EMD Techniques of Image Steganography
Journal Title: The International Journal of Technological Exploration and Learning - Year 2014, Vol 3, Issue 2
Abstract
Exploiting Modification Direction (EMD) is a technique to hide secret data into digital images. This paper reviews different EMD techniques to hide the confidential data. The main idea of EMD is to embed secret data into digital image in such a way that it provides high embedding efficiency as compared to the other techniques. The brief introduction of various EMD schemes and their comparisons are presented in this paper.
Authors and Affiliations
Mamta Kalra| Department of Computer Science & Engineering Deenbandhu Chhoturam University of Science & Technology, Parvinder Singh| Department of Computer Science & Engineering Deenbandhu Chhoturam University of Science & Technology
Data Aggregation Approach Using Neural Network in Wireless Sensor Networks
A wireless sensor network is one of the busiest networks because of multicast and broadcast network .In case of separate communication it gives high energy loss because there is requirement of some mechanism that can...
Scheduled Theoretical Restoration for Mining Immensely Partial Data Sets
Partial data sets have turn out to be just about ubiquitous in an extensive range of application fields. Mutual illustrations can be initiate in climate and image data sets, sensor data sets, and medical data sets. Th...
Liquidity Management and Profitability: A Case Study of Listed Manufacturing Companies in Sri Lanka
Liquidity management and profitability are very important issues in the growth and survival of business and the ability to handle the trade-off between the two a source of concern for financial managers.The study is a...
Online Marketing in Indian Politics: Role of Social Media
Indian Politics has always been a field of importance for every individual, organization and nation. There is a lot of contribution of the young politicians and voters in politics. The research was conducted to find o...
An Overview and Analysis of Private and Public Key DNA Cryptography
with the growth of technological advancements, the threats dealt by a user grow exponentially. Hence security has become a critical issue in data storage and transmission. As traditional cryptographic systems are now...