Effective Data Hiding Method Through Pixel Pair Matching
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2014, Vol 2, Issue 11
Abstract
This work proposes a new data-hiding method based on pixel pair matching , which is to use the values of pixel pair as a reference coordinate, and find a coordinate in the neighborhood set of this pixel pair based on the given message. Further the pixel pair is replaced by the searched coordinate to cover the digit. Two methods has been proposed to overcome this problem one is Exploiting modification direction (EMD) and another is diamond encoding (DE). The proposed methods offer lower distortion as compared to the existing methods by providing more compact neighborhood sets and allowing embedded digits in any notational system.
Authors and Affiliations
N. Arjun| M.TECH Scholar, Dept. of ECE BVC Engineering college, Odalarevu, AP, India, Ch. Sridevi| Assistant Professor,Dept. of ECE BVC Engineering college, Odalarevu, AP, India, V. Dhana Raj| Professor, Dept. of ECE BVC Engineering college, Odalarevu, AP, India, A. Praveen| HOD Dept. of ECE BVC Engineering college, Odalarevu, AP, India
Under water Image preprocessing by Average filter and a comparison study
Underwater image pre-processing is extremely essential because, under water images suffer from quality degradation due to low transmission of light. When an underwater image is captured, pre-processing is necessary t...
Reduced On_Chip Codeword Generation For Cross Talk Effect In Data Transmission Bus
Today we are having tremendous growth on cross technologies but these technology is limited on interconnected networks. We are having delay for these networks our major goal is prune delay this type of networks but i...
Low-Frequency Transmission for renewable sources
Now a day renewable energy is widely used such as wind energy and solar energy, due to their extreme abundance. So they should be properly interfaced with the power grid with suitable devices. In this paper a system...
Secure Database as a Service for Cloud Tenants With no Exposure Of Unencrypted Data
We propose a novel engineering that incorporates cloud database administrations with data mystery and the probability of executing concurrent operations on mixed data. This is the main course of action supporting ge...
Message Endorsement and Informant Confidentiality In Wireless Set of Connections
Privacy and security to the information is really given by verification. Verification includes the certain distinguishing proof of one gathering by another gathering or a procedure of affirming a personality .But now...