CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topic of concern. Data hiding is a powerful tool that provides mechanism for securing data over insecure channel by concealing information within information. Steganography inherits data hiding concept and passes information through host files in such a way that the existence of the embedded secret is unknown. This paper presents a joint application of compression, encryption and embedding techniques for implementing digital image steganography. Compression technique generates noise in the image. Inorder to retain the noise distortion to a minimum level, LSB insertion method is used for embedding purpose where the bits are inserted at the last 2 LSB’s of the image. In this proposed technique the secret information is initially compressed and then the resultant bits are encrypted. Finally these encrypted bits are embedded into an image. The main objective is to develop an application that increases the steganographic capacity and enhances the stego image quality while keeping the security intact.
Authors and Affiliations
Palak Mahajan, , Dr. Ajay Koul
A Fast Convergence and Quick Route Updates Based EnergyAware Tree-Based Routing Protocol for Mobile WSNS
Abstract: Wireless Sensor Networks is the result of latest advancements in the field of wireless technology. Therecent upgrades to the wireless network provides the opportunity to wireless sensor networks to fully...
Primal-Dual Asynchronous Particle Swarm Optimization (pdAPSO) Algorithm For Self-Organized Flocking of Swarm Robots
Abstract: This paper proposed a hybrid PSO algorithm that combines the Primal-Dual method with APSO algorithm to address the problem of swarm robotics flocking motion. This algorithm combines the explorative ability of A...
A Secure QOS Distributed Routing Protocol for Hybrid WirelessNetworks
Abstract: The succeeding wireless network is Hybrid Wireless Networks. It can provide Quality of Service(QoS) requirements in real time transmission for wireless application. But it stream including critical missio...
Sentiment of Sentence in Tweets: A Review
Abstract: Determine the sentiment of sentence that is positive or negative based on the presence of part of speech tag, the emoticons present in the sentences. For this research we use the most popular microblogging sitt...
Authentication of grayscale document images using shamir secret sharing scheme.
Abstract: This paper proposed a new blind authentication method based on the secret sharing technique with a data repair capability for grayscale document images .Shamir proposed threshold secret sharing scheme in...