A Secure Data Hiding Scheme In Images Using Random Generated Key

Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5

Abstract

 Abstract: Data hiding is the process of transmitting images in a hidden manner, where as the message should be invisible to the unauthorized users. This technique is a good way to achieve the secret delivery of data, where the colour image acts as a popular cover media to send the secret. The commonly used data hiding technique are based on block truncation coding and complementary Error Diffused Block Truncation Coding. Block Truncation Coding is a type lossy image compression technique for grey scale images. It divide the original image into blocks and then use a quantizer to reduce the number of grey levels. The major issues associated with BTC are unnecessary blocking and false contouring effects. To overcome these issues a complementary Hiding Error Diffused Block Truncation Coding was developed by Jing-Min-Guo and Yun-Fu-Lin. This method overcomes the limitations of traditional BTC, ensure the image quality and highest processing efficiency. The existing system consists of an encoder and decoder and the encoder spreads the watermark into two marked images and the corresponding data security is also improved with the security sharing concepts. However the existing system uses a pseudo random key, which is not synchronized in between the encoder and decoder may leads to wrong extraction. Another problem associated with the existing system is Block size. Various block size can lead different bitmap through existing decoder and the system does not consider the bias limitation, number of water mark as keys and cannot protect the embedded data. The proposed system overcomes the limitations of existing CHEDBTC system without altering its advantages. Our system can yield high image quality and can with stand against various types of security attacks

Authors and Affiliations

Sobimol Mathew

Keywords

Related Articles

 Detecting Anomaly IDS in Network using Bayesian Network

 In a hostile area of network, it is a severe challenge to protect sink, developing flexible and adaptive security oriented approaches against malicious activities. Intrusion detection is the act of detecting, mon...

 Effectual Routine for Trilateral Authentication in Ad-hoc Networks using Multicast Conventions

 Ad-hoc networks have mass of applications; though, a dynamic problem regarding their security aspects must be answered in order to realize these applications. Validating the source and ensuring the integrity &nbs...

 Fetching the hidden information of web through specific Domains

 Abstract: Now days, most of the people find the information over the internet by visiting various number of web pages and also by following the links under those web pages. A user has the ability to browse for data...

 Methods Migration from On-premise to Cloud

 Abstract: Cloud computing is evolving as a key computing platform for sharing resources that includeinfrastructures, software, applications, and business. An increasing number of companies are expected tomigrate th...

 Performance Analysis of Three Hop Reliability Model forWireless Sensor Networks in Nuclear Power Plants

Abstract: Wireless sensor networks(WSN) are a good choice for Nuclear Power Plants because of low costand flexibility. Reliability is a crucial factor for WSN in Nuclear Power Plants since all the data collected aretime...

Download PDF file
  • EP ID EP121689
  • DOI -
  • Views 76
  • Downloads 0

How To Cite

Sobimol Mathew (2014).  A Secure Data Hiding Scheme In Images Using Random Generated Key. IOSR Journals (IOSR Journal of Computer Engineering), 16(5), 49-54. https://europub.co.uk/articles/-A-121689