Jeffrey S. Marean

Learn More
Summary form only given. The digital forensic network lab is implemented with the goal of providing all students and faculty with a configurable research environment ideally suited for conducting network forensic testing on all TCP/IP network protocols passing through it. Of particular interest are protocols that are commonly used for file sharing, message(More)
Abstract— Recently, numerous novel algorithms have been proposed in the fields of steganography and visual cryptography with the goals of improving security, reliability, and efficiency. This paper discusses and compares the two methodologies. Some similarities and differences are presented, in addition to discussing some of the best known(More)
The image cryptography is one of the techniques used in the data security during communication over public domain. In the many researchers are working to make the visual cryptography techniques more robust and secure against the attack. In this paper, we have proposed the visual cryptography in the video with the halftone image as a secrete image. We have(More)
  • 1