Edge Adaptive Image Steganography Based on Adaptive Pixel Pair Matching
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 1
Abstract
This paper proposes a new improved steganographic technique based on pixel pair matching which is driven by edge adaptive technique. The cover image is scanned first to explore the edges of the image and is used as the candidate region to perform data hiding using pixel pair matching. The basic idea of pixel pair matching (PPM) is to use the value of a pixel pair as a reference coordinate, and search a coordinate in the neighborhood set of this pixel pair according to a given message digit. The pixel pair is then replaced by the searched coordinate to conceal the digit. The method uses only sharper edge regions while keeping the other smoother regions as they are. In contrast to the existing methods based on PPM, the masking driven approach has lower distortion for various payloads. The proposed method is expected to provide better performance than the existing techniques based on LSB and also secure against well-known steganalysis techniques.
Authors and Affiliations
Akhil P. V
A Survey of Network Security in Mobile Ad-Hoc Network
Abstract: This paper describes the concept of ad hoc networking and the security issues faced by giving its background and presenting some of the security challenges that are faced by the mobile ad hoc network. Ad hoc wi...
Increasing the Visibility of Search using Genetic Algorithm
Abstract : The vast repository of informational databases i.e. Web is available to the user in the form of textual documents. It’s a challenge to develop an effective information retrieval approach that can ease the user...
Effects Of Wormhole Attack On AODV And DSR Routing Protocol Through The Using NS2 Simulator
Abstract : Mobile Adhoc Networks (MANET) are self organizing, decentralized networks and possess dynamic topology, which make them attractive for routing attacks. Attacks on ad hoc networks can be classified as pas...
A Quantitative Measurement Methodology for calculating Risk related to Information Security
Nowadays, technology increases, so the risk related to technology is also increasing. Risk is the possibility of suffering loss. Therefore, we have to adopt some risk management methodology to reduce the number of ris...
Comparative study on Cache Coherence Protocols
Abstract: In this new age of technology, not only the software but also the computer architecture has beenevoluted to support those softwares. The main motive of evolution of architecture day by day is to make thes...