DATA HIDING SECURITY APPROACHED WITH POSITION BASED PIXEL SWAPPING STANDARD METHOD: A REVIEW
Journal Title: International Journal of Engineering Sciences & Research Technology - Year 0, Vol 5, Issue 2
Abstract
In this paper, Position Based Pixel Swapping Standard Method has been proposed, which includes the secret data must be encrypted using key and hiding secret data in image using Data Hiding Algorithm. Applied higher group LSB method to it and finally hides the data into red, green and blue images of a selected data or information. Therefore, the proposed algorithm is a combination of encryption of any form of data or information first then hiding the any form of data or information into the cover image which provides double security. The result of the proposed algorithm is analyzed and discussed using MSE, PSNR, entropy.
Authors and Affiliations
Rasika P. Ghom*
Performance Evolution of Conceptual Designed of Single Panel C
Now a day’s cryogenic pump available in mega mechanical project such as cryosorption pump available in ITER. This cryopump designed is applied in small scale industries to produce a vacuumed. Cryosorption pump in...
UNDERSTANDING THE DIFFERENT VULNERABILITY METHODS OF ATTACKS IN SECURE DATA
Cipher text-policy attribute based encryption (CPABE) provides an encrypted access control mechanism for broadcasting messages. Basically, a sender encrypts a message with an access control policy tree which is lo...
PERFORMANCE ANALYSIS OF COOPERATIVE COMMUNICATION FOR DUALHOPE RELAYING NETWORK WITH HARDWARE IMPAIRMENT OVER RAYLEIGH FADING CHANNEL
The cooperative communication becomes an important topic in the field of wireless communication network to improve the reiliability and speed of communication over long distance and curvbed surface. As distance is...
APPLICATION OF VALUE ENGINEERING TECHNIQUES IN BUILDING CONSTRUCTION PROJECTS
Value Engineering is a creative, organized effort, which analyzes the requirements of a project for the purpose of achieving the essential functions at the lowest total costs over the life of the project. Through a...
NEURAL NETWORK CORRELATION BASED SIMILARITY EVALUATION WITH ZERNIKE MOMENTS FOR THE POSE-INVARIANT FACE RECOGNITION
Human face recognition is best application in pattern recognition for identification and recognition. Development of face recognition system is increasing day by day in market and research organizations. Different param...