Horse Communication against Harsh Attack: A Stego Ride

  • Thanikaise V
  • Arulmozhiv P
N/ACitations
Citations of this article
8Readers
Mendeley users who have this article in their library.

Abstract

The developments in expertise and internet fruition have amplified dependence on systems and IT abided by the demand to secure the same. This intriguing1 effort in electronic world has unfolded a new boulevard called cyber defense. In this world of cyber hacking, information security plays a vital role. Primitive techniques though are old but are very helpful in giving a perfect outline of things away from human thoughts. One such technique is the Magic Square Method, wherein the brilliant orientation of the numbers leads to a perfect matrix useful for any mathematical developments. Block Segmentation in this study involves two kolams firstly the Kubera Kolam is the magic square that is employed and incorporated for introducing the randomization. Further is the Pulli Kolam, square for acting as the symmetric key for giving the precise bits to be hidden. Further on, modifiable pixel indicator gets slightly altered from the rudiments and is used to accomplish a much efficient and effective indicator liken the conventional one. © 2013 Academic Journals Inc.

Cite

CITATION STYLE

APA

Thanikaise, V., & Arulmozhiv, P. (2013). Horse Communication against Harsh Attack: A Stego Ride. Research Journal of Information Technology, 5(3), 263–276. https://doi.org/10.3923/rjit.2013.263.276

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free