2017
DOI: 10.18510/ijsrtm.2017.512
|View full text |Cite
|
Sign up to set email alerts
|

Data Security Using 2d Cellular Automata Rules

Abstract: Abstract-This paper deals with the secure transformation of text. Encryption is the most common method of hiding text from unauthorized access. Two popular ways of sending personal information in a secret way are Cryptography and Steganography. To hide the existence of the message as well as distorts the message itself using this method. LSB and ELSB are the advanced techniques used to hide text in the image. There are two levels to hide the secret information. In the first level of hiding text, data sent to i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...

Citation Types

0
0
0

Publication Types

Select...

Relationship

0
0

Authors

Journals

citations
Cited by 0 publications
references
References 6 publications
0
0
0
Order By: Relevance

No citations

Set email alert for when this publication receives citations?