The purpose of steganography is covert communication -to hide the very existence of a message from a third party. The paper proposes a new least significant bit embedding algorithm for hiding secret messages in nonadjacent pixel locations of edges of images. It ensures a better security against eavesdroppers.Section 5 is on the experimental results, followed by
There are lot of research works carried out in the field of Information Technology (IT), which have more impact on the education throughout the world. The main contribution from IT in today's education world is e-learning. There are several institutions implemented the mechanism and several technologies of e-learning in different countries. E-learning provides more flexibility in education.Although there are several organizations and institutions had come up with the e-learning system, the cost of investment involved for the infrastructure setup is much higher for e-learning applications. Cloud Computing is one of the important technology, which provides different services, which plays a vital role in the education domain and e-learning mechanism. In addition, the security factor in sharing the content is also much important nowadays as the content is shared among different countries with multiple source environments. In this paper, cloud-based e-learning is implemented using access control mechanism, which prevents the cloud resources from illegal user access. The key management schemes combined with access control technique is discussed for secure content sharing and to protect the e-learning environment. The traditional e-learning mechanism is compared with the cloud e-learning for the better understanding of the cloud usage and advantages. Findings indicate that cloud-based e-learning utilizes cloud services in a secure way and also more flexible and scalable in accessing the e-learning content. KEYWORDScloud computing, e-learning, key management, secured access control INTRODUCTIONNowadays, many educational institutions encourage the development of cloud e-learning system, which provides access to learning resources at anytime. The e-learning system, which provides more benefits 1 for the e-learners, has been implemented in several universities in different countries. One of the issues identified in implementing the e-learning mechanism is the cost factor 2 for the initial setup. The infrastructure needed for e-learning process implementation is the major problem for several institutions as the budget needed is more to support and update the e-learning system. The other major difficulties in e-learning implementation are obtaining or locating the servers, storage along with the network 3 needed to support, and also the resources mainly the humans needed to maintain and update e-learning system. E-learning process involves internet technology and its similar to the tradition teaching or education methodology. 1 The main process involved in e-learning is the client-server mechanism and also the web-based concepts. 4Accessibility and Storage are the other major problems in e-learning. Other works 4-6 solved the previous issues faced in e-learning by using the concept of web services and focussed on selection and combination process of learning objects. 7 Cloud computing 8 is the new paradigm in the IT world, which can also help the education sector. Cloud computing and its services can be utilized through the i...
Virtualization refers to the act of something including virtual computer makes a unreal image of the storage space devices servers or network resources so that they can be used on multiple machines at the same time. With the latest growth in cloud computing technologies, security of the data becomes important. It is an enable technology allowing the design of an intelligent abstraction layer that hides the density of underlying software or hardware virtualization technology that can make things easier operations as well as allow Information Technology organizations to react faster to changing business demands. It allows multiple virtual computers to run on top of one physical computer and to share the hardware resources, such as printers, scanners, and modems. This increases the efficient use of the computer by low costs since only one physical computer is needed and running. Cloud computing technology is one of the largest milestones in leading us to next generation technology and successful up business and Information Technology field. It helps to rise above the problem for the loss of data, accessing data whenever required and data security. This technology is mainly service oriented and focuses on reduction in low cost, hardware reduction and pay just for service concept.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
customersupport@researchsolutions.com
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.