Different Method Used in Pixel Value Differencing Algorithm
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 3
Abstract
Steganography is the art of hiding information inside a multimedia. The basic idea is to hide data inside carrier medium such as text, image, audio, video and networks in such a way that attacker cannot detect it. Image steganography is the major part of steganography which is divided into spatial and frequencydomains. Pixel value differencing is one of the spatial domain techniques. In this paper, we would review various pixel value differencing steganography techniques and also the changes in these techniques. This paper concludes with the need of better steganography techniques for color images and edge based images.
Authors and Affiliations
Tripti Dhruw , Dr. Namita Tiwari
Image Retrieval using Sparse Codewords with Cryptography for Enhanced Security
Now days face image of people is the interesting area of users. Most of the time images are in digital form. Thus, content-based face image retrieval is a technique which facilitates for many emerging applications.In thi...
Driving Simulator
Abstract: Simulators which are developed by suppliers individually for specific application purpose are known as Driving Simulator. Most of the conventional driving simulators provide some flexibility for construc...
A review of High Performance Computing
Current high performance computing (HPC) applications are found in many consumers, industrial and research fields. There is a great deal more to remote sensing data than meets the eye, and extracting that inform...
An Intelligence System for Detection of Cancer and Diagnosis
Abstract: Currently the digital images are used in various areas like medical, fashion, architecture, face recognition, finger print recognition and bio metrics. Recently the CBIR reduced the semantic gap between t...
A novel algorithm to protect and manage memory locations
Abstract: Most of security vulnerabilities continue to be caused by memory errors, and long-running programsthat interact with untrusted components. While comprehensive solutions have been developed to handle memor...