Reserving Room before Encryption Using Reversible Data Hiding Through Encrypted Images
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064



Downloads: 132 | Monthly Hits: ⮙10

Research Paper | Computer Science & Engineering | India | Volume 3 Issue 9, September 2014

Reserving Room before Encryption Using Reversible Data Hiding Through Encrypted Images

A. Mallareddy, P Anjibabu

Privacy has acquired considerable attention but is still largely ignored inside multimedia local community. Consider some sort of cloud research scenario the spot that the server can be resource-abundant, and is also capable regarding finishing the particular designated duties. It can be envisioned in which secure advertising applications using privacy preservation is going to be treated seriously. In view that the scale-invariant characteristic transform (SIFT) has become widely adopted in several fields, this project may be the first to the fact that privacy-preserving SORT (PPSIFT) and to address the condition of safeguarded SIFT characteristic extraction and also representation inside encrypted domain..

Keywords: Feature Extraction, Privacy Preservation, Security

Edition: Volume 3 Issue 9, September 2014

Pages: 432 - 436

Share this Article

How to Cite this Article?

A. Mallareddy, P Anjibabu, "Reserving Room before Encryption Using Reversible Data Hiding Through Encrypted Images", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=SEP1489, Volume 3 Issue 9, September 2014, 432 - 436

Enter Your Email Address and Click Download Button





Similar Articles with Keyword 'Feature Extraction'

Downloads: 34 | Weekly Hits: ⮙5 | Monthly Hits: ⮙22

Research Paper, Computer Science & Engineering, Syria, Volume 10 Issue 3, March 2021

Pages: 524 - 528

Detection and Classification of Skin Cancer using Image Processing Techniques

Maha Shawish, Balsam Eid

Share this Article

Downloads: 38 | Weekly Hits: ⮙4 | Monthly Hits: ⮙16

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 2, February 2021

Pages: 1673 - 1677

Convolution Neural Network Based Image Recognition

Sofia Hamid, Mrigana Walia

Share this Article

Downloads: 100 | Weekly Hits: ⮙3

Comparative Studies, Computer Science & Engineering, India, Volume 6 Issue 2, February 2017

Pages: 2147 - 2150

A Comparative Study of Algorithms used for Detection and Classification of Plant Diseases

Roshni C.R, Dr. M. Safish Mary

Share this Article

Downloads: 101 | Monthly Hits: ⮙15

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1772 - 1776

A Survey on Facilitating Document Annotation Techniques

Priyanka C. Ghegade, Vinod S. Wadne

Share this Article

Downloads: 102 | Weekly Hits: ⮙2 | Monthly Hits: ⮙8

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 4, April 2015

Pages: 1769 - 1771

A Review of Comparatively Study of Different Speaker Recognition Techniques

Umer Malik

Share this Article

Similar Articles with Keyword 'Privacy Preservation'

Downloads: 103 | Weekly Hits: ⮙2

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1640 - 1647

Privacy Preservation Protection for Personalized Web User by k-Anonymity with Profile Construction for Web Search Engines

Uma Maheswari.T, Dr.V. Kavitha

Share this Article

Downloads: 103 | Weekly Hits: ⮙2 | Monthly Hits: ⮙9

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 1454 - 1457

A Reliable Method for Accuracy Constrained Privacy Preservation for Relational Data

Waghmare Ashwini R, V. M. Jarali

Share this Article

Downloads: 104 | Weekly Hits: ⮙2 | Monthly Hits: ⮙10

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 1989 - 1992

Privacy-Preservation and Public Auditing for Cloud Data - A Survey

S Archana, Ananthi J

Share this Article

Downloads: 104 | Monthly Hits: ⮙11

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2144 - 2147

Survey on Privacy Preservation in Content Based Information Retrieval

Bhagyashree V. Khapli, Manjushri A. Mahajan

Share this Article

Downloads: 105 | Weekly Hits: ⮙1 | Monthly Hits: ⮙13

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 1303 - 1306

Survey on Privacy Preservation of Sensitive Data

Uma Ashok Huljanti, Dr. Srinivas Narasim Kini

Share this Article

Similar Articles with Keyword 'Security'

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Student Project, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 1237 - 1240

Women Safety Alert System Using Arduino

P. Jayalakshmi, Bejjanki Shashank, Kakumani Yasaswi

Share this Article

Downloads: 8 | Monthly Hits: ⮙8

Research Paper, Computer Science & Engineering, India, Volume 10 Issue 4, April 2021

Pages: 788 - 791

A New Cryptography Algorithm Based on ASCII Code

Yaser M.A. Abualkas

Share this Article

Downloads: 37 | Weekly Hits: ⮙2 | Monthly Hits: ⮙37

Research Paper, Computer Science & Engineering, Sri Lanka, Volume 10 Issue 4, April 2021

Pages: 139 - 144

Analysis onto the Evolving Cyber-Attack Trends during COVID-19 Pandemic

Senthuran Nallainathan

Share this Article

Downloads: 40 | Weekly Hits: ⮙1

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1380 - 1382

A Literature Review of Enhancing Security in Mobile Ad-Hoc Networks Using Trust Management Security Scheme

Rajshree Ambatkar, Purnima Selokar

Share this Article

Downloads: 40

Research Paper, Computer Science & Engineering, China, Volume 9 Issue 4, April 2020

Pages: 1544 - 1554

Recent Developments on Probabilistic Graphical Model Applied in Data Analysis

Kan'Sam Nadjak, Guisheng Yin

Share this Article



Top