0 Voturi pozitive0 Voturi negative

1 (de) vizualizări4 paginiPaper Title
A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence
Authors
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai
Abstract
This paper represents a novel approach of steganography using ModifiedSteganographic algorithm with Catalan-Lucas Series. In this algorithm,Catalan Lucas number sequence represents each RBG component of the image by 16 bits instead of 8 bits. By applying Bit Plane Slicing technique, the cover image is sliced into 48 virtual planes and the message to be hidden is also sliced into 16 virtual planes. These 16 planes of the secret message are hidden into some of the 48 virtual planes of the cover image using the proposed algorithm. This process generates three keys at the sender which are required to extract the message from the stego image at the receiver. This method provides high data security and hiding capacity. The experimental results and the PSNR values are also discussed with the advantages from the security perspective.
Keywords
Catalan, Lucas, Slicing, Spatial, Steganography,Zeckendorf.
Citation/Export
MLA
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai, “A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence”, June 18 Volume 6 Issue 6 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 180 - 183
APA
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai, June 18 Volume 6 Issue 6, “A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 180 - 183

Aug 31, 2018

© © All Rights Reserved

PDF, TXT sau citiți online pe Scribd

Paper Title
A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence
Authors
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai
Abstract
This paper represents a novel approach of steganography using ModifiedSteganographic algorithm with Catalan-Lucas Series. In this algorithm,Catalan Lucas number sequence represents each RBG component of the image by 16 bits instead of 8 bits. By applying Bit Plane Slicing technique, the cover image is sliced into 48 virtual planes and the message to be hidden is also sliced into 16 virtual planes. These 16 planes of the secret message are hidden into some of the 48 virtual planes of the cover image using the proposed algorithm. This process generates three keys at the sender which are required to extract the message from the stego image at the receiver. This method provides high data security and hiding capacity. The experimental results and the PSNR values are also discussed with the advantages from the security perspective.
Keywords
Catalan, Lucas, Slicing, Spatial, Steganography,Zeckendorf.
Citation/Export
MLA
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai, “A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence”, June 18 Volume 6 Issue 6 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 180 - 183
APA
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai, June 18 Volume 6 Issue 6, “A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 180 - 183

© All Rights Reserved

1 (de) vizualizări

Paper Title
A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence
Authors
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai
Abstract
This paper represents a novel approach of steganography using ModifiedSteganographic algorithm with Catalan-Lucas Series. In this algorithm,Catalan Lucas number sequence represents each RBG component of the image by 16 bits instead of 8 bits. By applying Bit Plane Slicing technique, the cover image is sliced into 48 virtual planes and the message to be hidden is also sliced into 16 virtual planes. These 16 planes of the secret message are hidden into some of the 48 virtual planes of the cover image using the proposed algorithm. This process generates three keys at the sender which are required to extract the message from the stego image at the receiver. This method provides high data security and hiding capacity. The experimental results and the PSNR values are also discussed with the advantages from the security perspective.
Keywords
Catalan, Lucas, Slicing, Spatial, Steganography,Zeckendorf.
Citation/Export
MLA
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai, “A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence”, June 18 Volume 6 Issue 6 , International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 180 - 183
APA
Mrs. Shilpa Pund-Dange, Dr. Chitra G Desai, June 18 Volume 6 Issue 6, “A Novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas Number Sequence”, International Journal on Recent and Innovation Trends in Computing and Communication (IJRITCC), ISSN: 2321-8169, PP: 180 - 183

© All Rights Reserved

- The Woman Who Smashed Codes: A True Story of Love, Spies, and the Unlikely Heroine who Outwitted America's Enemies
- NIV, Holy Bible, eBook
- NIV, Holy Bible, eBook, Red Letter Edition
- Steve Jobs
- Cryptonomicon
- Hidden Figures Young Readers' Edition
- Make Your Mind Up: My Guide to Finding Your Own Style, Life, and Motavation!
- Console Wars: Sega, Nintendo, and the Battle that Defined a Generation
- The Golden Notebook: A Novel
- Alibaba: The House That Jack Ma Built
- Life After Google: The Fall of Big Data and the Rise of the Blockchain Economy
- Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone
- Hit Refresh: The Quest to Rediscover Microsoft's Soul and Imagine a Better Future for Everyone
- The Innovators: How a Group of Hackers, Geniuses, and Geeks Created the Digital Revolution
- Autonomous: A Novel
- Algorithms to Live By: The Computer Science of Human Decisions
- Digital Gold: Bitcoin and the Inside Story of the Misfits and Millionaires Trying to Reinvent Money

Sunteți pe pagina 1din 4

______________________________________________________________________________________

A novel Approach of Steganography using Bit plane Slicing and Catalan-Lucas

Number Sequence

Assist. Professor, Department of Computer Science, Professor and Head, Department of Computer Science

Modern College, Shivajinagar, Pune-5. NDA, Khadakwasla, Pune, India

Email Id:shilpashlok24@gmail.com Email Id: chitragdesai@gmail.com

Phone number:992388532 Phone number:9422202272

Abstract— This paper represents a novel approach of steganography using ModifiedSteganographic algorithm with Catalan-Lucas Series. In this

algorithm,Catalan Lucas number sequence represents each RBG component of the image by 16 bits instead of 8 bits. By applying Bit Plane

Slicing technique, the cover image is sliced into 48 virtual planes and the message to be hidden is also sliced into 16 virtual planes. These 16

planes of the secret message are hidden into some of the 48 virtual planes of the cover image using the proposed algorithm. This process

generates three keys at the sender which are required to extract the message from the stego image at the receiver. This method provides high data

security and hiding capacity. The experimental results and the PSNR values are also discussed with the advantages from the security perspective.

__________________________________________________*****_________________________________________________

[5].If the RGB image is of class unit8 then the range of

I. INTRODUCTION

intensityvalue is [0-255]. The number of bits used to represent

Security of data is a very important issue nowadays. The aim the pixel values of the components determines the bit depth of

of steganography is to hide the secret message inside a digital the image. If each component of the image takes 8-bits means

cover like image,text,audio,video etc. such that it is the bit depth of the image is 24[9]. A bit plane[4,11] of an

notperceptible to the human eye. Steganography has been used image is a set ofbitscorresponding to a given bit position in

in various forms since 2500years [12]. In the Digital era, with each binary number. It is the contribution of the specific bit to

the increase in computer power, the development of digital make the total appearance of the image. If the image is

signal processing, coding theory and information theory, composed of 8 bits/pixel, then the 0thorder LSB of all the

steganography turns into digital[1].This paper focuses on image pixelsare extracted as plane 0 and the 7th order MSB of all the

Steganography. In order to make the technique more secure and pixelsare extracted as plane 7. LSB planes of an image have

less predictable, a new set of virtual bit planes are generated theleast participation in the perceptibility of the image. MSB

using pixel value decomposition and message bits are bit planes play animportant role in the perceptibility of the

embedded in this bit planes. image. In the proposed method, among 16 bits/pixel the first

order MSB (left to right) of all the pixels are extracted as plane

II. DIFFERENT STEGANOGRAPHIC PROTOCOLS:

1 and 16th order LSB of all the pixels are extracted as plane 16.

There are basically three types of steganographic protocols

[10, 11]: IV. MATHEMATICAL FOUNDATION BEHIND STEGANOGRAPHY

1) Pure key steganography: There is no need to exchange any The proposed algorithm uses a combination of Lucas number

stego key in this method. It is the simplest, but the most sequence and Catalan number sequence for pixel value

unsecured method for secret communication. decomposition and representation.

2) Secret key steganography: In Secret key Steganography, the

receiver needs a secret key for data extraction. A. Lucas number Sequence [13,15]

3) Public key steganography: In this type, two keys are

required; one is a publickey used for embedding a message 2 𝑛=0

while another is the private key which is used for extracting a

message. 𝐿𝑛 = 1 𝑛=1

The proposed algorithm follows Secret key Image 𝐿𝑛−1 + 𝐿𝑛−2 𝑛>1

Steganography. Image steganography can be carried out by two

techniques: 1.TransformDomain 2. Spatial Domain. The paper 𝐿(12) = 199, 123, 76, 47, 29, 18,

focuses on Spatial Domain Technique.

L12 L11 L10 L9 L8 L7

III. BIT PLANE SLICING

An RGB colorimage is a𝑀 × 𝑁 × 3 array of the color pixel. 11 7,4, 3, 2, 1

A pixel intensity value is a decimal number. Each color pixel is L6 L5 L4 L3 L2 L1

a triplet corresponding to red, green and blue colorcomponents

180

IJRITCC | June 2018, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 6 Issue: 6 180 - 183

______________________________________________________________________________________

B. Catalan number sequence[3,15] a) First, six planes of 𝑃𝐿(𝑃1, … . , 𝑃6) are X-ORed with mid-

2𝑛 ! level bit planes (𝐶𝑟5,,……,, 𝐶𝑟10 ) and the result is stored in the

𝐶𝑛 =

n + 1 ! n! low-level bit planes (𝐶𝑟11…... 𝐶𝑟16 ) for 𝐶𝑟 .

b) Next six planes of 𝑃𝐿(𝑃7, … . , 𝑃12) are X-ORed with mid-

𝐶(6) = 132, 42, 14, 5,2, 1 level bit planes (𝐶𝑔5,……,. 𝐶𝑔10 )and the result is stored in the

C6 C5 C4 C3 C2 C1 low-level bit planes (𝐶𝑔11,…...,. 𝐶𝑔16 ) for 𝐶𝑔 .

c) Last four planes of 𝑃𝐿(𝑃13, … . , 𝑃16) are X-ORed with

C. An extension of Zeckendorf’s Theorem [7,15] mid-level bit planes (𝐶𝑔9……. 𝐶𝑔12 ) and the result is stored in the

Let (𝑎𝑛 )𝑛∈𝑁 * be a strictly increasing sequence of low-level bit planes (𝐶𝑏1…….. 𝐶𝑏16 ) for 𝐶𝑏 .

positive integers, with 𝑎1 = 1, 𝑎2 = 2 and 𝑎𝑛 + 𝑎𝑛+1 ≥

𝑎𝑛+2 and 𝑛 ∈ 𝑁 ∗ .T h e n every positive integer𝑥 with 𝑎𝑛 ≤ 10. Construction of StegoImage:

𝑥 < 𝑎𝑛+1 ,𝑛 ∈ 𝑁 ∗ , can be uniquely represented as a sum of a) R,G and B components of the required image are

distinct, nonconsecutive terms of sequence (𝑎𝑛 ), with the constructed using high-level bit planes 𝐶𝑟1….. 𝐶𝑟4 ,mid-level bit

restriction that the term𝑎𝑛 appears in the sum. planes (𝐶𝑟5…….. 𝐶𝑟10 ) with no change and the modified low-

Each pixel has an integer value x on the close interval [0-255] level bit planes 𝐶

𝑟11….. 𝐶𝑟16 = 𝐾1 , 𝐶𝑔11…… 𝐶𝑔16 = 𝐾2 and

, can be represented as a sum of distinct nonconsecutive terms, 𝐶

𝑏13…. 𝐶𝑟16 = 𝐾3 where 𝐾1, 𝐾2 , 𝐾3 formed the keys for R,

we only need few term for encoding. It‟s clear from the Catalan G, and B planes respectively.

series that every integer in the range [0-255] cannot be b)Convert the image into decimal form by merging RGB

represented as a sum of distinct Catalan numbers. Hence the components by applying by summing up the place values.

union two sets i.e. Catalan and Lucas is taken as - 11. Send the stego image and the keys 𝐾1, 𝐾2 , 𝐾3 so formed

to the receiver.

CL= 𝐶(6) U 𝐿(12)

Extraction ( Input: Stego Image, Keys 𝐾1, 𝐾2 , 𝐾3 )

= 199, 132, 123, 76, 47, 42, 29,

[14]

CL16 CL15 CL14 CL13 CL12 CL11 CL10

1. Read aRGBstego image.

2. Separate the R, G and B component of thestego imageas 𝐶𝑟 ,

18, 14, 11, 7,5, 4, 3,2 1

𝐶𝑔 and 𝐶𝑏 .

CL9 CL8 CL7 CL6 CL5 CL4 CL3 CL2 CL1.

3. Apply CL series algorithm.

Here we get 16 bit representation and 16 virtual planes. 4. Each array𝐶𝑟 , 𝐶𝑔 and 𝐶𝑏 is sliced into 16 bit planes.

E.g.234 is represented as 1000001000010001. 5. Accept 𝐾1, 𝐾2 𝑎𝑛𝑑 𝐾3 keys from a sender for extraction

120 is represented as 0001010000000010. of payload.

Each pixel consists of three components which are R,G and B . 6. The payload bit planes are recovered by X-ORing the

So each intensity value of R, G, B is represented by 16 bits. respective bit planes of each component.

Hence by using Catalan-Lucas Sequence method, each pixel is 7. Recover the payload by combining bit planes so obtained.

converted into 48 bit and ultimately 48 bit planes. 8. Convert the binary values into a decimal bysumming up the

place values.

4. MODIFIED STEGANOGRAPHIC ALGORITHM USING CATALAN- 9. The payload is obtained from the stego image.

LUCAS SERIES [14]

Declaration: 𝑀 × 𝑁: Size of the cover image. A. An algorithm for converting a decimal number into a 16-

𝐿 : Length of Payload bit binary number using Catalan-Lucas Series and

Embedding (Input: Cover Image, Payload file) : Zeckendrof’s Theorem.[15]

1. Read an RGB image as a cover image. Declaration: Consider a series of the union of Catalan and

2. Separate the R, G and B component of the cover image Lucas number sequence

as 𝐶𝑟 , 𝐶𝑔 and 𝐶𝑏 . 𝑝=[199 132 123 76 47 42 29 18 14 11 7 5 4 3 2 1]. It's

3. Apply Catalan-Lucas series algorithm (CL series algorithm) an array of 16 decimal numbers.

for converting a decimal number into a 16-bit binary number. 1. Declare an array of 16 elements say ARY, initialize all its

4. Each array 𝐶𝑟 , 𝐶𝑔 and 𝐶𝑏 is sliced into 16 bit planes. elements to zeros.

5. Read the file which is to be embedded say Payload. 2. Accept number „𝑛' which is to be converted into 16 bit

6. Convert each character of the payload into its ASCII binary.

equivalent which forms a1-dimentional array of size𝐿. 3. Find out the number in array 𝑝 which is greater than orequal

Transform it into 𝑃[𝑀, 𝑁 ] array. Apply padding by 0s to to 𝑛. Say it is 𝐹𝑛 .

𝑃[𝑀, 𝑁 ] if necessary. 4. If n is equal to 𝐹𝑛 , then find out the array index of the

7. Apply CL series algorithm on 𝑃[𝑀, 𝑁 ] and store in position of 𝐹𝑛 and convert bit 0 to 1 on that respective

𝑃𝐿[16, 𝑀, 𝑁 ]. position of array ARY.

8. Array 𝑃𝐿 is sliced into 16 bit planes. 5. If n is less than 𝐹𝑛 , then find out the array index of the

9. Embedding Process position of (𝐹𝑛−1 ) and convert bit 0 to 1 on that respective

position of array ARYand perform𝑛 = 𝑛 − (𝐹𝑛−1 ).

6. Go to Step 3 and continue up to 𝑛 = 0.

181

IJRITCC | June 2018, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 6 Issue: 6 180 - 183

______________________________________________________________________________________

V. OBSERVATIONS: VI. ADVANTAGES OF NEWLY PROPOSED STEGANOGRAPHY

1) For Steganography module, the size of the message which is MODEL FROM SECURITY PERSPECTIVE

successfully encrypted and decrypted depends on the

dimensions (row×column) of the cover image. The length of 1. Generally, an image is represented in 8 bit, in the proposed

the message to be encrypted must be less than or equal to the system; it is represented in 16 bits. The hacker is not aware of

image size (row×column). Depending on the image size the this.

computation efforts are increased. 2. A number represented using Famous number sequence is

2) If message is represented in 16 bits, embedding of 16 well known.But the combination of Catalan series and Lucas

message planes take place as - series is used in the proposed method.

In R plane, 6 message planes are embedded. 3. Among 16 planes, data is embedded in few planes,it

In G plane, 6messageplanes are embedded. increases the ambiguity, which makes it difficult for the hacker

In B plane, 4 message planes are embedded. to detect the exact planes.

Each and every pixel is used for embedding. Hence the 4. Every time the key generated is payload dependent. If the

embedding capacity is high. key is compromised it‟s not useful for another payload

3) If message is represented in 8-bit binary system, we can hide (message).

two message files simultaneously by embedding the data in the 5. As every pixel is participated for embedding, it increases the

image planes as - embedding capacity. It's 16 bits/pixel.

For Ist File For IInd File 6. Three keys K1, K2 and K3 are generated. So unless the

In R-plane, 4 message planesare embedded In R-plane, 2 hacker knows all the keys, extraction is not possible.

messageplanesareembedded. 7. The proposed technique is best suitable for .bmp with variant

In G-plane,2 message planesare embeddedIn G-plane,4 intensity images because the size of the image remains

message planes are embedded. unchanged even after converting it into 16 bits.

In B-plane, 2 message planes are embeddedIn B-plane, 2 8. There is no need of a cover image to recover the payload.

message planes areembedded. 9.It gives PSNR value more than 30 dB. Hence, the distortion

Separate keys are required for extraction of each file which of the image is not perceptible.

doubles the embedding rate.

VII.CONCLUSION

4) PSNR is often expressed on a logarithmic scale in decibel This paper presents a novel Approach of Steganography using

(dB). PSNR value greater than or equal to 30dB is hard to Bit plane slicing and Catalan Lucas number Sequence. The

detect by the human eye [2]. PSNR value below 30 dB experiments are carried out on Intel(R) Core i5 -2410 M CPU

indicates a fairly low quality. The details about thesize with 6144 MB RAMS, on Matlab R2015a. The experimental

ofpayload, size of a cover image and PSNRvalues are given in study shows that it yields better PSNR value and higher

the table below: embedding capacity. Thissteganographicalgorithm is more

suitable for the BMP imageshaving bit depth 24. As the

TABLE I. Details of the Payload size, Cover image size and resulting stego image is having the same size as that of the

PSNR values. cover image, it nullifies the chance of detection of hidden

Size of No.of Sizeof No. of Size of PSN information. The method provides many inherent security

Payload Charac cover pixels of stego R features.

File ters Image a cover image (dB)

in a file image REFERENCES

14.3 KB 14662 121 KB 41616 121 KB 38.64 [1] Abbas Cheddad," Steganoflage: A New Image Steganography

48 KB 49575 148 KB 50544 148 KB 39.1 Algorithm," Ph.D. dissertation, University of Ulster School of

14.3 KB 14662 192 KB 65536 192 KB 39.74 Computing & Intelligent Systems,Faculty of Computing &

87 KB 89126 768 KB 262144 768 KB 41.00 Engineering, 2009.

118 KB 121394 768 KB 262144 768 KB 41.66 [2] Chakraborty, S., Jalal, A.S. andBhatnagar, "An efficient bit

125 KB 128499 768 KB 262144 768 KB 40.33 plane X-ORing algorithm for irreversible image steganography‟,

Int. Journal of trust management in computing and

5)If the message to be embedded is very large, it needs a large communications. (2012).

size cover image for embedding which increases the [3] D. Sravana Kumar, C H. Suneetha, A. Chandrasekhar," Novel

computation efforts. Encryption Schemes Based on Catalan Numbers", International

6) For Steganography module, BMP images with variant Journal of Engineering Research and Applications (IJERA)

intensity are most suitable. It can workfor JPEG and PNG ISSN: 2248-9622 www.ijera.com Vol. 2, Issue 2,Mar-Apr 2012,

images also with acceptable PSNR but the size of the image get pp.161-166.

changed. [4] GwanggilJeon, "Watermarking Application Using Bit Plane

Hence, a proposed novel approach of Steganography using Bit Allocation",International Journal of Security and Its

plane slicing and Catalan-Lucas number Sequence is more Applications Vol.8, No.5 (2014), pp.139-148

efficient for data hiding. It gives the hiding capacity of 16-bits http://dx.doi.org/10.14257/ijsia

per pixel. [5] J.R. Krenn," Steganography and Steganalysis",

http://www.krenn.nl/univ/cry/steg, Jan,2004.

[6] Matlab , R2015a, Mathworks.

182

IJRITCC | June 2018, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

International Journal on Recent and Innovation Trends in Computing and Communication ISSN: 2321-8169

Volume: 6 Issue: 6 180 - 183

______________________________________________________________________________________

[7] N.Aroukatos, K Manes, S. Zimeras and F. Georgiakodis,

"Technique in Image Steganography using Famous Number

Sequence " International Journal of Advanced Computer

Science, Jan 2015.

[8] Pratiksha Kale, Prof. MahipBartere: A Survey On Image

Steganography Technique, International Journal of Pure and

Applied Research in Engineering and Technology, Vol.3 (9)

pp143-152, March 2015.

[9] Rafael C. Gonzalez, Richard E. Woods and Steven L. Eddins.,

Digital Image Processing.

[10] S.G.K.D.N. Samaratunge, (August 2007): New Steganography

Technique for Palette Based Images, Second International

Conference on Industrial and Information Systems, ICIIS 2007.

[11] ShrikantKhaire," Review: Steganography – Bit Plane

Complexity Segmentation (BPCS)Technique" International

Journal of Engineering Science and Technology Vol. 2(9), 2010,

4860-4868.

[12] "Steganography:Past,Present,Future",https://www.sans.org/readi

ng_room/whitepapers/stenganography/steganography-past-

present-future-552 , 2001.

[13] "The First 200 Lucas numbers and their factors",

http://www.maths.surrey.ac.uk/hostedsites/R.Knott/Fibonacci/lu

cas200.html.

[14] ShilpaPund-Dange, Chitra G Desai, “Data Hiding Technique

using Catalan-Lucas Number Sequence”, International Journal

of Science and Technology, Volume 10, Issue 4, January 2017.

[15] ShilpaPund-Dange, Chitra G Desai, “Comparison of

Steganography technique using 8-bit binary representation and

Catalan-Lucas representation” International Journal of

Innovative Computer Science and Engineering, Volume-4,

Issue-1,Jan-Feb 2017.

https://www.instamojo.com/resolutioncenter/cases/C862797581

183

IJRITCC | June 2018, Available @ http://www.ijritcc.org

_______________________________________________________________________________________

- Asterix Cat30!31!32 252 Interface Specification Artas v6.2 092001Încărcat denksnksnd
- 124Încărcat deRosalin Paul
- 2014_ijca.pdfÎncărcat deMulti Vac
- V1I8-IJERTV1IS8268Încărcat deReshma Parvin
- IT.pdfÎncărcat dejayasri96
- edit pptÎncărcat deBhavya Shetty
- IJACSA.pdfÎncărcat deFarhana Sharmin
- Implementation of Steganography in Image Media Using Algorithm LSB (Least Significant Bit)Încărcat deIRJCS-INTERNATIONAL RESEARCH JOURNAL OF COMPUTER SCIENCE
- TaskÎncărcat deFahad Siddiqui
- CC++ Developer(On Site)Încărcat deSylvia Qiu
- OutÎncărcat deayam_ayam
- ReviewÎncărcat desreekuttyms
- Basic Experimental DesignÎncărcat deAjitpal Brar
- 552Încărcat dehamed_benz
- IT6-285_finalÎncărcat deИван Дракула
- Applied Cryptography 1Încărcat deSehrish Abbas
- EX01_INDEXMASHUPÎncărcat dehhynes8038
- Ieee Project Titles 2003-08Încărcat deauropondy
- TT07_ch6Încărcat deblooper631
- GANESHÎncărcat deGowthami Jo
- Adaptive Steganography-Based Optical Color Image CryptosystemsÎncărcat deajv1234567890
- RD-700NX Imple e03Încărcat deSantiago Vasconcelos
- Review Paperseminer38,40,41,50Încărcat dehail_ron
- unplugged-book-v1.pdfÎncărcat dekulandotcom
- Kim Kardashian, Single-Molecular Magnets, and the Future of Molecular Data StorageÎncărcat deAnnabs Sanchez
- binary_coding_lesson_plan.pdfÎncărcat deVeronica Echezarreta
- Tda7468Încărcat deTecnodrup Aguilar
- Assignment#1Încărcat deHadi Hafeez
- R-DAC Binary Weighted vs R-2R; TT ElectronicsÎncărcat dearunraj03
- 49325Încărcat deShugal On Hai

- a clustering and associativity analysis based probabilistic method for web page predictionÎncărcat derahul sharma
- Simulation of Vector Controlled Adjustable Speed System of Doubly Fed Induction MachineÎncărcat deEditor IJRITCC
- 48 1530871571_06-07-2018.pdfÎncărcat derahul sharma
- PAS: A Sampling Based Similarity Identification Algorithm for compression of Unicode data contentÎncărcat deEditor IJRITCC
- Safeguarding Data Privacy by Placing Multi-level Access RestrictionsÎncărcat deEditor IJRITCC
- space complexity analysis of rsa and ecc based security algorithms in cloud dataÎncărcat derahul sharma
- BUSINESS DIARY - An Interactive and Intelligent Platform for SME’sÎncărcat deEditor IJRITCC
- iTimer - Count On Your TimeÎncărcat deEditor IJRITCC
- Kinematic Hardening Parameters Identification with Finite Element Simulation of Low Cycle Fatigue using Genetic Algorithm ApproachÎncărcat deEditor IJRITCC
- Hybrid Algorithm for Enhanced Watermark Security with Robust DetectionÎncărcat deEditor IJRITCC
- IoT and Fingerprint Based Door Looking SystemÎncărcat deEditor IJRITCC
- Predictive Analysis for Diabetes using TableauÎncărcat deEditor IJRITCC
- a content based region separation and analysis approach for sar image classificationÎncărcat derahul sharma
- image restoration techniques using fusion to remove motion blurÎncărcat derahul sharma
- 38 1530255975_29-06-2018the fuzzy decision operations for satisfying the criteria of customer satisfactionÎncărcat derahul sharma
- Energy Efficiency Comparative Analysis of Different Routing Protocol In MANET for Healthcare EnvironmentÎncărcat deEditor IJRITCC
- novel approach for comparative analysis of networking routing protocolÎncărcat derahul sharma
- studies on the dynamics of two mutually coupled colpitts oscillatorsÎncărcat derahul sharma
- hybrid approach for data aggregation in wsn with advance security protocol inÎncărcat derahul sharma
- motif and conglomeration of software process improvement modelÎncărcat derahul sharma
- finest execution time approach for optimal execution time in mobile and cloud computingÎncărcat derahul sharma
- robust analysis for aodv protocol in vehicular adhoc network under black holeÎncărcat derahul sharma
- lift control system based on plcÎncărcat derahul sharma
- dual image watermarking scheme based on dwt-svdÎncărcat derahul sharma
- novel method for denoising medical image using 2nd level discrete wavelet transformÎncărcat derahul sharma
- Effective Approach for Extracting Noise from Digital Image and Real Time Data using Filtering TechniqueÎncărcat deEditor IJRITCC
- energy efficiency comparative analysis of different routing protocol in manet for healthcareÎncărcat derahul sharma
- a hybrid connecting character based text recognition and extraction algorithmÎncărcat derahul sharma
- a hybrid approach for performance estimation of mimo antenna over ofdmÎncărcat derahul sharma

- RUJUKAN1Încărcat deSageetha Ganesh
- Solar Power Optimizer for DC Distribution SystemÎncărcat deGRD Journals
- Jurnal PSG Tugas Ahmad_I151150471Încărcat deAhmad Muthi Abdillah
- AMQÎncărcat deJavier Riera
- HPD presentation on development and displacementÎncărcat deCity Limits (New York)
- Sneak Past Pay-For WiFi With DNS TunnelingÎncărcat demardefondo
- Tp Link Tl Sl2218 Cli Reference Guide 745105Încărcat deAleksandar Cancar
- LNs_2010-02-06Încărcat deCarlos Sulca Neira
- SnowÎncărcat desw ta
- monocle travel top 50 vyta trenitaliaÎncărcat deapi-261016855
- Boiler-Controls-MM-825E-Series-193-194-Pages-49-and-51.pdfÎncărcat deJeremy Lobo Villalobos
- Project Success Limiting Factors Monitoring TheoryÎncărcat deDavid Jane Molapo
- July 16, 2012, Affidavit of Service upon Jocelyn Colburne, Crown Prosecutors Office Fredericton New Brunswick Canada, of a Notice of Application and supporting Affidavit Challenging Jurisdiction of the Court and demanding dismissal of Charges. Andre Murray is falsely accused, charged with Criminal Charge of Assault upon Neil Rodgers, unlawfully, under duress, forced to sign an undertaking, then falsely accused, charged with Breach of Undertaking by the Fredericton Police Force.Încărcat deJustice Done Dirt Cheap
- Business Process Re EngineeringÎncărcat desanjayita
- Monique Rathbun v Scientology: Motion to ReconsiderÎncărcat deTony Ortega
- Surge Arrester Complete Catalogue 2006Încărcat deViverSharinganUchiha
- 3DTouch Operations ManualÎncărcat deMyagmarbayar Nergui
- merger Abbot PiramalÎncărcat debenvarr
- Nextcloud Manual.pdfÎncărcat deAgus Arya AñgGädînåtâ
- Two Wheeled Self Balancing Robot for Autonomous NavigationÎncărcat deIAEME Publication
- Copy of 01 Financial Reporting and Analysis - An Introduction(1)Încărcat deFariza Makhay
- Information Security Master Plan (1)Încărcat deMarubadi Rudra Shylesh Kumar
- Chapter 2 Ej501Încărcat deAdrian Marin
- Westfield NorthÎncărcat deAppletonCraig
- N.C.R REPORT-1Încărcat demangeshshinde124
- Electrical Machine DesignÎncărcat deMahmoud Fawzi
- Cena v. CSC_digestÎncărcat deJaysieMicabalo
- Briggs & Stratton Model 445600 Illustrated Parts ListÎncărcat deEvan Enderle
- Ra 9266 Questionnaires and AnswerÎncărcat deChicha Waters
- Need to Know IFRS 11 Joint Arrangements (Print) (1)Încărcat dekvnjan

## Mult mai mult decât documente.

Descoperiți tot ce are Scribd de oferit, inclusiv cărți și cărți audio de la editori majori.

Anulați oricând.