Refine your search
Co-Authors
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Sajeev Ambi, A. R.
- Secured File Management System Using Stegnography
Abstract Views :138 |
PDF Views:2
Authors
Affiliations
1 Department of Computer Applications, Malankara Catholic College, Tamil Nadu
2 Department of Computer Science, Womens Christian College, Tamil Nadu, IN
3 Department of Computer Applications, Malankara Catholic College, Tamil Nadu, IN
1 Department of Computer Applications, Malankara Catholic College, Tamil Nadu
2 Department of Computer Science, Womens Christian College, Tamil Nadu, IN
3 Department of Computer Applications, Malankara Catholic College, Tamil Nadu, IN
Source
Digital Image Processing, Vol 4, No 8 (2012), Pagination: 429-432Abstract
The purpose of stegnography is to hide messages or files inside other harmless file in way that does not allow any enemy to detect that there is a second secret message or file is present. Now Stegnography is gaining new popularity with the current industry demands for digital watermarking and fingerprinting of audio and video. Stegnography in images has truly come of age with the invention of fast, powerful computers. The most popular technique in image Stegnography is Least Significant Bit Insertion. There are a large number of stegnographic methods that most of us are familiar with especially if you watch a lot of spy movies, ranging from invisible ink and microdots to secreting a hidden message in the second letter of each word of a large body of text and spread spectrum radio communication. With computers and networks, there are many other ways of hiding information.Keywords
Least Significant Bit Insertion (LSBI), Encryption, Cover Medium, Hidden Data, Stego Key, Stego Medium.- Tract & Grid Based Image Authentication
Abstract Views :125 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, IN
2 Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, IN
1 Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, IN
2 Department of Computer Applications Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, IN
Source
Biometrics and Bioinformatics, Vol 5, No 6 (2013), Pagination: 234-238Abstract
People often choose weak passwords or use the same password for multiple accounts. Such practices can threaten security for not only the individual, but also for the entire website, service or business application. If a hacker is able to access just one user account through weak or stolen credentials, it can quickly escalate to a more widespread security breach. For avoiding this we are developing an easy and intuitive second layer of authentication using sector of images. First level is authenticating with alphanumeric and the second level is authenticating with several facts of an image.Keywords
Tract Forming, Category Authentication.- Cryptography & Steganography
Abstract Views :170 |
PDF Views:3
Authors
Affiliations
1 Department of Computer Applications, Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, IN
1 Department of Computer Applications, Malankara Catholic College, Mariagiri, Kaliyakkavilai, KK Dist, Tamilnadu, IN