Asian Science Citation Index is committed to provide an authoritative, trusted and significant information by the coverage of the most important and influential journals to meet the needs of the global scientific community.  
ASCI Database
308-Lasani Town,
Sargodha Road,
Faisalabad, Pakistan
Fax: +92-41-8815544
Contact Via Web
Suggest a Journal
Articles by M. Padmaa
Total Records ( 3 ) for M. Padmaa
  M. Padmaa , Y. Venkataramani and Rengarajan Amirtharajan
  The study of communication security includes not just encryption but also traffic security, whose essence lies in "Information Hiding". The security of an image can be enhanced by cleverly embedding data without affecting its quality. This can be done by using information hiding techniques like steganography and cryptography. Combining steganography with cryptography becomes an essential facet for secure communication. In present study, enhanced image quality and security is obtained by consorting pixel indicator technique with PVD technique. Here, the raw data is first encrypted to get two different forms of message T1 and T2 using two distinct keys K1, K2 which is done by using encryption algorithms. As two encrypted messages can be embedded in this process, we have to first extract and then decrypt the message to retrieve the original data. The enhanced level of security is defined by the fact that even if one retrieves the message from the image it’s still incomprehensible to get the original message without the two keys K1 and K2.
  M. Padmaa and Y. Venkataramani
  Steganography presents us with a secure means of data transfer which protects confidential information from unauthorized change. Putting it simple, it is a boon to prevent the unauthorized access or misuse of secret information. There are a lot of techniques (both spatial and transform domain) in Steganography. The question of “Which technique is the best” can only be answered hypothetically. Every steganographic technique is unique in its own way and produces desired result, that is, protection of information. The technique proposed in this study sheds light on capacity of embedding and high quality visual while being immune to steg analysis attack. Complexity is driven by means of stego key and LSB substitution.
  M. Padmaa and Y. Venkataramani
  Signals, images, emails, voice and videos, everything comes under screening before or after it is communicated. Protecting the information is highly essential especially in electronic communication which has become a stipulation in the routine life of zillions. Since safeguarding has many literal connotations, this study ntrates on one of them, privacy; technically secrecy or security. From the family of Information security, the proposed method can pick out cryptography and steganography to make this algorithm more secure and effective as well. As far as Visual Cryptography is concerned, the primary terminologies here are share, user and transparency. Its blend with steganography is worth mentionable here as it forms a new platform in information security and secret sharing. For embedding, Pixel Indicator (PI), Pixel Value Differencing (PVD) and OPAP are used. With reference to Pixel Indicator, two methods are discussed here. The effectiveness of the proposed method is assessed by calculating MSE and PSNR and the outcomes are tabulated and compared with existing methods.
Copyright   |   Desclaimer   |    Privacy Policy   |   Browsers   |   Accessibility