A High Capacitive and Confidentiality Steganography Using Private key
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2011, Vol 1, Issue 1
Abstract
Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges is proposed in this paper. The new technique embeds binary bit stream in 8-bits gray-scale image. The method also verifies whether the attacker has tried to modify the secret hidden (or stego-image also) information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity from the stego-image.
Authors and Affiliations
Smriti Gupta| Department Of Computer Science and Engineering NRI Institute of Science and Technology Bhopal, MP,India smriti.gupta@gmail.com
Advanced Composite Communication System
Advanced Composite Communication System (ACCS) is the new generation of composite communication systems for on board NAVAL ships. The secret form of communication in between ship to ship can be done from this system. Her...
A III-V Group Tunnel FETs with Good Switching Characteristics and their Circuit Performance
This paper explores suitable materials for tunnel FETs (TFETs) which have good switching characteristics. In all device simulations, total body of TFET is made up of group III-V and IV materials are simulated. Proposed I...
Way-Tagged L2 Cache Architecture in Conjunction with Energy Efficient Datum Storage
For improving the performance constraint in various microprocessors write-through cache policy can be employed. However, write-through policy also incurs large energy overhead. Considering the energy factor way-tagged ca...
Techniques Adopted for Containment of Polymorphic Worms – A Review
Development in the computer network technology has also widened its application in the field of education, science and business. But for such a media insecurity exists due to polymorphic worms. It is necessary to evade s...
Overlap Wavelet Transform for Image Segmentation
A new color image segmentation approach based on OWT is presented in this work. OWT extracts wavelet features which give a good separation of different patterns. Moreover the proposed algorithm uses morphological oper...