Learn More
Consider an image that has been encrypted uncompressed. The data compression algorithms are ineffective because the encryption masks the source. To reduce the size, distributed source coding technique is used without requiring the data be compressed prior to encryption. Under some reasonable condition, neither the security nor the compression efficiency(More)
In order to improve the capacity of the hidden secret data and to provide an imperceptible stego image quality, a new image steganography method based on image contrast is presented. A group of 2×2 blocks of non-overlapping spatially adjacent pixels is selected as the valid block for embedding the secret message. The modulo 4 arithmetic operation is(More)
—Steganography is the approach for hiding any secret message in a variety of multimedia carriers like images, audio or video files. Whenever we are hiding a data, it is very important to make it invisible, so that it could be protected. A number of steganographic algorithms have been proposed based on this property of a steganographic system. This paper(More)
Association rule mining is an active data mining research area and most ARM algorithms cater to a centralized environment. Centralized data mining to discover useful patterns in distributed databases isn't always feasible because merging data sets from different sites incurs huge network communication costs. In this paper, an Improved algorithm based on(More)
In this study, an efficient feature fusion based technique for the classification of colour texture images in VisTex album is presented. Gray Level Co-occurrence Matrix (GLCM) and its associated texture features contrast, correlation, energy and homogeneity are used in the proposed approach. The proposed GLCM texture features are obtained from the original(More)
Mobile agent systems are an active area of research with many issues still to be addressed before they achieve practical widespread use. Mobile agent is a mobile object that moves from host to host under the control of its own will to achieve task. Mobile agents are mainly intended to be used for applications distributed over large-scale networks since they(More)
As the multimedia and internet technologies are growing fast, the transmission of digital media plays an important role in communication. The various digital media like audio, video and images are being transferred through internet. There are a lot of threats for the digital data that are transferred through internet. Also, a number of security techniques(More)
Large volumes of data are available in the web. The discussion forum, review sites, blogs and news corpora are some of the opinion rich resources. The opinions obtained from those can be classified and used for gathering online customer's preferences. Techniques are being applied to design a system that identifies and classify opinions spread largely in the(More)