A Proposed Encoding and Hiding Text in an Image by using Fractal Image Compression
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 1
Abstract
The problem of protecting data and information originates from the dependency upon encryption and steganography separately. Therefore, it is easy to break them and detecting the contents of the secret massages available in data, pictures, texts or audios. To add multiple layers of security our research proposed an algorithm that can hide a text in an image in a such away that prevents as much as possible any suspicion having a hidden text, after RSA cipher. In this research a new hiding method is proposed based on encoding the information by using RSA cryptosystem and hiding the cipher information(ciphertext) by using proposed fractal image compression(FIC). FIC based on IFS exploits the spatial redundancy with it is different parts and they are blocked based algorithm with variable block size that intend to approximate blocks of a determined size with contractive transformation. This blocks based allow hiding capacity to be large.
Authors and Affiliations
Dr. Fadhil Salman Abed
A Relative Study on Retinal Vessel Segmentation
Retinal image processing is a standard medical repetition and offers number of profitable products for physicians. In the field of retinal image processing retinal vessel segmentation is the crucial task for detection of...
Comparison and Study of AOMDV and DSDV Routing Protocols in MANET Using NS-2
A mobile ad hoc network (MANET) is a collection of wireless mobile nodes communicating with each other using multi-hop wireless. One of the main challenges of MANET is the design of robust routing algorithms that adapt t...
AN ANDROID APPLICATION FOR ATM WITH A SECURED PIN-ENTRY METHODS
One of the most commonly occurringproblems in the recent years are the ATM (Automatic teller machine) frauds. People lose their money due to lack of awareness. The major reason for such kind of actions is the attacks mad...
Design of Anomaly Detection System for Outlier Detection in Hardware Profile Using PCA
In this paper, we design an Anomaly Detection System for Outlier Detection in Hardware Profile by using Principal Component Analysis (PCA) that helps reduce the dimension of data. Anomaly detection methods can detect new...
Upgraded Selection Sort
Sorting is a technique which is frequently used in our day to day life. It has a direct implication on searching. If the data is sorted on any key attribute, finding data based on that key attribute becomes very fast. Th...