Skin Detection Based Cryptography in Steganography (SDBCS)
Journal Title: International Journal of Computer Science and Information Technologies - Year 2010, Vol 1, Issue 4
Abstract
As the popularity of digital cameras increases, some limitations of digital technology are becoming apparent and on the other hand it has become imperative to ensure security of information. Looking ahead towards the authentication scheme with a view to optimize it. Skin detection [1] is a very popular and useful technique for detecting and tracking human-body parts. It receives much attention mainly because of its wide range of applications such as, face detection and tracking, naked people detection, hand detection and tracking, people retrieval in databases and Internet, etc. With this view we proposed a novel method in steganography using skin color detection scheme. In this method we introduced a Two Way security mechanism in steganography using skin color detection scheme as well as cryptography. To ensure the strength of cryptography we used JCA (Java Cryptography Architecture).
Authors and Affiliations
Mr. R. Surendiran , Dr. K. Alagarsamy
An Approach to Secure Larger Size Data with Authenticity and Integrity
The scenario of present day of information security system includes confidentiality, authenticity, integrity, non-repudiation. This present paper focus is enlightening the technique to secure data or message with authen...
CHALLENGES IN COMPUTING TODAY
This paper reviews the challenges faced by ordinary users in the domain of computing today.As there are numerous problems in computing,with each problem centered around different issues and each one r...
Design of DFE Based MIMO Communication System for Mobile Moving with High Velocity
Reliability, high quality, and efficient data rate communication for high speed mobile is the growing research in recent years. In this paper time dispersive and frequency dispersive effects on signal is analyzed. Then a...
A Journey on WiMAX and its Security Issues
Security has become a primary concern in order to provide protected communication in Wireless environment. We know the basic concept of communication is sent the information from source node to destination node but in my...
Text database cleaning by filling the Missing values using Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture
Agents are software programs that perform tasks on behalf of others and they are used to clean the text database with their characteristics. Agents are task oriented with the ability to learn by them...