Secure Transmission of Compound Information Using Image Steganography
Journal Title: International Journal on Computer Science and Engineering - Year 2011, Vol 3, Issue 4
Abstract
The security of information handled in real time transmission reception like internet is of paramount consideration, as this information may be confidential. And also, the parameter in concern nowa- days is size as it makes large amount of data to be at a single place. This paper proposes a technique for the simultaneous transmission of multiple data securely. We took an advantage of less space required for storing an image than that of a wav file. The proposed technique brings down the required channel capacity to transfer secret data in real time systems besides improving robustness
Authors and Affiliations
Lalitha. G , Ashish Jain , U. Raja
Two Factor Biometric Key for Secure Wireless Networks
The applications of wireless networks is steadily increasing through out the world. Wireless transactions are now appening in highly secure banking networks. To have more reliable networks, security of wireless networks...
PDPKDES ( Pre Distributed Powerful Key for Data Encryption Standard)
Data encryption standard in spite of being a great algorithm in terms of a good combination of confusion and diffusion steps, doesn’t largely used because of a weak key concept. The key used in DES is only 64 bits (or 56...
The efficiency of algorithms DATA MINING "Close + and Extraction of association rules" for indexation 2D/3D and Selection of characteristic views.
This paper presents a new classification and search method of 3D object features views. This method is an application of algorithms: Close+ for an object views classification purpose Algorithm for extracting asso...
DEVELOPMENT OF BIO-CRYPTO KEY FROM FINGERPRINTS USING CANCELABLE TEMPLATES
Identity theft can be effectively solved by the integration of biometrics and cryptography. Lately, researchers and experimenters have been greatly attracted by the improved performance (protection) of cryptographic keys...
An Empirical Study on XML Schema Idiosyncrasies in Big Data Processing
The design and maintenance of the XML schemas for the enterprise, if done incorrectly, can be difficult and frustrating experience. The applications that use XML data binding or participate in the processing of large and...