SECURED DATA HIDING BY USING EXTENDED VISUAL CRYPTOGRAPHY

نویسندگان

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

LSB Based Steganography using Genetic Algorithm and Visual Cryptography for Secured Data Hiding and Transmission

A large number of commercial steganographic programs use the Least Significant Bit(LSB) embedding as the method of choice for hiding data as it has low computation complexity and high embedding capacity. Although there has been an extensive research work in the past, but majority of the work has no much optimal consideration for robust security towards the encrypted image. The proposed system p...

متن کامل

Extended Visual Cryptography Scheme for Secret Hiding

Visual Cryptography is based on cryptography where n images are encoded in a way that only the human visual system can decrypt the hidden message without any cryptographic computations when all shares are stacked together. This paper presents an improved algorithm based on Chang’s and Yu visual cryptography scheme for hiding a colored image into multiple colored cover images. This scheme achiev...

متن کامل

Reversible Data Hiding using Visual Cryptography: A Review

Data security and data integrity are the two challenging areas for research. There are so many research is progressing on the field like internet security, steganography, cryptography. Data hiding are a group of techniques used to put a secure data in a host media with small deterioration in host and the means to extract the secure data afterwards. Reversible data hiding is a technique to embed...

متن کامل

Data Hiding Using Cryptography: A Review

In this paper we will overview how data hiding can be done using Cryptography. Basically, we will describe how one can use Steganography for hiding data with Cryptography. Cryptography and Steganography are well known and widely used techniques that manipulate information in order to cipher or hide their existence. These two techniques share the common goals and services of protecting confident...

متن کامل

Medical Image Protection by Using Cryptography Data-Hiding and Steganography

This paper presents protecting the transmission of medical images. The presented algorithms will be applied to images.This work presents a new method that combines image cryptography, data hiding and Steganography technique for denoised and safe image transmission purpose. In This method we encrypt the original image with stream cipher algorithm then embed the encrypted image with patient infor...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2014

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2014.0311006