A Secure Data Hiding Scheme In Images Using Random Generated Key

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: Data hiding is the process of transmitting images in a hidden manner, where as the message should be invisible to the unauthorized users. This technique is a good way to achieve the secret delivery of data, where the colour image acts as a popular cover media to send the secret. The commonly used data hiding technique are based on block truncation coding and complementary Error Diffused Block Truncation Coding. Block Truncation Coding is a type lossy image compression technique for grey scale images. It divide the original image into blocks and then use a quantizer to reduce the number of grey levels. The major issues associated with BTC are unnecessary blocking and false contouring effects. To overcome these issues a complementary Hiding Error Diffused Block Truncation Coding was developed by Jing-Min-Guo and Yun-Fu-Lin. This method overcomes the limitations of traditional BTC, ensure the image quality and highest processing efficiency. The existing system consists of an encoder and decoder and the encoder spreads the watermark into two marked images and the corresponding data security is also improved with the security sharing concepts. However the existing system uses a pseudo random key, which is not synchronized in between the encoder and decoder may leads to wrong extraction. Another problem associated with the existing system is Block size. Various block size can lead different bitmap through existing decoder and the system does not consider the bias limitation, number of water mark as keys and cannot protect the embedded data. The proposed system overcomes the limitations of existing CHEDBTC system without altering its advantages. Our system can yield high image quality and can with stand against various types of security attacks

Authors and Affiliations

Sobimol Mathew

Keywords

Related Articles

 Face Recognition using Face Alignment and PCA Techniques: ALiterature Survey

Abstract: The face is our key of attention in social communication, playing a main role in transmission identityand sentiment. Hence, Face recognition has become an important issue in many applications such as securitysy...

 Improved and Energy Efficient Olsr Protocol Using Spanning Tree in Manet

 Abstract: Mobile Adhoc Network is an autonomous and decentralized network. Its topology changes dynamically and message overhead is more due to its frequent change of topology in network. For reliable transmissio...

 Government Policies Search Using Marathi Speech RecognitionSystem– Based On Robust Feature Extraction Method

Abstract:Country like India, where 70% of the population lives in village and rural parts of the country, itbecomes more necessary to utilize such tools for their social, economic, administrative and governanceregenerati...

 Secure Dispatch of Mobile Sensors in a Hybrid Wireless Sensor Networks

 A Hybrid Wireless Sensor network (HWSN) with static and mobile nodes is considered. Static sensors monitor the environment and report events occurring in the sensing field. Mobile sensors are then dispatched to v...

 Semi-Supervised Discriminant Analysis Based On Data Structure

Abstract: Dimensionality reduction is a key data-analytic technique for mining high-dimensional data. In thispaper, we consider a general problem of learning from pairwise constraints in the form of must-link and cannotl...

Download PDF file
  • EP ID EP121689
  • DOI -
  • Views 101
  • Downloads 0

How To Cite

Sobimol Mathew (2014).  A Secure Data Hiding Scheme In Images Using Random Generated Key. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 49-54. https://europub.co.uk/articles/-A-121689