A Technique To Hide Information Within Image File For Secure Transmission
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
In today’s world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video format can also be used, but because of their frequency on the internet, digital images are more popular. There are variety of steganography technique that are used for hiding secret information and are more complex than others while all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden.This project report intends to give an overview of image steganography, its use and techniques. It also helps to choose which stegnographic technique are suitable for which application and also attempts to identify the requirements of a good steganography algorithm.
Achieving Privacy in Publishing Search logs
The “database of intentions,” collects by the search engine companies for the histories of their users search queries. These searchlogs are a gold mine for researchers. The Search engine companies, howev...
PIDF Auto Tuning Control System (AVR) In Power System Stability Analysis
Abstract:This work aims to develop a controller based on auto tuning 0f PIDF to simulate an automatic voltage regulator (AVR) in transient stability power system analysis. AVR is an essential part of the synchronous gene...
A Study on Learning Factor Analysis – An Educational Data Mining Technique for Student Knowledge Modeling
Abstract: The increase in dissemination of interactive e-learning environments has allowed the collection of large repositories of data. The new emerging field, Educational Data Mining (EDM) concerns with developing meth...
Analysis and Implementation of Efficient Association Rules using K-mean and Neuralgas Algorithm
Efficient Privacy Preserving association rule mining has emerged as a latest research issue. In this thesis work, existing algorithms, Increase Support of Left Hand Side and Decrease Support of Right Hand Side...
Privacy Preservation by Using AMDSRRC for Hiding Highly Sensitive Association Rule
Abstract: Researchers are needed for settling on the choice of information mining. In any case a few associations to help with some external counsellor for the procedure of information mining on the grounds that th...