Image Steganography With LSB
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2013, Vol 2, Issue 1
Abstract
:The rapid development of data transfer through internet has made it easier to send the data accurate and faster to the destination, but in order to transfer the data securely to the destination without any modifications, there are many approaches like steganography. This paper introduces the concept of steganography using “ LSB METHOD”.
Authors and Affiliations
Rahul Joshi , Lokesh Gagnani , Salony Pandey
OPTIMAL LOCATION OF UPFC IN POWER SYSTEM USING SYSTEM LOSS SENSITIVITY INDEX
This paper presents the development of simple and efficient models for suitable location of unified power flow controller (UPFC), with static point of view, for congestion management. Two different objectives h...
Trust in Cloud Computing
Cloud computing is the most recent technology in the Information technology industry which a lot of companies and government are putting much concern to make sure that they have benefited from this new innovation. Howeve...
A Survey on Preserving Privacy towards Location Proof
Location proof of a particular person relies on his/her mobile device position. One of the valuable features of the location proofs tells about accessing the location based services (LBS) by using mobile device. Lo...
Computaional Complexity Analysis on Water Quality Index
The computational algorithms are used to determine the features and applications from large data sets in real time environment. The computational applications are also used in environmental computing to evaluate th...
Disambiguation of User Queries in Search Engines
With the increasing number of user queries to search engine. it has become necessary to study the area of Information Retrieval. User always expects to get the most appropriate and relevant results to the query. Bu...