An Architectural Approach of Data Hiding In Images UsingMobile Communication
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2015, Vol 17, Issue 3
Abstract
Abstract: Our paper proposes a new type of technique for retrieving back the hidden information in an imagesusing mobile communications. The usage of mobile communication in this paper is also termed as a step-2verification on the receiver’s side. By using the histogram modification technique the sender is going toembedded the data into an image, and sends it to the receiver. This paper mainly concentrates on the receiver’sside to get back the embedded data using mobile communication. In the first section we briefly review theintroduction the on data hiding- its previous techniques, applications, and also about reversible dataembedding. In the second section we focus on the related work. In the third section we are going to discussabout the proposed methodology for retrieving back the hidden information. The fourth section shows thearchitecture of the proposed methodology. And the subsequent sections describe a note on security andconclusion.
Authors and Affiliations
T. Venkata Satya Vivek , V. Lakshma Reddy, Ganta Anil , M Rao Batchnaboyina
Improving Data Storage Security in Cloud Computing Using RC6 Algorithm
In spite of the huge advantages got from the selection of cloud computing idea, its famous adoption has been determined usually by security concerns. The broadened assault surface in a cloud environment makes it more def...
PageRank algorithm and its variations: A Survey report
This survey report basically gives a comparison report on different page ranking algorithm on the basis of numerical analysis. Four popular algorithms used for this purpose PageRank, Weighted PageRank, PageRank...
Mining Top-k Closed Sequential Patterns in Sequential Databases
In data mining community, sequential pattern mining has been studied extensively. Most studies require the specification of minimum support threshold to mine the sequential patterns. However, it is difficult &nbs...
Token Sequencing Approach to Prevent SQL Injection Attacks
: Internet, the network of networks represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud. Many web applications remain under the attack of hackers who intentional...
Wireless Sensor Grids Energy Efficiency Enrichment UsingQuorum Techniques
Abstract: Wireless sensor networks are mainly considered for atmosphere reconnaissance, wherein wirelesssensor nodes collaborate to get their work done. Generally, wireless sensors are battery powered; therefore, i...