Robust Digital Data Hiding in Low Coefficient Region of Image
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2021, Vol 9, Issue 1
Abstract
Digital images have many uses in the field of health, research, military, art, etc. Digital Images need annotation for retrieval and protection from piracy, attacks, and modification. To perform this retrieval and protection, some of the information was hidden in the image matrix. This paper proposes a data embedding and extraction algorithm. Low-frequency regions of the image are identified to embed secret information in LSV (Least Significant Value) and MSV (Most Significant Value) of a selected coefficient once the data hiding in the embedding section of the proposed model image gets retransformed in the original image structure as per the number of bits used in LSV and MSV for data hiding image gets secured from different spatial attacks. The experiment is performed on real images. A comparison of the proposed model is done on PSNR, MSE, evaluation parameters. It is shown that the proposed model is better as compared to the existing model.
Authors and Affiliations
Nomaan Jaweed Mohammed, Mohamed Manzoor Ul Hassan
Feature Extraction Technique for Human Face Recognition – A Hybrid Approach
This paper presents a new feature extraction technique for recognizing human faces. The proposed method uses hybrid feature extraction techniques such as Principal Component Analysis and Gabor Wavelet are combined togeth...
A Study of Goodness –of- Fit Tests for Some Discrete Probability Distribution
This paper presents the goodness of fit (GOF) tests for several discrete distributions viz., Poisson, Generalized Poisson and Negative binomial distribution. Parameter estimation is performed and goodness of fit test for...
Analysis of Bullet Train Project Using CPM and PERT
One of the most significant tools for project planning and management is the Critical Path Method (CPM), as well as the Project Evaluation and Review Technique (PERT). When the time required or anticipated to perform spe...
A New Security Primitive Based on Hard AI Problems and Efficient User Authentication using Captcha and Graphical Passwords
In this paper,I present a new security primitive based on hard AI (Artificial Intelligence) problems, namely, a novel family of graphical password systems built on top of Captcha technology, which we call Captcha as grap...
Survey on Fog Computing Mitigating Data Theft Attacks in Cloud
Cloud computing now-a-days forms a very important unit in the online world, by modifying how the computers and Internet were used few years back. Cloud computing provides the facility to store personal information and th...