In-dependable Data hiding in an Encrypted Image using FCM-DH Algorithm
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 2
Abstract
In this paper, a data mining technique, Fuzzy C Means Clustering (FCM) based data hiding algorithm (FCM-DH) is used to divide pixels into classes or clusters from the encrypted image. Clustering of pixels in an encrypted image is considered in the proposed approach for creating a space to accommodate data. Before applying the FCM-DH, a content owner prepares a cover image by encrypting the pixels of an image with encryption key. Then, group the pixels to compress the least significant bits of the encrypted image using a proposed FCM-DH technique with data-hiding key and form a partition matrix to create space to accommodate data. With a received cover image containing hidden data, if the receiver can extract the data with data-hiding key or decrypt the cover image with encryption key to obtain original image independently. If the receiver applying both the datahiding key and the encryption key, then extract the data and recover the original image without any error by exploiting the spatial correlation in natural image.
Authors and Affiliations
S Janani, S Poorani
Person Authentication by voice and image using ANFIS and Shifted MFCC
In security systems, the interest in using biometric technologies for person authentication has grown rapidly. Voice is one of the most promising and mature biometric modalities for secured access control. Here prese...
Equivalent Entity Mining Commencing On Relative Uncertainty
Contrast entities are an significant part of decision making progression. To assist judgment making it is useful to evaluate entities that share widespread utility but have distinguishing peripheral characteristics....
Dynamic Traffic Congestion Control Scheme in MANET with Cooperative Communication
Cooperative communications enables efficient utilization of system communication resources, thereby allowing nodes or terminals participating in a communication network to collaborate with each other during informatio...
Technique to the Data Alignment for Accomplishing Accurate Annotation In Web Databases
Databases turn out to be web reachable all the way through HTML form-based search interfaces. The data units revisit from the essential database typically programmed into the result pages vigorously for human browsin...
Requirement Elicitation in Web Applications: Challenges
Requirement elicitation is a vital activity in the process of requirement development and it discovers the requirements of end users. The successfulness of this process mainly depends on identifying the appropriate s...