Using Concept of Steganography and Visual Cryptography for Secured Data hiding
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: The most advanced and updated Shamir Encryption algorithm is efficient enough to prevent and stop unauthorized and illegal access to the secured encoded data. It is best to solution to ensure reliability and security of the data with the help of Steganography and Visual Cryptography. On the ground of the failure of the previous extensive research by expert to ensure security of the data.
Authors and Affiliations
Mr. Deepak S. Bhiogade, , Prof. Milind Tote
A Reflective Swarm Intelligence Algorithm
Swarm Intelligence (SI) algorithms are heuristics for finding the optimal solutions of optimization problems. They are made up of groups of swarms that interact with one another in the search effort within their...
Comparison of different Ant based techniques for identification of shortest path in Distributed Network
MDSR to Reduce Link Breakage Routing Overhead in MANET Using PRM
Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network, route may not exit for long time. Hence, DSR alg...
Validation Experimentations of Local Alignment Parameters for Comparing DNA and Protein Sequences
Abstract : A basic issue in aligning DNA and protein sequences is to find similar characters between two or more sequences in order to detect relations between newly defined sequences and well-known sequences store...
Human Being Character Analysis from Their Social Networking Profiles
In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays...