Frequency Domain Approach of Image Steganography
Journal Title: International Journal of Innovative Research in Information Security - Year 2016, Vol 0, Issue 0
Abstract
Image steganography is the art of hiding a message, image, or file within another message, image, or file. Likely, an old term in Ancient Greek, Steganography is derived from steganos meaning ―”concealed” and graphein meaning ―”writing”, in other word we can say it refers to the science of “invisible” communication. Unlike cryptography, where the goal is to secure communications from an eavesdropper, steganography techniques strive to hide the very presence of the message itself froman observer. In this research paper we deal with hiding a digital message image inside a digital cover image leading us to the stego image. With the combination of Message Preparation using Spatial Domain image modification technique, discrete cosine transforms (DCT) and image scrambled using modified Arnold Transform, an algorithm based on the three technologies is proposed. The effectiveness of the proposed methods has been estimated by computing Mean square error (MSE) and Peak Signal to Noise Ratio (PSNR) and experimental result shows that the proposed algorithm is highly secured with good perceptual invisibility.
Authors and Affiliations
Himadri Bhattacharjee, Dr. Samir Kumar Bandyopadhyay
Implementation of an Instant Messaging Tool
Instant messaging (IM) becomes a vital part of our daily use in social media and internet network. The growing of communication needs reliable and fast technologies and tools. As a result, companies are implementing vari...
Optimization Multicast Routing Problem by Enabled Virtualization Rendezvous Point
Multicast provides effective communication and transmission, optimizes performance and enables truly distributed applications, also simultaneously optimizes cost of the multicast tree, average delay and maximum end-to-en...
Data Aggregation to Improve Energy Efficiency in Wireless Sensor Networks
Wireless Sensor Network is a collection of large number of tiny sensor nodes which are connected to each other wireless having limited energy. These nodes are mobile in nature. These sensor nodes sense the same data and...
Performing Network Simulators of TCP with E2E Network Model over UMTS Networks
Wireless links losses result in poor TCP throughput since losses are perceived as congestion by TCP with the evolution of 3G technologies like Universal Mobile Telecommunication System (UMTS), the usage of TCP has become...
Kenya Police Service Members’ Perception of the Effectiveness of Guidance and Counseling Services in Curbing Suicide Ideation and Stress Management
The main purpose of the study was to assess the Kenya police members’ perception of the effectiveness of guidance and counselling services in curbing suicide ideation and stress management. The inability to cope effectiv...