New and Unconventional Techniques in Pictorial Steganography and Steganalysis
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 14, Issue 3
Abstract
Steganography involves transferring data through a given channel in such a way that the communication channel itself is hidden from all involved parties. It is a form of security through obscurity; this technique protects both messages and stations involved in communication. In the most modern form of digital steganography, electronic communication may include complex steganographic lines of code inside transport layer which accomplishes the aforementioned task of protecting data and anonymity of participating stations. Steganography is much confused with the term cryptography former is fundamentally different in the sense that the message is sent secretly without attracting any attention of third party intruders by protecting anonymity of involved channels, nodes and stations
Authors and Affiliations
Vikas Kothari
Longest Common Subsequence: A Method for Automatic Evaluation of Handwritten Essays
Abstract Essays are used to evalaute student’s knowledge from early before itself. The aim of the proposed system is to evalaute the handwritten essays automatically. The proposed method is to develope an automated syste...
Ict As A Change Agent For Socialization And Social Engineering
Abstract: The future communication has been predicted to depend to a great degree on electronic modes; academics businessmen and professionals in various fields, purpose, various uses of ICT facilities and new media gene...
A Name Entity Detection and Relation Extraction fromUnstructured Data by N-gram Features
Abstract : In recent years Name entity extraction and linking have received much attention. However, correctclassification of entities and proper linking among these entities is a major challenge for researcher. Wepropos...
An encrypted mechanism for securing cloud data from data mining attacks
Abstract: Cloud Computing is a vast infrastructural and rising pool which provides huge storage of data in one sphere. Organizations nowadays are in the marathon of equipping the whole system in a cloud form. In th...
Selection of Legendre Moments for Content Based Image Retrieval Using ACO Based Algorithm
Abstract : Feature selection is an important step in Content Based Image Retrieval (CBIR) which has a great impact on reducing complexity and increasing efficiency of CBIR frameworks. Swarm Intelligence (SI) methods, as...