• English
    • français
    • Deutsch
    • español
    • português (Brasil)
    • Bahasa Indonesia
    • русский
    • العربية
    • 中文
  • English 
    • English
    • français
    • Deutsch
    • español
    • português (Brasil)
    • Bahasa Indonesia
    • русский
    • العربية
    • 中文
  • Login
View Item 
  •   Home
  • OAI Data Pool
  • OAI Harvested Content
  • View Item
  •   Home
  • OAI Data Pool
  • OAI Harvested Content
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

Browse

All of the LibraryCommunitiesPublication DateTitlesSubjectsAuthorsThis CollectionPublication DateTitlesSubjectsAuthorsProfilesView

My Account

Login

The Library

AboutNew SubmissionSubmission GuideSearch GuideRepository PolicyContact

Statistics

Most Popular ItemsStatistics by CountryMost Popular Authors

Applications Secure Data Transmission using Dual Steganographic Approach

  • CSV
  • RefMan
  • EndNote
  • BibTex
  • RefWorks
Author(s)
Dr. Ch. Rupa
B. Sai Jyothi
Dr. P. S. Avadhani
Contributor(s)
The Pennsylvania State University CiteSeerX Archives
Keywords
GOC
Cheating Text
Dual Steganography
WMM

Full record
Show full item record
URI
http://hdl.handle.net/20.500.12424/3656202
Online Access
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.7165
http://ijsaa.org/8011211.pdf
Abstract
Abstract — Security is an issue that is more sensitive in a message transmission due to the open nature and lack of morality in humans. In this paper we used different steganographic techniques for keeping a message secretly. Current research efforts follow a hierarchical approach. It is using steganographic approach or cryptographic approach or else both. Despite of that several authentication mechanisms are proposed due to attackers are enhancing the information from the secure message. Hence in the proposed method used genetic operator crossover (GOC) for encrypting the real message. Then, the cipher Text is eliding into the meaning full sentence using cheating text method. To improve the security of a real message again the result, cheating text is hidden into a message using word mapping method (WMM). Security of a message will improve with this approach. It can achieve by improving the computation complexity and conquering of cryptography and dual steganographic techniques.
Date
2012-04-14
Type
text
Identifier
oai:CiteSeerX.psu:10.1.1.219.7165
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.219.7165
Copyright/License
Metadata may be used without restrictions as long as the oai identifier remains attached to it.
Collections
OAI Harvested Content

entitlement

 
DSpace software (copyright © 2002 - 2022)  DuraSpace
Quick Guide | Contact Us
Open Repository is a service operated by 
Atmire NV
 

Export search results

The export option will allow you to export the current search results of the entered query to a file. Different formats are available for download. To export the items, click on the button corresponding with the preferred download format.

By default, clicking on the export buttons will result in a download of the allowed maximum amount of items.

To select a subset of the search results, click "Selective Export" button and make a selection of the items you want to export. The amount of items that can be exported at once is similarly restricted as the full export.

After making a selection, click one of the export format buttons. The amount of items that will be exported is indicated in the bubble next to export format.