with Cryptography

Image Steganography combined with Cryptography

... In this paper, we proposed the combination of Image Steganography and cryptography has been achieved by using the LSB technique and AES algorithm. LSB technique is used to hide the secret data into an image ...

9

Title: Understanding Steganography over Cryptography and Various Steganography Techniques

Title: Understanding Steganography over Cryptography and Various Steganography Techniques

... of steganography and ...of steganography methods and techniques and how steganography ...that steganography is more secure medium than ...In steganography the transmitting medium is any ...

6

Securing Text Message Using Audio Steganography and Cryptography

Securing Text Message Using Audio Steganography and Cryptography

... is Steganography and Cryptography. Steganography hides secret information into a cover medium and Cryptography convert data into an unrecognizable ...audio steganography and audio ...

7

Security for Digital Data using Combination of Audio Steganography and Cryptography

Security for Digital Data using Combination of Audio Steganography and Cryptography

... It can be concluded from this paper that there are many encryption techniques available currently to secure the data. Latest advancements in technology and new concepts like quantum cryptography have added a ...

7

Data Migration Using Steganography and Cryptography in Public Cloud

Data Migration Using Steganography and Cryptography in Public Cloud

... improved steganography approach to hide the messages into image files which is Adaptive LSB Method for color images with higher imperceptibility/quality, large capacity/payload and better in robustness/resistance ...

5

Integration of Steganography and Visual Cryptography for Authenticity

Integration of Steganography and Visual Cryptography for Authenticity

... Visual Cryptography (VC) is a method of encrypting a secret image into shares such that stacking a sufficient number of shares reveals the secret ...improved Steganography and visual cryptography is ...

5

Skin Detection Based Cryptography in Steganography(SDBCS)

Skin Detection Based Cryptography in Steganography(SDBCS)

... of steganography often are used in conjunction with cryptography so that the information is doubly protected; first it is encrypted and then hidden so that an adversary has to first find the information (an ...

5

Transaction Security Using Steganography and Visual Cryptography

Transaction Security Using Steganography and Visual Cryptography

... banking. Steganography is the art of hiding of a message within another so that hidden message is ...behind steganography is that message to be transmitted is not detectable to casual ...in ...

5

Multiple Meliorated Security Using Steganography Embedded with Watermarking and Cryptography

Multiple Meliorated Security Using Steganography Embedded with Watermarking and Cryptography

... both cryptography and steganography are explored to provide dynamic method of cloaking data from any unwarranted ...for steganography and employed LSB algorithmto encode the message inside the audio ...

24

A SECURE MAIL  APPLICATION USING STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY

A SECURE MAIL APPLICATION USING STEGANOGRAPHY AND VISUAL CRYPTOGRAPHY

... using Steganography and Visual ...Image Steganography to construct an image from the message and use of Visual Cryptography provides secure email ...

9

E-Retailing System Using Steganography And Visual Cryptography: A Survey

E-Retailing System Using Steganography And Visual Cryptography: A Survey

... A. Customer Authentication: Customer unique authentication password is connected to the bank which is hidden inside in a cover text using the text based Steganography method and the information like account no is ...

6

Online Voting System based on Image Steganography and Visual Cryptography

Online Voting System based on Image Steganography and Visual Cryptography

... secure steganography algorithms. The advantage of steganography over cryptography is its ability to offer a more advanced way of hiding a se- ...Therefore, steganography is used to secure the ...

15

A Review on Data Hididng using Steganography & Visual Cryptography

A Review on Data Hididng using Steganography & Visual Cryptography

... So steganography is an effort to conceal the existence of the hidden ...between cryptography & steganography is that cryptography conceals the content of the message not the existence of ...

6

Online Payment System using Steganography and Visual Cryptography

Online Payment System using Steganography and Visual Cryptography

... based steganography and visual cryptography that provides customer data privacy and prevents misuse of data at merchant’s ...uses steganography and visual cryptography [12, 13, and 14], are ...

6

Show all 1670 documents...

Related subjects