We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Information Security through data Encryption and Data Hiding

by Somaditya Roy, Samir Kumar Bandyopadhyay
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 4 - Number 12
Year of Publication: 2010
Authors: Somaditya Roy, Samir Kumar Bandyopadhyay
10.5120/874-1235

Somaditya Roy, Samir Kumar Bandyopadhyay . Information Security through data Encryption and Data Hiding. International Journal of Computer Applications. 4, 12 ( August 2010), 32-35. DOI=10.5120/874-1235

@article{ 10.5120/874-1235,
author = { Somaditya Roy, Samir Kumar Bandyopadhyay },
title = { Information Security through data Encryption and Data Hiding },
journal = { International Journal of Computer Applications },
issue_date = { August 2010 },
volume = { 4 },
number = { 12 },
month = { August },
year = { 2010 },
issn = { 0975-8887 },
pages = { 32-35 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume4/number12/874-1235/ },
doi = { 10.5120/874-1235 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:52:56.864094+05:30
%A Somaditya Roy
%A Samir Kumar Bandyopadhyay
%T Information Security through data Encryption and Data Hiding
%J International Journal of Computer Applications
%@ 0975-8887
%V 4
%N 12
%P 32-35
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

This paper introduces a model for information security and message hiding based on image steganography as well as it describes about various steps of that proposed model in brief.

References
  1. G. Eason, B. Noble, and I. N. Sneddon, “On certain integrals of Lipschitz-Hankel type involving products of Bessel functions,” Phil. Trans. Roy. Soc. London, vol. A247, pp. 529–551, April 1955. (references)
  2. J. Clerk Maxwell, A Treatise on Electricity and Magnetism, 3rd ed., vol. 2. Oxford: Clarendon, 1892, pp.68–73.
  3. I. S. Jacobs and C. P. Bean, “Fine particles, thin films and exchange anisotropy,” in Magnetism, vol. III, G. T. Rado and H. Suhl, Eds. New York: Academic, 1963, pp. 271–350.
  4. K. Elissa, “Title of paper if known,” unpublished.
  5. R. Nicole, “Title of paper with only first word capitalized,” J. Name Stand. Abbrev., in press.
  6. Y. Yorozu, M. Hirano, K. Oka, and Y. Tagawa, “Electron spectroscopy studies on magneto-optical media and plastic substrate interface,” IEEE Transl. J. Magn. Japan, vol. 2, pp. 740–741, August 1987 [Digests 9th Annual Conf. Magnetics Japan, p. 301, 1982].
  7. M. Young, The Technical Writer's Handbook. Mill Valley, CA: University Science, 1989.
Index Terms

Computer Science
Information Sciences

Keywords

Image steganography Data Hiding