Rajesh Kumar Tiwari

Learn More
The growing possibilities of modern communication need the special means of security especially on computer network. Data security in the last few years has gained a wider audience. In this paper we have discussed a new steganographic technique based on the file hybridization. In contrast to other methods of steganography where data embedding in image work(More)
The Government of India initiated a cash incentive scheme--Janani Suraksha Yojana (JSY)--to promote institutional deliveries with an aim to reduce maternal mortality ratio (MMR). An observational study was conducted in a tertiary-care hospital of Madhya Pradesh, India, before and after implementation of JSY, with a sample of women presenting for(More)
There are more than 1.15 million cases of breast cancer diagnosed worldwide annually. At present, only small numbers of accurate prognostic and predictive factors are used clinically for managing the patients with breast cancer. DNA microarrays have the potential to assess the expression of thousands of genes simultaneously. Recent preliminary researches(More)
Nowadays reversible circuit designing is the emerging area of research. This design strategy aims towards the formation of digital circuits with ideally zero power dissipation. In this paper we have proposed a new reversible logic module to design a 4-bit binary 2 " s complement circuit. This complement circuit using reversible logic can be used to design(More)
Establishing hidden communication is an important subject of discussion that has gained increasing importance nowadays with the development of the internet. One of the key methods for establishing hidden communication is steganography. Modern day steganography mainly deals with hiding information within files like image, text, html, binary files etc. These(More)
and memory management are the major demands for electronics devices like ipods, cell phones, pmps, iphones and digital cameras. In this paper, we have suggested a high level of security mechanism by considering the concept of steganography along with the principle of cryptography. Four different methods that can save a considerable amount of memory space(More)
With the rapid development of a network multimedia environment, digital data can now be distributed much faster and easier. To maintain privacy and security cryptographic alone is not enough. In recent years, steganography has become attractive vicinity for network communications. In this paper, an attempt is made to develop a methodology which calculate(More)