Distinct Revocable Data Hiding In Ciphered Image
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: This scheme proposes a secure and authenticated reversible data hiding in cipher images.Nowadays, we pay more attention to reversible data hiding in encrypted images, as the original cover can bereversibly recovered after embedded data is retrieved. In the first phase, the content owner encrypts the originalimage using an encryption key. Then, a data hider compresses the least significant bits (LSB’s) of the encryptedimage using a data hiding key to create space to store some additional data. Then, if a receiver has the datahiding key, he can extract the additional data from the encrypted image though he is unaware of the imagecontent. If the receiver has the encryption key with him, then he can decrypt the data to obtain an image similarto the original image. If the receiver has both, the data hiding key as well as the encryption key, then he can extract the additional data as well as he can recover the original content.
Authors and Affiliations
Anamika Patil , Pooja Bafna , Mona Pounikar , Pranjal Badgujar
Improved Frequent Pattern Mining Algorithm with Indexing
Abstract: Efficient frequent pattern mining algorithms are decisive for mining association rule. In this paper,we examine the matter of association rule mining for items in a massive database of sales transactions....
Network Layer Attacks: Analysis & Solutions, A Survey
Abstract - An ever-existing concern is the lack of security due to the very fact that the technology is wireless and is vulnerable to security threats & attacks. Also, among the wide-spread characteristics of a CR, s...
Improvement of QoS Contained by AODV Routing Protocol On the Basis of Varying Queue Length and Dynamic TTL Value in MANET
A Mobile ad-hoc network (MANET) is a network, self-configuring, proficient of self-directed functioning, quickly deployable and operates without infrastructure. MANET operates without any centralized administrati...
Foreign Direct Investment (FDI) In Indian Service Sector-A Study of Post Liberalization
Vehicle Security System with Theft Identification and Accident Notification
The rapid development of electronics provides secured environment to the human. As a part of this ‘Vehicle Security System With Theft Identification And Accident Notification’ is designed to reduce the risk i...