Using Concept of Steganography and Visual Cryptography for Secured Data hiding

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: The most advanced and updated Shamir Encryption algorithm is efficient enough to prevent and stop unauthorized and illegal access to the secured encoded data. It is best to solution to ensure reliability and security of the data with the help of Steganography and Visual Cryptography. On the ground of the failure of the previous extensive research by expert to ensure security of the data.

Authors and Affiliations

Mr. Deepak S. Bhiogade, , Prof. Milind Tote

Keywords

Related Articles

 Penetrating Windows 8 with syringe utility

 : Windows 8, the most popular operating system by Microsoft launched in October 2012. It is developed for use of desktops, laptops, tablets, home theatre PC’s. Windows 8 is more secure than previous version...

Main Content Mining from Multi Data Region Deep Web Pages

Abstract: An Automatic Data extraction from the deep web pages is an endeavoring errand. Colossal web substance are gotten to as per well-known interest submitted to Web databases and the returned data records are e...

 An Effective Method to Hide Texts Using Bit Plane Extraction

 Abstract: The work is to show how simply a data can be hidden inside an image and be easily extracted usingMatlab. The work focuses on bit plane extraction and how it can be used to complete the above mentioned tas...

Intent based Image Ranking for Web Search Reranking

Abstract: New approach is presented for reranking of the images. While searching images on the web to increase the accuracy of the image search result Image search reranking is used. Image search reranking is aneffective...

Automatic test data generation for time-continuous embedded system using built-in signals

Nowadays, embedded systems are becoming critical applications and play important roles in modern society. Therefore, quality assurance for these types of systems has attracted many attentions in software engineering rese...

Download PDF file
  • EP ID EP147662
  • DOI -
  • Views 91
  • Downloads 0

How To Cite

Mr. Deepak S. Bhiogade, , Prof. Milind Tote (2014).  Using Concept of Steganography and Visual Cryptography for Secured Data hiding. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 130-135. https://europub.co.uk/articles/-A-147662