Data Hiding in Color Images Using Modified Quantization Table
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
With the rapid growth of of internet and wireless networks, information security becomes significant to protect e-commerce and personal privacy. Data Hiding is an important issue for information security.There has been number of steganographic embedding techniques proposed over last few years. This paper presents a novel steganographic method based on the JPEG quantization table modification. Instead of dividing cover image into 8×8 blocks, the cover image is divided into nonoverlapping blocks of 16×16 pixels to embed secret information. Here we have considered color images and investigated the feasibility of data hiding. Four performance parameters namely Capacity, MSE and PSNR and NC have been compared on different sizes of standard test images. In comparison with Jpeg-Jsteg and Chang et al. methods based on the conventional blocks of 8x8 pixels the proposed method shows high performance with regard to embedding rate and PSNR of stego image. Furthermore, NC shows that the produced stego-images are almost similar to the original cover images.
Authors and Affiliations
Neha Batra , Pooja Kaushik
Improvement of the SARA strategies for MANET model
Wireless ad-hoc networks are autonomous systems composed of mobile hosts that are free to move around arbitrarily. Routing is difficult in MANET’s since mobility may cause radio links to break frequently. When any...
E-Voting System for on Duty Person Using RSA Algorithm with Kerberos Concept
An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily as digital information. There are many security challenges associated with the use of Inter...
Energy Aware Congestion Control Multipath Routing: A Survey
Mobile An ad hoc network (MANET) is a collection of wireless mobile hosts forming a temporary network without the aid of any established infrastructure or centralized administration. The life time of the network is an im...
Image Denoising using Dual-Tree Complex DWT and Double-Density Dual-Tree Complex DWT
Non-stationary signal processing applications use standard non-redundant DWT (Discrete Wavelet Transform) which is very powerful tool. But it suffers from shift sensitivity, absence of phase information, and poor directi...
A Survey on Intrusion Detection System in Data Mining
This paper presents a survey of techniques of intrusion detection system using supervised and unsupervised learning. The techniques are categorized based upon different approaches like Statistics, Data mining, Ne...