A Proposed Encoding and Hiding Text in an Image by using Fractal Image Compression
Journal Title: International Journal on Computer Science and Engineering - Year 2012, Vol 4, Issue 1
Abstract
The problem of protecting data and information originates from the dependency upon encryption and steganography separately. Therefore, it is easy to break them and detecting the contents of the secret massages available in data, pictures, texts or audios. To add multiple layers of security our research proposed an algorithm that can hide a text in an image in a such away that prevents as much as possible any suspicion having a hidden text, after RSA cipher. In this research a new hiding method is proposed based on encoding the information by using RSA cryptosystem and hiding the cipher information(ciphertext) by using proposed fractal image compression(FIC). FIC based on IFS exploits the spatial redundancy with it is different parts and they are blocked based algorithm with variable block size that intend to approximate blocks of a determined size with contractive transformation. This blocks based allow hiding capacity to be large.
Authors and Affiliations
Dr. Fadhil Salman Abed
Geographic information based Replication and Drop Routing (GeoRaDR): A Hybrid Message Transmission Approach for DTNs
Several approaches have been proposed to perform routing in Delay/Disruption Tolerant Networks (DTNs) which has a random connectivity pattern. As the routing path from the source to destination will not be available alwa...
AN ALGORITHM FOR STEERING CONTROL WITH SIMULATION RESULTS
The idea behind the paper was channelization of human thoughts to automated realization. It is decided to implement the theme of automatic maneuvering of vehicles and the unanimous choice of sensor was touch screen. It w...
Two Factor Biometric Key for Secure Wireless Networks
The applications of wireless networks is steadily increasing through out the world. Wireless transactions are now appening in highly secure banking networks. To have more reliable networks, security of wireless networks...
Throughput Analysis of Many to One Multihop Wireless Mesh Ad hoc Network
Mobile ad hoc networks are formed by co operative association of wireless nodes communicating with each other without the use of infrastructure. Every node acts as a router in the network and enables the communication be...
Implementation of Multiplatform RIA using User Interface Components
Abstract—Nowadays, there are a growing number of Web 1.0 applications that are migrating towards Web 2.0 User Interfaces, in search of multimedia support and higher levels of interaction among other features. These We...