A Steganography Approach to Protect Secret Information in Computer Network
Journal Title: International Journal of Science and Research (IJSR) - Year 2015, Vol 4, Issue 4
Abstract
Everyone use computer networks to share resource and to exchange information. Protection of data is a demanding issue in today’s era. The prevalent part of the data or information pass throughout the internet and it becomes difficult to make data secure. There arise a need of data hiding. Steganography is different as the study of hidden communication. Steganography is the skill and science of hiding a pinnacle secret communication in a cover media such as image, text, signals or sound in such a approach that nobody, with the exception of the intentional beneficiary knows the existence of the data. This paper express the thought to protect secret information in computer network by means of exploring initially what is the steganography, cryptography and DWT and the necessities associated to steganography. In this paper, we implemented the security and data hiding technique that are used to implement a steganography.
Evaluation Social Ties and Trust in Online Social Network
In this research work we have built a systems which pulls tweets , pre-process each tweet to remove unwanted artifacts and the gives stemming treatment to each token in the tweet to finally get the score value which is c...
Performance Analysis of Central Gas Turbine Power Station, Edjeba, Delta State, Nigeria
Performance Analysis of Central Gas Turbine Power Station, Edjeba, Delta State, Nigeria
A New Method for Construction of MV-optimal Generalized Group Divisible Designs with two Groups
In this article, we consider the construction of generalized group divisible designs with two groups (GGDD(2)) from balanced incomplete block designs (BIBD). We also discuss MV-optimality of these designs.
Secret Digital Image Sharing Using Natural Image Based VSS Scheme
Visual cryptography is a technique of sharing secret images. This technique encrypts a secret image into number of shares. Combining these shares generates the original image and it can be directly recognized by the huma...
Simulation and Performance Comparison of Dual arm Mach Zehnder Modulator and Single arm Mach Zehnder Modulator in Duobinary Transmission System
"Duobinary signal is a three level signal which has higher dispersion tolerance and better bandwidth efficiency than conventional binary signal formats. Optical duobinary signal can be generated by using either a dual a...