Gender: : Male
Branch: : Computer Science EngineeringSend Friend Request
lsome current hash algorithms
•SHA-512 & Whirlpool
lHMAC authentication using hash function
lCMAC authentication using a block cipher
Gender: : Male
City : BareillySend Friend Request
Cryptography Paper Presentation And Seminar
In the multimedia steganocryptic system, the message will first be encrypted using public key encryption algorithm, and then this encrypted data will be hidden into an image file thus accomplishing both data encoding and hiding. The multimedia data will be used to provide the cover for the information. Cryptography involves converting a message text into an unreadable cipher. On the other hand, steganography embeds message into a cover media and hides its existence. Both these techniques provide some security of data neither of them alone is secure enough for sharing information over an unsecure communication channel and are vulnerable to intruder attacks.
Although these techniques are often combined together to achieve higher levels of security but still there is a need of a highly secure system to transfer information over any communication media minimizing the threat of intrusion. In this paper we propose an advanced system of encrypting data that combines the features of cryptography, steganography along with multimedia data hiding. This system will be more secure than any other these techniques alone and also as compared to steganography and cryptography combined systems Visual steganography is one of
Please find the attached file along with this
If You have any query regarding the files.Please feel free to ask.I'll be glad to help you.
Gender: : Female
City : LucknowSend Friend Request
Nice matter to study and understand..thanks...
---------- Post added at 02:04 PM ---------- Previous post was at 02:04 PM ---------
Last edited by vrishtisingh; 4th November 2011 at 07:38 PM.