Top Message
Top Message
Back to Home Page  |  Settings   |  Sign In
Web Education
1 2 3 4 5
Pages
|
Viewing 31-40 of 48 total results
 Secure Message Transfer Using Cryptography and ...
[5] Y.K.Jain and R. R. Ahirwal, "A Novel Image Steganography Method wih Adaptive Number of Least Significant bits Modification Based on Private Stego Keys", International Journal of Computer Science and Security (2010)....
Metamorphic Cryptography: A Fusion of Cryptography and ...
Atul Haribhau Kachare, Mona Deshmukh. International Journal of Engineering and Technical Research (IJETR) ISSN: 2321-0869, Volume-2, Issue-3, March 2014
List of Open Access publications for International Journal ...
A Novel Image Steganography Method with Adaptive Number of Least Significant Bits Modification Based on Private Stego-Keys : Yogendra Kumar Jain : Pages - 40 - 49 | Revised - 25-02-2010 | Published - 26-03-2010 : Full Text Available (120.31KB) MORE INFORMATION
 Hiding Data in Video Sequences using RC6 Algorithm
This method uses the Least Significant Bits (LSB) insertion to hide data within encrypted image data. The binary representation of the each hidden data is used to overwrite the LSB of each byte within the encrypted image randomly. The Least significant bit replacement method is effectively used for data hiding process....
A Secure Steganographic Algorithm Based on Frequency ...
This contribution proposes a novel steganographic method based on the compression standard according to the Joint Photographic Expert Group and an Entropy Thresholding technique. The steganographic algorithm uses one public key and one private key to generate a binary sequence of pseudorandom numbers that indicate where the elements of the binary sequence of a secret message will be inserted....
STEGANOGRAPHY-TECHNOLOGY-RESEARCH PAPER-SOFTWARE
A novel imagesteganographymethod with adaptive number of least significant bits modification based on private stego-keys free download Abstract To enhance the embedding capacity of imagesteganographyand provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego ......
Comparative study of digital audio steganography ...
Also known as LSB (Least Significant Bit), this method is one of the earliest methods used for information hiding. Traditionally, It is based on embedding each bit from the message in the least significant bit of the cover audio in a deterministic way (see Figure3). Thus, for a 16 kHz sampled audio, 16 kbps of data are hidden....
Perancangan Aplikasi Stegakrip Dengan Metode LSB Dan ...
Information hiding using least significant bit steganography and cryptography. International Journal of Modern Education and Computer Science, 4(6), 27-34. Jain, Y. K., & Ahirwal, R. R. (2010). A novel image steganography method with adaptive number of least significant bits modification based on private stego-keys.
Steganography - Wikipedia
Steganography (/ ˌ s t ɛ ɡ ə ˈ n ɒ ɡ r ə f i / STEG-ə-NOG-rə-fee) is the practice of concealing a file, message, image, or video within another file, message, image, or video.The word steganography comes from Greek steganographia, which combines the words steganós (στεγανός), meaning "covered or concealed", and -graphia meaning "writing&...
US5748763A - Image steganography system featuring ...
An identification code signal is hidden in a carrier signal (such as an electronic data signal or a physical medium) in a manner that permits the identification signal later to be discerned. The carrier signal can thereby be identified, or some machine responsive action can thereby be taken. In one image steganography embodiment, the relative strength of the identification code signal is both ...
1 2 3 4 5
Pages
|