Secured Genetic Algorithm based image hiding technique with location number compression
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 4
Abstract
Abstract: Data hiding involves hiding of information in a cover media to obtain the indistinguishable media, in such a way that the cover media is supposed not to have any embedded image for its unintended recipients. Steganography and Watermarking are main parts of the fast developing area of information hiding. This paper is based on Steganography, Watermarking and Cryptography where the system ensures secured image transferbetween the source and destination. Encrypted image bits are embedded into higher and random LSB layers,resulting in increased robustness against noise addition. On the other hand, multi-objective Genetic Algorithm operators are used to reduce distortion. The basic idea of this paper is to improve security. For this improvement image embedding position numbers are converted to optimized Arrays and these Arrays are embedded into the Audio file. Performance based on imperceptibility, security and hiding capacity has been evaluated and discussed
Authors and Affiliations
Krishna Bhowal , D. Sarkar , S. Biswas , P. P. Sarkar
Approach Of Object Oriented Data Modeling
In This section explains some basic concepts such as Object-oriented programming, objects, database system, and object-oriented database. Also there is some explanations of the basic object-oriented modeling .
Routing and Security Issues for Trust Based Framework inMobile Ad Hoc Networks
Abstract: Mobile means moving and Ad Hoc means temporary without any fixed infrastructure, so mobile adhoc networks (MANETs) are a kind of temporary networks in which nodes are moving without any fixedinfrastructur...
A Cost Estimation of Maintenance Phase for Component Based Software
Cost estimation of maintenance phase is necessary to predict the reliability, improve the productivity, project planning, controlling and adaptability of the software. Accurate estimation makes good understanding...
1 Level DWT Image Watermarking Algorithm for RGB Cover Images and Watermarks
Abstract: This paper proposes a new 1 level DWT (Discrete wavelet transform) robust image watermarking algorithm for RGB cover images and watermarks. In the proposed algorithm 1 level DWT is applied on RGB cover image. T...
Pragmatic Approch for Financial Networking System Using Cyber Physical Systems Through Advanced DataMining Concepts
Abstract: Last few decades witnessed the proliferation of financial reforms, liberalization and globalization of economy coupled with rapid revolution in information technology (IT).The paper presents the benefits...