Learn More
Abstract— Recently, numerous novel algorithms have been proposed in the fields of steganography and visual cryptography with the goals of improving security, reliability, and efficiency. This paper discusses and compares the two methodologies. Some similarities and differences are presented, in addition to discussing some of the best known(More)
Summary form only given. The digital forensic network lab is implemented with the goal of providing all students and faculty with a configurable research environment ideally suited for conducting network forensic testing on all TCP/IP network protocols passing through it. Of particular interest are protocols that are commonly used for file sharing, message(More)
This paper presents a framework for identifying the legal risks associated with performing network forensics on public networks. The framework is discussed in the context of the Gnutella P2P network protocol for which the legal issues related to authorized access have not yet been addressed. 1. Introduction The analysis of legal issues related to(More)
The image cryptography is one of the techniques used in the data security during communication over public domain. In the many researchers are working to make the visual cryptography techniques more robust and secure against the attack. In this paper, we have proposed the visual cryptography in the video with the halftone image as a secrete image. We have(More)
  • 1