The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper proposes a steganography method using the digital images. Here, we are embedding the data which is to be secured into the digital image. Human Visual System proved that the changes in the image edges are insensitive to human eyes. Therefore we are using edge detection method in steganography to increase data hiding capacity by embedding more data in these edge pixels. So, if we can increase...
Steganography is a data hiding process in which information is secured, while transferring data from sender to receiver. In audio steganography, encoding process is carried out through inactive frames of low bit rate audio streams by performing iLBC (Internet Loy Bit rate Codec). This methodology can be used in applications such as VoIP(Voice Over Internet Protocol), streaming audio archival and messaging...
In this paper we proposed a steganography with maximum data, hiding capacity. In order to increase data hiding, 2D Anaglyphic stereography images are used for this process. The 2D Anaglyphic stereo input images of different colours and coloured filters in front of each eye allows only the appropriate image to pass. Some international standards body has decided that the right eye filter should he blue...
DNA cryptography is a new field in cryptography that is emerging with the advancement on DNA research carried out in recent years. DNA is being used because of its vast parallelism, energy efficiency and the amount of information that the DNA can store. These properties of DNA are explored for cryptographic purposes such as encryption, authentication, signature, and various other applications in cryptography...
Association rule mining finds the strong association between the large items of data sets. In this paper we mainly focus on the privacy using Ck secure sum in randomized response technique. Because when the data is distributed among different sites in horizontal partitioning across multiple sites and the sites wish to collaborate to identify valid association rule globally. However the sites must...
This paper presents a very low power and area efficient ASIC implementation of Advanced Encryption Standard Algorithm (AES). The implementation results of S-Box, MixColumn Transformation and overall AES encryption/ decryption are given in this paper. The AES has been implemented in 90nm standard CMOS library using Synopsys Design Compiler with a core voltage of 1.2V. The power dissipation of S-Box...
Ever since the rise of technology and communication, the want of security system has also gone up. The indispensable facets of secure data transmission are none other than sheltered, hasty last but not least multifarious cryptosystem. The other dimension of information hiding is steganography. The downside of cryptography is though the secret is cloaked, communication is not rather disguised. For...
The advent of the internet age has led to the increase of prominent network security issues. Information encryption has long been a method used for information security. With the rapid development of parallel computing capacities of computer hardware, this method alone could not be trusted to ensure security by increasing the key sizes, thus bringing in the information hiding techniques into the scenario...
Data mining algorithms extract knowledge from very large data. In most cases the large data has to be shared among multiple users where security plays a vital role. This paper deals with an efficient privacy preserving decision tree construction by reducing communication and computation cost while performing secure cardinality of scalar product during tree induction. The algorithm scales well with...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.