A Novel Approach for Reversible Data Hiding in Encrypted Images Using Key Based Pixel Selection
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2014, Vol 5, Issue 6
Abstract
In this paper a new steganographic approach is proposed to increase the confidentiality of the hidden data in RGB images by placing the data randomly across the encrypted images. By using the secret key provided to the users, key based pixel selection approach is applied in order to randomize the pixel selection. In order to make the retrieved image and data free from error, space is reserved before image encryption. LSB replacement method is used to embed the data in the encrypted image. The basic idea in the newly proposed method is to embed the data into the least significant bits of pixels of red plane which are placed diagonally within the cover image. Replacing the Least Significant bits in a single RGB plane does not provide any distortion to the restored image which can be visible to human eye.
Authors and Affiliations
Mala R , Mrs. Manimozi I
Novel Approach for Detection of Brain Tumor using Segmentation Techniques
Medical Image Processing is one of the standard method to detect the abnormal tissue. The key benefit of this field is reduction of manual work and early detection of the disease. Various types of medical imaging modalit...
“MOBILE MALWARE DETECTION TECHNIQUES”
The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet acc...
Improvement of performance of web crawlers for efficient web searching and crawling
The effectiveness of a crawler directly affects the efficiency of the searching quality of the web search engines. As the crawler interacts with billions of hosts or servers over a period of weeks or months, the issues o...
Implementing secure data accumulation by ant agents in wireless sensor network using randomized dispersive routes
In this paper we discuss the implementation of data accumulation in wireless sensor networks and also the methods to increase the security of the accumulated data using dispersive routing techniques like NRRP( Non Repeti...
Rule Based Exception Handling and Priority Modeling For Diabetes Management Using Ontology and SWRL
Increase treatment quality is the most challenging task because clinical status of the patient and circumstances inside a healthcare organization constantly change. In this paper we present a Rule based Exception handlin...