Downloads: 120 | Views: 261
Research Paper | Computer Science & Engineering | India | Volume 2 Issue 5, May 2013 | Popularity: 6.7 / 10
A Novel Method of Data Encryption and Hiding Scheme Using VPASS Technique
Anand L S, Prajwal S Sanket, Sharath R V, Varun R
Abstract: Cryptography is an art of making the data unintelligible to third party other than the sender and receiver. The security for data can be implemented using public and private cryptography. The data is made secure using many data encryption techniques. We have proposed an advanced technique of encryption involving unique VPASS Algorithm. Original work related this includes the playfair technique and since then modification to this have been proposed. Our scheme involves the use of unique VPASS matrix to encrypt the messages. Security of the message can be enhanced by using a steganography technique. Steganography is the art of concealing the existence of information within seemingly harmless carriers. In this paper we have proposed a revised information hiding scheme using VPASS technique. Original work related to our scheme includes the Chang et al method of information hiding. The Chang et al method can be implemented for greyscale images but our method can be implemented for colour images.
Keywords: Steganography, embedding, VPASS, reference matrix
Edition: Volume 2 Issue 5, May 2013
Pages: 293 - 296
Make Sure to Disable the Pop-Up Blocker of Web Browser
Downloads: 656 | Views: 2004
Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 401 | Views: 722
Computer Science & Engineering, India, Volume 7 Issue 11, November 2018
Pages: 1951 - 1955Hadoop Performance Improvement using Metadata and Securing with Oauth Token
Swapnali A. Salunkhe, Amol B. Rajmane
Downloads: 386 | Views: 703
Computer Science & Engineering, India, Volume 9 Issue 12, December 2020
Pages: 1 - 3Comparative Study of Conventional Desktop Computer and Compute Stick
Aadarsh Sooraj, Sooraj G.
Downloads: 354 | Views: 700
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 629 - 632Review Paper on Secure Hashing Algorithm and Its Variants
Priyanka Vadhera, Bhumika Lall
Downloads: 336 | Views: 690
Computer Science & Engineering, India, Volume 3 Issue 6, June 2014
Pages: 2148 - 2152The Impact and Application of 3D Printing Technology
Thabiso Peter Mpofu, Cephas Mawere, Macdonald Mukosera