encode process
Recently Published Documents


TOTAL DOCUMENTS

2
(FIVE YEARS 1)

H-INDEX

1
(FIVE YEARS 1)

2019 ◽  
Vol 14 (2) ◽  
pp. 146-151 ◽  
Author(s):  
C. Narmatha ◽  
P. Manimegalai ◽  
S. Manimurugan

Background: To transmit the secret data are in a secure manner or to prevent the intruder/ third party activities while transmitting secret data’s through the public networks are challenging task now. In order to deal with these situations, this paper presents an encryption/encoding technique of MSI (Modified Steganography for Image) for secret data before transmitting over the network. Methods: The MSI technique is classified into two phases, one is stegano image creation by encode process and another one is reconstructing the secret data from the stegano image by decode process. In encode process, the grayscale cover and secret images are considering as an input. In addition, segregation, 8-bit binary conversion, substitution and decimal conversion processes are doing a vital role in hiding the secret image into a cover image. The MSI encoded stegno image is almost equal to the cover image and it's not an easy to identify by the Human Visual Attack (HVA). Results & Conclusion: To evaluate the proposed MSI encoding process the time, signal to noise ratio, complexity and strength are considering as the parameters. In result, the MSI encode technique is providing good reconstruction image quality, strong against the pixel attack and HVA, less execution time than the conventional schemes.


2002 ◽  
Vol 9 (49) ◽  
Author(s):  
Mikkel Nygaard ◽  
Glynn Winskel

A small but powerful language for higher-order nondeterministic processes is introduced. Its roots in a linear domain theory for concurrency are sketched though for the most part it lends itself to a more operational account. The language can be viewed as an extension of the lambda calculus with a ``prefixed sum'', in which types express the form of computation path of which a process is capable. Its operational semantics, bisimulation, congruence properties and expressive power are explored; in particular, it is shown how it can directly encode process languages such as CCS, CCS with process passing, and mobile ambients with public names.


Sign in / Sign up

Export Citation Format

Share Document