• No results found

[PDF] Top 20 A Novel Technique to Secure Cloud Data using Steganography

Has 10000 "A Novel Technique to Secure Cloud Data using Steganography" found on our website. Below are the top 20 most common "A Novel Technique to Secure Cloud Data using Steganography".

A Novel Technique to Secure Cloud Data using Steganography

A Novel Technique to Secure Cloud Data using Steganography

... in cloud information stockpiling and present another joined encoding and information concealing strategy to avoid unapproved information access in cloud information ...of cloud information when it is ... See full document

5

A Novel Technique of Image Steganography

A Novel Technique of Image Steganography

... A Novel Technique for Image Steganography Based on DWT and Huffman Encoding” International Journal of Computer Science and Security, (IJCSS), Volume (4): Issue ... See full document

7

A Novel Technique For Secure Data Transmission Using Cryptography And Steganography

A Novel Technique For Secure Data Transmission Using Cryptography And Steganography

... the data security which is advised to be the higher level of security by using the multiple data files and key ...embedding, data embedding and data extraction model into one ... See full document

5

A Novel Technique for Secure, Lossless Steganography with Unlimited Payload

A Novel Technique for Secure, Lossless Steganography with Unlimited Payload

... Protection using steganography by crypto-image as cover Image, International Journal of Advanced Computer Research (ISSN (print): 2249-7277 ISSN (online): 2277- 7970)Volume-2 Number-3 Issue-5 ...and ... See full document

6

A Novel Technique of CVC to improve the Security of Steganography

A Novel Technique of CVC to improve the Security of Steganography

... Cryptography is an art that applies complex mathematics and logic so as to design strong encryption methods to protect the secret data. Cryptography allows people to keep confidence in the electronic world. ... See full document

5

HIGH CAPACITY IMAGE STEGANOGRAPHY IN THE SPATIAL DOMAIN USING LEHMER CODE

HIGH CAPACITY IMAGE STEGANOGRAPHY IN THE SPATIAL DOMAIN USING LEHMER CODE

... of data without raising suspicion. This paper presents a novel technique for image steganography using Lehmer code that provides high capacity and better ...the technique ... See full document

9

Secure and Authorized Data Deduplication Using Hybrid Cloud Technique

Secure and Authorized Data Deduplication Using Hybrid Cloud Technique

... day cloud computing become famous as well as popular term ...many cloud services are available in low cost also give high ...of data or file forwarding by large number of user done on ...of ... See full document

8

A Secure Approach to Audio Steganography

A Secure Approach to Audio Steganography

... by using this approach because the hidden message is not under the insecurity of attacks to change ...proposed technique, the sound is divided into samples where each sample is of 24bit, 8 bits are to be ... See full document

7

A Novel Video Steganography Algorithm for Secure Data Hiding

A Novel Video Steganography Algorithm for Secure Data Hiding

... least secure and least resource hungry method of steganography, an attempt has been made to enhance the security of this method by incorporating random frame selection and pixel swapping operation along ... See full document

7

A Novel Secure Image Hiding on Indexed Images Using  Pixel-Matching Technique

A Novel Secure Image Hiding on Indexed Images Using Pixel-Matching Technique

... The steganography applications range from those that actually hide data, often encrypted, within the file, to those that simply attach hidden information to the end of a file such as ...for ... See full document

5

Data Hiding using JPEG Steganography

Data Hiding using JPEG Steganography

... to secure our data from being access, stolen and ...that data can be accessed by the third ...about data hacking. The hackers are able to access the data and files because the security ... See full document

5

Secure Text/Image Data Communication by Image Steganography into Video Sample using Wavelet Technique

Secure Text/Image Data Communication by Image Steganography into Video Sample using Wavelet Technique

... with steganography the message embedded is ...amongst steganography and watermarking is that in watermarking the information about details of owner is embedded while in steganography message which ... See full document

7

A Novel Approach for Video Steganography using LSB Technique

A Novel Approach for Video Steganography using LSB Technique

... of steganography techniques available among which hiding data in video using logical operation by LSB substitution is a simple ...embedded using the stego ...operation using LSB ... See full document

5

A Study of ECG Steganography for Securing Patient's Confidential Data based on Wavelet Transformation

A Study of ECG Steganography for Securing Patient's Confidential Data based on Wavelet Transformation

... METHODOLOGY The new security technique used in [8] guarantees secure transmission of confidential information is based on using steganography techniques to hide confidential information [r] ... See full document

5

A Secured Authorized Data Deduplication in Cloud using Hash based Message Authentication Code

A Secured Authorized Data Deduplication in Cloud using Hash based Message Authentication Code

... a technique for removing duplicate copies of storage data, and provides security to that stored ...in cloud storage deduplication has been a well-known ...storage data and control the damage ... See full document

5

A Secure Image and Text Steganography Technique

A Secure Image and Text Steganography Technique

... a novel system for data encryption and hiding into image. The data is hidden in a randomized way in the selected area of the ...image steganography which could be proven a highly secured ... See full document

6

A Novel Data Embedding Technique for Hiding Text in Video File using Steganography

A Novel Data Embedding Technique for Hiding Text in Video File using Steganography

... are using cryptology as well as Steganography to support or help themselves with their objective apart from state of art, communication technology and ...subject. Steganography is derived from Greek ... See full document

6

ECC encrypted secure reversible data 
		hiding on real time images with enhanced security

ECC encrypted secure reversible data hiding on real time images with enhanced security

... Reversible data hiding in encrypted domain (RDHED) has greatly attracted researchers as the original content can be losslessly reconstructed after the embedded data are extracted, while the content owner’s ... See full document

7

Enhancement of Data Security for Cloud Environment Using Cryptography and Steganography Technique

Enhancement of Data Security for Cloud Environment Using Cryptography and Steganography Technique

... much secure because sequence of images is change every ...in cloud, if they enter the correct sequence of ...of data operations this interface will again ask the user sequence, this time images gets ... See full document

6

A Secure Data Hiding Technique Using Video Steganography

A Secure Data Hiding Technique Using Video Steganography

... the data from one place to another place rapidly and accurately. This data when goes through the internet may become a victim of the hackers who can steal, modify and misuse the ...the data with ... See full document

9

Show all 10000 documents...