A High Capacitive and Confidentiality Steganography Using Private key
Journal Title: International Journal of Electronics Communication and Computer Technology - Year 2011, Vol 1, Issue 1
Abstract
Steganography and Steganalysis are two important areas of research that involve a number of applications. These two areas of research are important especially when reliable and secure information exchange is required. To enhance the embedding capacity of image steganography and provide an imperceptible stego-image for human vision, a novel adaptive number of least significant bits substitution method with private stego-key based on gray-level ranges is proposed in this paper. The new technique embeds binary bit stream in 8-bits gray-scale image. The method also verifies whether the attacker has tried to modify the secret hidden (or stego-image also) information in the stego-image. The technique embeds the hidden information in the spatial domain of the cover image and uses simple (Ex-OR operation based) digital signature using 140-bit key to verify the integrity from the stego-image.
Authors and Affiliations
Smriti Gupta| Department Of Computer Science and Engineering NRI Institute of Science and Technology Bhopal, MP,India smriti.gupta@gmail.com
Monitoring and Protection of Oil and Gas Condition in Industrial Using Wireless Sensor Networks
Wireless Sensor Networks (WSNs) are one of the fastest growing and emerging technologies in the field of Wireless networking today. WSNs have a vast amount of applications including environmental monitoring, military, ec...
A Mathematical Approach towards Mitigating the Effects of Wormhole Attack
Mobile Ad-hoc or spontaneous wireless networks are threatened by a powerful attack known as the wormhole attack. The wormhole attack is very powerful and preventing the attack has proven to be difficult. A strategic plac...
User Driven Feedback Control System driven using CAN Protocol
Industrial automation is a sector having vast possibilities for major improvements. The system described in this paper consists of a console master computer (CMC) which will monitor various physical nodes usually found i...
Reconstruction of Cloud Contaminated Remote Sensing Images Using Inpainting Strategy
This paper focuses a method for cloud detection and their reconstruction technique. Detecting these portions of an image and then filling in the missing data is an important photo editing work. The filling-in approach su...
Overlap Wavelet Transform for Image Segmentation
A new color image segmentation approach based on OWT is presented in this work. OWT extracts wavelet features which give a good separation of different patterns. Moreover the proposed algorithm uses morphological oper...