• No results found

Steganography Hides

Cyber Warfare and Terrorism based on Data Transmission through Classical Cryptographic and Steganographic Algorithms

Cyber Warfare and Terrorism based on Data Transmission through Classical Cryptographic and Steganographic Algorithms

... and Steganography are both used to provide security to information over the unsecure channel as they are on transmission over the ever busy communication traffic ...adversary. Steganography hides the ...

5

Encryption Of Data Behind The Diverged Audio And Video Frame Using Rsa Algorithm

Encryption Of Data Behind The Diverged Audio And Video Frame Using Rsa Algorithm

... Cryptography scrambles a message it cannot be understood; the Steganography hides the message so it cannot be seen. In this paper we will focus to develop one system, which uses both Cryptography and ...

7

Steganography using Cryptography and Pseudo Random Numbers

Steganography using Cryptography and Pseudo Random Numbers

... Now a day’s most of the data is in digital form. Due to spread of internet and various computing devices this data is exceptionally increasing day by day. Some of this data is private like password, ATM pins, biometric ...

6

IMAGE STEGANOGRAPHY USING DESYNCHRONIZATION

IMAGE STEGANOGRAPHY USING DESYNCHRONIZATION

... Abstract— Steganography is the art and science of hidden ...the steganography system: capacity and security. Steganography and cryptography share the objective of protecting secret ...whereas ...

7

Abstract: Steganography refers to the data hiding. The main purpose of image steganography is to hide the

Abstract: Steganography refers to the data hiding. The main purpose of image steganography is to hide the

... While steganography hides as much data as possible into a cover signal, watermarking tries to emphasize the robustness against rotation, cropping, and translation of the embedded information at the expense ...

10

ENHANCING SECURE COMMUNICATION USING GENERALIZED RSA AND COLOR COMPONENT REPLACEMENT STEGANOGRAPHY

ENHANCING SECURE COMMUNICATION USING GENERALIZED RSA AND COLOR COMPONENT REPLACEMENT STEGANOGRAPHY

... and Steganography are the two popular techniques to provide secure communication, where Cryptography distorts the message and Steganography hide the existence of the ...replacement steganography are ...

10

A Review of Steganography

A Review of Steganography

... about steganography which is a technique of concealing private data within a multimedia transporter as picture file, soundtrack file, and video ...picture steganography are to augment the proficiency with ...

6

The use of hides to reduce acute stress in the newly hospitalised domestic cat (Felis sylvestris catus)

The use of hides to reduce acute stress in the newly hospitalised domestic cat (Felis sylvestris catus)

... The use of hides to reduce acute stress in the newly hospitalised. domestic cat (Felis sylvestris catus)[r] ...

7

Enhancing Mobile Cloud Computing Security Using Steganography

Enhancing Mobile Cloud Computing Security Using Steganography

... how steganography, which is a secrecy method to hide information, can be used to enhance the security and privacy of data (images) maintained on the cloud by mobile ...

15

A Novel 4X4 LSB Pixel Substitution Approach for
          Image Steganography

A Novel 4X4 LSB Pixel Substitution Approach for Image Steganography

... diverse steganography methodologies including spatial domain and frequency ...distinctive Steganography approaches that includes hiding secret information in a fitting media transporter, ...information. ...

5

A Survey on Approaches and Communication in Spread Spectrum Image Steganography

A Survey on Approaches and Communication in Spread Spectrum Image Steganography

... image steganography scheme which is a Fuzzy based selection of ...system hides and recovers messages of substantial length within digital imagery while maintaining the original image size and dynamic ...

5

High-capacity reversible image steganography based on pixel value ordering

High-capacity reversible image steganography based on pixel value ordering

... topic. Steganography tech- niques include the least-significant bit (LSB) [2], pixel-value differencing (PVD) [3], and subsequently proposed substitution and combination methods of PVD and LSB ...The ...

15

Survey of steganographic techniques for compressed media

Survey of steganographic techniques for compressed media

... We suggest a compression based totally textual content steganography technique as a way to improve capacity and security. Specifically, the trouble is to attain a widespread increment in the amount of secret data ...

8

Secure Image Steganography using DNA sequence based on DNA Cryptography

Secure Image Steganography using DNA sequence based on DNA Cryptography

... internet, steganography is one of leading technologies being used around the globe for long ...DNA steganography is one such ...Image Steganography for Data Security,first we encrypt data with the ...

5

A  New Approach to Provide Security to Audio Information Using Cryptography & Steganography

A New Approach to Provide Security to Audio Information Using Cryptography & Steganography

... Abstract— Information in any form is a very important resource for any organization or individual person. Due to research and new technologies it is possible to store and exchange information in different formats. ...

9

An Efficient Modified LSB technique for Video Steganography

An Efficient Modified LSB technique for Video Steganography

... 4. Video Steganography: It is a technique of hiding any kind of files or data into digital video format. In this case video (combination of pictures) is used as carrier for hiding data. Generally discrete cosine ...

7

APPLICATION OF CELLULAR AUTOMATA FOR MODELING AND REVIEW OF METHODS OF MOVEMENT 
OF A GROUP OF PEOPLE

APPLICATION OF CELLULAR AUTOMATA FOR MODELING AND REVIEW OF METHODS OF MOVEMENT OF A GROUP OF PEOPLE

... 4118 because of the uneven modification of pixel and simplicity [26]. LSB-matching scheme is used to add or subtract a numerical 1 into the pixels of a Cover- Image (CI) based on a secret data within an aim of reducing ...

22

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography

... combined steganography with Random key share overlapping(RKO) technique for Visual Cryptography ...image steganography ii) RKO technique is used to split stego image into random share and key share at the ...

6

An Approach to Virtual Learning on the LAN Based System

An Approach to Virtual Learning on the LAN Based System

... technique Steganography is an alternative method used instead of ...If steganography and encryption technique both are used together for data protection, the combination can provide high level of security ...

8

A Secure Approach to Audio Steganography

A Secure Approach to Audio Steganography

... audio steganography one problem is that they are less robust against intentional attacks that try to reveal hidden message and second problem is having low robustness against unintentional ...

7

Show all 914 documents...

Related subjects