International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 132 | Views: 277

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014 | Popularity: 6.2 / 10


     

Reserving Room before Encryption Using Reversible Data Hiding Through Encrypted Images

A. Mallareddy, P Anjibabu


Abstract: Privacy has acquired considerable attention but is still largely ignored inside multimedia local community. Consider some sort of cloud research scenario the spot that the server can be resource-abundant, and is also capable regarding finishing the particular designated duties. It can be envisioned in which secure advertising applications using privacy preservation is going to be treated seriously. In view that the scale-invariant characteristic transform (SIFT) has become widely adopted in several fields, this project may be the first to the fact that privacy-preserving SORT (PPSIFT) and to address the condition of safeguarded SIFT characteristic extraction and also representation inside encrypted domain. .


Keywords: Feature Extraction, Privacy Preservation, Security


Edition: Volume 3 Issue 9, September 2014


Pages: 432 - 436



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
A. Mallareddy, P Anjibabu, "Reserving Room before Encryption Using Reversible Data Hiding Through Encrypted Images", International Journal of Science and Research (IJSR), Volume 3 Issue 9, September 2014, pp. 432-436, https://www.ijsr.net/getabstract.php?paperid=SEP1489, DOI: https://www.doi.org/10.21275/SEP1489



Similar Articles

Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024

Pages: 516 - 519

I-Vote Android Application for Internet-Voting

Rahul Kumar, Hima Saxena, Dr. Suman Sharma

Share this Article

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 137 | Weekly Hits: ⮙2 | Monthly Hits: ⮙3

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2246 - 2249

Packet Analysis with Network Intrusion Detection System

Rashmi Hebbar, Mohan K

Share this Article

Downloads: 0

Student Project, Computer Science & Engineering, India, Volume 11 Issue 1, January 2022

Pages: 455 - 459

Real World IoT Applications in Daily Domain

Eega Vivek Reddy, J Bala Krishna, Huzaifa Saad

Share this Article

Downloads: 0

Survey Paper, Computer Science & Engineering, India, Volume 11 Issue 7, July 2022

Pages: 1023 - 1029

A Survey and High-Level Design on Human Activity Recognition

Abhishikat Kumar Soni, Dhruv Agrawal, Md. Ahmed Ali, Dr. B. G. Prasad

Share this Article
Top