3 research outputs found

    A High Secured Steganalysis using QVDHC Model

    Get PDF
    Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression. The data format will be an audio, image, text or video. The main objective is to save memory of using these techniques is to save memory and to preserve data confidentiality, integrity. In this paper, a hybrid approach was proposed which combines Quotient Value Difference (QVD) with Huffman coding. These two methods are more efficient, simple to implement and provides better security to the data. The secret message is encoded using Huffman coding, while the cover image is compressed using QVD. Then the encoded data is embedded into cover image and transferred over the network to receiver. At the receiver end, the data is decompressed to obtain original message. The proposed method shows high level performance when compared to other existing methods with better quality and minimum error

    Secure Communication Model for Dynamic Task Offloading in Multi-Cloud Environment

    Get PDF
    As the data is increasing day-by-day, the mobile device storage space is not sufficient to store the complete information and also the computation capacity also is a limited resource which is not sufficient for performing all the required computations. Hence, cloud computing technology is used to overcome these limitations of the mobile device. But security is the main concern in the cloud server. Hence, secure communication model for dynamic task offloading in multi-cloud environment is proposed in this paper. Cloudlet also is used in this model. Triple DES with 2 keys is used during the communication process between the mobile device and cloudlet. Triple DES with 3 keys is used by the cloudlet while offloading the data to cloud server. AES is used by the mobile device while offloading the data to the cloud server. Computation time, communication time, average running time, and energy consumed by the mobile device are the parameters which are used to evaluate the performance of the proposed system, SCM_DTO. The performance of the proposed system, SCM_DTO is compared with ECDH-SAHE and is proved to be performing better

    A high secured Steganalysis using QVDHC model

    Get PDF
    Data compression plays a vital role in data security as it saves memory, transfer speed is high, easy to handle and secure. Mainly the compression techniques are categorized into two types. They are lossless, lossy data compression. The data format will be an audio, image, text or video. The main objective is to save memory of using these techniques is to save memory and to preserve data confidentiality, integrity. In this paper, a hybrid approach was proposed which combines Quotient Value Difference (QVD) with Huffman coding. These two methods are more efficient, simple to implement and provides better security to the data. The secret message is encoded using Huffman coding, while the cover image is compressed using QVD. Then the encoded data is embedded into cover image and transferred over the network to receiver. At the receiver end, the data is decompressed to obtain original message. The proposed method shows high level performance when compared to other existing methods with better quality and minimum erro
    corecore