The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the increasing developments in communication technologies, there is a need for extremely robust information exchange, which is the core aim of steganography. Steganography conceals this information into a trusted media, i.e., an image, video, or audio file, thereby masking its existence. In this paper, to improve the security of implanted data, a steganographic method is proposed that uses contours...
Steganography embeds a secret message inside an innocent looking cover medium, stealthily, without creating any attention. The cover medium used can be a text, image, audio, video, network packets, etc. To embed the secret, steganographic techniques rely on the redundant information of the used cover medium or the properties which human perceptual system fails to differentiate. Hence the choice of...
The Image enciphering applications have been progressively analyzed to cope with the demand of secured realtime image transmission over the channels. The existing chaotic systems hold several important features, such as the sore dependence on initial constraints, system arguments, pseudorandom property, no periodicity and topological transitivity. Chaotic cryptosystems have more useful and practical...
Human health, energy, and comfort are affected more by climate than by any other element of the physical environment. Physiological functions of the human body respond to changes in the weather with climate and the seasons. The emphasis of present work is to provide the hot day temperature patterns during April and May months and extract its behavioral aspects using association rule mining of data...
The tool firewall is the software or hardware procedure that facilitates to guard data and it filter the entire traffic voyage the network boundary. It might be configured to restrict or to permit certain devices or applications to access our data sources available in our network. Packet matching over the firewall tool can be treated as a taper setting trouble: All network data packet consist of its...
This paper inscribes a new approach for maintaining the data usage report for the cloud data storage using a novel data property analyzer. Cloud data storage is a technology that uses the internet and central remote servers to maintain data and share the applications. It allows consumer to use applications without installation and access their personal files at any computer with internet access. In...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.