sir i want to know about the future enhancement for reversible data hiding in encrypted images by reserving room before encryption please mail the enhancement to my mail address divya.madhavarapu93[at]gmail.com
Posts: 14,118
Threads: 61
Joined: Oct 2014
In cryptography, encryption is the process of encoding messages or information in such a way that only authorized parties can read it. Encryption denies the message content to the interceptor. Typically, encryption is used when you need to keep your private data. In an encryption scheme, the message or information, called plain text, is encrypted using an encryption algorithm, generating encrypted text that can only be read if it is decrypted. For technical reasons, an encryption scheme usually uses a pseudorandom encryption key generated by an algorithm. Such an algorithm is necessary for the decryption of the message because without it, any party will be able to break the code and access the data. Although for a well-designed cipher scheme, large computational resources and skills are required. An authorized recipient can easily decrypt the message with the key provided by the originator to the recipients, but not to the unauthorized interceptors. The rapid development of the transfer of data through the Internet facilitated the sending of the data with precision and faster to the destination.
There are many means of transmission to transfer the data to the destination as the emails; At the same time, it may be easier to modify and misuse valuable information through hacking. Therefore, in order to securely transfer the data to the destination without any modification, there are certain approaches such as cryptography and steganography. Let's understand what cryptography and steganography means. Cryptography is the study of techniques for secure communication in the presence of third parties also called as adversaries. More generally, it is about building and analyzing protocols that block these third parties with the help of various aspects of information security, such as data confidentiality, data integrity, authentication and non-repudiation. Modern cryptography exists at the intersection of rules and regulations for math, computer science, image processing, etc. There are many cryptography applications that include computer and e-commerce passwords