A NEW APPROACH FOR HIDING DATA USING B-BOX
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2013, Vol 4, Issue 10
Abstract
Digital Images and video encryption play an important role in today’s multimedia world. Many encryption schemes have been proposed to provide a security for digital images. This paper designs an efficient cryptosystem for video. Our method can achieve two goals; the first goal is to design a height security for hiding a data in video, the second goal is to design a computational complexity cryptosystem.
Authors and Affiliations
Dr. Saad azize AL_ani, Bilal Obaid Obaid
Nonlinear Condition Tolerancing Using Monte Carlo Simulation
To ensure accuracy and performance of the products, designers tend to hug the tolerances. While, manufacturers prefer to increase them in order to reduce costs and ensure competition. The analysis and synthesis of tolera...
Maximizing Throughput of SW ARQ with Network Coding through Forward Error Correction
Over the years, several techniques for improving throughput of wireless communication have been developed in order to cater for the ever increasing demand of high speed network service. However, these techniques can only...
Emotion Classification in Arousal Valence Model using MAHNOB-HCI Database
Emotion recognition from physiological signals attracted the attention of researchers from different disciplines, such as affective computing, cognitive science and psychology. This paper aims to classify emotional state...
Detection of Infected Leaves and Botanical Diseases using Curvelet Transform
The study of plants is known as botany and for any botanist it is a daily routine work to examine various plants in their research lab. This research efforts an image processing-based algorithm for extracting the region...
Detection of Routing Misbehavior in MANETs with 2ACK scheme
The Routing misbehavior in MANETs (Mobile Ad Hoc Networks) is considered in this paper. Commonly routing protocols for MANETs [1] are designed based on the assumption that all participating nodes are fully cooperative. R...