A Secure Image Steganography Method Based on Neural Network
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2016, Vol 7, Issue 6
Abstract
Steganography is the term used to describe the hiding of data in images to avoid detection by attackers. Steganalysis is the method used by attackers to determine if images have hidden data and to recover that data. By matching data to an image, there is less chance of an attacker being able to use steganalysis to recover the data. Before hiding the data in an image the application first encrypts it. The proposed method of steganography in this work encodes the secret message in least significant bits of the original image using DWT method, where the pixels values of the encrypted image are modified by the genetic algorithm (GA) and neural network (NN) to retain their statistic characters, thereby making the detection of secret of message difficult. The whole implementation is done in MATLAB using MSE, Time and PSNR parameters.
Authors and Affiliations
Jasmeen Kaur Pandher , Kamalpreet kaur
An analysis of LEACH Protocol in Wireless Sensor Network: A Survey
Wireless Sensor Network is composed of numbers of tiny sensors (nodes) which have the capability of gathering the data about environmental activities and making certain computations on them so that they can be communicat...
Pragmatics of Wireless Sensor Networks
Wireless sensor network composed of infrastructureless, small, low-power, low cost, dynamic nature, application oriented, and multihoping wireless nodes, design for the purpose of collecting information by environment se...
A KEY MANAGEMENT PROTOCOL FOR HIERACHICAL WIRELESS SENSOR NETWORKS
Wireless sensor networks (WSNs) are deployed in hostile environments in many applications. In order to resist security threats, sensor nodes of WSNs often use pre-shared secret keys to encrypt and exchange confidential d...
Spontaneous identification of individual nick name from web
A person is generally called by different names, it is difficult to identify a person from the web, person will be called by different names by different people for example, Michael Jackson is called as MJ and some call...
A Survey of Various Load Balancing Techniques and Proposed Load Balancing Method in Cloud Computing.
The Cloud Computing data Centre has abundant hosts as well as Solicitation requests. A Cloud Computing platform that manoeuvre behind the corporate firewall and within control of an organisation IT department. Cloud deal...