A Technique To Hide Information Within Image File For Secure Transmission
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
In today’s world lots of data are being corrupted so, for a secure message transfer we need Steganography .It is the method of hiding information in other information. Other file formats such as of audio or video format can also be used, but because of their frequency on the internet, digital images are more popular. There are variety of steganography technique that are used for hiding secret information and are more complex than others while all of them have respective strong and weak points. Different applications may require absolute invisibility of the secret information, while others require a large secret message to be hidden.This project report intends to give an overview of image steganography, its use and techniques. It also helps to choose which stegnographic technique are suitable for which application and also attempts to identify the requirements of a good steganography algorithm.
Energy Efficient Anchor-Based Localization Algorithm for WSN
Localization is one of the most fundamental problems in wireless sensor networks, since the locations of the sensor nodes are critical to both network operations and most application level tasks. To solve the loc...
A Systematic Review of Software Security Issues Associated With Agile Software Development
Abstract: Main aim of this research is to review various software security issues associated with agile software development. Software security issues which are considered are types of design and code changes, lack of do...
Identify the surgically altered face images using granular-PCA approach
Abstract: Plastic surgery provide a way to enhance the facial appearance. The non-linear variations introduced by the plastic surgery has raised a challenge for face recognition algorithms. In this research we ma...
Implementation of AES Algorithm in MicroController Using PIC18F452
Security has become an increasingly important feature with the growth of electronic communication which calls for more advanced ways to encrypt the raw data[1]AES-128 is going to be implemented as the encr...
Analysis for Diagnosing Myocardial Ischemia by Detecting the Boundary of Left Ventricle in Echocardiography Sequences using GVF snake
Left ventricular performance, one of the hallmarks of coronary artery disease, can be detected by,echocardiography. Coronary artery disease (CAD) also known as myocardial ischemic heart disease (MIHD), is the most common...