Data Hiding in Color Images Using Modified Quantization Table
Journal Title: International Journal of Advanced Research in Computer Engineering & Technology(IJARCET) - Year 2012, Vol 1, Issue 8
Abstract
With the rapid growth of of internet and wireless networks, information security becomes significant to protect e-commerce and personal privacy. Data Hiding is an important issue for information security.There has been number of steganographic embedding techniques proposed over last few years. This paper presents a novel steganographic method based on the JPEG quantization table modification. Instead of dividing cover image into 8×8 blocks, the cover image is divided into nonoverlapping blocks of 16×16 pixels to embed secret information. Here we have considered color images and investigated the feasibility of data hiding. Four performance parameters namely Capacity, MSE and PSNR and NC have been compared on different sizes of standard test images. In comparison with Jpeg-Jsteg and Chang et al. methods based on the conventional blocks of 8x8 pixels the proposed method shows high performance with regard to embedding rate and PSNR of stego image. Furthermore, NC shows that the produced stego-images are almost similar to the original cover images.
Authors and Affiliations
Neha Batra , Pooja Kaushik
A Comparative Study of Fuzzy & Genetic Power System Stabilizers and Role of Static Voltage Compensation on Power System stability
This paper describes the application of genetic and fuzzy logic Power System Stabilizer (PSS), for single line to ground and three phase faults, with/without static voltage compensator. The genetic and fuzzy PSSs a...
Comparative Analysis of Various Scheduling Algorithms
Scheduling is the technique used for controlling the order of the job which is to be performed by a CPU of a computer. The motive of scheduling is to engage the CPU at its maximum capacity and no process shall wait for l...
Comparison of Modern Denoising Algorithms
Integrity of edge and detail information associated with the original images play an important role in applications. Images acquired from sensors, transmission errors and lossy compression contains noise and it is...
A Review of Query Image in Content Based Image Retrieval
CBIR applies to techniques for retrieving similar images from image databases, based on automated feature extraction methods. In recent years, the medical imaging field has been grown and is generating a lot more interes...
Intrusion Detection Based Security Solution for Cluster Based WSN
Wireless sensor network (WSN) can provide low cost solution to variety of real-world problems. Sensors are low cost tiny devices with limited storage, computational capability and power. they can be deployed in...