Data Hiding Using Blind Algorithm of Steganography
Journal Title: International Journal for Research in Applied Science and Engineering Technology (IJRASET) - Year 2016, Vol 4, Issue 9
Abstract
The process of hiding messages or information within other non-secret text or data is called steganography. Steganography may be text, image, audio or video steganography. Digital image Steganography is popular because images have high data hiding capacity and are used for transmission. We propose and implement a data hiding method using blind algorithm of steganography which hides secret data in colour images by maintaining good visual quality and takes very less time in hiding and extraction of message. This method is based on third level two dimensional discrete wavelet transform (DWT) set by Haar wavelet. The main advantage of blind steganography methods is that there is no requirement of original image in extraction process which makes secret communication undetected by third party user or any steganalysis tools. In order to obtain a better imperceptibility result secret message Huffman encoding is used. The security of communication is also increased by these modifications. The experimental activities are carried out by using software MATLAB R2014a.
Authors and Affiliations
Mohit Gupta, Praveen Kr. Tripathi
Non Traditional Optimization Techniques For Cutting Force Optimization In Milling Process Based On Machining Parameters
Minimum cutting forces are always gives the better results on response parameters. In this paper describes the nontraditional optimization methods to get the optimum cutting force in milling process. The objective funct...
Survey on Data Mining for Increasing Agriculture Productivity
Crop management of certain agriculture region is depends on the climatic conditions of that region because climate can make huge impact on crop productivity. Real time weather data can helps to attain the good crop mana...
Secure Cloud Storage Using Decentralized Access Control with Unspecified Authentication
The Secure Cloud Storage Using Decentralized Access Control with Unspecified Authentication for secures the data. The cloud verifies the authenticity of the series without knowing the user’s identity before storing data...
A Review on Manufacturing Cycle Time Reduction by Applying Lean Tools and Technique in Small Scale Industries
Cycle time should be painstaking a viable option when an organization is demanding to perk up efficiency, productivity and cost base and customer reaction. Tools of lean manufacturing are used to diminish to the cycle t...
Performance Analysis of Physical Layer of WiMAX 802.16 using 64 QAM
IEEE 802.16 is an emerging technology for the future telecommunication standards. All Communication standards follows the basic OSI model.OSI model have seven layers. Upper layers responsible for user interface and lowe...