A High Capacitive and Confidentiality Steganography Using Private key
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2011, Vol 1, Issue 1
Abstract
Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges is proposed in this paper. The new technique embeds binary bit stream in 8-bits gray-scale image. The method also verifies whether the attacker has tried to modify the secret hidden (or stego-image also) information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity from the stego-image.
Authors and Affiliations
Smriti Gupta| Department Of Computer Science and Engineering NRI Institute of Science and Technology Bhopal, MP,India smriti.gupta@gmail.com
The State of the Art in Locally Distributed Web-Server Systems
The paper describes a novel algorithms for a load balancer, allocates the work to the clusters of SIP server. The several load balancing algorithms for distributing Session Initiation Protocol (SIP) request to a cluster...
Seamless Mobility in Heterogeneous Mobile Networks
The objective of this paper is to introduce a vertical handover (VHO) algorithm between wireless LANs (WLANs) and LTE mobile networks. The proposed algorithm is based on the fuzzy control theory and takes into conside...
A Novel Low Power Topology in Reversed Nested Miller Compensation Using Triple-Active Capacitance
A novel three-stage amplifier topology for low voltage , low power and large capacitive load applications is proposed . This scheme is called the tripple-active capacitance and resistance in reversed nested Miller compen...
Dynamic Cluster Based Data Aggregation in WSN (FDDA)
WSN consisting of a large number of small sensors with low-power transceivers can be an effective tool for gathering data in a variety of environments. As sensor nodes are deployed in sensing field, they can help people...
Comparison of Fiber Based Dispersion Compensation in RZ and NRZ Data Modulation Formats
In this paper, dispersion compensating fibers are used to compensate for the positive dispersion accumulated over the length of transmission fiber. Pre and post dispersion compensation schemes are employed for dispersion...