In Greek steganography this is called as “covered writing”, which is the science of communication using hidden information. To analyze the existing techniques this method is introduced. This technique embeds and extracts the hidden information of large length inside digital images which maintains the range and size of the original image. Without the knowledge of the original image the hidden message can be recovered using the suitable keys. Methods related to speed spectrum like image restoration and error control methods are explained and the presentation of the system is showed.
Steganography has been also categorized as cryptography by many authors because hiding a message is considered as somekind of secret writing. The main types of steganography are Technical Steganography and Linguistic Steganography. We will not go deeper in describing these types since as mentioned Steganography is not the main theme of the discussion in this document. 3.2 Digital Watermarking Digital watermark also known as forensic watermark is a peace of code embedded into an image document or video and it can be visible or invisible. Main aim of digital watermark is to protect the authenticity of a document and its author
Considering the above parameters, Cryptographic algorithms and protocol are very useful to keep a network system secure. “Cryptography” is an art and science of providing information by transferring it into an unreadable format which can be only read by the expected receiver having the secret key to break the message. It can be defined as a science that applies complex mathematics and logic to design strong encryption
Scenography is a discipline that helps us appreciate that the use of space in cinematographic narration is not an arbitrary decision, but that it forms part of the narrative paraphernalia. While temporal relations are dominant in auditory signs, in visual signs, spatial relations are dominant. Up/down; in front/behind; close/distant; left/right are not indifferent decisions in framing an object on the screen. Horizontal and vertical axes are not neutral dimensions of pictorial representations (Chandler 2010, 110). Apart from the conventional ideological connotations of space, there are equally the superstitious connotations that the audience can gather from the significance of the positions of particular images.
A Comparative Study on Privacy Preserving Data Mining Techniques Raza Hassan Student, Dept. of CS Nation University of Computer & Emerging Sciences, CFD F149016@nu.edu.pk Sajid Anwer Lecturer, Dept. of CS Nation University of Computer & Emerging Sciences, CFD email@example.com Abstract Privacy preserving has devised as a vital concern with reference to the success of the data mining. Privacy preserving data mining (PPDM) deals with hiding an individual’s sensitive identity without sacrificing the usability of data and is a well-researched branch even today. People have become well conscious of the privacy intrusions on their personal data and are very hesitant to share their sensitive information.
Initially, established cryptographic primitives for the idea of data security protection cannot be directly adopted due to the users loss of control of data in Cloud Computing. Therefore, confirmation of correct data storage in the cloud must be conducted without a explicit knowledge of the whole data. Taking into consideration that various kinds of data for each user stored in the cloud and the claim of long term continuous declaration of their data safety, the problem of verifying exactness of data storage in the cloud becomes even more demanding. Secondly, the Cloud Computing is not just considered as a third party data warehouse. The data stored in the cloud may be recurrently updated by the users, including deletion, insertion, modification, appending, reordering, etc.
The hidden relationships and trends are not precisely distinct from reviewing the data. Data mining is a multi-level process involves extracting the data by retrieving and assembling them, data mining algorithms, evaluate the results and capture them. Data Mining is also revealed as necessary process where bright methods are used to extract the data patterns by passing through miscellaneous data mining
REVIEW ON DATA MINING Poornima D Jiawei Han Micheline Kamber Abstract: My main research involved how Data Mining process involves in real world and the reach of data mining and utilities of data mining. Data Mining has a great deal of attention due to wide availability of huge amounts of data, where these imminent need for turning such data into a useful information and knowledge. From the last development of data collection and database creation mechanisms served as prerequisite from development of effective mechanisms for data storage and retrieval, and query and transaction processing. The fast-growing, tremendous-amount of data, collected and stored in large and numerous data repositories, has far exceeded our human ability for comprehension
Attack on data always happens without the person involve realize about it. This is why data encryption is important. Data encryption using asymmetric key is one of the most trustable data security algorithm. When the sender wants to send data or message, data encryption will change the data to an indecipherable state by using algorithms or theorems. Data encryptions are initially used by the authority military to communicate with each other during the old days.
This is why Data Mining has a somewhat mixed response from the researcher in this ﬁeld. If used correctly, it can be a powerful tool, holding the potential to fully exploit the exponentially increasing amount of available data, promising great advances in Astronomy. However, if misused, it can be little more than the black-box application of complex computing algorithms that may give little insight, and provide questionable results. Skepticism is not the only problem, now days there are Multi-Terabyte Sky Surveys and Archives which will soon reach Multi-Petabyte, Billions of Detected Sources, and Hundreds of Measured Attributes per Source. Below are the high lights of current trends of Observational Astronomy • Large digital sky surveys are becoming the dominant source of data in astronomy: currently 100 TB in major archives, and growing