Comparative analysis of Stegnography Algorithms on the Basis of PSNR value & cover file size
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 3
Abstract
Abstract: With the rapid growth in the field of technology, there is always a requirement of development of fast and secure algorithms. Steganography is used to provide confidentiality over the transmitted data or the stored data. There were many steganography algorithms proposed to provide security but there is always a competition to develop a algorithm which is fast, secure, having high PSNR value and less cover file size. In this paper, authors have discussed such papers and compare it with each others.
Authors and Affiliations
Shubhi Jain , Sini Shibu
Towards Accurate Estimation of Fingerprint Ridge Orientation Using BPNN and Ternarization
Accurate estimation of ridge orientation is a crucial step in fingerprint image enhancement because the performance of a minutiae extraction algorithm and matching heavily relies on the quality of the input fin...
A New Classifier Based onRecurrent Neural Network UsingMultiple Binary-Output Networks
Abstract:Conventional classifiers have several outputs equal to the number of classes (N) which imposes somuch complexityto the classifiers,both in training and testing stages. Instead of using one extra-large andcomplic...
An Effective m-Health System for Antenatal and Postnatal Care in Rural Areas of Bangladesh
Abstract: In South Asia, Maternal Mortality Rate (MMR) is so high due to the lack of health facility, doctor’s insufficiency, lack of communication facility and also the poverty. Bangladesh is also suffering from this un...
A Practical Approach Forparallel Image Processing
This review paper tries to solve the problem of processing big data of images on Apache Hadoop using Hadoop Image Processing Interface (HIPI) for storing and efficient distributed processing, combined with OpenCV, an ope...
Comparative Analysis of Smart Card Authentication Schemes
Various kinds of authentication schemes have been deployed to secure the information or resources from unauthorized access. In these schemes, server maintains a verification table which is vulnerable to a var...