CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topic of concern. Data hiding is a powerful tool that provides mechanism for securing data over insecure channel by concealing information within information. Steganography inherits data hiding concept and passes information through host files in such a way that the existence of the embedded secret is unknown. This paper presents a joint application of compression, encryption and embedding techniques for implementing digital image steganography. Compression technique generates noise in the image. Inorder to retain the noise distortion to a minimum level, LSB insertion method is used for embedding purpose where the bits are inserted at the last 2 LSB’s of the image. In this proposed technique the secret information is initially compressed and then the resultant bits are encrypted. Finally these encrypted bits are embedded into an image. The main objective is to develop an application that increases the steganographic capacity and enhances the stego image quality while keeping the security intact.
Authors and Affiliations
Palak Mahajan, , Dr. Ajay Koul
TAB-PRRA: Improved Link Repair Decision Mechanism for Ondemand Routing in MANET
The traditional AODV protocol uses a fixed hop count based threshold as a basis for deciding when to invoke Local Repair or Source Repair in case of a link break. The problem arises with this type of repairing m...
Performance and Evaluation of Data Mining Techniques in Cancer Diagnosis
We analyze the breast Cancer data available from the WBC, WDBC from UCI machine learning with the aim of developing accurate prediction models for breast cancer using data mining techniques. Data mining has...
Privacy Preserving by Hiding Association Rule Mining from Transaction Database
Abstract: For making the decision of data mining process some expertise are required, some organization have their own expertise, but many organization doesn’t have their own expertise, so the organization helps with som...
Optimized Framework for Online Admission Systems With Reference To Professional Programmes in Maharashtra
Abstract: As Admission system is a process, researchers are going to concentrate on standardization, evaluation and optimization. This research paper presents optimized framework for Online Admission process. Framework i...
Enhancement of Cryptographic Security using Stopping Sets
In this paper, we have used channel codes in cryptographic secrecy. Main idea of this paper is to develop the notion of combined security due to cryptography and channel coding. Thus, it is providing a more complet...