Edge Adaptive Image Steganography Based on Adaptive Pixel Pair Matching
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
This paper proposes a new improved steganographic technique based on pixel pair matching which is driven by edge adaptive technique. The cover image is scanned first to explore the edges of the image and is used as the candidate region to perform data hiding using pixel pair matching. The basic idea of pixel pair matching (PPM) is to use the value of a pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. The method uses only sharper edge regions while keeping the other smoother regions as they are. In contrast to the existing methods based on PPM, the masking driven approach has lower distortion for various payloads. The proposed method is expected to provide better performance than the existing techniques based on LSB and also secure against well-known steganalysis techniques.
Authors and Affiliations
Akhil P. V
Secure Data Sharing Using Compact Summation key in HybridCloud Storage
Abstract: Data security is crucial aspect in cloud storage. Providing security to a single file or to set of files isanother important factor. In cloud, security is applied to a set of files i.e. to central locatio...
Differentiating Algorithms of Cloud Task Scheduling Based on various Parameters
Abstract: Cloud computing is a new design structure for large, distributed data centers. Cloud computing system promises to offer end user “pay as go” model. To meet the expected quality requirements of users, cloud comp...
Fetching the hidden information of web through specific Domains
Abstract: Now days, most of the people find the information over the internet by visiting various number of web pages and also by following the links under those web pages. A user has the ability to browse for data...
An Efficient Strategy to Reduce and To Restrict Malicious Attacks on the Web with Web Sense
Abstract: As the growth of Information Technology and Communication has led to vivid change, people can connect with each other globally at anywhere and in anytime through search engines. These search engines has also tr...
Real Time Zetta Bytes -Universal Memory ASIC SOC IP Core Design Implementation using VHDL and Verilog HDL for High Capacity Data Computing Processors like Cloud/Cluster/Super VLIW Parallel Distributing Pipelined Array Computing Processors
Abstract: The main intention is RTL Design Architecture and HDL Design Implementation of Zetta Bytes Memory ASIC SOC IP Core for Advanced Parallel Array Distributed Pipelined Array Computing /Cloud Computing / Super VLIW...