Image Steganography Based On Hill Cipher with Key Hiding Technique
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 11, Issue 5
Abstract
In today’s digital world invisible ink and paper have been replaced by much more versatile and practical covers for hiding messages – digital documents, images, video, and audio files. As long as an electronic document contains irrelevant or redundant information, it can be used as a “cover” to hide secret messages. Cryptography is the study of encoding and decoding secret messages where as Steganography is the art and science of writing hidden messages in such a way that no one apart from the sender and intended recipient even realizes there is a hidden message. In this paper we implement Hill Cipher algorithm, for hiding our text behind the cover image and decrypt the cover image to get original text. The highlight of this paper is that, the key is encrypted and scrambled within the cover image
Authors and Affiliations
Pavan N
Texture Based Approach For Face Image Recognition Using Low Resolution Images
Face recognition based on Euclidean distance and texture feature. A method for face recognition by using the GLCM (Gray Level Co-occurrence Matrix) and texture features. Euclidean distance classifier is used for the matc...
The Application of Model Predictive Control (MPC) to Fast Systems such as Autonomous Ground Vehicles (AGV)
Abstract: This paper investigates the application of Model Predictive Control (MPC) to fast systems such as Autonomous Ground Vehicles (AGV) or mobile robots. The control of Autonomous ground vehicles (AGV) is chal...
Improve Performance by Using Load Balancing Algorithm to Reduce Response Time and Processing Time on Cloud Computing
Cloud computing is one of the incredible technology which enable the new vision for IT industry. Nowadays, it has become a strong alternative for startup large as well as small scale organizations that only use the resou...
Big Data Mining using Map Reduce: A Survey Paper
Abstract: Big data is large volume, heterogeneous, distributed data. Big data applications where datacollection has grown continuously, it is expensive to manage, capture or extract and process data using existings...
Survey Of DDoS Attacks Based On TCP/IP Protocol Vulnerabilities
Abstract: Distributed denial-of-service (DDoS) attacks are one of the key threats and perhaps the toughest security problem for today’s Internet.Distributed Denial of Service (DDoS) attack has become a stimulating proble...