International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 122 | Views: 325 | Weekly Hits: ⮙5 | Monthly Hits: ⮙5

Research Paper | Electronics & Communication Engineering | India | Volume 4 Issue 4, April 2015 | Popularity: 7.3 / 10


     

Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption

Akash V. Malasane, S. P. Bhonge


Abstract: Metamorphic cryptography is the inconsistency between of cryptography and steganography. This combination will be used for the higher level of security has gained a lot of importance. Cryptography refers to the study of art and science for achieving security by encode the messages to make them sure that the data is not readable. The readable message is converted into an unreadable message by using cryptographic system, this process called as well-structured and systematic, antithesis operation is performed by using cryptanalysis that means unreadable message is converted into a readable message, this process called as error and trial based. Steganography is the technique that give the skill to hide the massages that is to be kept secret inside other messages. Before The art and science of writing hidden messages in such a way that no one can access this information expect sender and receiver. This paper provides a higher level of security for hide the information messages by using development of system for video based metamorphic encryption.


Keywords: Cryptography, Steganography, Metamorphic encryption, metamorphic decryption, key


Edition: Volume 4 Issue 4, April 2015


Pages: 2014 - 2019



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Akash V. Malasane, S. P. Bhonge, "Secure Information Transmission Based on Cryptography Fused with Steganography by using Metamorphic Video Encryption", International Journal of Science and Research (IJSR), Volume 4 Issue 4, April 2015, pp. 2014-2019, https://www.ijsr.net/getabstract.php?paperid=16041503, DOI: https://www.doi.org/10.21275/16041503



Similar Articles

Downloads: 0

Review Papers, Electronics & Communication Engineering, India, Volume 11 Issue 12, December 2022

Pages: 143 - 144

Blockchain Based Access Control System for Cloud Storage

Kamisetty Vinay

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Masters Thesis, Electronics & Communication Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1015 - 1019

A High Performance Data Encryption and Masking Using AES Algorithm

Poornima TN, Dr. Somashekar K

Share this Article

Downloads: 4 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Electronics & Communication Engineering, India, Volume 11 Issue 4, April 2022

Pages: 1295 - 1299

Implementation of Elliptic Curve Cryptography Processor for FPGA Applications

Ch. Venkateswarlu, Nirmala Teegala

Share this Article

Downloads: 95

M.Tech / M.E / PhD Thesis, Electronics & Communication Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2276 - 2281

Skin based Data hiding in Images by Using Haar and db2 DWT Techniques

Swapnali Zagade, Smita Bhosale

Share this Article

Downloads: 101

Review Papers, Electronics & Communication Engineering, India, Volume 5 Issue 12, December 2016

Pages: 1054 - 1061

Review on Methods of Authentication of Images with Data Repair Capability

Vrushali Chirmade, Dimple Chaudhari

Share this Article
Top