CEET: A Compressed Encrypted & Embedded Technique for Digital Image Steganography
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 2
Abstract
Abstract: In this information era, digital information sharing and transfer plays a vital role and their use has increased exponentially with the development of technology. Thus providing security of data is a topic of concern. Data hiding is a powerful tool that provides mechanism for securing data over insecure channel by concealing information within information. Steganography inherits data hiding concept and passes information through host files in such a way that the existence of the embedded secret is unknown. This paper presents a joint application of compression, encryption and embedding techniques for implementing digital image steganography. Compression technique generates noise in the image. Inorder to retain the noise distortion to a minimum level, LSB insertion method is used for embedding purpose where the bits are inserted at the last 2 LSB’s of the image. In this proposed technique the secret information is initially compressed and then the resultant bits are encrypted. Finally these encrypted bits are embedded into an image. The main objective is to develop an application that increases the steganographic capacity and enhances the stego image quality while keeping the security intact.
Authors and Affiliations
Palak Mahajan, , Dr. Ajay Koul
A Survey of the Internet of Things
Abstract: This paper studies the state-of-art of Internet of Things (IoT). By enabling new forms of communication between people and things, and between things themselves, IoT would add a new dimension to the world of in...
Digital Image Forgery Detection by Contrast Enhancement
Abstract: For decades, photographs have been used to document space-time events and they have often served as evidence in courts. Today, powerful digital image editing software makes image modifications straightfor...
Outage Probability Performance Analysis of a New Hybrid Relay Selection Protocol
In this paper, the diversity gains of wireless relay networks were exploited. The proposed cooperative scheme using the first best relay for providing the highest SNR at the destination, whereas the second best relay is...
Traffic Modeling of Wireless Body Area Network
Abstract: Wireless Body Area Network (WBAN) is required to provide quality of service (QoS) guarantees for transporting and processing life threatening gathered data. One important aspect of providing QoS guarantees unde...
Competent Tracking of Moving Object Using Affine & Illumination Insensitive Template Matching
Abstract : Moving object detection & tracking in real world scene is becoming significant problem in today’s era. The extensive study in this area is motivated by potential number of applications of object tracking....