A Proposed Encoding and Hiding Text in an Image by using Fractal Image Compression
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 1
Abstract
The problem of protecting data and information originates from the dependency upon encryption and steganography separately. Therefore, it is easy to break them and detecting the contents of the secret massages available in data, pictures, texts or audios. To add multiple layers of security our research proposed an algorithm that can hide a text in an image in a such away that prevents as much as possible any suspicion having a hidden text, after RSA cipher. In this research a new hiding method is proposed based on encoding the information by using RSA cryptosystem and hiding the cipher information(ciphertext) by using proposed fractal image compression(FIC). FIC based on IFS exploits the spatial redundancy with it is different parts and they are blocked based algorithm with variable block size that intend to approximate blocks of a determined size with contractive transformation. This blocks based allow hiding capacity to be large.
Authors and Affiliations
Dr. Fadhil Salman Abed
Simulator for Software Project Reliability Estimation
Several models are there for software development processes, each describing approaches to a variety of tasks or activities that take place during the process. Without project management, software projects can easily be...
Modified route-maintenance in AODV Routing protocol using static nodes in realistic mobility model
One of the popular wireless network architectures is Mobile Ad Hoc Network (MANET). It can be easily deployed in every environment, without any underlying backbone and infrastructure support. MANET is a wireless network...
MICROCONTROLLER PIN CONFIGURATION TOOL
Configuring the micro controller with large number of pins is tedious. Latest Infine on microcontroller contains more than 200 pins and each pin has classes of signals. Therefore the complexity of the microcontroller is...
Robust Watermarking Scheme using Column DCT Wavelet Transform under Various Attacks
A novel watermarking scheme for color images has been proposed using column DCT wavelet transform. To improve the robustness of watermarking scheme, compressed watermark with tolerable fidelity is embedded into host imag...
Iris Pattern Segmentation using Automatic Segmentation and Window Technique
A Biometric system is an automatic identification of an individual based on a unique feature or characteristic. Iris recognition has great advantage such as variability, stability and security. In this paper, use the two...