Data Concealing in Encrypted Images Using Reversible Data Hiding (RDH) Technique
Journal Title: INTERNATIONAL JOURNAL OF COMPUTER TRENDS & TECHNOLOGY - Year 2013, Vol 6, Issue 4
Abstract
In the new era of technology,more attention is needed to be given to hide some personal data or secret information, etc. This can be exactly brought out through Reversible Data [1] Hiding,since it maintains the splendid property that the original cover can be retrieved back after data is embedded. It can be extracted while protecting the image content confidentially. We suggest a new method by method of encryption after appropriating room with a conventional method. The proposed method can achieve real concealment, that is, data revealing and image recovery with some loss in data. If the receiver has the encryption key,he/she can decrypt the data to obtain an image similar to the original, but cannot extract the extra data. Experiments show that this method can embed more number of times as large number of data for the same image quality as the conventional methods, such as for PSNR & MSE .
Authors and Affiliations
Sujith T , Mr Iwin Thanakumar S
Detection of Spoofing Using Packet Marking Algorithm
Wireless networks are vulnerable to spoofing attacks, which allows for many other forms of attacks on the networks. However the localization infrastructure can be subjected to non cryptographic attacks, such as signal at...
Efficient Fault-Tolerant Strategy Selection Algorithm in Cloud Computing
Cloud computing is upcoming a mainstream feature of information technology. More progressively enterprises deploy their software systems in the cloud environment. The applications in cloud are usually large scale and con...
Improving Routing Performance by Using Neighbor Coverage Knowledge and Energy Aware Metric in Mobile Adhoc Networks
A mobile adhoc network is an independent collection of mobile nodes without having the fixed infrastructure. In the mobile adhoc networks, because of the high mobility of the nodes there is frequent link breakage that ca...
Proficient And Protected Content Dispensation In Distributed Environment To Client Proxy-Based Transcoding Approach
Currently internet client varies widely both in hardware and software properties. The ever increasing requirements of clients to support heterogeneous environment, demand techniques to adapt the same content to diverse d...
Harmony Search Optimization in K-Means Clustering
Clustering is a data mining technique that classifies a set of observations into clusters based on some similarity measures. The most commonly used partitioning based clustering algorithm is K-means. However, the K-means...