A Secure Data Hiding Scheme In Images Using Random Generated Key
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Data hiding is the process of transmitting images in a hidden manner, where as the message should be invisible to the unauthorized users. This technique is a good way to achieve the secret delivery of data, where the colour image acts as a popular cover media to send the secret. The commonly used data hiding technique are based on block truncation coding and complementary Error Diffused Block Truncation Coding. Block Truncation Coding is a type lossy image compression technique for grey scale images. It divide the original image into blocks and then use a quantizer to reduce the number of grey levels. The major issues associated with BTC are unnecessary blocking and false contouring effects. To overcome these issues a complementary Hiding Error Diffused Block Truncation Coding was developed by Jing-Min-Guo and Yun-Fu-Lin. This method overcomes the limitations of traditional BTC, ensure the image quality and highest processing efficiency. The existing system consists of an encoder and decoder and the encoder spreads the watermark into two marked images and the corresponding data security is also improved with the security sharing concepts. However the existing system uses a pseudo random key, which is not synchronized in between the encoder and decoder may leads to wrong extraction. Another problem associated with the existing system is Block size. Various block size can lead different bitmap through existing decoder and the system does not consider the bias limitation, number of water mark as keys and cannot protect the embedded data. The proposed system overcomes the limitations of existing CHEDBTC system without altering its advantages. Our system can yield high image quality and can with stand against various types of security attacks
Authors and Affiliations
Sobimol Mathew
Best Treatment Identification for Disease Using Machine Learning Approach in Relation to Short Text
Abstract: The goal of Machine Learning is to construct a computer system that can adapt and learn from their experience. Machine Learning approach helps to integrate the computer based system into the healthcare fi...
Security Suite for IT and Telecom Industries
Abstract: Security is the biggest concern nowadays faced by various companies as security threats are more prevalent. This „openness‟ is the reason because of which protecting networks and business data is even more diff...
Obtaining the Name aliases from the Web, using them to Cluster Text Documents with Cuckoo Algorithm and Comparing Results with K-Means Algorithm
Abstract: There is an increase in the searching where name aliases are concerned. Approximately 30 percent of searches are based on aliases; hence it becomes important to obtain correct aliases. Lexical pattern bas...
A Novel Method of Data Staging For Better Mobile User Accessibility through Cloud
Abstract: In this paper, we identify and create vantage sites to stage shared data items for the ease of mobile user accesses. As mobile users will be charged on the usage of communication bandwidth and for the amo...
Analysis of Manhattan mobility model without RSUs
The vehicular communication is an important issue to the researchers who are engaged in preventing traffic accidents and traffic jams. The earlier vehicular models had discussed only communication among vehicles...