A Dynamic Image Generation Scheme for Steganographic Data Encryption
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: This paper proposes a new approach to provide an extra layer of security to steganographictechniques. Today, most of the data is sent over the internet, whether personal or professional. Protection of digital multimedia content has become an increasingly important issue for content owners and service providers; therefore; there is a never ending demand to make the transmission network more secure. Conventional cryptography methods are vastly open to unauthorized attacks as they are well known to attackers and many new kinds of attacks are being raised, exploiting the loop holes in the conventional techniques. Hence, the demand for designing new techniques, for reliable encryption methods are high. This paper presents a novel method of hiding data in popular image formats like JPEG, TIF and PNG along with the message/data. The image in steganography till now, used to be fixed, standard images; we propose to implement dynamic images, which are generated using the user's voice. This kind of voice generated image is unique to each person and is virtually untraceable on the world wide web.
Authors and Affiliations
Shahjada Imran Khan , Anindya Shankar Shukl , Anandarup Mukherjee
Design and Developing a Multicast Routing Protocol for Link Failure and Reliable Data Delivery.
MANET is a mobile Ad hoc network. It is a wireless and self organized network without infrastructure support. Ad hoc networks systems possess rapid deployment, robustness and flexibility. The problems of Ad ho...
Multi-Resolution Pruning Based Co-Location Identification In Spatial Data
A co-location spatial pattern is a pattern of multiple groups which co-relates spatial features or events that are frequently located in same zone. Co-location pattern mining emphasizes overall analysis bymanipulating th...
Optimization of Horizontal Aggregation in SQL by using C4.5 Algorithm and K-Means Clustering
Abstract: Datasets in the horizontal aggregated layout are preferred by most of data mining algorithms, machine learning algorithm. Major efforts are required to compute data in the horizontal aggregated format. Th...
Feature Based Semantic Polarity Analysis Through Ontology
Abstract: Opinion mining, a trending research area where customers feels that opinions of others are alwaysimportant for making decisions while purchasing the products. Here the problem is to collect those opinions...
Design & Development of an Advanced Database ManagementSystem Using Multiversion Concurrency Control Model for aMultiprogramming Environment
Abstract: Multi Version Concurrency Control (MVCC) is a locking scheme commonly used by moderndatabase implementations to control fast, safe concurrent access to shared data. MVCC is designed to providethe followin...