TWO-LEVEL DATA SECURITY USING STEGANOGRAPHY AND 2D CELLULAR AUTOMATA
نویسندگان
چکیده
منابع مشابه
Digital Data Security and Copyright Protection Using Cellular Automata
The emergence of many challenges and the rapid development of the means of communications and computer networks and the Internet. Digital information revolution has affected a lot on human societies. Data today has become available in digital format (text, image, audio, and video), which led to the emergence of many opportunities for creativity for innovation as well as the emergence of a new k...
متن کاملData Security and Authentication Using Steganography
Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing security-using Steganography. In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is encrypted and authenticated. This message...
متن کاملData Security Using Cryptography and Steganography Techniques
Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, th...
متن کاملForest Fire Simulation Using 2d Cellular Automata
Since many decades different parts of world's forest environment undergo depletion because of many factors but major depletion is due to random forest fires a state, process, or instance of combustion in which fuel or other material is ignited and combined with oxygen, giving off light, heat and flame. This causes destruction of a building, town, forest etc. In Andhra Pradesh the forest area to...
متن کاملData Security with Image Clustering using Steganography
Steganography is art of invisible Communication. It strives to hide the existence of communicated message in appropriate medium i.e. Image, Audio or Video. So as not to arouse an eavesdropper’s suspicion. Various techniques with Objectives of robustness, Payload and Undetectability are available and have their respective pros and cons. Various Steganography Techniques are employed depending on ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Research in Engineering and Technology
سال: 2014
ISSN: 2321-7308,2319-1163
DOI: 10.15623/ijret.2014.0319060