An Efficient Data Hiding Technique for Steganography
Journal Title: International Journal of P2P Network Trends and Technology(IJPTT) - Year 2014, Vol 4, Issue 1
Abstract
Bose Chaudhuri Hochquenghem (BCH) based data hiding scheme for JPEG steganography is presented. Traditional data hiding approaches hide data into each block, where all the blocks are not overlapping each other. Two consecutive blocks can be overlapped to form a combined block which is larger than a single block, but smaller than two consecutive non overlapping blocks in size. In order to embed more amounts of data into the combined block than a single block. A way to get a joint solution for hiding data into two blocks with intersected coefficients such that any modification of the intersected area does not affect the data hiding process into both blocks. Due to hiding more amounts of data into the intersected area, embedding capacity is increased. The nonzero DCT coefficient stream is modified to achieve better steganalysis and to reduce the distortion impact after data hiding. Reducing distortion between the cover object and stego object is an important issue for steganography.
Authors and Affiliations
P. Karthiga Lakshmi
Improved rtPS SchedulingwithQoE metrics in Joint WiMAX / Satellite Networks
Thispaper improves a previously proposed scheduling algorithm that is responsible to share the allocated capacity to the uplink traffic of an integrated satellite and WiMAX network. The target of this improvement i...
Energy Efficient Scheme for Improving the Performance of Wireless Sensor Networks
The wireless sensor networks sensing the neighbor nodes to disseminated the information to every sensor nodes on the networks area. The random walk through topology is mentioning in this paper for obtaining the results o...
A Survey on Sensor Cloud: Architecture and Applications
Cloud Computing is a part of computer science and it enables providing Internet services to external customers via very scalable computing capacities. It is abstracted, controlled and high-scalable computer infrastructur...
Addressing Trust Issues in Cloud Computing
Cloud computing is an evolving paradigm with tremendous momentum, but its unique aspects exacerbate trust issues in cloud computing. Data is the most valuable of clients (or) company’s asset; it must be protected with mu...
Crawler Using Inverted WAH Bitmap Index and Searching User Defined Document Fields
Crawler is a web crawler aiming to search and retrieve web pages from the World Wide Web, which are related to a specific topic. It based on some specific algorithms to select web pages relevant to some pre-defined...