Secure Steganography for Digital Images
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 6
Abstract
The degree of imperceptibility of hidden image in the ‘Digital Image Steganography’ is mostly defined in relation to the limitation of Human Visual System (HVS), its chances of detection using statistical methods and its capacity to hide maximum information inside its body. Whereas, a tradeoff does exist between data hiding capacity of the cover image and robustness of underlying information hiding scheme. This paper is an exertion to underline the technique to embed information inside the cover at Stego key dependent locations, which are hard to detect, to achieve optimal security. Hence, it is secure under worst case scenario where Wendy is in possession of the original image (cover) agreed upon by Alice and Bob for their secret communication. Reliability of our proposed solution can be appreciated by observing the differences between cover, preprocessed cover and Stego object. Proposed scheme is equally good for color as well as gray scaled images. Another interesting aspect of this research is that it implicitly presents fusion of cover and information to be hidden in it while taking care of passive attacks on it
Authors and Affiliations
Khan Rafat, Muhammad Hussain
Improving Quality of Vietnamese Text Summarization Based on Sentence Compression
Sentence compression is a valuable task in the framework of text summarization. In previous works, the sentence is reduced by removing redundant words or phrases from original sentence and tries to remain information. In...
Autonomous Vehicle-to-Vehicle (V2V) Decision Making in Roundabout using Game Theory
Roundabout intersections promote a continuous flow of traffic. Roundabouts entry move traffic through an intersection more quickly, and with less congestion on approaching roads. With the introduction of smart vehicles a...
Spatial Domain Image Steganography based on Security and Randomization
In the present digital scenario secure communication is the prime requirement. Commonly, cryptography used for the said purpose. Another method related to cryptography is used for the above objective is Steganography. St...
Application of Fuzzy Analytical Hierarchy Process based on Geometric Mean Method to Prioritize Social Capital Network Indicators
Vietnam is striving to develop dynamically and overcome many human resource challenges. As the economy expands, the demand for jobs and human resource development has become increasingly critical. The pressures from refo...
A Comparative Study between Applications Developed for Android and iOS
Now-a-days, mobile applications implement complex functionalities that use device’s core features extensively. This paper realizes a performance analysis of the most important core features used frequently in mobile appl...