Distinct Revocable Data Hiding In Ciphered Image
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: This scheme proposes a secure and authenticated reversible data hiding in cipher images.Nowadays, we pay more attention to reversible data hiding in encrypted images, as the original cover can bereversibly recovered after embedded data is retrieved. In the first phase, the content owner encrypts the originalimage using an encryption key. Then, a data hider compresses the least significant bits (LSB’s) of the encryptedimage using a data hiding key to create space to store some additional data. Then, if a receiver has the datahiding key, he can extract the additional data from the encrypted image though he is unaware of the imagecontent. If the receiver has the encryption key with him, then he can decrypt the data to obtain an image similarto the original image. If the receiver has both, the data hiding key as well as the encryption key, then he can extract the additional data as well as he can recover the original content.
Authors and Affiliations
Anamika Patil , Pooja Bafna , Mona Pounikar , Pranjal Badgujar
Improvising Data Locality and Availability in Hbase Ecosystem
Abstract: In this paper, we try to represent the importance of data locality with the HBase architecture. HBase has a dynamic master slave architecture but the emphasis on data locality, i.e. getting the logic or p...
Improving Data Storage Security in Cloud Computing UsingElliptic Curve Cryptography
Abstract: Companies tends towards more availability, less cost, managed risk, agility- all of which areproviding by cloud computing. The cloud computing is a way to deliver IT services on demand and pay perusage, and it...
Software Engineering Process in Web Application Development
Abstract: The methods used for the development of conventional software engineering models cannot be useddirectly for the development of web based applications. This paper identifies and analyses the variousadaptat...
Image Retrieval using Sparse Codewords with Cryptography for Enhanced Security
Now days face image of people is the interesting area of users. Most of the time images are in digital form. Thus, content-based face image retrieval is a technique which facilitates for many emerging applications.In thi...
Numerical Solution of unsteady gravity flow of power-law fluids through a porous medium
Abstract: In this paper, we present a numerical study of the rheological behaviour effect of non-Newtonian, power-law fluids on the unsteady gravity flow through a porous medium. The governing equations are derived&...