Secure Image Hiding Algorithm using Cryptography and Steganography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 13, Issue 5
Abstract
In the present scenario, any communication of internet and networks application requires security.Lots of data security and data hiding algorithms have been developed in the last decade.Cryptography and steganography are the two major techniques for secret communication.In this paper,the secret image is first encrypted by using BLOWFISH algorithm which has very good performance and is a most powerful technique compared to other Algorithms. Now this encrypted imageis embedded with videoby using LSB Approach of steganography. Our proposed model gives two layers of security for secret data, which fully satisfy the basic key factors of information security system that includes: Confidentiality, Authenticity, Integrity and Non – Repudiation
Authors and Affiliations
Hemlata Sharma
A Review on Geometrical Analysis in Character Recognition
Abstract: Character Recognition is a prominent area in the field of image processing. Most of the basicconcepts in image processing have been introduced in connection with research carried out in characterrecogniti...
Privacy Preserving and Load Balancing For Secure Cloud Storage
Using Cloud Storage, users can remotely store their data and enjoy the on-demand high quality applications and services from a shared pool of configurable computing resources, without the burden of local data sto...
Image Enhancement Techniques: A Selected Review
Image enhancement is one of the key issues in high quality pictures such as digital cameras. Since image clarity is very easily affected by lighting, weather, or equipment that has been used to capture the image....
A Survey on Different Levels of Risks during Different Phases in Data Warehouse
Abstract: The term Data Warehouse represents huge collection of historical data which are subject-oriented, non-volatile, integrated, and time-variant and such data is required for the business needs [1]. Data warehouses...
Identify the surgically altered face images using granular-PCA approach
Abstract: Plastic surgery provide a way to enhance the facial appearance. The non-linear variations introduced by the plastic surgery has raised a challenge for face recognition algorithms. In this research we ma...