Imperceptible Stego-Marked Image Manipulation for Encrypted Data Hiding

Download Now
Provided by: International Journal of Application or Innovation in Engineering & Management (IJAIEM)
Topic: Big Data
Format: PDF
In day to day life, people from different sectors need to transfer the digital data for different purposes. But there exist many threats to this type of data transfer. Some important data can be lost during transfer or any intruder can hack the data to gain particular assesses. To handle these issues, one solution can be the use of a technique which will securely store the data and be sent in a form that no one could get to know that some important data is being transferred.
Download Now

Find By Topic