1. Visual Steganography and Encryption Tachniques with Hardware Implementation
- Author
-
Hemang Shrivastava, Hare Ram Sah, and Manoj Ramaiya
- Subjects
Steganography ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Yarn ,computer.file_format ,Thread (computing) ,Encryption ,Image (mathematics) ,Visualization ,visual_art ,visual_art.visual_art_medium ,Image file formats ,business ,computer ,Computer hardware ,Linear search - Abstract
The visual steganography is used to hide secret message within an image and extracting it from destination image. The secure forms of steganography are visual steganography which is implemented in image files. For securing data encryption method is used with mathematical concepts and achieves higher level of secured communication. Both the techniques visual steganography and encryption technique are combined to achieve two layer of security. Instead of sequential search, the thread based parallel search is implemented to increase the retrieval speed at high rate of concurrent search which can be implemented on any real-time architecture.
- Published
- 2020
- Full Text
- View/download PDF