In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 2
Abstract
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encrypted image is considered in the proposed approach for creating a space to accommodate data. Before applying the FCM-DH, a content owner prepares a cover image by encrypting the pixels of an image with encryption key. Then, group the pixels to compress the least significant bits of the encrypted image using a proposed FCM-DH technique with data-hiding key and form a partition matrix to create space to accommodate data. With a received cover image containing hidden data, if the receiver can extract the data with data-hiding key or decrypt the cover image with encryption key to obtain original image independently. If the receiver applying both the datahiding key and the encryption key, then extract the data and recover the original image without any error by exploiting the spatial correlation in natural image.
Authors and Affiliations
S Janani, S Poorani
Modified Histogram Based Contrast Enhancement Using Unsharp masking Filter For Medical Images
Low contrast digital images analysis is major drawback in the medical image processing. An image with low contrast has a narrow histogram located typically toward the middle of the intensity scale. Low contrast digit...
Content-based image retrieval using DWT based feature extraction and texture, shape and color features
Content Based Image Retrieval (CBIR) is the retrieval of images based on visual features such as colour, texture and shape. In this paper, we propose the algorithm on the basis of extraction and matching of color and...
Seclusiveness Jamming Attacks Using Packet Hiding Method
We explains the problem of selective jamming attacks in wireless networks. The adversary is active only for a short period of time in this particular attack, it selectively targets the messages of high priority with...
Medium Voltage High-Power Converter Topology for the Large Permanent Magnet Wind Generator Systems
This paper proposes a modular, medium voltage, highpower converter topology for the large permanent magnet wind generator system, eliminating the grid-side step-up transformer, which is desirable for both onshore and o...
Real-Time Face Detection System for Virtual Classroom Environment
In today’s fast paced world where human computer interaction systems are working towards becoming more user-friendly. Face detection has become an integral part of many of these systems. It also has varying range of...