A High Capacitive and Confidentiality Steganography Using Private key

Abstract

Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges is proposed in this paper. The new technique embeds binary bit stream in 8-bits gray-scale image. The method also verifies whether the attacker has tried to modify the secret hidden (or stego-image also) information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity from the stego-image.

Authors and Affiliations

Smriti Gupta| Department Of Computer Science and Engineering NRI Institute of Science and Technology Bhopal, MP,India smriti.gupta@gmail.com

Keywords

Related Articles

Voice Based Elderly Assistance Using Wireless Technology

The voice controlled wheel robot system needs to make use of the latest technological components available. In this paper, we present the design and implementation of a voice based wheel chair system where communication...

Comparison of Fiber Based Dispersion Compensation in RZ and NRZ Data Modulation Formats

In this paper, dispersion compensating fibers are used to compensate for the positive dispersion accumulated over the length of transmission fiber. Pre and post dispersion compensation schemes are employed for dispersion...

A Novel Approach on DWT Province for Colorant Watermarking

This article aims at lightweight, visionless recognition of additive spread-spectrum watermarks in the DWT domain. We focus on two host signal clatter models and two types of postulate tests for watermark recognition....

16nm planar process CMOS SRAM cell design: Analysis of Operating Voltage and Temperature Effect

Purpose: CMOS devices are scaling down to nano ranges resulting in increased process variations and short channel effects which not only affect the reliability of the device but also performance expectations. The SRAM de...

Coin Recognition Using Circular Hough Transform

This paper represents algorithm for recognition of the coins of different denomination. The proposed system first uses a canny edge detection to generate an edge map, then uses CHT (Circular Hough transform) to recognize...

Download PDF file
  • EP ID EP8264
  • DOI -
  • Views 522
  • Downloads 27

How To Cite

Smriti Gupta (2011). A High Capacitive and Confidentiality Steganography Using Private key. International Journal of Electronics Communication and Computer Technology, 1(1), 9-14. https://europub.co.uk/articles/-A-8264