The demand for effective information security schemes is increasing day by day with the exponential growth of internet. Therefore, cryptographic algorithms are widely used in many research areas to fulfill the security requirements. Among the security requirements, message authentication plays an important role to prevent message alternation and modification from unauthorized party. Due to attack made on Today’s data communication, effective steganographic techniques are also developed using various carriers such as image, audio, video, etc. So, this work proposes security system by integrating cryptographic one-way hash function (SHA-512) and image steganographic approach to meet confidentiality and message authentication requirements. The...
In the present scenario the use of images increased extremely in the cyber world so that we can easi...
In this era, many people exchange data digitally either through the internet or other communication ...
This paper proposes a novel steganographic technique for secure data communication by combining Secr...
The demand for effective information security schemes is increasing day by day with the exponential ...
In the field of communication system and internet, the information security is playing ...
In the field of communication system and internet, the information security is playing a crucial rol...
Data hiding is one of the challenging issues in the field of network security. Unlike cryptography, ...
Steganography is a process that involves hiding a message in an appropriate carrier like image or au...
Steganography is a method of sending confidential information in a way that the existence of the cha...
The information security becoming more important and attracting much attention nowadays as the numbe...
The network provides a method of communication to distribute information to the masses. With the gro...
This paper introduces a new method of securing image using cryptographic and steganographic techniqu...
AbstractSteganography is the only answer for secure and secret communication. Existing methods in im...
Abstract — Security is an important issue in the field of communication. During storing or transmiss...
Steganography is the art and science that hides the information in an appropriate cover carrier like...
In the present scenario the use of images increased extremely in the cyber world so that we can easi...
In this era, many people exchange data digitally either through the internet or other communication ...
This paper proposes a novel steganographic technique for secure data communication by combining Secr...
The demand for effective information security schemes is increasing day by day with the exponential ...
In the field of communication system and internet, the information security is playing ...
In the field of communication system and internet, the information security is playing a crucial rol...
Data hiding is one of the challenging issues in the field of network security. Unlike cryptography, ...
Steganography is a process that involves hiding a message in an appropriate carrier like image or au...
Steganography is a method of sending confidential information in a way that the existence of the cha...
The information security becoming more important and attracting much attention nowadays as the numbe...
The network provides a method of communication to distribute information to the masses. With the gro...
This paper introduces a new method of securing image using cryptographic and steganographic techniqu...
AbstractSteganography is the only answer for secure and secret communication. Existing methods in im...
Abstract — Security is an important issue in the field of communication. During storing or transmiss...
Steganography is the art and science that hides the information in an appropriate cover carrier like...
In the present scenario the use of images increased extremely in the cyber world so that we can easi...
In this era, many people exchange data digitally either through the internet or other communication ...
This paper proposes a novel steganographic technique for secure data communication by combining Secr...