Hiding the Data into Meaningful Encrypted Image Using Reversible Data Hiding Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Data hacking is one of the challenging problems in Internet world. It is possible to greatly improve our understanding and also should provide security to network data. The most existing encryption algorithms designed to protect image contents transform original image into a texture-like or noise-like image whichresults in a significantly large number of attacks. A New Image Encryption System (NIES) concept is introduced to transform an original image into a visually meaningful encrypted one and to hide the data in image by usingReversible Data Hiding (RDH) technique. The proposed methods have potential applications for privacy and copyright protection in networks and cloud computing. In which gives effective protection to the secret data and also low computation cost
Authors and Affiliations
G. Malathi , Dr. S. Raju
A Novel set of tools to “Extract, Rework, Batch” [ERB] Big Data with Apache Hadoop Environment
Abstract: Over the previous couple of years, organizations across public and personal sectors have created a strategic call to show massive information into competitive advantage. The challenge of extracting price...
Recognition of Human Iris Using Accurate Iris Map
Personal identification based on Biometrics technology is a trend in future. Iris Recognition is regarded as a high accuracy verification technology when compared to traditional approaches. In real-time Iris Rec...
Voltage Control Of Three Phase Ac/Dc Pwm Converters UsingFeedback Linearisation
Abstract: This paper proposes a voltage control strategy for a three level PWM converter based on feedbacklinearization in order to control dc bus voltage. Incorporating the power balance of the input and output si...
Video Steganography: A Survey
Abstract: Recent advances in information technology have made quick delivery and sharing of multimedia information possible. But these advances in technology are leading breaches to information security and personal info...
Cataloging Of Sessions in Genuine Traffic by Packet Size Distribution and Session Grouping
Cataloging traffic keen on precise network applications is vital for application-aware network organization and it turn into more taxing because modern applications incomprehensible their network behaviors. Whe...