Secure Image Hiding Algorithm using Cryptography and Steganography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 5
Abstract
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and steganography are the two major techniques for secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique compared to other Algorithms. Now this encrypted imageis embedded with videoby using LSB Approach of steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non – Repudiation
Authors and Affiliations
Hemlata Sharma
Analyzing Process Behavior to Predict Resource Allocation in Distributed Environment by Using Time Series and Online Predictive Approach Algorithm
Abstract:A distributed system is a collection of different computers to handle large amount of data, the connected computers can share and coordinate their data on network. It is very difficult to for server to han...
Incremental Sequential Pattern Tree Mining
In this paper, we have proposed an Incremental Sequential Pattern Tree mining algorithm to retrieve new updated frequent sequential patterns from dynamic sequence database. Sequential Pattern Tree stores...
Pattern of Epistaxis of Patients Attending in A Tertiary Care Hospital of Tripura, Northeastern Region of India
Epistaxis is one of the most frequently encountered emergencies reported to occur in up to 60% of the general population. It has a bimodal age presentation with incidence peaks in below 25 years and above 50 years of age...
Mining Top-k Closed Sequential Patterns in Sequential Databases
In data mining community, sequential pattern mining has been studied extensively. Most studies require the specification of minimum support threshold to mine the sequential patterns. However, it is difficult &nbs...
http://publishers.indexcopernicus.com/edit_journal_listissues.php
Abstract : The emerging ultra wideband (UWB) system offers a great potential for the design of high speed short-range wireless communications. In order to satisfy the growing demand for higher data rates, one possi...