Using Concept of Steganography and Visual Cryptography for Secured Data hiding
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The most advanced and updated Shamir Encryption algorithm is efficient enough to prevent and stop unauthorized and illegal access to the secured encoded data. It is best to solution to ensure reliability and security of the data with the help of Steganography and Visual Cryptography. On the ground of the failure of the previous extensive research by expert to ensure security of the data.
Authors and Affiliations
Mr. Deepak S. Bhiogade, , Prof. Milind Tote
Context Based Indexing in Search Engines Using Ontology:Review
Abstract: Nowadays, the World Wide Web is the collection of large amount of information which is increasingday by day. For this increasing amount of information, there is a need for efficient and effective index st...
A software tool that provides relevant information for diabetic patients to help prevent diabetic foot[i][u][/u][/i]
Abstract: This project proposes a tool which can be very useful for diabetic patients for preventing diabetic foot. 347 million people worldwide have diabetes and 15% of them have the chance of developing diabetic...
“Classification of Spam Categorization on Hindi Documents using Bayesian Classifier”
In the current e-world, mostly all the transactions and the business are taking place through e-mails. Now a day, e-mail has become a powerful tool for communication as it saves a lot of time, paper and cost. But, due to...
The Application of Model Predictive Control (MPC) to Fast Systems such as Autonomous Ground Vehicles (AGV)
Abstract: This paper investigates the application of Model Predictive Control (MPC) to fast systems such as Autonomous Ground Vehicles (AGV) or mobile robots. The control of Autonomous ground vehicles (AGV) is chal...
Ontology Based Data Analysing Approach for Actionable Knowledge Discovery
Abstract: In Data Mining, the effectiveness of association rules is limited by the huge quantity of delivered rules. In this manuscript, we propose a new approach to prune and filter discovered rules. An interactiv...