Copyright © 2014 ISSR Journals. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. ABSTRACT: Now a days, in data transmission security and authentication are the major challenges. To resolve these problems different techniques are used like cryptography, steganography etc. in the image steganography, we are using two images i.e., cover image and hidden image. The hidden image is sent by put it in the cover image. In the present techniques, only one key is used for both encryption and decryption. So, the users can see the data and also they can modify the content of the data.. Now...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Steganography could be a technique of concealing secret messages in a very cowl object whereas commu...
The rapid growth of the internet and electronic commerce has brought to the forefront the issue of p...
Security is a fundamental component of every network design. Authenticity and Security of data is a ...
The design of secure authentication protocols is quite challenging. Involving human authentication p...
The RSA algorithm is an asymmetric key cryptography. Based on the theoretical frame work of Deffie a...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
The idea of information security lead to the evolution of Cryptography. In other words, Cryptography...
Cryptography defines different methods and technologies used in ensuring communication between two p...
With the world entering in the 21st century rigorous efforts are being made to secure data and flow ...
The information technique has developed rapidly. The technique of QR codes is widely applied in our ...
Perkembangan teknologi dan sistem jaringan saat ini mengalami peningkatan secara signifikan, terutam...
RSA Rivest-Shamir-Adleman is an algorithm used by modern computers to encrypt and decrypt messages. ...
Abstract: In Public key cryptography two different keys (a pair of keys) are used, one for encryptio...
RSA method has been a staple of cryptology for centuries. It is the corner stone of modern encryptio...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Steganography could be a technique of concealing secret messages in a very cowl object whereas commu...
The rapid growth of the internet and electronic commerce has brought to the forefront the issue of p...
Security is a fundamental component of every network design. Authenticity and Security of data is a ...
The design of secure authentication protocols is quite challenging. Involving human authentication p...
The RSA algorithm is an asymmetric key cryptography. Based on the theoretical frame work of Deffie a...
Abstract: The security of the Rivest-Shamir-Adelman (RSA) public key algorithm depends on the diffic...
The idea of information security lead to the evolution of Cryptography. In other words, Cryptography...
Cryptography defines different methods and technologies used in ensuring communication between two p...
With the world entering in the 21st century rigorous efforts are being made to secure data and flow ...
The information technique has developed rapidly. The technique of QR codes is widely applied in our ...
Perkembangan teknologi dan sistem jaringan saat ini mengalami peningkatan secara signifikan, terutam...
RSA Rivest-Shamir-Adleman is an algorithm used by modern computers to encrypt and decrypt messages. ...
Abstract: In Public key cryptography two different keys (a pair of keys) are used, one for encryptio...
RSA method has been a staple of cryptology for centuries. It is the corner stone of modern encryptio...
Cryptography has a long and fascinating history. Over the centuries, an elaborate set of protocols a...
Steganography could be a technique of concealing secret messages in a very cowl object whereas commu...
The rapid growth of the internet and electronic commerce has brought to the forefront the issue of p...