Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4
Abstract
Abstract: Metamorphic cryptography is the inconsistency between of cryptography and steganography. This combination will be used for the higher level of security has gained a lot of importance. Cryptography refers to the study of art and science for achieving security by encode the messages to make them sure that the data is not readable. The readable message is converted into an unreadable message by using cryptographic system, this process called as well-structured and systematic, antithesis operation is performed by using cryptanalysis that means unreadable message is converted into a readable message, this process called as error and trial based. Steganography is the technique that give the skill to hide the massages that is to be kept secret inside other messages. Before The art and science of writing hidden messages in such a way that no one can access this information expect sender and receiver.This paper provides a higher level of security for hide the information messages by using development of system for video based metamorphic encryption.
The Relation between Outsourcing Employee Perception to Recruitment Process and Status with Employee Morale
The Relation between Outsourcing Employee Perception to Recruitment Process and Status with Employee Morale
Factors Affecting Consumers' Perceptions of Digital Sales Promotions – An Experimental Investigation
"Along with the existence of modern content-based digital goods, a promotional premium product does no longer need to be tangible - digital premiums are alternatives to traditional physical premium products. This article...
Optimal Resource Allocation and Load Distribution for Server Processors using Hot Spot Migration - A Survey
Load distribution is one of the most important problem faced in the cloud computing environment when the servers are connected to the network. Load distribution is used to distribute the workload among multiple computers...
Intrusion Detection System in Web Services
Intrusion Detection System in Web Services
The Design of Web Based Secure Internet Voting System for Corporate Election
In a traditional voting environment voting process sometimes becomes quite inconvenient due to the reluctance of certain voters to visit a polling booth to cast votes besides involving huge social and human resources. Th...