Review on Steganography in Digital Media
Journal Title: UNKNOWN - Year 2015, Vol 4, Issue 2
Abstract
Generally, in steganography, the actual information is not maintained in its original format and thereby it is converted into an alternative equivalent multimedia file like image, video or audio which in turn is being hidden within another object. This apparent message (known as cover text in usual terms) is sent through the network to the recipient, where the actual message is separated from it.
Vehicle Theft Identification RIFD Based Vehicle ID Detection in a Wireless Charging Applications
There is not any suitable payment system for the electric rechargeable automobiles. Additionally there is not any effective system to track the theft vehicles; still police-s job of finding the lost vehicle is very diffi...
Survey on Mobile and Wireless Security Awareness: User Perspectives
The use of wireless and mobile devices especially smartphones has become the norm nowadays. The emerging and advancement of wireless and mobile devices has brought the issue of security breaches and attacks back into foc...
The Stability Analysis of the Mathematical Model of Tuberculosis Transmission Dynamics
In this paper, we present the stability analysis of the mathematical model of Tuberculosis transmission dynamics based on SEI model. The analysis is derived from the principles of compartmental modeling showing the rates...
A Novel Pass Transistor Logic Based Pulse Triggered Flip-flop with Conditional Enhancement
A Novel Pass Transistor Logic Based Pulse Triggered Flip-flop with Conditional Enhancement
Quick and Secure Data Retrieval for Decentralized Disruption-Tolerant Military Networks
Abstract-The DTN technology is the famous technology which used in the military network it is differ from the normal peer to peer network it is having the storage network if the connection is not establish it will store...