2,938 research outputs found

    An Expert System for Automatic Software Protection

    Get PDF
    L'abstract è presente nell'allegato / the abstract is in the attachmen

    A review on structured scheme representation on data security application

    Get PDF
    With the rapid development in the era of Internet and networking technology, there is always a requirement to improve the security systems, which secure the transmitted data over an unsecured channel. The needs to increase the level of security in transferring the data always become the critical issue. Therefore, data security is a significant area in covering the issue of security, which refers to protect the data from unwanted forces and prevent unauthorized access to a communication. This paper presents a review of structured-scheme representation for data security application. There are five structured-scheme types, which can be represented as dual-scheme, triple-scheme, quad-scheme, octal-scheme and hexa-scheme. These structured-scheme types are designed to improve and strengthen the security of data on the application

    Reviewing the Effectivity Factor in Existing Techniques of Image Forensics

    Get PDF
    Studies towards image forensics are about a decade old and various forms of research techniques have been presented till date towards image forgery detection. Majority of the existing techniques deals with identification of tampered regions using different forms of research methodologies. However, it is still an open-end question about the effectiveness of existing image forgery detection techniques as there is no reported benchmarked outcome till date about it. Therefore, the present manuscript discusses about the most frequently addressed image attacks e.g. image splicing and copy-move attack and elaborates the existing techniques presented by research community to resist it. The paper also contributes to explore the direction of present research trend with respect to tool adoption, database adoption, and technique adoption, and frequently used attack scenario. Finally, significant open research gap are explored after reviewing effectiveness of existing techniques

    HIGH CAPACITY AND OPTIMIZED IMAGE STEGANOGRAPHY TECHNIQUE BASED ON ANT COLONY OPTIMIZATION ALGORITHM

    Get PDF
    The tremendous development of digital technology, it is mandatory to address the security while transmitting information over network in a way that observer couldn’t depict it. Measures to be taken to provide the security by establishing hidden communication using steganography principle which is help to camouflage the secret information in some carrier file such as text, image, audio and video. In this era of hidden data communication, image becoming an effective tool on account of their frequency, capability and accuracy. Image steganography uses an image as a carrier medium to hide the secret data. The main motive of this article is that the uses the combination of frequency domain and optimization method inorder to increasing in robustness. In this article, Integer Wavelet transform is performed into the host image and coefficients have been transformed. ACO optimization algorithm is used to find the optimal coefficients where to hide the data. Furthermore, sample images and information having been demonstrated which proved the increased robustness as well as high level of data embedding capacity
    • …
    corecore