ARCHITECTURE OF NEW HIDING TECHNIQUE FOR PROJECTED & COMPRESSED TEXT IN DIGITAL IMAGE Aditi Soni, Sujit K. Badodia SVITS, Indore, India ABSTRACT The art of information hiding has received lots of attention in the recent years as security of information has become a big concern in this internet epoch. As sharing of sensitive information through a common communication channel has become unavoidable, Steganography is the science and art of hiding information. Steganography means hiding a secret message (the embedded message) within a file (source cover) in such a way that an observer will not be able to detect the presence of contents of the hidden message. In this paper, proposed data hiding method that utilizes Projection of the letters, then
If any user wants to access the data then he have to decrypt it by using a key. Another method has been opted for securing and protecting the databases. It has been observed that to make the databases secure different rules at organization level can be implemented. Data or information is always a big and important asset for any organization whose security cannot be negotiated. In different information security layers area unit outlined shown in figure 2 below.
In this assignment I will identified well confidentiality, integrity and availability and real world application of the. So I will try to discuss these three component and example of real world scenario. 1.3.1 Confidentiality In the context of information security and CIA triad , confidentiality means that information that should stay secret and only those person authorized to access it may receive access . From ancient times, mankind has known that information is power, and in our information age access to information is more important than ever. Unauthorized access to confidential information many have divesting consequences, not only in national security applications, but also in commerce and industry, main mechanism of protection of confidentiality in information systems are cryptography and access control.
SECRET SHARING Shamir’s Secret Sharing algorithm in cryptography is developed by Adi Shamir. It is a method of secret sharing, where a secret is divided into pieces, giving each authenticated member its own unique part, where at least half the parts or more than half are needed together to reconstruct the secret. All shares required together seems to be not practical, and therefore sometimes the threshold scheme is used where any no. of share are sufficient to reconstruct the original secret. Shamirs (t, n)-threshold scheme.
Abstract Cryptography is one of the main constituents of computer security. Public cryptography is the art of protecting information by transforming it (encrypting it) into an unreadable format, called cipher text. Only those who possess a secret key can decrypt the message into plain text. This paper reviews five commonly used asymmetric key cryptography algorithms namely RSA, Diffie–Hellman, El Gamal, DSA and ECC and present their comparative study. 1.
The technique of elastography was introduced into the clinic for the purpose of improving the diagnostic performance of thyroid carcinoma. Due to its a noninvasive nature and later on with additional imaging modality features, Ophir et al.  proposed elastography in 1991 for the purpose of evaluating the stiffness of tissue and it has been widely used ever since. Many studies have indicated that adding elastographic technique to conventional US can help to improve the differentiation of thyroid lesions [45, 46]. Elastography is based upon the mechanical principles that tissue displacement is more in softer tissue than in harder tissue; hence elastography can be used to estimate the tissue stiffness in way that can reflect the nature of lesions.
Because of this steganography has invented. Steganography is the practice of hiding private or sensitive information within something that appears to be nothing out of the usual(Aelphaeis Mangarae , 2006). History of steganography based on ancient antiquity. Steganography, coming from the Greek words (stegos) meaning roof or covered and (graphia) which means writing(Krenn, 2000). However, with the evolution of technology steganography has progressed too.
The so-called fully homomorphic encryption is considered the Holy Grail of Cryptography. Addition and multiplication are the main building blocks of computers, and the ability to make calculations on encrypted data without decrypting it, would lead to a whole new level of security. So, a company, for example, could send an encrypted database to a cloud computing provider, which would work on that data without decrypting it. If a customer wanted then to perform a search on their personal database, it could be performed in spite of the encryption, the result would then be encoded and sent to the authorized person, and the latter can then decrypt it on their own computer. Similarly, the content of other Internet applications such as web-mail could
In today’s world, the Internet is used to access and transfer huge amounts of data. Therefore, security of that data becomes a pivotal issue. Almost everything is stored in databases that are maintained by the servers which provide a secure access to it. This secure access is nothing but a culmination of cryptographic techniques to prevent any kind of misuse of this data. For example, the accounts’ information in a bank’s database contains crucial data misuse of which may lead to a great amount of financial loss.
The k-means clustering is one of the most common methods of data analysis in the field of pattern recognition, image processing etc.. 4. Image segmentation Segmentation partitions an image into distinct regions containing each pixels with similar attributes. The segmentation can be done using various methods like Otsu’ method, k-means clustering, converting RGB image into HIS model etc. Image segmentation is typically used to locate objects and boundaries in images. The result of image segmentation is a set of segments that collectively cover the entire image or a set of contours extracted from the image.