Título: A CONTROLLED STRATEGY OF THE DETECTED DATA ORINETED LEAKAGE
Autores: Kumar, R.Sunil; M.Tech Student, Dept of CSE, RRS College of Engineering and Technology, Patancheru, Medak, A.P
Anusha, K.; Assistant Professor, Dept of CSE, RRS College of Engineering and Technology, Patancheru, Medak, A.P
Fecha: 2013-08-07
Publicador: International journal of computer and electronics research
Fuente:
Tipo: Peer-reviewed Article
Tema: Leakage of the Data; Strategy Allocation; Data Authentication; Security Analysis; Watermarking Strategy;Data Hiding Technique Respectively
Descripción: Nowadays there is a huge advancement in the technology takes place in the system based perspective in a well oriented fashion respectively. Here there is a huge challenge for the present designed method in this challenging environment and also a rapid growing technology based aspect. Here there is a problem oriented with the leakage of the data takes place in a well efficient fashion respectively. Here at the time of the transfer of the data to the users it is accessed that is leaked by the help of the third parties oriented scenario that is due to the agent based scenario. Here there is a leakage of the data takes place before it is transmitted to the user in a well efficient fashion respectively. Therefore there is a huge problem with respect to this particular aspect oriented scenario respectively. Now there is a complete degradation of the performance and also the disturbance of the overall system outcome in a well equipped fashion respectively. In order to overcome this particular problem there is a design oriented framework is maintained in order to the control based parameters related to the performance based and also the control based parameter of the degraded performance in a well effective manner respectively. Therefore there is a new technique is proposed by the architectural analysis where at the time of the transfer of the data by the help of the third party based strategy there are applied with a proper data hiding technique in the form of the effective watermarking technique so that it is completely protected in a well efficient manner respectively. Experiments are conducted on the present method and its performance is evaluated by the effective analysis in a well oriented fashion.  
Idioma: Inglés

Artículos similares:

A hybrid k-Mean-GRASP for partition based Clustering of two-dimensional data space as an application of p-median problem por Nadella, Sunil; Associate Professor,P.G. Dept of Computer Science, Ideal College of Arts & Sciences, Kakinada,M V S V, Kiranmai; Lecturer ,Department of CSE,University College of Engineering,JNTU Kakinada,Gugulotu, Narasimha; Department of CSE JNTUH College of Engineering, Nachupally, Kondagattu,Karimnagar
Architecture of Mobile application, Security issues and Services involved in Mobile Cloud Computing Environment por Saini, Swarnpreet SIngh; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Bagga, Ritu; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Singh, Devinder; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar,Jangwal, Tarun; Dept. of Computer Science Engineering CT Institute of Engineering and Management Technology, Jalandhar
A Novel approach of Hybrid Method of Hiding the Text Information Using Stegnography por R, Thamaraiselvan; Assistant Professor Dept. of Computer Applications M.G.R.College Dr. MGR Nagar Hosur - 635109 TN, India,Saradha, A.; Professor and Head, Department of Computer Science and Engineering, Institute of Road and Transport Technology, Erode, TN, India
RSA Algorithm Implementation for Ciphering Medical Imaging por Ali, Samoud; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.,Adnen, Cherif; Signal processing Laboratory - Science Faculty of Tunis , 1060 Tunis.
A STUDY ON KNOWLEDGE ACQUISITION APPROACH FOR COMPOSITE AEROSPACE COMPONENT DESIGN por Sivaraman, G; Assistant Professor & HeadDept. of Computer ApplicationsM.G.R.CollegeDr. MGR NagarHosur - 635109TN
Corpus based Emotion Extraction to implement prosody feature in Speech Synthesis Systems por Chandak, Manoj B; DEPTT. OF COMPUTER SCIENCE AND ENGG S.R.K.N.E.C NAGPUR UNIVERSITY,Bhutekar, Swati
A NEW DATA HIDING METHOD USING PIXEL POSITION AND LOGICAL AND OPERATION por Saini, Ravi; C.M.R.A., GP Sanghi,Rohtak, Haryana,Yadav, Rajkumar; U.I.E.T, Maharshi Dayanand University, Rohtak
A New Focus on Distance Learning for Physically Impaired Students: A Multi-agent Oriented Approach por Pujari, Shiladitya; University Institute of Technology, Burdwan University,Mondal, Subrata
Productivity Inference with Dynamic Bayesian Models in Software Development Projects por Naman, Abou Bakar; Department of Comptuer Science & Information Technology Sarhad University,Lali, M.Ikram.; University of education Lahore, Attock campus
10