Method To Enhance The Capacity Of Embedding Data In Jpeg Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 2
Abstract
A novel method of reversible data hiding is proposed here. The technique relies on data hiding in encrypted JPEG images is used. As we know that encryption is an effective method of privacy protection .All previous method such as embedding using a difference expansion method produce some error on the recovery stage and their embedding capacity is relatively small compared to the proposed method. In this paper, we take an image and it is compressed and later it is encrypted .To this image the secret data are embedded to it and again it is encrypted using another key called embedding key. Reaching the receiver side if he has only the both key he can obtain initial image otherwise only partially restored image and secrete data that embedded in it will not be retrieved.
Authors and Affiliations
Julie Antony k, Reenu Mariam Cherian, Sanoj R
An Optimal and Secure Ranking Search Over out Sourced Cloud Databases
Considering top k multi keywords from the out sourced information files is still an intriguing examination issue in light of the fact that out sourced information over cloud can be scrambled for secrecy .In this pape...
Network Coding Equivalent Content Distribution (NCECD) Scheme in P2P Networks
Anonymizing networks such as Tor allow users to access internet services privately by using a series of routers to hide the client’s IP address from the server. The success of such networks that However has been limit...
Performance Analysis of Improved ODMRP with Motion Detection (IOMD) in Mobile Ad Hoc Network
Multicast transmission is a more effective mechanism when more effective mechanism to unicasts for group communication based applications and of due importance to future network development. Multicasting in ad hoc ne...
Dos Attack Detection System Using Anomaly Based Technique In Interconnected Systems
Denial-of-service (dos) attacks are one kind of violent and threatening invasive behaviour to online servers. Dos attacks harshly humiliate the ease of use of a victim, which can be a host, a router, or an entire net...
An Efficient Content Sharing Scheme For Delay-Tolerant Smart Phone Networks
Some smart phones in the network store content that they are ready to share with others. All Smartphone users are eager to assist and provide a limited amount of their resources such as bandwidth, storage and process...