Research Article

Information Security through data Encryption and Data Hiding

by  Somaditya Roy, Samir Kumar Bandyopadhyay
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Issue 12
Published: August 2010
Authors: Somaditya Roy, Samir Kumar Bandyopadhyay
10.5120/874-1235
PDF

Somaditya Roy, Samir Kumar Bandyopadhyay . Information Security through data Encryption and Data Hiding. International Journal of Computer Applications. 4, 12 (August 2010), 32-35. DOI=10.5120/874-1235

                        @article{ 10.5120/874-1235,
                        author  = { Somaditya Roy,Samir Kumar Bandyopadhyay },
                        title   = { Information Security through data Encryption and Data Hiding },
                        journal = { International Journal of Computer Applications },
                        year    = { 2010 },
                        volume  = { 4 },
                        number  = { 12 },
                        pages   = { 32-35 },
                        doi     = { 10.5120/874-1235 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2010
                        %A Somaditya Roy
                        %A Samir Kumar Bandyopadhyay
                        %T Information Security through data Encryption and Data Hiding%T 
                        %J International Journal of Computer Applications
                        %V 4
                        %N 12
                        %P 32-35
                        %R 10.5120/874-1235
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces a model for information security and message hiding based on image steganography as well as it describes about various steps of that proposed model in brief.

References
  • G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
  • J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
  • I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  • K. Elissa, “Title of paper if known,” unpublished.
  • R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  • Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
  • M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Image steganography Data Hiding

Powered by PhDFocusTM