Defended Data Embedding For Chiseler Avoidance in Visible Cryptography by Using Morphological Transform Domain
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2013, Vol 15, Issue 2
Abstract
This paper proposes a data-veiling technique for binate images in morphological transform domain for authen- tication purpose. To attain blind watermark drawing, it is difficult to use the detail coordinate precisely as location map to regulate the data-veiling locations. Thus, we look flipping an edge pixel in binate images as deviating the edge location one pixel horizontally ,one vertically. Positioned on this conclusion, we propose an interlaced morphological binate wavelet transform to path the alter edges, which thus ease blind watermark drawing and fusion of cryptographic indication.Unlike current block-based approach, in that the block size is given as 3 x 3 pixels and larger, we establish the image in 2 x 2 pixel blocks. It allows resilience in discovering the edges and also gets the low computational complication. There are two case that twisting the candidates of one do not change the flippability circumstances of other are engaged for orthogonal embedding, that deliver more relevant candidates can be determined so that a larger quqntity can be accomplished.A contemporary effective Backward-Forward Minimization method is suggested, which acknowledge the backward i.e enclose candidates and forward those twisted candidates that may be concerned by spining the present pixel. By this way, the complete visual bias can be minimized. Experimental results determine the validity of our arguments.
Authors and Affiliations
Nalla Bariki Praveen Kumar
High Efficient Complex Parallelism for Cryptography
Cryptography is an important in security purpose applications. This paper contributes the complex,parallelism mechanism to protect the information by using Advanced Encryption Standard (AES) Technique. AES is an encrypti...
A Survey on Energy Efficiency and Cluster Handling in Real Time Wireless Sensor Networks
Abstract: Wireless networking technology in recent years has seen a thriving development. Wireless sensor networks (WSN) has remote environmental monitoring and target tracking as an important application. This makes sen...
Security-Aware Packet Scheduling Scheme with Multi-Level Queuing and RSA
Emerging security-aware packet scheduling algorithms can efficiently improve the security measures while forwarding the packets over wireless links. Existing scheduling algorithms for real-time wireless networks are not...
Growth and Development Strategy of It Software and Service Industry
Data storage security in Cloud
Abstract : Cloud computing is worthy of consideration and try to build business systems as a way for businesses in this way can undoubtly bring about lower costs, higher profits and more choice; for large scale ind...