An Efficient Steganographic Scheme Using Skin Tone Detection and Discrete Wavelet Transformation
Journal Title: International Journal of Computer Science & Engineering Technology - Year 2013, Vol 4, Issue 7
Abstract
Steganography is a technique used for secret communication, in which secret information is embedded into a cover medium. The Secret information may be some text or image or even audio clip and the cover medium may be some image, audio or some word file. In this paper, we propose a steganographic scheme for text hiding and logo hiding. We use Natural Images as cover medium for hiding secret information. Steganography scheme used in this paper is based on skin tone detection. In this scheme secret information is embedded within skin portion of image. Skin tone detection is achieved using HSV (Hue, Saturation and Value) color space. Additionally DWT (Discrete Wavelet Transform) and LSB (Least Significant Bit) methods are used for embedding of secret information.
Authors and Affiliations
Swati Kumravat
Detection and Removal of Bad Smells instantly using a InsRefactor
Software refactoring is one of the essential techniques which are used to improve the software quality without affecting any of the external functionality of the software. There were numerous of software refactoring tool...
Hilditch’s Algorithm Based Tamil Character Recognition
Character identification plays a vital role in the contemporary world of Image processing. It can solve many composite problems and makes human’s work easier. An instance is Handwritten Character detection. Handwritten r...
Fusion of Panchromatic and Multispectral Image with no Gamut
Satellite with different sensors generates images with different characteristics such as, images with spatial resolution such as panchromatic (PAN) images and images with high spectral resolution such as multispectral (M...
Secret Detection of Sensitive Data Leakage
Surveys from many years have shown that many data leakages has been found due different problems like malicious attacks, hacking, different attacks. Approximately 28% of all data leakages are due to human mistakes which...
Web Banking: A Security Management and Communications Approach
The paper provides a survey research report on the information security and communication management disciplines within the scope of Web Banking. The benefits and uses of information and communication approaches were exa...