A NEW APPROACH TO IDENTIFY THE STEGNO IMAGE USING EIGEN VALUE AND EIGEN VECTOR METHOD
Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 3
Abstract
In this paper we propose a new BMP based Steganography image identification using Eigen values and Eigen Vectors Technique. This is new approach and this method is different from normal and Steganography image comparison, the steganography technique is normally based on BMP images by hiding information in other information. Many different carrier file formats can be used, but digital images are the most popular because of their frequency on the Internet. For hiding secret information in images, there exists a large variety of steganographic techniques some are more complex than others and all of them have respective strong and weak points. Different applications have different requirements of the steganography technique used. For example, some applications may require absolute invisibility of the secret information, while others require a larger secret message to be hidden. This paper intends to give an overview of steganography image identification using Eigen values and Eigen Vectors Technique. It also attempts to identify the requirements of a good steganographic algorithm and briefly reflects on which steganographic techniques are more suitable for which applications.
Authors and Affiliations
Dr. S. S Dinakaran#1, M. Sc. , M. Phil. , Ph. D. , A. Ruby#
Fly Ash and Recycled Coarse Aggregate in Concrete: New Era for Construction Industries - A Literature Review
Use of recycled coarse aggregate in concrete can be useful for environmental protection and economical terms. Recycled aggregates are the materials for the future. Same as fly ash is also a byproduct from various...
Hiding Messages Using Motion Vector Technique In Video Steganography
Steganography is the art of hiding information in ways that avert the revealing of hiding messages.Video files are generally a collection of images. so most of the presented techniques on images and audio can be...
Design & Implementation Of 32-Bit Risc (MIPS) Processor
In this paper we propose a novel technique of run-time loading of machine code for MIPS-32 soft-core processor. As we know, implementing fewer instructions and addressing modes on silicon reduces the complexity of the in...
To Study and Analyze to foresee market Using Data Mining Technique
In every field there is huge growth and demand in knowledge and information over the internet. The automation using data mining and predictive technologies are doing an advance amount of deals in the markets. Data...
Electricity Generation in a Microbial Fuel Cell: Study of Two Proton Exchange Membrane Diameter
Dual chamber Microbial Fuel Cell (MFC) with saline catholyte was used in this laboratory scale study on the effect of Proton exchange membrane (PEM) diameter on energy output. Two different a gar-agar salt-bridges PEM of...