A High Capacitive and Confidentiality Steganography Using Private key

Abstract

Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges is proposed in this paper. The new technique embeds binary bit stream in 8-bits gray-scale image. The method also verifies whether the attacker has tried to modify the secret hidden (or stego-image also) information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity from the stego-image.

Authors and Affiliations

Smriti Gupta| Department Of Computer Science and Engineering NRI Institute of Science and Technology Bhopal, MP,India smriti.gupta@gmail.com

Keywords

Related Articles

The State of the Art in Locally Distributed Web-Server Systems

The paper describes a novel algorithms for a load balancer, allocates the work to the clusters of SIP server. The several load balancing algorithms for distributing Session Initiation Protocol (SIP) request to a cluster...

Seamless Mobility in Heterogeneous Mobile Networks

The objective of this paper is to introduce a vertical handover (VHO) algorithm between wireless LANs (WLANs) and LTE mobile networks. The proposed algorithm is based on the fuzzy control theory and takes into conside...

A Novel Low Power Topology in Reversed Nested Miller Compensation Using Triple-Active Capacitance

A novel three-stage amplifier topology for low voltage , low power and large capacitive load applications is proposed . This scheme is called the tripple-active capacitance and resistance in reversed nested Miller compen...

Dynamic Cluster Based Data Aggregation in WSN (FDDA)

WSN consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. As sensor nodes are deployed in sensing field, they can help people...

Comparison of Fiber Based Dispersion Compensation in RZ and NRZ Data Modulation Formats

In this paper, dispersion compensating fibers are used to compensate for the positive dispersion accumulated over the length of transmission fiber. Pre and post dispersion compensation schemes are employed for dispersion...

Download PDF file
  • EP ID EP8264
  • DOI -
  • Views 550
  • Downloads 27

How To Cite

Smriti Gupta (2011). A High Capacitive and Confidentiality Steganography Using Private key. International Journal of Electronics Communication and Computer Technology, 1(1), 9-14. https://europub.co.uk/articles/-A-8264