A New Way to Implement Stegnography by Minimizing Distortion
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 7
Abstract
In this paper we are going to learn about the minimization of distortion in steganography. For this purpose we use a general nonbinary embedding operation and discuss various system requirements. We assume every possible value of stego element by assigning a scalar which expresses the distortion of a embedding change done by replacing the cover element by this value. The total distortion is assumed to be a sum of per-element distortions. Both the payload-limited sender (minimizing the total distortion while embedding a fixed payload) and the distortion-limited sender (maximizing the payload while introducing a fixed total distortion) are considered. Nonbinary case is decomposed into several binary cases by replacing individual bits in cover elements, but there is no loss of performance. Using a novel syndrome-coding scheme, the binary case is approached and these are based on dual convolution codes equipped with the Viterbi algorithm. This fast and very versatile solution achieves state-of-the-art results in steganographic applications while having linear time and space complexity with respect to the number of cover elements. Practical merit of this approach is validated by constructing and testing adaptive embedding schemes for digital images. In this paper what we’ve obtained is to implement steganography by using general non-binary embedding operation. This gives the new technique to implement steganography effectively and easily.
Authors and Affiliations
K. Kiran Kumar , Y. Prabhu Suresh Babu , , A. Sudhir , , P. Ravi Prakash
Efficient Timeslot Assignment and Route Discovery Mechanism for Mobile Clients
Recent advances in wireless data networking and portable information appliances have engendered a new paradigm of computing, called mobile computing, [5] in which users carrying portable devices have access to da...
ARCHITECTURE OF 4-BIT PIPELINE ADC IN CMOS TECHNOLOGY
Analog-to-digital converters (ADCs) are key design blocks and are currently adopted in many application fields to improve digital systems, which achieve superior performances with respect to analog solutions. With th...
GRID COMPUTING – AN ALTERNATIVE TO HPC
Grid Computing delivers on the potential in the growth and abundance of network connected systems and bandwidth: computation, collaboration and communication over the Advanced Web. At the heart of Grid Computing...
An Overview of Partial Shuffle for Database Access Pattern Protection Using Reverse Encryption Algorithm
Encryption of database is an important topic for research, as secure and efficient encryption algorithms are needed that provide the ability to query over encrypted database and allow optimized encryption and decryption...
A Survey on Clustering Based Image Segmentation
In computer vision, segmentation refers to the process of partitioning a digital image into multiple segments (Sets of pixels, also known as super pixels). This paper is a survey on various clustering techniques...