A High Capacitive and Confidentiality Steganography Using Private key
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2011, Vol 1, Issue 1
Abstract
Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges is proposed in this paper. The new technique embeds binary bit stream in 8-bits gray-scale image. The method also verifies whether the attacker has tried to modify the secret hidden (or stego-image also) information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity from the stego-image.
Authors and Affiliations
Smriti Gupta| Department Of Computer Science and Engineering NRI Institute of Science and Technology Bhopal, MP,India smriti.gupta@gmail.com
Comparative BER Analysis Of Mitigation Of ICI Through SC,ML and EKF Methods In OFDM Systems
OFDM is a multicarrier modulation technique in which a high rate bitstream is split into N parallel bit-streams of lower rate and each of these are modulated using one of N orthogonal sub-carriers. Orthogonal Frequency D...
An Error Notification Method for a High Speed Serial Communication on FPGA
In parallel communication the cost as well as complexity of the system increases due to simultaneous transmission of data bits on multiple wires. Serial communication alleviates this drawback and emerges as effective...
Developing CMOS Camera and USB Device Drivers in Linux 2.6.32
This paper proposes CMOS camera and USB device drivers implementation on S3C2440 using LINUX 2.6.32. The CMOS camera driver is used for video acquisition applications, which implements image-sensor technology and USB dri...
Peak to Average Power Ratio Reduction in OFDM System by Clipping and Filtering
This paper results clipping and filtering technique for peak to average power ratio (PAPR) reduction in orthogonal frequency division multiplexing (OFDM). Our simulation results show that this technique removes inband an...
A Novel Approach on DWT Province for Colorant Watermarking
This article aims at lightweight, visionless recognition of additive spread-spectrum watermarks in the DWT domain. We focus on two host signal clatter models and two types of postulate tests for watermark recognition....