Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 4
Abstract
Abstract: Metamorphic cryptography is the inconsistency between of cryptography and steganography. This combination will be used for the higher level of security has gained a lot of importance. Cryptography refers to the study of art and science for achieving security by encode the messages to make them sure that the data is not readable. The readable message is converted into an unreadable message by using cryptographic system, this process called as well-structured and systematic, antithesis operation is performed by using cryptanalysis that means unreadable message is converted into a readable message, this process called as error and trial based. Steganography is the technique that give the skill to hide the massages that is to be kept secret inside other messages. Before The art and science of writing hidden messages in such a way that no one can access this information expect sender and receiver.This paper provides a higher level of security for hide the information messages by using development of system for video based metamorphic encryption.
Comparative Study on Azo dye-doped Polymer Films for Optical Phase Conjugation
In this paper, we have studied the linear optical properties and nonlinear optical Phase Conjugation properties of two azo dye-doped polymer films by considering organic dyes disperse orange (DO-25) and disperse yellow (...
Traffic Analysis Based On Image Processing
Traffic information is an important tool in the planning, maintenance and control of any modern transport system. The Image Processing algorithm has been applied to measure basic traffic parameters such as traffic volume...
Geophysical Exploration of Iron Ore Deposit in Kimachia Area in Meru County in Kenya, Using Gravity and Magnetic Techniques
A combined geological and geophysical survey undertaken in Kimachia area of Meru County in central Kenya has established the existence of small scale iron ore deposit that seems to be part of a more extensive iron rich z...
Initial Fault Detection by Using RAEED Protocol in Face Tracking Technique
One of the type of wireless sensor network is object tracking sensor network, which is used to track the object moving in the dedicated area. It reports the latest location of the object to base station. There is new f...
An Analysis of Transformer Raw Materials Planning by Using Lot Sizing Technique (A Study Case of PT. XYZ Indonesia)
Global market of world electrical equipment has increased year by year. However, the fluctuated cost of raw materials can become an obstacle for the market development. PT. XYZ as one of electrical equipment companies ne...