Steganography with BSS-RSA-LSB technique: A new approach to Steganography
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 5
Abstract
Security of information plays a vital role in data transmission. For this purpose steganography and cryptography is plays a major role. Steganography embed a text into cover image and cryptography convert plain text into the cipher text vice versa. There are many algorithms that has been proposed for steganography and cryptography for safe transmission of the data. But intruder sometimes identify the secret message from the stegano image. In the proposed system we apply BSS technique on secret message after to convert the cipher text using RSA algorithm. The cipher text is embedded into cover image using LSB technique, it generates stegano image.
Authors and Affiliations
Rakesh Nayak| Associate Professor,Department of CSE, Sri Vasaviengineering College, Tadepalligudem,Andhrapradesh
Efficiency of Text Mining of Accident Narratives By Accessing Predictive Performance
This work portrays the utilization of content mining with a mix of methods to naturally find accident attributes that can educate a superior comprehension of the supporters of the accidents. The review assesses the v...
Scuttling Web Opportunities By Application Cramming
The web contains large data and it contains innumerable websites that is monitored by a tool or a program known as Crawler. The main goal of this paper is to focus on the web forum crawling techniques. In this paper,...
To The Encrypted Sensed Data By Applying Digital Signatures To Message Packets Using SET-IBS and SETIBOOS
We recommend two protected and resourceful data Transmission(SET) protocols for CWSNs, called SET-IBS and SETIBOOS,by means of the IBS scheme and the IBOOS scheme, correspondingly. The key suggestion of both SET-IBS...
A New Multilevel Inverter Topology of D-STATCOM to Compensate Reactive and Nonlinear Loads
This work proposes an enhanced hybrid distribution static compensator (D-STATCOM) topology to address some practical issues like power loss, filter size, performance etc. A LCL filter has been utilized at the front e...
Low-Error and High-Throughput Discrete Cosine Transform (DCT) Design
In this paper, by operating the shifting and addition in parallel, an error-compensated addertree (ECAT) is proposed to deal with the truncation errors and to achieve low-error and highthroughput discrete cosine transf...