Method To Enhance The Capacity Of Embedding Data In Jpeg Images
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2016, Vol 5, Issue 2
Abstract
A novel method of reversible data hiding is proposed here. The technique relies on data hiding in encrypted JPEG images is used. As we know that encryption is an effective method of privacy protection .All previous method such as embedding using a difference expansion method produce some error on the recovery stage and their embedding capacity is relatively small compared to the proposed method. In this paper, we take an image and it is compressed and later it is encrypted .To this image the secret data are embedded to it and again it is encrypted using another key called embedding key. Reaching the receiver side if he has only the both key he can obtain initial image otherwise only partially restored image and secrete data that embedded in it will not be retrieved.
Authors and Affiliations
Julie Antony k, Reenu Mariam Cherian, Sanoj R
Storage Correctness Verification and Data Regaining In Cloud
Users no longer hold physical possession of the outsourced data makes the data integrity protection in cloud computing a formidable task particularly for users with constrained computing resources. Moreover users sho...
High Performance of Fault Detection And Correction Technique Using Difference Set Codes For Memory Applications
The advanced combination technologies made it possible for accessing any device so fast that within a portion of seconds the job can be performed. Now days fast memories exists everywhere during accessing if any erro...
Energy efficient cluster based approach in wireless Ad-hoc networks: Survey
A mobile ad-hoc network (MANET) is a collection of different mobile nodes. These nodes can communicate with each other over wireless networks using wireless links. The energy saving is an important challenge of wirel...
Butterfly Design for RADIX-4K DIF FFT
VLSI and Digital Signal Processing are the two emerging technologies in the present world. Design of high performance, low area and low power VLSI circuits are needed for the DSP applications. This paper is dealing w...
Public Key Encryption Using Key Aggregate Cryptosystem
Data contribution is an imperative functionality in cloud storage. For illustration bloggers can let their friends view a separation of their private pictures. An endeavour may contribution her employee’s contact to...