Information Hiding Using Mosaic Images with Random Image Key Generation
Journal Title: INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY - Year 2013, Vol 12, Issue 3
Abstract
Image watermarking is one of the efficient technique to send the secrete information from sender to receiver. The concept of information hiding using mosaic images is also an efficient technique of keeping the information secretes. The existing technique of information hiding using LSB based embedding of information and then using greedy search algorithm for the searching of images tile into the database. The technique implemented in the literature so far provides more error rate and also the time complexity is greater, since it uses the concept of greedy search for the searching of most similar image tile in the database. Our proposed technique does not require searching of the tile images resulting in a lower computational time. The proposed technique is based on the concept of watermarking, where the secrete image is converted into a number of tiles and then each of the tile image is converted into binary value. These binary values are used as a secrete key from which the cover image is encrypted and decrypted.
Authors and Affiliations
Akhilesh Bansiya, Yogendra Kumar Jain
A COMPARATIVE STUDY OF VARIOUS METHODS OF ANN FOR SOLVING TSP PROBLEM
Abstract This paper represents TSP (Travelling Salesman Problem) by using Artificial Neural Networks.A comparative study of various methods of ANN is shown here for solving TSP problem.The Travelling Salesman Problem...
MOBILE AGENT APPLICATION DEVELOPMENT IN A SIMPLE JAVA-BASED MOBILE AGENT SYSTEM (SIMMAS)
As network information resources grew in size, it was most efficient to process queries and updates at the site where the data was located. The processing accomplished by a traditional client-server network interface con...
Implementation and Evaluation of Rule Induction Algorithm with Association Rule Mining: A study in life insurance
Data Mining: extracting useful insights from large and detailed collections of data. With the increased possibilities in modern society for companies and institutions to gather data cheaply and efficiently, this subject...
Formal Methods in Information Security
Formal methods use mathematical models for analysis and verification at any part of the program life-cycle. The use of formal methods is admitted, recommended, and sometimes prescribed in safety-and security-related stan...
Watermarking Using LSB Shifting to Document Protection
The original signature or document. The application demonstrates that it can be used to protect a document or signature from fraud by an authorize person. Criminal can be considered as Harmful act or omission against the...