Using Concept of Steganography and Visual Cryptography for Secured Data hiding

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: The most advanced and updated Shamir Encryption algorithm is efficient enough to prevent and stop unauthorized and illegal access to the secured encoded data. It is best to solution to ensure reliability and security of the data with the help of Steganography and Visual Cryptography. On the ground of the failure of the previous extensive research by expert to ensure security of the data.

Authors and Affiliations

Mr. Deepak S. Bhiogade, , Prof. Milind Tote

Keywords

Related Articles

 A Reflective Swarm Intelligence Algorithm

 Swarm Intelligence (SI) algorithms are heuristics for finding the optimal solutions of optimization problems. They are made up of groups of swarms that interact with one another in the search effort within their...

 MDSR to Reduce Link Breakage Routing Overhead in MANET  Using PRM

 Dynamic Source Routing (DSR) algorithm is simple and best suited for high mobility nodes in wireless ad hoc networks. Due to high mobility in ad-hoc network, route may not exit for long time. Hence, DSR  alg...

 Validation Experimentations of Local Alignment Parameters for Comparing DNA and Protein Sequences

 Abstract : A basic issue in aligning DNA and protein sequences is to find similar characters between two or more sequences in order to detect relations between newly defined sequences and well-known sequences store...

 Human Being Character Analysis from Their Social Networking Profiles

In this paper, characteristics of human beings obtained from profile statement present in their social networking profile status are analyzed in terms of introvert, extrovert or ambivert. Recently, Machine learning plays...

Download PDF file
  • EP ID EP147662
  • DOI -
  • Views 113
  • Downloads 0

How To Cite

Mr. Deepak S. Bhiogade, , Prof. Milind Tote (2014).  Using Concept of Steganography and Visual Cryptography for Secured Data hiding. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 130-135. https://europub.co.uk./articles/-A-147662