A Secure Data Hiding Scheme In Images Using Random Generated Key
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 5
Abstract
Abstract: Data hiding is the process of transmitting images in a hidden manner, where as the message should be invisible to the unauthorized users. This technique is a good way to achieve the secret delivery of data, where the colour image acts as a popular cover media to send the secret. The commonly used data hiding technique are based on block truncation coding and complementary Error Diffused Block Truncation Coding. Block Truncation Coding is a type lossy image compression technique for grey scale images. It divide the original image into blocks and then use a quantizer to reduce the number of grey levels. The major issues associated with BTC are unnecessary blocking and false contouring effects. To overcome these issues a complementary Hiding Error Diffused Block Truncation Coding was developed by Jing-Min-Guo and Yun-Fu-Lin. This method overcomes the limitations of traditional BTC, ensure the image quality and highest processing efficiency. The existing system consists of an encoder and decoder and the encoder spreads the watermark into two marked images and the corresponding data security is also improved with the security sharing concepts. However the existing system uses a pseudo random key, which is not synchronized in between the encoder and decoder may leads to wrong extraction. Another problem associated with the existing system is Block size. Various block size can lead different bitmap through existing decoder and the system does not consider the bias limitation, number of water mark as keys and cannot protect the embedded data. The proposed system overcomes the limitations of existing CHEDBTC system without altering its advantages. Our system can yield high image quality and can with stand against various types of security attacks
Authors and Affiliations
Sobimol Mathew
Color Based Image Retrieval System
Advances in the data storage and image acquisition technologies have enabled the creation of large datasets. It is necessary to develop appropriate information systems to efficiently manage these collections. T...
Longest Common Subsequence: A Method for Automatic Evaluation of Handwritten Essays
Abstract Essays are used to evalaute student’s knowledge from early before itself. The aim of the proposed system is to evalaute the handwritten essays automatically. The proposed method is to develope an automated syste...
Adjacent Total Average Algorithm for Travel Time Prediction
Abstract: Travel time prediction plays an important role with the development of ATIS (Advanced Travelers Information Systems).It provides useful information which may allow travelers to change their routes and to decide...
Cloud Data Sharing in a Dynamic Group with a Dual Secure Technology
Abstract: Cloud data sharing is an untrustworthy service where any malicious user can access the data from cloud storage and make use of it so an encryption technique is used to convert data into a unreadable forma...
Twitter Sentiment Classification on Sanders Data using HybridApproach
Abstract : Sentiment analysis is very perplexing and massive issue in the field of social data mining. Twitter isone of the mostly used social media where people discuss on various issues in a dense way. The tweets about...