Image Steganography Using Dynamic LSB with Blowfish Algorithm
Journal Title: International Journal of Computer & organization Trends(IJCOT) - Year 2013, Vol 3, Issue 7
Abstract
The past few years have seen an increasing interest in using images as cover media for Steganography communication.The basic structure of Steganography is made up of three components: cover image, message, and the key. The carrier can be a digital image;it is the object that will carry the hidden message. A key is used to decode/decipher/discover the hidden message. This can be anything from a password, a pattern, a black-code etc. In this paper we propose a new form of Steganography, Which deals with disadvantages of Simple LSB substitution and as well as symmetric cryptography algorithm called Blowfish algorithm.
Authors and Affiliations
Aishwary Kulshreshta , Ankur Goyal
A Novel Encryption approach in Database Security
Database servers are the most important thing in company environment. They store client details, financial information, human resource details and all the data are should be keptas very secret. Database security&nb...
Mathematical Analysis of the Control of the Spread of Infectious Disease in a Prey-Predator Ecosystem
We present a model for the mathematical analysis of the control of the spread of an infectious disease in a predator-prey ecosystem. In this work, we present a compartmental mathematical model expressed by a sy...
Touchless Written English Characters Recognition using Neural Network
Touchless written English character recognizer (TER), a new touchless approach to write and an intelligent approach to recognize English characters has been proposed in this paper. In TER, the inputs of English cha...
Resolving Dynamic Shortest Path Routing Problems in Mobile Adhoc Networks Using ABC And ACO
Mobile Ad Hoc Network (MANET) is a dynamic multihop wireless network which is self organized and self managed network. MANET is decentralized by a collection of mobile nodes. The major problem in MANET is fast changing n...
Detecting and Alerting Tcp –Ip Packets againt TCP SYN attacks
Transmission Control Protocol Synchronized ( TCP SYN) Flood has become a problem to the network management to maintain the network server from being attacked by the malicious attackers. Possibly one of the problems...