Security in Video Conferencing Using Video Stegnography
Journal Title: International journal of Emerging Trends in Science and Technology - Year 2015, Vol 2, Issue 8
Abstract
I describe a steganographic system which embeds secret messages into a video stream.I examine the signal path which typically includes discrete cosine transformation (DCT) based, lossy compression. Result is the technical realisation of a steganographic algorithm whose security is established by indeterminism within the signal path.
Authors and Affiliations
dr. Shruti
A Real Time Telehelth Monitoring System
Now a day's healthcare industry is to provide better healthcare to people anytime and anywhere in the world in a more economic and patient friendly manner. In the present paper the physiological parameters such as ECG, P...
A surveillance of MRSA nasal carriage in Community and Health Care Workers
Staphylococcus aureus (S. aureus) is both a human commensal & an important pathogen in disease. It is a frequent cause of infections in both community and hospital. Being the principal habitant in human nares, S. aureus...
Fusarium Wilt of Garden Egg (Solanum melongena) At Imawa Village of Kura Local Government of Kano State, Nigeria
This was a Survey of fusarium wilt of Solanum melongena at Imawa village of Kura Local Government area located on N11o 47’56.8” and 008o 27’33.7”. During the survey, Four (4) plots were visited weekly for 8 weeks. Sympto...
Semi-Structured Data Structured Data Conversion Using Data Mining Methods
Emerging technologies of semi-structured data have attracted a wide attention like networks, e-commerce, information retrieval and databases. In these applications, the data are modeled not as static collections but as t...
Analysis of J48 Algorithm in Classification-Ebola Virus
Data mining is the rising research area to overcome various queries and classification. It is one of the major problems in the area of data mining. In this article, we used J48 algorithm of the WEKA interface. It can be...