CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topic of concern. Data hiding is a powerful tool that provides mechanism for securing data over insecure channel by concealing information within information. Steganography inherits data hiding concept and passes information through host files in such a way that the existence of the embedded secret is unknown. This paper presents a joint application of compression, encryption and embedding techniques for implementing digital image steganography. Compression technique generates noise in the image. Inorder to retain the noise distortion to a minimum level, LSB insertion method is used for embedding purpose where the bits are inserted at the last 2 LSB’s of the image. In this proposed technique the secret information is initially compressed and then the resultant bits are encrypted. Finally these encrypted bits are embedded into an image. The main objective is to develop an application that increases the steganographic capacity and enhances the stego image quality while keeping the security intact.
Authors and Affiliations
Palak Mahajan, , Dr. Ajay Koul
Database Applications in Analyzing Agents
Abstract: There are many situations in which two or more agents (e.g., human or computer decision makers)interact with each other repeatedly in settings that can be modeled as repeated stochastic games. In suchsitu...
Comparisons of Video Summarization Methods
Abstract: Video summarization is a process of removing the redundant frames and generating the most informative key frames of the videos. In this paper we have explained two efficient methods for video summariz...
A Multi-Agent System to Support ICT based Distance Learningthrough Modeling of Learner Needs: The Caseof Bachelor of Education at the University of Nairobi
Abstract:In distant learning environments, most learners need feedback from their lecturers and administration. The feedback supports them to achieve their learning objectives. However, the feedback that the most distant...
Design of Mobile Robot Navigation system using SLAM and Adaptive Tracking Controller with Particle Swarm Optimization for Indoor Environment Monitoring
[i][/i]Abstract: Now a day mobile robot work as a autonomous machine which is used to control the locomotion and move around in environment by varying the physical location A self localization & mapping of mobile rob...
Anti-spam Filter Based on Machine Learning Algorithm
We building one of the filter which help the user relief from the unwanted mails in his inbox of the mail account which is develop using the machine learning algorithm and which also contain the filter.In this we c...