P Thakur, S Kushwaha, Y Rai - International Journal of Computer …, 2015 - academia.edu
Steganography word is making from two words: one is Steganos that means “covered or secret” and second is the graphic that means “writing”. Similarly Cryptography word is also …
R Amirtharajan, P Archana, V Rajesh… - … IEEE Conference on …, 2013 - ieeexplore.ieee.org
The advent of the internet age has led to the increase of prominent network security issues. Information encryption has long been a method used for information security. With the rapid …
Broadband application of wireless communication calls for good signal to noise ratio (SNR) and variable high data rates. In the midst of a spate of available techniques, Orthogonal …
Steganography technique and the combination of both techniques; Both the technique can be applied on various type of secrete message like text, image, video and audio etc …
R Amirtharajan, PS Priya, G Revathi… - … IEEE Conference on …, 2013 - ieeexplore.ieee.org
Ever since the rise of technology and communication, the want of security system has also gone up. The indispensable facets of secure data transmission are none other than …
Modern day business world go hand in hand with the technologies. For instance, one can witness the usage of teleconferencing, image scanning; smart cards etc have become more …
Role of modern day technology in business world is very imperative and moving. Be it collaboration, telephony, social media etc. in a particular trade, ultimately, information is …
This paper gives an insight on, error control codes, where Low Density Parity Check (LDPC) codes or turbo codes are used to encode the data stream to tolerate channel errors and …