Downloads: 107 | Views: 288
Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015 | Popularity: 6.2 / 10
Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method
Ekata S. Bele, Chetan Bawankar
Abstract: To assert the secrecy and confidentiality of pictures or image could be a vivacious space of analysis, with totally different approaches being followed, the primary being encrypting the pictures through multi share multi level algorithms mistreatment keys, the opposite approach involves activity information mistreatment higher lsb data activity algorithmic rule to keep up the pictures secrecy. A data content owner encrypts the important image by mistreatment totally different share, and a hide knowledge will add further knowledge into the encrypted image mistreatment higher lsb data-hiding technique although he doesn't understand the initial and real data. With an encrypted image containing further knowledge, a receiver could initial rewrite it consistent with the cryptography key, and so extract the embedded knowledge and recover the initial image consistent with the data-hiding key.
Keywords: ekata
Edition: Volume 4 Issue 6, June 2015
Pages: 1976 - 1979
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 186 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Bangladesh, Volume 5 Issue 6, June 2016
Pages: 1523 - 1527Multifunctional Remote Controlled Robot Using Android Application
T. A. Mithu, T. S. Reddy
Downloads: 176 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 11, November 2020
Pages: 457 - 461Artificial Intelligence for Hiring
Ishan Borker, Ashok Veda
Downloads: 657 | Weekly Hits: ⮙1 | Monthly Hits: ⮙2
Research Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020
Pages: 1454 - 1458Heart Disease Prediction with Machine Learning Approaches
Megha Kamboj
Downloads: 105
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 5, May 2014
Pages: 1751 - 1754Joining Delay; Packet Delivery and Limitations of EGMP
G. Anandhi, Dr. S. K. Srivatsa
Downloads: 5 | Weekly Hits: ⮙4 | Monthly Hits: ⮙4
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 13 Issue 1, January 2024
Pages: 516 - 519I-Vote Android Application for Internet-Voting
Rahul Kumar, Hima Saxena, Dr. Suman Sharma