TWO-LEVEL DATA SECURITY USING STEGANOGRAPHY AND 2D CELLULAR AUTOMATA

نویسندگان

چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Data Security and Copyright Protection Using Cellular Automata

The emergence of many challenges and the rapid development of the means of communications and computer networks and the Internet. Digital information revolution has affected a lot on human societies. Data today has become available in digital format (text, image, audio, and video), which led to the emergence of many opportunities for creativity for innovation as well as the emergence of a new k...

متن کامل

Data Security and Authentication Using Steganography

Steganography is the art of covered, or hidden, writing. The purpose of steganography is covert communication to hide the existence of a message from a third party. This proposed system deals with implementing security-using Steganography. In this technology, the end user identifies an image which is going to act as the carrier of data. The data file is encrypted and authenticated. This message...

متن کامل

Data Security Using Cryptography and Steganography Techniques

Although cryptography and steganography could be used to provide data security, each of them has a problem. Cryptography problem is that, the cipher text looks meaningless, so the attacker will interrupt the transmission or make more careful checks on the data from the sender to the receiver. Steganography problem is that once the presence of hidden information is revealed or even suspected, th...

متن کامل

Forest Fire Simulation Using 2d Cellular Automata

Since many decades different parts of world's forest environment undergo depletion because of many factors but major depletion is due to random forest fires a state, process, or instance of combustion in which fuel or other material is ignited and combined with oxygen, giving off light, heat and flame. This causes destruction of a building, town, forest etc. In Andhra Pradesh the forest area to...

متن کامل

Data Security with Image Clustering using Steganography

Steganography is art of invisible Communication. It strives to hide the existence of communicated message in appropriate medium i.e. Image, Audio or Video. So as not to arouse an eavesdropper’s suspicion. Various techniques with Objectives of robustness, Payload and Undetectability are available and have their respective pros and cons. Various Steganography Techniques are employed depending on ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Research in Engineering and Technology

سال: 2014

ISSN: 2321-7308,2319-1163

DOI: 10.15623/ijret.2014.0319060