Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 4 Issue 6, June 2015

Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method

Ekata S. Bele, Chetan Bawankar

To assert the secrecy and confidentiality of pictures or image could be a vivacious space of analysis, with totally different approaches being followed, the primary being encrypting the pictures through multi share multi level algorithms mistreatment keys, the opposite approach involves activity information mistreatment higher lsb data activity algorithmic rule to keep up the pictures secrecy. A data content owner encrypts the important image by mistreatment totally different share, and a hide knowledge will add further knowledge into the encrypted image mistreatment higher lsb data-hiding technique although he doesn't understand the initial and real data. With an encrypted image containing further knowledge, a receiver could initial rewrite it consistent with the cryptography key, and so extract the embedded knowledge and recover the initial image consistent with the data-hiding key.

Keywords: ekata

Edition: Volume 4 Issue 6, June 2015

Pages: 1976 - 1979

Share this Article

How to Cite this Article?

Ekata S. Bele, Chetan Bawankar, "Implementation of MLMS base Information Security in Combination with HLSB Data Hiding Method", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SUB155620, Volume 4 Issue 6, June 2015, 1976 - 1979

76 PDF Views | 62 PDF Downloads

Download Article PDF



Top