Multiple Level Information Security Using Image Steganography and Authentication
نویسندگان
چکیده
منابع مشابه
Data Security and Authentication Using Steganography
Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing security-using Steganography. In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is encrypted and authenticated. This message...
متن کاملData Security with Image Clustering using Steganography
Steganography is art of invisible Communication. It strives to hide the existence of communicated message in appropriate medium i.e. Image, Audio or Video. So as not to arouse an eavesdropper’s suspicion. Various techniques with Objectives of robustness, Payload and Undetectability are available and have their respective pros and cons. Various Steganography Techniques are employed depending on ...
متن کاملImproved information security using robust Steganography system
Steganography is an emerging area which is used for secured data transmission over any public media.Steganography is a process that involves hiding a message in an appropriate carrier like image or audio. It is of Greek origin and means "covered or hidden writing". The carrier can be sent to a receiver without any one except the authenticated receiver knowing the existence of this information. ...
متن کاملNovel Approach to Information Security Management of Confidential and Propriety Information using Image Steganography
Today there is a paradigm shift in the way we look at securing assets. In a time where knowledge is the most important asset there is need to look at securing these assets in a different way. Based on the review literature it has been observed that laptop stolen/lost can be possible threat to leakage of confidential data. Most of the stolen laptops are never recovered. Though data backups are a...
متن کاملSecret image sharing with steganography and authentication
A novel approach to secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is proposed. A secret image is first processed into n shares which are then hidden in n user-selected camouflage images. It is suggested to select these camouflage images to contain well-known contents, like famous character images, well-known scene pi...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Advanced Trends in Computer Science and Engineering
سال: 2019
ISSN: 2278-3091
DOI: 10.30534/ijatcse/2019/100862019