The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Cloud computing provides the massive potential for technological transformation in traditional distributed network services. In general cloud computing services provide an ease to associated cloud customers to access and perform multiple operations on it from multiple locations. Thus, secure data sharing, storage and transference for this large volume of the data set are one of the key issues for...
Multimedia confidential data uses internet communication channel for transmission where it is not very safe to transmit data via internet communication channel. So it is desired to secure the data before transmitting. The image transmission is a also an another way where image is an array, or a matrix, of square pixels (picture elements) arranged in columns and rows Image processing is one of the...
Instruction set architecture (ISA) of a processor fills the semantic gap between user and machine. A good ISA for a particular application should be able to address the issues of programmability, implementability, and compatibility. An application specific instruction set processor (ASIP) is a processor designed for a particular application. ISA customization is the process of integrating application...
Steganography is a technology used since years for the communication of messages secretly. These secret messages are put inside honest carriers. Carriers can be digital images, audio files, video files and so on. The limitation in sending concealed longer messages has been overcoming by the inclusion of video files as carriers. Popular internet services such as Skype, BitTorrent, GoogleSuggest, and...
Reversible watermarking is quite effective in transfer of small data through the medium of images and both could be easily recovered at the receiving end. Because of this it's widely used in medical imagery. Here we propose a technique based on difference expansion, in which the transferred image consist of the original image embedded with, the patient information, hash of the original image and the...
The unbelievable evolution of Internet technologies & its applications need very high level the security of data during transmission over the unsafe communication network. Image steganography is a technique for hiding information into a cover image. Least Significant-Bit (LSB) based approach is most common steganographic technique in spatial domain due to its easiness and hiding capacity....
The incredible evolution of Internet technologies & its applications require high level the security of data over the communication channel. Image steganography is a digital technique for concealing information into a cover image. Least Significant-Bit (LSB) based approach is most popular steganographic technique in spatial domain due to its simplicity and hiding capacity. All of existing methods...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.